Information Technology

Technology is constantly changing, so how can you be sure your systems are up-to-date?  We can help you learn how to manage and use the technological tools you need to operate efficiently.  You'll also find easy and affordable ways to outsource your information technology needs, ensuring the security and optimal effectiveness of your systems.  Because let's face it ... unless you are in the IT business, you probably need some help.

Cyber Security Resources

cyber threatsThe threat of a cyber attack on your small business is very real.

SBAM has put together a variety of resources to help you become informed. Click here for details.


Managed IT Services

NUWAVEAre your IT systems operating efficiently?

With the proper technology and implementation team, your company can realize dramatic productivity and profitability gains. NuWave Technology Partners' unique approach provides clients with a single point-of-contact for all their telephone and data needs, and covers the spectrum from servicing existing phone systems to complete new installations.

Related News

How Michigan’s Department of Agriculture and Rural Development is helping small businesses grow! Wednesday on Business Next

Jamie Clover Adams, director of Michigan’s Department of Agriculture and Rural Development, provides an overview of the department’s mission and how it relates to small businesses; talks about how the department is helping small businesses grow and create jobs, reports how the department is helping small businesses comply with licensing and regulation, talks about the role small businesses will play in growing Michigan’s food industry and explains how the department is helping small businesses participate in the food export market. Also, an interview with a small business recently featured at MichiganJobsInsight.com. Rod Call is a co-founder of Unsalted Sailing in Traverse City.

Listen today at 10 a.m., 3 p.m. and 8 p.m. on the 
Michigan Business NetworkSBAM members can log in and listen to archived programs anytime on a PC or mobile device by going to the Business Next show page.     

Low-cost volunteer public speaking training for you and your workers! Details on today’s Business Next audio seminar

Today on Business Next, Michael Rogers talks with Jack Pyle, Lt. Governor for Marketing for District 62 Toastmasters, to learn how Toastmasters’ low-cost volunteer public speaking training can help your small business employees improve their productivity and value as workers. Also on today’s show, Valentino Hernandez, owner of iCab, talks about his taxi cab service that harnesses the power of mobile technology (featured on Michiganjobsinsight.com); James A. Ostrowski, Office of Environmental Assistance for the Michigan Department of Environmental Quality, talks about the recently-released 7th Edition Michigan Guide to Environmental Health & Safety Regulations; and Tyrell Barnes, owner of New Tech Central, discusses his high end computer business and the rewards and challenges of being a small business owner in Detroit.

Listen today at 10 a.m., 3 p.m. and 8 p.m. on the Michigan Business NetworkSBAM members can log in and listen to archived programs anytime on a PC or mobile device by going to the Business Next show page.    

Advice on improving your sales! Listen today on the free Business Next audio seminar

Friday on Business Next, SBAM’s Vice President Communications Michael Rogers talks with Perry Ballard, founder of Manage Perceived Value, about the interaction between small business products and services and how to leverage that to improve sales. Also today, Patricia Salo of the Michigan Small Business Technology Development Center talks about the New Venture program that helps people start small businesses in southeast Michigan. And, Michael interviews Robert Kamal, owner of KoHorts IT services, a fast moving company in the field of mobile device marketing; and Toby Brzoznowski, Executive Vice President and company co-founder of LLamasoft, to learn more about his supply chain management company, its growth plans and insights for small business owners hoping to do a better job handling their supply chains.

Listen Friday at 10 a.m., 3 p.m. and 8 p.m. on the 
Michigan Business NetworkSBAM members can log in and listen to archived programs anytime on a PC or mobile device by going to the Business Next show page.   

Think your data is safe? Think again.

Article courtesy of SBAM Approved Partner ASE

By Anthony Kaylin  

Common problem: your employee leaves the company, then uses your company’s data in the new job.  What recourse do you have?

In April 2010, Mike Miller resigned from his position as Project Director for WEC Carolina Energy Solutions, Inc. (WEC). Twenty days later, he made a presentation to a potential WEC customer on behalf of WEC’s competitor, Arc Energy Services, Inc. (Arc). The customer ultimately chose to do business with Arc. WEC contends that before resigning, Miller, acting at Arc’s direction, downloaded WEC’s proprietary information and used it in his presentation to Arc. WEC sued Miller, his assistant Emily Kelley, and Arc. WEC alleges that, among other things, Arc violated the Computer Fraud and Abuse Act (CFAA).

When Miller worked for WEC, the company provided him with a laptop computer and cell phone, and authorized his access to the company’s intranet and computer servers. Miller had access to numerous confidential and trade secret documents stored on WEC servers, including pricing terms, ending projects and the technical capabilities of WEC. To protect its confidential information and trade secrets, WEC had instituted policies that prohibited using the information without authorization or downloading it to a personal computer. However, these policies did not restrict Miller’s authorization to access the information.

At trial, the court dismissed the CFAA allegations. WEC appealed to the 4th Circuit Court of Appeals.

To prove a case under the CFAA, the ex-employer must show that the ex-employee (1) "intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer"; or (2) "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value"; or (3) "intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage[,] or . . . causes damage and loss."

On appeal, the 4th Circuit upheld the trial court, adopting a narrow reading of the terms "without authorization" and "exceeds authorized access." It held that these terms apply only when an individual accesses a computer without permission or obtains or alters information on a computer beyond that which he is authorized to access. The court then stated that WEC failed to allege that Miller and Kelley accessed a computer or information on a computer without authorization. The court then found that WEC’s complaint belied such a conclusion because the complaint stated that Miller "had access to WEC’s intranet and computer servers" and "to numerous confidential and trade secret documents stored on these computer servers, including pricing, terms, pending projects[,] and the technical capabilities of WEC."

The court then found that that although Miller and Kelley may have misappropriated information, they did not access a computer without authorization or exceed their authorized access.

Currently, there are two interpretations of “without authorization" or "exceeds authorized access” making the rounds of the federal circuits. The 9th Circuit mirrors the 4th Circuit interpretation. The 9th Circuit holds that an employee's misuse or misappropriation of an employer's business information is not "without authorization" so long as the employer has given the employee permission to access such information. The 7th Circuit, by contrast, holds a broader interpretation of these terms. When an employee accesses a computer or information on a computer to further interests that are adverse to his employer, he violates his duty of loya

Build a team of trusted advisors! Find out how on today's Business Next free audio seminar.

Michael Rogers interviews Paul Hense, retired Grand Rapids CPA and nationally-known small business advocate. Paul talks about how to select a good team of professional advisors to help your small business succeed. He suggests that your team should consist of an accountant, attorney, financial planner, HR expert and legislative advocates.

Listen Wednesday at 10 a.m., 3 p.m. and 8 p.m. on the 
Michigan Business NetworkSBAM members can log in and listen to archived programs anytime on a PC or mobile device by going to the Business Next show page.   
RSS
First34353637383940414243Last