The good news is that there are criminal and civil laws for companies to pursue in an effort to recover misappropriated datum and to prevent it from being used against them. Of course, the best defense is a strong offense, and for most organizations, this means education and preparation throughout the enterprise. In 2004, Smith complied a document titled “Reporting & Planning Guidelines—Industrial Espionage & Network Intrusions” (available at www.jcsmithinv.com) that serves as a valuable tool for those looking to identify and protect against unscrupulous acts. The guidelines include important “Dos” and “Don’ts” that apply wherever valuable proprietary data need to be protected, whether it is sophisticated software or dynamic label designs.