PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

How to Protect Your Company's Trade Secrets

More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods.

2013-02-16
February 16, 2013 (Press-News.org) In today's information age, knowledge is power. More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods. As a result, a company's "trade secrets" or confidential information are its stock-in-trade. Lose them, and profits nosedive.

Our society recognizes the importance of keeping the confidentiality of certain information and as a result, 40 states and the District of Columbia have adopted the Uniform Trade Secrets Act ("UTSA"), with some modification in each state.

Among other things, the definition of "trade secret" that was adopted as part of the UTSA varies slightly from state to state. The UTSA was adopted in California in 2003 and now exists beginning at Section 3426 of the California Civil Code. In California, a trade secret it is defined as information, including a formula, pattern, compilation, program, device, method, technique or process, that:

- derives independent economic value, actual or potential, from not being generally known to the public or other persons who can obtain economic value from its disclosure or use, and

- is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

If an item is recognized as a trade secret or confidential information, the UTSA provides you with many rights and remedies if it is stolen. This includes damages and court orders prohibiting its use by competitors who acquired it improperly, among other things.

Trade Secrets And Confidential Information
Quite a bit of information can be protected as a trade secret under the UTSA. Essentially, trade secrets are almost any information that gives a business entity a competitive advantage if they are kept secret from the competition. This can include: customer lists, software, manufacturing processes, the formula for manufacturing a product, information about customer needs, ordering patterns and preferences, business plans, marketing techniques, and even information about your general business strategy and direction.

Even items that might not be trade secrets under the law may be protected in California if their disclosure would give a competitor an advantage, and the information is kept confidential within your company.

In order to be protected, trade secrets and confidential information must be unavailable to the general public and not able to be discovered by, for example, just looking through the phone book or publicly available information. It also must be "the subject of efforts that are reasonable under the circumstances to maintain its secrecy." In other words, as long as the company makes "reasonable efforts," even if the secret gets out in some way, you may protect it under the UTSA.

The UTSA states that not every person must receive express notice of the trade secret status of every piece of information. However, you should try to give such notice to anyone who might receive it. The standard is that you must undertake "reasonable efforts" to maintain secrecy. Though this seems to be an objective standard, what efforts are "reasonable" may differ in the minds of judges and juries. So more, rather than fewer, efforts, is better.

Companies who are concerned about keeping the competitive advantage that comes from keeping their trade secrets, well, secret, should take some steps now to protect them. Doing so is a good idea for two reasons. First, if you take the proper protective actions now, it will be more difficult for someone to steal your trade secrets or confidential information. Second, taking proper steps will make it easier for you to get relief from a court under the Uniform Trade Secrets Act and other relevant laws if someone steals them.

Steps You Can Take To Protect Your Trade Secrets Now

$ Decide what information you want to protect as a trade secret or confidential information. But be reasonable in doing so. If you define everything as a trade secret, it will weaken your position when arguing that a particular piece of information is, in fact, confidential and that its secrecy is essential to your company's success.

$ Limit access to the information only to persons who need to know it as a part of their job duties.

$ Have all employees who will be exposed to trade secrets or confidential information sign a confidentiality agreement that contains a statement that they recognize that it is a trade secret, that it is distributed on a "need to know only" basis, a promise not to use the information in the future to compete with your company, and an agreement to advise any subsequent employer of the restrictions. Make sure those agreements are reasonable in scope and nature and that they contain adequate consideration to make the agreement enforceable. Keep the signed agreement as part of each employee's file.

$ Include a similar confidentiality provision in all contracts with temporary workers, outside entities, vendors who will have access to the information, distributors, partners and customers. Keep the signed agreement as part of files for those workers and entities, as well.

$ If a document contains trade secrets, label it as confidential, and treat it as such. Prevent widescale copying of such documents and, if appropriate and manageable, number each copy (in the middle of the page, so that the source of any unauthorized copies can be identified), register the document numbers and require that the documents be returned for destruction either when the task is completed or on demand.

$ Create a formal confidentiality policy for all trade secrets and confidential information, follow it, and instruct all employees who work with any company information that certain such information is considered a trade secret, to be treated confidentially.

$ Act appropriately to correct and discipline all persons who violate these policies.

$ Conduct exit audits with all departing employees and, as a part of these audits, have them return all secret information and advise them of their duties under any non-compete, non-disclosure, or other agreements. Have these spelled out in a document which they acknowledge reviewing by signing it.

