Trade Secrets
Trade Secrets
Trade Secrets
Trade Secret
Protection Program
This Presentation
• PART 1 - Outline
– Definition
– Legal requirements
– Legal rights
– Enforcement
T e c h n ic a l a n d S c ie n tific In fo r m a tio n
F in a n c ia l In fo r m a tio n
Trade Secret
C o m m e r c ia l In fo r m a tio n
N e g a tiv e In fo r m a tio n
in s o m e la w s
• Technical and scientific information:
– product information
• technical composition of a product: medicine, paint,
beverage
• technical data about product performance
• product design information
– manufacture information
• manufacturing methods and processes (weaving technique,
device process)
• production costs, refinery processes, raw materials
• specialized machinery
– computer codes
• Commercial information:
– customer list
– business plan
– marketing strategy
– supplier arrangements
– customer buying preferences and
requirements
– consumer profiles
– sales methods
• Financial information:
– pricing information
– price lists
• Negative information:
– dead-ends in research
• actual or potential
– Contract law
• when there is an agreement to protect the TS
– NDA/CA
– anti-reverse engineering clause (enforceability debated)
• where a confidential relationship exists
– attorney, employee
2. Monetary damages
• actual damages caused as a result of the misuse (lost profits)
• amount by which defendant unjustly benefited from the
misappropriation (unjust enrichment)
3. Seizure order
• can be obtained in civil actions to search the defendant's
premises in order to obtain the evidence to establish the theft of
trade secrets at trial
4. Precautionary impoundment
• of the articles that include misused trade secrets, or the products
that resulted of misusing
To establish violation, the owner
must be able to show :
BUSINESS STRATEGIES
TO HANDLE & PROTECT
TRADE SECRETS
Loss of trade secrets -
a growing problem (1)
Considerations in determining
whether information is a trade
secret:
– Is it known outside the company?
– Is it widely known by employees and
others involved within the company?
– Have measures been taken to guard its
secrecy?
– What is the value of the information for
your company?
– What is the potential value for your
competitors?
– How much effort/money spent in collecting
or developing it?
– How difficult would it be for others to
acquire, collect of duplicate it?
2. Develop a protection policy
– Departing employees :
• exit interview, letter to new employer, treat
fairly & compensate reasonably for patent
work, further limit access to data
6. Physically isolate and protect
– Separate locked depository
– Authorization
– Access control
• log of access: person, document reviewed
• biometric palm readers
– Surveillance of depository/company
premises
• guards, surveillance cameras
– Shredding
– Oversight; audit trail
7. Maintain computer secrecy
– Secure online transactions, intranet,
website
– Authorization (password); access control
– Mark confidential or secret (legend pop,
or before and after sensitive information)
– Physically isolate and lock: computer
tapes, discs, other storage media
– No external drives and USB ports
– Monitor remote access to servers
– Firewalls; anti-virus software; encryption
8. Restrict public access to
facilities
– Log and visitor’s pass
– Accompany visitor
– Sometimes NDA/CA
– Visible to anyone walking through a
company’s premises
• type of machinery, layout, physical handling of work in
progress, etc
– Overheard conversations
– Documents left in plain view
– Unattended waste baskets
9. Third parties
– Sharing for exploitation
PROTECTING INVENTIONS:
TRADE SECRETS
OR PATENTS?
Introduction
n o r e g is t r a t io n c o s t s fe e s
b u t: c o s ts to k e e p s e c r e t r e g is tra tio n + m a in te n a n c e
c a n la s t lo n g e r lim it e d in t im e
- b u t: lim ite d to e c o n o m ic life - g e n e r a lly : m a x 2 0 y
- u n c e r ta in life s p a n : le a k o u t is irre m e d ia b le - b u t: c a n b e in v a lid e d
n o d is c lo s u r e d is c lo s u r e
- b u t: p r a c tic a l n e e d to d is c lo s e - p u b lic a tio n 1 8 m a fte r filin g
- if le a k o u t: T S lo s t - if P n o t a llo w e d : n o T S
T ra d e S e c re ts P a te n ts
L a r g e s u b je c t m a t t e r S u b je c t m a t t e r lim it e d :
P r o t e c t io n o f v ir t u a lly a n y t h in g - R e q u ir e m e n t s : n e w , n o n o b v io u s , u s e f u l
m a in t a in e d in s e c r e t b y a b u s in e s s - S c o p e : p a te n t c la im
t h a t g iv e s c o m p e t it iv e a d v a n t a g e
O n ly p r o t e c t io n a g a in s t E x c lu s iv e r ig h t s
im p r o p e r a c q u ir e m e n t /u s e m o n o p o ly t o e x p lo it
t h e in v e n t io n
M o r e d if f ic u lt t o e n f o r c e " P o w e r t o o l"
- s o m e c o u n t r ie s : n o la w s
- a b ilit y t o s a f e g u a r d T S d u r in g lit ig a t io n
Business and Marketplace
Considerations
1. Market life of the subject matter
• Difficult/expensive to do RE?
– Secret ∼ manufacturing method or formula → difficult → TS
– Secret embodied in product → easy (e.g. cleaning fluid) → P
4. Likelihood of subject matter
being independently developed
• Complexity of invention