SlideShare a Scribd company logo
1 of 26
Download to read offline
eLunch Presentation–
Trade Secret Protection
June 12, 2018
Steve Grimes, Shannon Murphy, & Ben Ostrander
Privacy & Data Security Task Force
Today’s eLunch Presenters
2
Steve Grimes
White Collar, Regulatory Defense
& Investigation
Chicago, IL
sgrimes@winston.com
• Co-leader of the firm’s Global Privacy and
Data Security Task Force.
• Former Chief Compliance Officer and
senior litigation counsel to a Fortune 500
company, which affords him the
perspective to provide clients with a
pragmatic problem-solving approach.
• Conducted numerous investigations and
tried ten federal jury trials as a federal
prosecutor.
Shannon Murphy
White Collar, Regulatory Defense
& Investigation
Chicago, IL
stmurphy@winston.com
• Member of the firm’s Global Privacy and Data
Security Task Force.
• Over a decade of criminal justice experience
protecting clients’ rights.
• Leverages knowledge of the law and
computer forensics to provide expertise to
clients in litigation, investigations, and
corporate data protection, with a focus on
data security and theft of trade secrets.
Ben Ostrander
Labor & Employment
Chicago, IL
bostrander@winston.com
• Member of the firm's Labor and Employment
Group.
• Significant investigation, counseling, and
litigation experience in competition and trade
secret matters.
Potentially Overlooked Threat -- Data Theft
THE PAST
WHETHER
THEFT WOULD OCCUR
THE PRESENT
WHENTHEFT WILL OCCUR &
HOWDAMAGING WILL IT BE
0%
5%
10%
15%
20%
25%
30%
35%
40%
Business
Relationships
Designs Methods/Processes Products Financial
Information
Marketing
Information
Trade Secret Types
All Companies Have Secrets
Employees Are Not Protecting Trade Secrets
62% -- Transfer data to personal
devices
56% -- Do not believe it is a crime to
use a competitor’s trade secrets
50% -- Keep confidential data
40% -- Plan to use data at new job
To Refer or Not to Refer…?
Who owns this issue?
IT/Info Sec
Engineers/
IP Attorneys
Employment
Attorneys/HR
Litigators
Compliance
Trade Secret Plan: Two Goals
+
WHAT TO DO
BEFORE
THEFT OCCURS
Identify trade secrets + Limit Access
NOT
a trade secret
=
NOT
reasonably protected
Use enforceable agreements
•Nuances of states’
restrictive covenant laws
•“Reasonable”
restrictions
•Key stipulations to
bolster enforceability
•Sufficient protections for
confidential information
Draft precise policies + Train employees
•IP ownership
•Confidentiality
•Acceptable IT and
email use
•Indemnification
•No expectation of
privacy
•Cooperation obligation
Implement ways to catch theft
•Download alerts
•Email attachment alerts
•Monitoring
•Software
(i.e. homing beacon)
Have sufficient exit protocols
•Terminate physical and
electronic access
completely and promptly
•Conduct an exit
interview
•Require the employee to
re-certify obligations
•Assess risk of theft
Failing to have a response protocol
HR, legal, managers, IT
and other key players must
know specific steps to take
immediately
WHAT TO DO
AFTER
THEFT OCCURS
Properly preserve evidence
•Must promptly preserve:
• Devices
• Logs
• Emails
• Documents
• Video
• Online storage/apps
•Risks:
• Destruction/loss/corruption of key
evidence
• Missing pieces of the puzzle
• Spoliation
Send a cease and desist letter
Dissemination, destruction,
or use by employee or
future employer
CONTAINING THE
PROBLEM IS CRUCIAL
Maintain privilege
•Nuanced Privilege Issues
• Take investigative steps
“at direction of counsel”
• Mark documents, notes, and
memoranda
• Give Upjohn warnings
• Take care disclosing information
to government agencies
Consider hiring outside counsel
• Cross-functional expertise
• Investigation/forensics
• Criminal
• IP
• Employment/privacy
• Quick filing of TRO/PI
• Outside resources
• Increase credibility of
investigation
• Protect privilege
Properly handle parallel cases
• Parallel cases present
numerous pitfalls
• Cannot threaten criminal action to
get civil advantage
• Avoid a civil protective order that
hinders sharing of information
• Need to separately track civil and
criminal work to maximize
restitution
• Criminal referral requires higher
level of evidence
Prevent stolen secrets from entering the
company
•Employee uploads/uses
former employer’s
secrets
• Civil litigation & liability
• Criminal prosecution &
conviction
HOW WINSTON
CAN HELP
A Cross-functional Task Force
Criminal
Intellectual
Property
Employment
Civil
Winston’s Trade Secret Audit
• Winston performs standardized data protection audits
(potential fixed-fee arrangement) tailored to the size of a
company and industry.
• Audits include:
• Interviews of key stakeholders (HR, IT, Compliance, Legal, IP/engineers,
select business leaders)
• Review of trade secret protections and related policies, procedures, and
agreements
• Output provided:
• Privileged report and maturity model
• Identification of highest priority action items
• Executive-level presentation regarding findings
Thank You.
27
Ben Ostrander
Chicago, IL
312-558-3263
bostrander@winston.com
Shannon Murphy
Chicago, IL
312-558-5285
stmurphy@winston.com
Steve Grimes
Chicago, IL
312-558-8317
sgrimes@winston.com