$ Make sure that confidential information in a computerized file is available only with a password, and that the password is given only to necessary personnel and is changed regularly. Keep a record of the measures taken by, for example, logging the dates that the passwords are changed. Create firewalls to any internet-connected computers and maintain necessary security to prevent computer espionage and theft.

$ Be careful of emails, and adopt a formal policy of not exchanging trade secrets or confidential information via email. Emails are stored on every computer on the Internet through which they pass on the way to their destination, and it is not secure. If email is the only way to exchange information, use an encryption program, such as PGP, to protect it.

$ Conduct periodic trade secret audits to check for leaks.

$ Be aware that trade secrets laws in the U.S. are different from laws in other countries. Outside the U.S., trade secret protection may be nonexistent. In some countries, industrial espionage is considered legal, acceptable and is often used.

If you follow the recommendations above, you are well on your way to protecting your company's trade secrets and ensuring that your company has a legitimate advantage in using its confidential information in a profitable way. After taking the above steps, anyone who attempts to steal your trade secrets or confidential information does so at his or her own peril; as you have greatly increased your chances of prevailing in judicial proceedings to protect them.

Website: http://www.hockani.com/


ELSE PRESS RELEASES FROM THIS DATE:

Let the Winner Games Begin!

2013-02-16
Winner.com is proud to announce the launching of Winner Games. Comprised of a collection of instant win and casual games, Winner features new hits such as Avengers Scratch, Rubik's Riches and Captain America Scratch. Visitors to Winner Games will find categories such as Sports & Virtual with casual horseracing and football games. Avengers Scratch is a new game that takes players through scenes from the hit Avengers movie. Players match The Incredible Hulk, Thor and Iron Man and collect Marvel-ous payouts. The Avengers Scratch jackpot is won by matching the S.H.I.E.L.D. ...

Biodiversity protects against disease, scientists find

Biodiversity protects against disease, scientists find
2013-02-15
The richer the assortment of amphibian species in a pond, the more protection that community of frogs, toads and salamanders has against a parasitic infection that can cause severe deformities, including the growth of extra legs. The findings, published in a paper in this week's issue of the journal Nature, support the idea that greater biodiversity in large-scale ecosystems, such as forests or grasslands, may also provide greater protection against diseases, including those that affect humans. A larger number of mammal species in an area may curb cases of Lyme disease, ...

Decoys could blunt spread of ash-killing beetles

Decoys could blunt spread of ash-killing beetles
2013-02-15
UNIVERSITY PARK, Pa. -- As the emerald ash borer ravages North American ash trees, threatening the trees' very survival, a team of entomologists and engineers may have found a way to prevent the spread of the pests. Emerald ash borers (EABs), a type of beetle native to Asia, first appeared in the U.S. about 20 years ago. They are now moving east from Michigan, killing ash trees on the Eastern Seaboard as far south as North Carolina. "Within 25 years, practically no ash trees may remain on either side of the St. Lawrence Seaway," said Akhlesh Lakhtakia, Charles Godfrey ...

Poor stress responses may lead to obesity in children

2013-02-15
UNIVERSITY PARK, Pa. -- Children who overreact to stressors may be at risk of becoming overweight or obese, according to researchers at Penn State and Johns Hopkins University. "Our results suggest that some children who are at risk of becoming obese can be identified by their biological response to a stressor," said Lori Francis, associate professor of biobehavioral health. "Ultimately, the goal is to help children manage stress in ways that promote health and reduce the risks associated with an over- or under-reactive stress response." Francis and her colleagues ...

A smoking gun in lung cancer epigenetics

2013-02-15
Recent studies have identified correlations between cigarette smoke-induced microRNA (miRNA) expression and different aspects of lung cancer; however, it is unclear how miRNA expression directly contributes to carcinogenesis. MiRNAs regulate the expression of target genes and can have a significant impact on when and how well different gene products are expressed. In this issue of the Journal of Clinical Investigation, David Schrump and colleagues at the National Cancer Institute in Bethesda, MD, measured miRNA expression in normal human lung cells exposed to cigarette ...

Increased heart attack-related mortality in diabetics linked to protein oxidation

2013-02-15
Diabetic patients are more than twice as likely to die from a heart attack as non-diabetic patients, but the mechanisms that underlie increased heart attack-related mortality in diabetic patients are unknown. High levels of the oxidized form of the protein CamKII (ox-CaMKII) have been linked to increased risk of sudden death after heart attack. Additionally, hearts from diabetic patients have significantly greater ox-CAMKII compared to hearts from non-diabetic patients. In this issue of the Journal of Clinical Investigation, Min Luo and colleagues at the University of Iowa ...

