The options to protect data, formulas, products, and documented ideas or concepts come in many forms. Government and big business seem to spend the most time and money focused on this protection as well as educating others about the risks and mitigation.
The government creates entire departments focused on protecting intellectual property. Presidential directives are issued, methods are developed, and collaboration ensues in an effort to protect both public and private sector from disaster. Governments encourage businesses to take steps to protect IP, brand, and innovations. Internal threats to data center security have been a known exposure for decades.
As early as 1998, the United States government formally recognized the increasing risk of cyber threats when the President issued “…Presidential Decision Directive 63 (PDD-63), which called for the creation of a national plan to protect the services on which we depend daily.”  Our everyday essential services, i.e. energy, banking, finance transportation, vital human services, and telecommunications are all interdependent. Preservation of vital intellectual property would be impacted due to the ever-increasing interdependency of electronics on our way of life. With the unchecked growth of the internet-web, advanced electronics, and miniaturized telecommunications, our intellectual property would be vulnerable to a whole host of new threats.
The economy itself when in a down turn, can be considered a disruption requiring considerations be given to protecting Intellectual Property-IP. In the Philippines, “…micro, small, and medium enterprises (MSMEs) account for 99.6 percent of the country’s economy” and are told to protect assets . These type organizations are being encouraged to register the innovations, inventions, and brands in order to preserve their intellectual property rights.
I’m sure there are hundreds of examples of methods employed by businesses to protect IP, here are a few:
- Hardware, software and services vendors develop products to protect data and systems for all size of organization from the home pc to multi-national corporations- anti-spam, anti-virus, anti-phishing, etc.
- At Intellistore Design Consulting one of the many IT service vendors on the web, they encourage clients to develop and implement IT Best practices. Their ‘Six Tips’  could be used by any business/data center:
- Take ownership of your IP
- Ensure access to source code
- Prepare and IT disaster recovery plan
- Incorporate the ability to upgrade or migrate to new technologies
- Implement data compliance standards
- Take control of your companies online accounts
- At Google, the data center boasts several backup options with an emphasis on redundancy as a primary tactic to protect and restore data and systems, with a solution called Perforce Disaster Recovery. 
- ATT focused some of their advertising, marketing, and educational material for citizens around Katrina events by providing advice on protecting value records. Among many things to do, ATT recommended protecting all resources, records, and data through both traditional off-site backups, as well as, using generators for backup power supply. The generators are focused on the most critical business functions. 
Burtles suggests that more than one backup method needs to be employed to ensure successful recovery, and for data centers, he places great emphasis on hot-sites, cold-sites, and redundancy. 
The concept of trust seems to be an important element of protective disaster recovery plan for intellectual property. At some point, a decision must be made to place a copy and the original innovation (IP) in a two different safe places. Determining a ‘safe place’ is an entire project in itself and would involve statistical theory along with a healthy dose of trust.
Redundancy of data systems, data centers, access methods, and protective software are all offer solidly proven methods to protect data and information. Governments clearly see the need and have taken steps across the globe to secure their data as well as educate business on best practices. Entire businesses exist in the data storage world, which provide hardware, software, and services to protect information.
In the end, I believe it comes down to taking a calculated risk, based on solid data, and implementing a proven method of intellectual property protection.
 “Critical Infrastructure Protection”. Department of Justice, Computer Crime and Intellectual Property Section-CCIPS, USA.gov. Retrieved 10-04-09 from http://www.usdoj.gov/criminal/cybercrime/critinfr.htm
 GMA NewsTV.com, Retrieved 10-04-09 from http://www.gmanews.tv/story/167997/Firms-told-to-protect-intellectual-property-assets
 Herrmann, Kathy. “6 Tips to Protect Your Intellectual Property“. 6-MAY09Retrieved 10-04-09 from http://community.intellicore-design.com/blog/2009/5/6/6-tips-to-protect-your-intellectual-property.html
 Wright, Rick. 2008.“Perforce Disaster Recovery at Google”. Retrieved 10-04-09 from http://www.perforce.com/perforce/conferences/us/2009/Presentations/Wright-Disaster_Recovery-paper.pdf
 “ATT Disaster Preparedness – 2008 Hurricane Season”. 2008. Retrieved 10-04-09 from http://www.att.com/Common/merger/files/pdf/att_emer_prepare_tips.pdf
 Burtles, Jim. 2007. “Principles and Practice of Business Continuity: Tools and Techniques“, Rothstein Associates.