SlideShare a Scribd company logo
1 of 6
SCHILLING 2017
TRADE SECRET
Badra Khairiah
Sistem Informasi
Uin Suska Riau
Rather than disclose detailed information about a
proprietary product or process in exchange for the grant of a
patent, inventors or firms often will choose to protect their
intellectual property by holding it as a trade secret. A trade
secret is information that belongs to a business that is generally
unknown to others. Trade secrets need not meet many of the
stringent requirements of patent law, enabling a broader class of
assets and activities to be protectable. For example, while the
formula for a beverage is not patentable, it can be considered a
trade secret.
.
Trade secret law traces its history back to Roman law
punishing individuals who induced someone to reveal the
details of their employer’s commercial affairs Information is
typically considered to be a trade secret only if it (a) offers a
distinctive advantage to the company in the form of
economic rents, and (b) remains valuable only as long as
the information remains private. Examples of trade secrets
might include information about a firm’s customers, its
marketing strategies, or its manufacturing processes. Trade
secret law protects such information from being wrongfully
taken by another party. In the United States, trade secret
law is implemented at thestate level, but the Uniform Trade
Secret Act attempts to make these laws consistent from
state to state.
For information to qualify as a trade secret under the Uniform
Trade Secret Act, the information must meet the following
three criteria:
• The information must not be generally known or readily
ascertainable through legitimate means.
• The information must have economic importance that is
contingent upon its secrecy.
• The trade secret holder must exercise reasonable
measures to protect the secrecy of the information.
If information meets these criteria, the Uniform Trade Secret
Act stipulates that its owner can prevent others from benefiting
from this information without the owner’s trade secret
Information that belongs to a business that is held private.
permission. In particular, the act states that no individual or
group can copy, use, or otherwise benefit from a trade secret
without the owner’s authorization if they meet any of the
following conditions:
1. They are bound by a duty of confidentiality (e.g., employees,
lawyers).
2. They have signed a nondisclosure agreement.
3. They acquire the secret through improper means such as
theft or bribery.
4. They acquire the information from someone who did not
have the right to disclose it.
5. They learn about the secret by mistake but have reason to
know that the information was a protected trade secret.
In most U.S. states, if owners of a trade secret believe that
another party has stolen or improperly disclosed their trade
secret, they can ask a court to issue an injunction against
further use of the secrets, and they may also be able to
collect damages for any economic harm suffered by the
improper use of the trade secret. For example, in November
2002, Procter & Gamble sued Potlatch Corporation,
claiming that Potlatch had stolen trade secret methods used
to produce Bounty paper towels and Charmin bath tissue by
hiring away two of Procter & Gamble’s paper manufacturing
experts. Potlatch is a large, private-label tissue
manufacturer that produces toilet paper, facial tissues,
napkins, and paper towels for grocery store chains such as
Albertsons and Safeway. By March 2003, the two
companies had reached an agreement to settle out of court,
keeping the terms of the settlementconfidential

More Related Content

Similar to Trade secret

Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038FNian
 
IICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationIICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationErica Bristol
 
Common Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A DealsCommon Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A DealsMatheson Law Firm
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. dan hyde
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyerscanadianlawyer
 
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part IProtecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part IJohn Watkins
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActEveryNDA
 
Confidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxConfidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxFelger Tilos
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsLawPlus Ltd.
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...Financial Poise
 

Similar to Trade secret (20)

Protection for submission
Protection for submissionProtection for submission
Protection for submission
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
 
SPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPTSPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPT
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
 
IICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationIICJ Article Trade Secret Mediation
IICJ Article Trade Secret Mediation
 
Common Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A DealsCommon Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A Deals
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
 
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part IProtecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
 
Confidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxConfidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptx
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other Agreements
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
 
Presentation2
Presentation2Presentation2
Presentation2
 

More from Badra Khairiah

Birth of the snowboarding industry
Birth of the snowboarding industryBirth of the snowboarding industry
Birth of the snowboarding industryBadra Khairiah
 
Organizing for i nnovation at google
Organizing for i nnovation at googleOrganizing for i nnovation at google
Organizing for i nnovation at googleBadra Khairiah
 
