February 16, 2013 (Press-News.org) In today's information age, knowledge is power. More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods. As a result, a company's "trade secrets" or confidential information are its stock-in-trade. Lose them, and profits nosedive.
Our society recognizes the importance of keeping the confidentiality of certain information and as a result, 40 states and the District of Columbia have adopted the Uniform Trade Secrets Act ("UTSA"), with some modification in each state.
Among other things, the definition of "trade secret" that was adopted as part of the UTSA varies slightly from state to state. The UTSA was adopted in California in 2003 and now exists beginning at Section 3426 of the California Civil Code. In California, a trade secret it is defined as information, including a formula, pattern, compilation, program, device, method, technique or process, that:
- derives independent economic value, actual or potential, from not being generally known to the public or other persons who can obtain economic value from its disclosure or use, and
- is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
If an item is recognized as a trade secret or confidential information, the UTSA provides you with many rights and remedies if it is stolen. This includes damages and court orders prohibiting its use by competitors who acquired it improperly, among other things.
Trade Secrets And Confidential Information
Quite a bit of information can be protected as a trade secret under the UTSA. Essentially, trade secrets are almost any information that gives a business entity a competitive advantage if they are kept secret from the competition. This can include: customer lists, software, manufacturing processes, the formula for manufacturing a product, information about customer needs, ordering patterns and preferences, business plans, marketing techniques, and even information about your general business strategy and direction.
Even items that might not be trade secrets under the law may be protected in California if their disclosure would give a competitor an advantage, and the information is kept confidential within your company.
In order to be protected, trade secrets and confidential information must be unavailable to the general public and not able to be discovered by, for example, just looking through the phone book or publicly available information. It also must be "the subject of efforts that are reasonable under the circumstances to maintain its secrecy." In other words, as long as the company makes "reasonable efforts," even if the secret gets out in some way, you may protect it under the UTSA.
The UTSA states that not every person must receive express notice of the trade secret status of every piece of information. However, you should try to give such notice to anyone who might receive it. The standard is that you must undertake "reasonable efforts" to maintain secrecy. Though this seems to be an objective standard, what efforts are "reasonable" may differ in the minds of judges and juries. So more, rather than fewer, efforts, is better.
Companies who are concerned about keeping the competitive advantage that comes from keeping their trade secrets, well, secret, should take some steps now to protect them. Doing so is a good idea for two reasons. First, if you take the proper protective actions now, it will be more difficult for someone to steal your trade secrets or confidential information. Second, taking proper steps will make it easier for you to get relief from a court under the Uniform Trade Secrets Act and other relevant laws if someone steals them.
Steps You Can Take To Protect Your Trade Secrets Now
$ Decide what information you want to protect as a trade secret or confidential information. But be reasonable in doing so. If you define everything as a trade secret, it will weaken your position when arguing that a particular piece of information is, in fact, confidential and that its secrecy is essential to your company's success.
$ Limit access to the information only to persons who need to know it as a part of their job duties.
$ Have all employees who will be exposed to trade secrets or confidential information sign a confidentiality agreement that contains a statement that they recognize that it is a trade secret, that it is distributed on a "need to know only" basis, a promise not to use the information in the future to compete with your company, and an agreement to advise any subsequent employer of the restrictions. Make sure those agreements are reasonable in scope and nature and that they contain adequate consideration to make the agreement enforceable. Keep the signed agreement as part of each employee's file.
$ Include a similar confidentiality provision in all contracts with temporary workers, outside entities, vendors who will have access to the information, distributors, partners and customers. Keep the signed agreement as part of files for those workers and entities, as well.
$ If a document contains trade secrets, label it as confidential, and treat it as such. Prevent widescale copying of such documents and, if appropriate and manageable, number each copy (in the middle of the page, so that the source of any unauthorized copies can be identified), register the document numbers and require that the documents be returned for destruction either when the task is completed or on demand.
$ Create a formal confidentiality policy for all trade secrets and confidential information, follow it, and instruct all employees who work with any company information that certain such information is considered a trade secret, to be treated confidentially.
$ Act appropriately to correct and discipline all persons who violate these policies.
$ Conduct exit audits with all departing employees and, as a part of these audits, have them return all secret information and advise them of their duties under any non-compete, non-disclosure, or other agreements. Have these spelled out in a document which they acknowledge reviewing by signing it.
$ Make sure that confidential information in a computerized file is available only with a password, and that the password is given only to necessary personnel and is changed regularly. Keep a record of the measures taken by, for example, logging the dates that the passwords are changed. Create firewalls to any internet-connected computers and maintain necessary security to prevent computer espionage and theft.