More Related Content

What's hot

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013Dan Michaluk
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014Dan Michaluk
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyDan Michaluk
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 

What's hot (20)

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 

Similar to Trade Secret Protection: Practical Advice on Protecting and Defending Your Organization’s Trade Secrets

Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramVeriato
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Rob Levey
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Associationmurnan
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data BreachBrian Heidelberger
 

Similar to Trade Secret Protection: Practical Advice on Protecting and Defending Your Organization’s Trade Secrets (20)

Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring Program
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 

More from Winston & Strawn LLP

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesWinston & Strawn LLP
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaWinston & Strawn LLP
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsWinston & Strawn LLP
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceWinston & Strawn LLP
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Winston & Strawn LLP
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansWinston & Strawn LLP
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Winston & Strawn LLP
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceWinston & Strawn LLP
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions ProgramWinston & Strawn LLP
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Winston & Strawn LLP
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Winston & Strawn LLP
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesWinston & Strawn LLP
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsWinston & Strawn LLP
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBWinston & Strawn LLP
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...Winston & Strawn LLP
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...Winston & Strawn LLP
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareWinston & Strawn LLP
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...Winston & Strawn LLP
 

More from Winston & Strawn LLP (20)

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law Landmines
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) Guidance
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement Plans
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions Program
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical Devices
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and Implications
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRB
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
 
The Current M&A Environment
The Current M&A EnvironmentThe Current M&A Environment
The Current M&A Environment
 

Recently uploaded

如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 

Recently uploaded (20)

如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 

Trade Secret Protection: Practical Advice on Protecting and Defending Your Organization’s Trade Secrets

  • 1. eLunch Presentation– Trade Secret Protection June 12, 2018 Steve Grimes, Shannon Murphy, & Ben Ostrander Privacy & Data Security Task Force
  • 2. Today’s eLunch Presenters 2 Steve Grimes White Collar, Regulatory Defense & Investigation Chicago, IL sgrimes@winston.com • Co-leader of the firm’s Global Privacy and Data Security Task Force. • Former Chief Compliance Officer and senior litigation counsel to a Fortune 500 company, which affords him the perspective to provide clients with a pragmatic problem-solving approach. • Conducted numerous investigations and tried ten federal jury trials as a federal prosecutor. Shannon Murphy White Collar, Regulatory Defense & Investigation Chicago, IL stmurphy@winston.com • Member of the firm’s Global Privacy and Data Security Task Force. • Over a decade of criminal justice experience protecting clients’ rights. • Leverages knowledge of the law and computer forensics to provide expertise to clients in litigation, investigations, and corporate data protection, with a focus on data security and theft of trade secrets. Ben Ostrander Labor & Employment Chicago, IL bostrander@winston.com • Member of the firm's Labor and Employment Group. • Significant investigation, counseling, and litigation experience in competition and trade secret matters.
  • 3. Potentially Overlooked Threat -- Data Theft THE PAST WHETHER THEFT WOULD OCCUR THE PRESENT WHENTHEFT WILL OCCUR & HOWDAMAGING WILL IT BE
  • 4. 0% 5% 10% 15% 20% 25% 30% 35% 40% Business Relationships Designs Methods/Processes Products Financial Information Marketing Information Trade Secret Types All Companies Have Secrets
  • 5. Employees Are Not Protecting Trade Secrets 62% -- Transfer data to personal devices 56% -- Do not believe it is a crime to use a competitor’s trade secrets 50% -- Keep confidential data 40% -- Plan to use data at new job
  • 6. To Refer or Not to Refer…?
  • 7. Who owns this issue? IT/Info Sec Engineers/ IP Attorneys Employment Attorneys/HR Litigators Compliance
  • 8. Trade Secret Plan: Two Goals +
  • 10. Identify trade secrets + Limit Access NOT a trade secret = NOT reasonably protected
  • 11. Use enforceable agreements •Nuances of states’ restrictive covenant laws •“Reasonable” restrictions •Key stipulations to bolster enforceability •Sufficient protections for confidential information
  • 12. Draft precise policies + Train employees •IP ownership •Confidentiality •Acceptable IT and email use •Indemnification •No expectation of privacy •Cooperation obligation
  • 13. Implement ways to catch theft •Download alerts •Email attachment alerts •Monitoring •Software (i.e. homing beacon)
  • 14. Have sufficient exit protocols •Terminate physical and electronic access completely and promptly •Conduct an exit interview •Require the employee to re-certify obligations •Assess risk of theft
  • 15. Failing to have a response protocol HR, legal, managers, IT and other key players must know specific steps to take immediately
  • 17. Properly preserve evidence •Must promptly preserve: • Devices • Logs • Emails • Documents • Video • Online storage/apps •Risks: • Destruction/loss/corruption of key evidence • Missing pieces of the puzzle • Spoliation
  • 18. Send a cease and desist letter Dissemination, destruction, or use by employee or future employer CONTAINING THE PROBLEM IS CRUCIAL
  • 19. Maintain privilege •Nuanced Privilege Issues • Take investigative steps “at direction of counsel” • Mark documents, notes, and memoranda • Give Upjohn warnings • Take care disclosing information to government agencies
  • 20. Consider hiring outside counsel • Cross-functional expertise • Investigation/forensics • Criminal • IP • Employment/privacy • Quick filing of TRO/PI • Outside resources • Increase credibility of investigation • Protect privilege
  • 21. Properly handle parallel cases • Parallel cases present numerous pitfalls • Cannot threaten criminal action to get civil advantage • Avoid a civil protective order that hinders sharing of information • Need to separately track civil and criminal work to maximize restitution • Criminal referral requires higher level of evidence
  • 22. Prevent stolen secrets from entering the company •Employee uploads/uses former employer’s secrets • Civil litigation & liability • Criminal prosecution & conviction
  • 24. A Cross-functional Task Force Criminal Intellectual Property Employment Civil
  • 25. Winston’s Trade Secret Audit • Winston performs standardized data protection audits (potential fixed-fee arrangement) tailored to the size of a company and industry. • Audits include: • Interviews of key stakeholders (HR, IT, Compliance, Legal, IP/engineers, select business leaders) • Review of trade secret protections and related policies, procedures, and agreements • Output provided: • Privileged report and maturity model • Identification of highest priority action items • Executive-level presentation regarding findings
  • 26. Thank You. 27 Ben Ostrander Chicago, IL 312-558-3263 bostrander@winston.com Shannon Murphy Chicago, IL 312-558-5285 stmurphy@winston.com Steve Grimes Chicago, IL 312-558-8317 sgrimes@winston.com