PRIVACY & SECURITY
Client Confidentiality
As stated at "Testimony," because of its focus on sensitive strategic issues, Bridges does not generally reveal the names of clients, following the precedent set by Bain & Company and Kissinger Associates. In the 70s the partners at Bain & Company (founded 1973) carried no business cards and referred to clients by code names. Kissinger Associates (founded 1982) to this day does not reveal clients and allegedly forbids them from disclosing any relationship with the firm. Bridges policy is similar, albeit not quite as strict. Hence some limited client references (both wins and losses) are made at "Testimony."
Aside from the exceptions at "Testimony," clients are not disclosed. Bridges does not publish a client list. Bridges will not intentionally disclose, reveal or transfer (and shall take reasonable steps to protect the confidentiality, and to prevent the unauthorized or accidental disclosure of) client information to third parties (i.e. persons or entities that are not affiliates of Bridges) subject only to the exception of a court order.
Security for strategic decisions can be very sensitive, for instance for any firm having military contracts. A maximum security option is briefly discussed in the final section below. The concept of private versus public information differs widely from one culture to another. The classic example is that one´s salary is often a secret in Germany, but casually chatted about in the U.S. The laws protecting one´s private data are also far stricter in Germany than in the U.S. However in both countries banks will fully disclose both commercial and personal account information to just about any stranger who asks. Since 9/11, unrecorded bearer shares, numbered accounts and bank secrecy are pretty much things of the past. U.S. customs officials will sometimes seize a laptop and demand its password ----or it does not get returned. As security is becoming harder to maintain, piracy and theft of intellectual property are on the rise. Furthermore any discussion of military contracts is as sensitive a topic today as it ever was in the past. (The author has twice briefly held security clearances. The first was a Secret clearance from the U.S. Marine Corps when he was involved with military intelligence. The second was a low level security clearance from the German Ministry of Defence because of its funding of a research institute (LIMAS) at Bonn University with which he was associated.) A suggestion for a high level of security, for instance for a merger or acquisition (especially a hostile takeover) follows. A Maximum Security Option The coach is provided by the client a seperate laptop dedicated solely to the coaching engagement for its duration. There is no E-Mail communication, transfer of files or data except over this secure laptop. This laptop has triple security. First, only the coach and the client have a password to it. Second, PGP software (cf. www.pgpi.com) (PGP = Pretty Good Privacy) has been installed on it. Hence all E-Mail exchanges are encrypted. Third, software preventing unwanted printing or copying ("cut and paste") is also installed. At the conclusion of the engagement, the laptop with its sensitive data is returned to the client. There is no back-up at Bridges.