$ Be careful of emails, and adopt a formal policy of not exchanging trade secrets or confidential information via email. Emails are stored on every computer on the Internet through which they pass on the way to their destination, and it is not secure. If email is the only way to exchange information, use an encryption program, such as PGP, to protect it.
$ Conduct periodic trade secret audits to check for leaks.
$ Be aware that trade secrets laws in the U.S. are different from laws in other countries. Outside the U.S., trade secret protection may be nonexistent. In some countries, industrial espionage is considered legal, acceptable and is often used.
If you follow the recommendations above, you are well on your way to protecting your company's trade secrets and ensuring that your company has a legitimate advantage in using its confidential information in a profitable way. After taking the above steps, anyone who attempts to steal your trade secrets or confidential information does so at his or her own peril; as you have greatly increased your chances of prevailing in judicial proceedings to protect them.
Website: http://www.hockani.com/
How to Protect Your Company's Trade Secrets
More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods.
2013-02-16
ELSE PRESS RELEASES FROM THIS DATE:
Let the Winner Games Begin!
2013-02-16
Winner.com is proud to announce the launching of Winner Games. Comprised of a collection of instant win and casual games, Winner features new hits such as Avengers Scratch, Rubik's Riches and Captain America Scratch.
Visitors to Winner Games will find categories such as Sports & Virtual with casual horseracing and football games.
Avengers Scratch is a new game that takes players through scenes from the hit Avengers movie. Players match The Incredible Hulk, Thor and Iron Man and collect Marvel-ous payouts. The Avengers Scratch jackpot is won by matching the S.H.I.E.L.D. ...
Biodiversity protects against disease, scientists find
2013-02-15
The richer the assortment of amphibian species in a pond, the more protection that community of frogs, toads and salamanders has against a parasitic infection that can cause severe deformities, including the growth of extra legs.
The findings, published in a paper in this week's issue of the journal Nature, support the idea that greater biodiversity in large-scale ecosystems, such as forests or grasslands, may also provide greater protection against diseases, including those that affect humans.
A larger number of mammal species in an area may curb cases of Lyme disease, ...
Decoys could blunt spread of ash-killing beetles
2013-02-15
UNIVERSITY PARK, Pa. -- As the emerald ash borer ravages North American ash trees, threatening the trees' very survival, a team of entomologists and engineers may have found a way to prevent the spread of the pests.
Emerald ash borers (EABs), a type of beetle native to Asia, first appeared in the U.S. about 20 years ago. They are now moving east from Michigan, killing ash trees on the Eastern Seaboard as far south as North Carolina.
"Within 25 years, practically no ash trees may remain on either side of the St. Lawrence Seaway," said Akhlesh Lakhtakia, Charles Godfrey ...
Poor stress responses may lead to obesity in children
2013-02-15
UNIVERSITY PARK, Pa. -- Children who overreact to stressors may be at risk of becoming overweight or obese, according to researchers at Penn State and Johns Hopkins University.
"Our results suggest that some children who are at risk of becoming obese can be identified by their biological response to a stressor," said Lori Francis, associate professor of biobehavioral health. "Ultimately, the goal is to help children manage stress in ways that promote health and reduce the risks associated with an over- or under-reactive stress response."
Francis and her colleagues ...
A smoking gun in lung cancer epigenetics
2013-02-15
Recent studies have identified correlations between cigarette smoke-induced microRNA (miRNA) expression and different aspects of lung cancer; however, it is unclear how miRNA expression directly contributes to carcinogenesis. MiRNAs regulate the expression of target genes and can have a significant impact on when and how well different gene products are expressed. In this issue of the Journal of Clinical Investigation, David Schrump and colleagues at the National Cancer Institute in Bethesda, MD, measured miRNA expression in normal human lung cells exposed to cigarette ...
Increased heart attack-related mortality in diabetics linked to protein oxidation
2013-02-15
Diabetic patients are more than twice as likely to die from a heart attack as non-diabetic patients, but the mechanisms that underlie increased heart attack-related mortality in diabetic patients are unknown. High levels of the oxidized form of the protein CamKII (ox-CaMKII) have been linked to increased risk of sudden death after heart attack. Additionally, hearts from diabetic patients have significantly greater ox-CAMKII compared to hearts from non-diabetic patients. In this issue of the Journal of Clinical Investigation, Min Luo and colleagues at the University of Iowa ...