JCI early table of contents for Feb. 15, 2013

2013-02-15
A smoking gun in lung cancer epigenetics Recent studies have identified correlations between cigarette smoke-induced microRNA (miRNA) expression and different aspects of lung cancer; however, it is unclear how miRNA expression directly contributes to carcinogenesis. MiRNAs regulate the expression of target genes and can have a significant impact on when and how well different gene products are expressed. In this issue of the Journal of Clinical Investigation, David Schrump and colleagues at the National Cancer Institute in Bethesda, MD, measured miRNA expression in normal ...

Most comprehensive report in 50 years on education of key scientists

2013-02-15
In the most comprehensive report in a half century, experts today described fundamental changes needed in the education of the scientists whose work impacts medicine, drug discovery and virtually every other discipline. The result of a year-long project of a presidential commission of the American Chemical Society (ACS), the world's largest scientific society, the report was the topic of a symposium here at the 2013 annual meeting of the American Association for the Advancement of Science (AAAS). Although it concluded that the state of graduate education in the chemical ...

'The Scars of Human Evolution' briefing explores physical fallout from 2-footed walking

2013-02-15
From sore feet to backaches, blame it on human evolution. "Because we are the only mammals to walk on two feet," says Bruce Latimer, an anthropologist from the Case Western Reserve University School of Dental Medicine. Latimer will present "A Backache of Longstanding: An Evolutionary Perspective on the Human Vertebral Column" at the 2013 American Association for the Advancement of Science's annual meeting in Boston, Feb. 14-18. His talk will be featured in the session, "The Scars of Human Evolution." Latimer and other panelists will explain how adapting to upright ...

The science of uncertainty in genomic medicine

2013-02-15
BOSTON - The notion of "personalizing" health care through the use of an individual's genetic code has attracted considerable enthusiasm and investment. Impressive examples, confirmed through formal studies of clinical validity and utility, suggest that we have only scratched the surface of applications to treat disease more precisely, identify risk factors for complex disease, and guide preventative measures. As the cost of sequencing entire genomes falls, the opportunities for people around the world to take possession of their entire genetic code will proliferate. ...

LAST 30 PRESS RELEASES:

Four NYU faculty win Sloan Foundation research fellowships

Personal perception of body movement changes when using robotic prosthetics

Study shows brain responses to wildlife images can forecast online engagement — and could help conservation messaging

Extreme heat and drought at flowering could put future wheat harvests at risk

Harlequin ichthyosis: a comprehensive review of pathogenesis, diagnosis, and management

Smithsonian planetary scientists discover recent tectonic activity on the Moon

Government censorship of Chinese chatbots

Incorporating a robotic leg into one’s body image

Brain imaging reveals how wildlife photos open donor wallets

Wiley to expand Advanced Portfolio

Invisible battery parts finally seen with pioneering technique

Tropical forests generate rainfall worth billions, study finds

A yeast enzyme helps human cells overcome mitochondrial defects

Bacteria frozen in ancient underground ice cave found to be resistant against 10 modern antibiotics

Rhododendron-derived drugs now made by bacteria

Admissions for child maltreatment decreased during first phase of COVID-19 pandemic, but ICU admissions increased later

Power in motion: transforming energy harvesting with gyroscopes

Ketamine high NOT related to treatment success for people with alcohol problems, study finds

1 in 6 Medicare beneficiaries depend on telehealth for key medical care

Maps can encourage home radon testing in the right settings

Exploring the link between hearing loss and cognitive decline

Machine learning tool can predict serious transplant complications months earlier

Prevalence of over-the-counter and prescription medication use in the US

US child mental health care need, unmet needs, and difficulty accessing services

Incidental rotator cuff abnormalities on magnetic resonance imaging

Sensing local fibers in pancreatic tumors, cancer cells ‘choose’ to either grow or tolerate treatment

Barriers to mental health care leave many children behind, new data cautions

Cancer and inflammation: immunologic interplay, translational advances, and clinical strategies

Bioactive polyphenolic compounds and in vitro anti-degenerative property-based pharmacological propensities of some promising germplasms of Amaranthus hypochondriacus L.

AI-powered companionship: PolyU interfaculty scholar harnesses music and empathetic speech in robots to combat loneliness

[Press-News.org] How to Protect Your Company's Trade Secrets
More and more companies nowadays are in the business of profiting by using and selling information, rather than by manufacturing goods.