Qualitative methods for choosing projects
Qualitative methods for choosing projectsQualitative methods for choosing projects
Qualitative methods for choosing projectsBadra Khairiah
 
STRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONSSTRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONSBadra Khairiah
 
ORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLEORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLEBadra Khairiah
 
QUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTSQUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTSBadra Khairiah
 
Birth of the Snowboarding Industry
Birth of the Snowboarding IndustryBirth of the Snowboarding Industry
Birth of the Snowboarding IndustryBadra Khairiah
 

More from Badra Khairiah (10)

Birth of the snowboarding industry
Birth of the snowboarding industryBirth of the snowboarding industry
Birth of the snowboarding industry
 
Organizing for i nnovation at google
Organizing for i nnovation at googleOrganizing for i nnovation at google
Organizing for i nnovation at google
 
Qualitative methods for choosing projects
Qualitative methods for choosing projectsQualitative methods for choosing projects
Qualitative methods for choosing projects
 
Presentation1
Presentation1Presentation1
Presentation1
 
STRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONSSTRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONS
 
ORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLEORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLE
 
QUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTSQUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTS
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
 
Birth of the Snowboarding Industry
Birth of the Snowboarding IndustryBirth of the Snowboarding Industry
Birth of the Snowboarding Industry
 
Badra1
Badra1Badra1
Badra1
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Trade secret

  • 1. SCHILLING 2017 TRADE SECRET Badra Khairiah Sistem Informasi Uin Suska Riau
  • 2. Rather than disclose detailed information about a proprietary product or process in exchange for the grant of a patent, inventors or firms often will choose to protect their intellectual property by holding it as a trade secret. A trade secret is information that belongs to a business that is generally unknown to others. Trade secrets need not meet many of the stringent requirements of patent law, enabling a broader class of assets and activities to be protectable. For example, while the formula for a beverage is not patentable, it can be considered a trade secret. .
  • 3. Trade secret law traces its history back to Roman law punishing individuals who induced someone to reveal the details of their employer’s commercial affairs Information is typically considered to be a trade secret only if it (a) offers a distinctive advantage to the company in the form of economic rents, and (b) remains valuable only as long as the information remains private. Examples of trade secrets might include information about a firm’s customers, its marketing strategies, or its manufacturing processes. Trade secret law protects such information from being wrongfully taken by another party. In the United States, trade secret law is implemented at thestate level, but the Uniform Trade Secret Act attempts to make these laws consistent from state to state.
  • 4. For information to qualify as a trade secret under the Uniform Trade Secret Act, the information must meet the following three criteria: • The information must not be generally known or readily ascertainable through legitimate means. • The information must have economic importance that is contingent upon its secrecy. • The trade secret holder must exercise reasonable measures to protect the secrecy of the information. If information meets these criteria, the Uniform Trade Secret Act stipulates that its owner can prevent others from benefiting from this information without the owner’s trade secret Information that belongs to a business that is held private. permission. In particular, the act states that no individual or group can copy, use, or otherwise benefit from a trade secret without the owner’s authorization if they meet any of the following conditions:
  • 5. 1. They are bound by a duty of confidentiality (e.g., employees, lawyers). 2. They have signed a nondisclosure agreement. 3. They acquire the secret through improper means such as theft or bribery. 4. They acquire the information from someone who did not have the right to disclose it. 5. They learn about the secret by mistake but have reason to know that the information was a protected trade secret.
  • 6. In most U.S. states, if owners of a trade secret believe that another party has stolen or improperly disclosed their trade secret, they can ask a court to issue an injunction against further use of the secrets, and they may also be able to collect damages for any economic harm suffered by the improper use of the trade secret. For example, in November 2002, Procter & Gamble sued Potlatch Corporation, claiming that Potlatch had stolen trade secret methods used to produce Bounty paper towels and Charmin bath tissue by hiring away two of Procter & Gamble’s paper manufacturing experts. Potlatch is a large, private-label tissue manufacturer that produces toilet paper, facial tissues, napkins, and paper towels for grocery store chains such as Albertsons and Safeway. By March 2003, the two companies had reached an agreement to settle out of court, keeping the terms of the settlementconfidential