JCI early table of contents for Feb. 15, 2013
2013-02-15
A smoking gun in lung cancer epigenetics
Recent studies have identified correlations between cigarette smoke-induced microRNA (miRNA) expression and different aspects of lung cancer; however, it is unclear how miRNA expression directly contributes to carcinogenesis. MiRNAs regulate the expression of target genes and can have a significant impact on when and how well different gene products are expressed. In this issue of the Journal of Clinical Investigation, David Schrump and colleagues at the National Cancer Institute in Bethesda, MD, measured miRNA expression in normal ...
Most comprehensive report in 50 years on education of key scientists
2013-02-15
In the most comprehensive report in a half century, experts today described fundamental changes needed in the education of the scientists whose work impacts medicine, drug discovery and virtually every other discipline. The result of a year-long project of a presidential commission of the American Chemical Society (ACS), the world's largest scientific society, the report was the topic of a symposium here at the 2013 annual meeting of the American Association for the Advancement of Science (AAAS).
Although it concluded that the state of graduate education in the chemical ...
'The Scars of Human Evolution' briefing explores physical fallout from 2-footed walking
2013-02-15
From sore feet to backaches, blame it on human evolution.
"Because we are the only mammals to walk on two feet," says Bruce Latimer, an anthropologist from the Case Western Reserve University School of Dental Medicine.
Latimer will present "A Backache of Longstanding: An Evolutionary Perspective on the Human Vertebral Column" at the 2013 American Association for the Advancement of Science's annual meeting in Boston, Feb. 14-18. His talk will be featured in the session, "The Scars of Human Evolution."
Latimer and other panelists will explain how adapting to upright ...
The science of uncertainty in genomic medicine
2013-02-15
BOSTON - The notion of "personalizing" health care through the use of an individual's genetic code has attracted considerable enthusiasm and investment. Impressive examples, confirmed through formal studies of clinical validity and utility, suggest that we have only scratched the surface of applications to treat disease more precisely, identify risk factors for complex disease, and guide preventative measures.
As the cost of sequencing entire genomes falls, the opportunities for people around the world to take possession of their entire genetic code will proliferate. ...
LAST 30 PRESS RELEASES:
AI–guided lung ultrasound by nonexperts
Prevalence of and inequities in poor mental health across 3 US surveys
Association between surgeon stress and major surgical complications
How cryogenic microscopy could help strengthen food security
DNA damage can last unrepaired for years, changing our view of mutations
Could this fundamental discovery revolutionise fertiliser use in farming?
How one brain circuit encodes memories of both places and events
ASU-led collaboration receives $11.2 million to build a Southwest Regional Direct Air Capture Hub
Study finds strategies to minimize acne recurrence after taking medication for severe acne
Deep learning designs proteins against deadly snake venom
A new geometric machine learning method promises to accelerate precision drug development
Ancient genomes reveal an Iron Age society centred on women
How crickets co-exist with hostile ant hosts
Tapered polymer fibers enhance light delivery for neuroscience research
Syracuse University’s Fran Brown named Paul “Bear” Bryant Newcomer Coach of the Year Award recipient
DARPA-ABC program supports Wyss Institute-led collaboration toward deeper understanding of anesthesia and safe drugs enabling anesthesia without the need for extensive monitoring
The Offshore Wind Innovation Hub 2025 call for innovators opens today
Aligning Science Across Parkinson’s (ASAP) launches a new funding opportunity to join the Collaborative Research Network
State-of-the-art fusion simulation leads three scientists to the 2024 Kaul Foundation Prize
Davos Alzheimer's Collaborative launches innovative brain health navigator program for intuitive coordination between patients and providers
Media registration now open: ATS 2025 in San Francisco
New study shows that corn-soybean crop rotation benefits are extremely sensitive to climate
From drops to data: Advancing global precipitation estimates with the LETKF algorithm
SeoulTech researchers propose a novel method to shed light on PFOS-induced neurotoxicity
Large-scale TMIST breast cancer screening trial achieves enrollment goal, paving the way for data that provides a precision approach to screeninge
Study published in NEJM Catalyst finds patients cared for by MedStar Health’s Safe Babies Safe Moms program have better outcomes in pregnancy, delivery, and postpartum
Octopus arms have segmented nervous systems to power extraordinary movements
Protein shapes can help untangle life’s ancient history
Memory systems in the brain drive food cravings that could influence body weight
Indigenous students face cumbersome barriers to attaining post-secondary education
[Press-News.org] How to Protect Your Company's Trade SecretsMore and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods.