February 16, 2013 (Press-News.org) In today's information age, knowledge is power. More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods. As a result, a company's "trade secrets" or confidential information are its stock-in-trade. Lose them, and profits nosedive.
Our society recognizes the importance of keeping the confidentiality of certain information and as a result, 40 states and the District of Columbia have adopted the Uniform Trade Secrets Act ("UTSA"), with some modification in each state.
Among other things, the definition of "trade secret" that was adopted as part of the UTSA varies slightly from state to state. The UTSA was adopted in California in 2003 and now exists beginning at Section 3426 of the California Civil Code. In California, a trade secret it is defined as information, including a formula, pattern, compilation, program, device, method, technique or process, that:
- derives independent economic value, actual or potential, from not being generally known to the public or other persons who can obtain economic value from its disclosure or use, and
- is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
If an item is recognized as a trade secret or confidential information, the UTSA provides you with many rights and remedies if it is stolen. This includes damages and court orders prohibiting its use by competitors who acquired it improperly, among other things.
Trade Secrets And Confidential Information
Quite a bit of information can be protected as a trade secret under the UTSA. Essentially, trade secrets are almost any information that gives a business entity a competitive advantage if they are kept secret from the competition. This can include: customer lists, software, manufacturing processes, the formula for manufacturing a product, information about customer needs, ordering patterns and preferences, business plans, marketing techniques, and even information about your general business strategy and direction.
Even items that might not be trade secrets under the law may be protected in California if their disclosure would give a competitor an advantage, and the information is kept confidential within your company.
In order to be protected, trade secrets and confidential information must be unavailable to the general public and not able to be discovered by, for example, just looking through the phone book or publicly available information. It also must be "the subject of efforts that are reasonable under the circumstances to maintain its secrecy." In other words, as long as the company makes "reasonable efforts," even if the secret gets out in some way, you may protect it under the UTSA.
The UTSA states that not every person must receive express notice of the trade secret status of every piece of information. However, you should try to give such notice to anyone who might receive it. The standard is that you must undertake "reasonable efforts" to maintain secrecy. Though this seems to be an objective standard, what efforts are "reasonable" may differ in the minds of judges and juries. So more, rather than fewer, efforts, is better.
Companies who are concerned about keeping the competitive advantage that comes from keeping their trade secrets, well, secret, should take some steps now to protect them. Doing so is a good idea for two reasons. First, if you take the proper protective actions now, it will be more difficult for someone to steal your trade secrets or confidential information. Second, taking proper steps will make it easier for you to get relief from a court under the Uniform Trade Secrets Act and other relevant laws if someone steals them.
Steps You Can Take To Protect Your Trade Secrets Now
$ Decide what information you want to protect as a trade secret or confidential information. But be reasonable in doing so. If you define everything as a trade secret, it will weaken your position when arguing that a particular piece of information is, in fact, confidential and that its secrecy is essential to your company's success.
$ Limit access to the information only to persons who need to know it as a part of their job duties.
$ Have all employees who will be exposed to trade secrets or confidential information sign a confidentiality agreement that contains a statement that they recognize that it is a trade secret, that it is distributed on a "need to know only" basis, a promise not to use the information in the future to compete with your company, and an agreement to advise any subsequent employer of the restrictions. Make sure those agreements are reasonable in scope and nature and that they contain adequate consideration to make the agreement enforceable. Keep the signed agreement as part of each employee's file.
$ Include a similar confidentiality provision in all contracts with temporary workers, outside entities, vendors who will have access to the information, distributors, partners and customers. Keep the signed agreement as part of files for those workers and entities, as well.
$ If a document contains trade secrets, label it as confidential, and treat it as such. Prevent widescale copying of such documents and, if appropriate and manageable, number each copy (in the middle of the page, so that the source of any unauthorized copies can be identified), register the document numbers and require that the documents be returned for destruction either when the task is completed or on demand.
$ Create a formal confidentiality policy for all trade secrets and confidential information, follow it, and instruct all employees who work with any company information that certain such information is considered a trade secret, to be treated confidentially.
$ Act appropriately to correct and discipline all persons who violate these policies.
$ Conduct exit audits with all departing employees and, as a part of these audits, have them return all secret information and advise them of their duties under any non-compete, non-disclosure, or other agreements. Have these spelled out in a document which they acknowledge reviewing by signing it.
$ Make sure that confidential information in a computerized file is available only with a password, and that the password is given only to necessary personnel and is changed regularly. Keep a record of the measures taken by, for example, logging the dates that the passwords are changed. Create firewalls to any internet-connected computers and maintain necessary security to prevent computer espionage and theft.
$ Be careful of emails, and adopt a formal policy of not exchanging trade secrets or confidential information via email. Emails are stored on every computer on the Internet through which they pass on the way to their destination, and it is not secure. If email is the only way to exchange information, use an encryption program, such as PGP, to protect it.
$ Conduct periodic trade secret audits to check for leaks.
$ Be aware that trade secrets laws in the U.S. are different from laws in other countries. Outside the U.S., trade secret protection may be nonexistent. In some countries, industrial espionage is considered legal, acceptable and is often used.
If you follow the recommendations above, you are well on your way to protecting your company's trade secrets and ensuring that your company has a legitimate advantage in using its confidential information in a profitable way. After taking the above steps, anyone who attempts to steal your trade secrets or confidential information does so at his or her own peril; as you have greatly increased your chances of prevailing in judicial proceedings to protect them.
Website: http://www.hockani.com/
How to Protect Your Company's Trade Secrets
More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods.
2013-02-16
ELSE PRESS RELEASES FROM THIS DATE:
Let the Winner Games Begin!
2013-02-16
Winner.com is proud to announce the launching of Winner Games. Comprised of a collection of instant win and casual games, Winner features new hits such as Avengers Scratch, Rubik's Riches and Captain America Scratch.
Visitors to Winner Games will find categories such as Sports & Virtual with casual horseracing and football games.
Avengers Scratch is a new game that takes players through scenes from the hit Avengers movie. Players match The Incredible Hulk, Thor and Iron Man and collect Marvel-ous payouts. The Avengers Scratch jackpot is won by matching the S.H.I.E.L.D. ...
Biodiversity protects against disease, scientists find
2013-02-15
The richer the assortment of amphibian species in a pond, the more protection that community of frogs, toads and salamanders has against a parasitic infection that can cause severe deformities, including the growth of extra legs.
The findings, published in a paper in this week's issue of the journal Nature, support the idea that greater biodiversity in large-scale ecosystems, such as forests or grasslands, may also provide greater protection against diseases, including those that affect humans.
A larger number of mammal species in an area may curb cases of Lyme disease, ...
Decoys could blunt spread of ash-killing beetles
2013-02-15
UNIVERSITY PARK, Pa. -- As the emerald ash borer ravages North American ash trees, threatening the trees' very survival, a team of entomologists and engineers may have found a way to prevent the spread of the pests.
Emerald ash borers (EABs), a type of beetle native to Asia, first appeared in the U.S. about 20 years ago. They are now moving east from Michigan, killing ash trees on the Eastern Seaboard as far south as North Carolina.
"Within 25 years, practically no ash trees may remain on either side of the St. Lawrence Seaway," said Akhlesh Lakhtakia, Charles Godfrey ...
Poor stress responses may lead to obesity in children
2013-02-15
UNIVERSITY PARK, Pa. -- Children who overreact to stressors may be at risk of becoming overweight or obese, according to researchers at Penn State and Johns Hopkins University.
"Our results suggest that some children who are at risk of becoming obese can be identified by their biological response to a stressor," said Lori Francis, associate professor of biobehavioral health. "Ultimately, the goal is to help children manage stress in ways that promote health and reduce the risks associated with an over- or under-reactive stress response."
Francis and her colleagues ...
A smoking gun in lung cancer epigenetics
2013-02-15
Recent studies have identified correlations between cigarette smoke-induced microRNA (miRNA) expression and different aspects of lung cancer; however, it is unclear how miRNA expression directly contributes to carcinogenesis. MiRNAs regulate the expression of target genes and can have a significant impact on when and how well different gene products are expressed. In this issue of the Journal of Clinical Investigation, David Schrump and colleagues at the National Cancer Institute in Bethesda, MD, measured miRNA expression in normal human lung cells exposed to cigarette ...
Increased heart attack-related mortality in diabetics linked to protein oxidation
2013-02-15
Diabetic patients are more than twice as likely to die from a heart attack as non-diabetic patients, but the mechanisms that underlie increased heart attack-related mortality in diabetic patients are unknown. High levels of the oxidized form of the protein CamKII (ox-CaMKII) have been linked to increased risk of sudden death after heart attack. Additionally, hearts from diabetic patients have significantly greater ox-CAMKII compared to hearts from non-diabetic patients. In this issue of the Journal of Clinical Investigation, Min Luo and colleagues at the University of Iowa ...
JCI early table of contents for Feb. 15, 2013
2013-02-15
A smoking gun in lung cancer epigenetics
Recent studies have identified correlations between cigarette smoke-induced microRNA (miRNA) expression and different aspects of lung cancer; however, it is unclear how miRNA expression directly contributes to carcinogenesis. MiRNAs regulate the expression of target genes and can have a significant impact on when and how well different gene products are expressed. In this issue of the Journal of Clinical Investigation, David Schrump and colleagues at the National Cancer Institute in Bethesda, MD, measured miRNA expression in normal ...
Most comprehensive report in 50 years on education of key scientists
2013-02-15
In the most comprehensive report in a half century, experts today described fundamental changes needed in the education of the scientists whose work impacts medicine, drug discovery and virtually every other discipline. The result of a year-long project of a presidential commission of the American Chemical Society (ACS), the world's largest scientific society, the report was the topic of a symposium here at the 2013 annual meeting of the American Association for the Advancement of Science (AAAS).
Although it concluded that the state of graduate education in the chemical ...
'The Scars of Human Evolution' briefing explores physical fallout from 2-footed walking
2013-02-15
From sore feet to backaches, blame it on human evolution.
"Because we are the only mammals to walk on two feet," says Bruce Latimer, an anthropologist from the Case Western Reserve University School of Dental Medicine.
Latimer will present "A Backache of Longstanding: An Evolutionary Perspective on the Human Vertebral Column" at the 2013 American Association for the Advancement of Science's annual meeting in Boston, Feb. 14-18. His talk will be featured in the session, "The Scars of Human Evolution."
Latimer and other panelists will explain how adapting to upright ...
The science of uncertainty in genomic medicine
2013-02-15
BOSTON - The notion of "personalizing" health care through the use of an individual's genetic code has attracted considerable enthusiasm and investment. Impressive examples, confirmed through formal studies of clinical validity and utility, suggest that we have only scratched the surface of applications to treat disease more precisely, identify risk factors for complex disease, and guide preventative measures.
As the cost of sequencing entire genomes falls, the opportunities for people around the world to take possession of their entire genetic code will proliferate. ...
LAST 30 PRESS RELEASES:
Pink skies
Monkeys are world’s best yodellers - new research
Key differences between visual- and memory-led Alzheimer’s discovered
% weight loss targets in obesity management – is this the wrong objective?
An app can change how you see yourself at work
NYC speed cameras take six months to change driver behavior, effects vary by neighborhood, new study reveals
New research shows that propaganda is on the rise in China
Even the richest Americans face shorter lifespans than their European counterparts, study finds
Novel genes linked to rare childhood diarrhea
New computer model reveals how Bronze Age Scandinavians could have crossed the sea
Novel point-of-care technology delivers accurate HIV results in minutes
Researchers reveal key brain differences to explain why Ritalin helps improve focus in some more than others
Study finds nearly five-fold increase in hospitalizations for common cause of stroke
Study reveals how alcohol abuse damages cognition
Medicinal cannabis is linked to long-term benefits in health-related quality of life
Microplastics detected in cat placentas and fetuses during early pregnancy
Ancient amphibians as big as alligators died in mass mortality event in Triassic Wyoming
Scientists uncover the first clear evidence of air sacs in the fossilized bones of alvarezsaurian dinosaurs: the "hollow bones" which help modern day birds to fly
Alcohol makes male flies sexy
TB patients globally often incur "catastrophic costs" of up to $11,329 USD, despite many countries offering free treatment, with predominant drivers of cost being hospitalization and loss of income
Study links teen girls’ screen time to sleep disruptions and depression
Scientists unveil starfish-inspired wearable tech for heart monitoring
Footprints reveal prehistoric Scottish lagoons were stomping grounds for giant Jurassic dinosaurs
AI effectively predicts dementia risk in American Indian/Alaska Native elders
First guideline on newborn screening for cystic fibrosis calls for changes in practice to improve outcomes
Existing international law can help secure peace and security in outer space, study shows
Pinning down the process of West Nile virus transmission
UTA-backed research tackles health challenges across ages
In pancreatic cancer, a race against time
Targeting FGFR2 may prevent or delay some KRAS-mutated pancreatic cancers
[Press-News.org] How to Protect Your Company's Trade SecretsMore and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods.