SlideShare a Scribd company logo
1 of 13
Download to read offline
Intellectual Property Rights
Presented by
Dr. B.Rajalingam
Assistant Professor
Department of Computer Science & Engineering
Priyadarshini College of Engineering & Technology, Nellore
Unit 4
Trade Secrete Litigation
Syllabus
• Trade Secrets:
Trade Secrete Law
Determination of Trade Secrete Status
Liability for Misappropriations of Trade Secrets
Protection for Submission
Trade Secrete Litigation
• Unfair Competition:
Misappropriation
Right of Publicity
False Advertising
29 April 2020 2
Trade Secret Law: Dr. B.Rajalingam
Trade Secret Litigation
Trade secret litigation comprises of two aspects :
1. Violations of trade secret law takes places when the confidential information is
obtained through misappropriations.
 Misappropriations means where someone acquires, uses and/or discloses
company trade secret without taking any permission from company in an
improper manner.
2. Violations of non disclosure agreement takes place when a party in the
contract from the breach to the agreement.
 Misappropriation in violation of a state trade secret law.
 If no written agreement exists, the plaintiff must rely upon case law.
 To protect trade secret violations, companies should require new employees who
will have access to confidential information to acknowledge in writing agreement
that accepting employment.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 3
Cont…
 If grounds for federal jurisdiction exist, the action may be brought in federal
court.
 If the action also involves copyright or patent, it must be brought in federal court.
 Otherwise, the action will be brought in a state court.
 If the action is instituted in federal court, a federal court will apply state law
inasmuch as there is no general federal trade secret law.
 The UTSA provides that an action for misappropriation must be brought within
three years after misappropriation is discovered.
 In federal court, the action will be governed by the Federal Rules of Civil
Procedure relating to federal civil actions.
 These rules set the times for responding to the complaint, matters pertaining to
motions and discovery, and any other litigation related matters.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 4
Cont…
 After the complaint is filed, the defendant will respond by filing an answer, usually
denying that any breach of agreement.
 If the defendant has a cause of action to assert against the plaintiff relating to the
trade secret, it must be asserted by way of a counterclaim in the litigation so that
all disputes between the parties relating to the information can be resolved at the
same time.
 The plaintiff and defendant will take depositions to obtain testimony from those
who may have information about the case.
 For example, the plaintiff may depose individuals in the defendant’s company to
determine whether they were instructed to misappropriate the plaintiff’s
information.
 Interrogatories may be served on either party to obtain information, such as to
inquire about experts either side may intend to call.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 5
Cont…
 If the matter cannot be resolved by private agreement, it will proceed to trial.
 The trade secret owner must prove misappropriation by a preponderance of the
evidence.
 Either party may request a jury trial; otherwise, a judge will render the decision.
 One of the difficult issues in trade secret litigation arises from the fact that the
trade secret sought to be protected often must be disclosed in the litigation so the
judge or jury can evaluate whether the information is sufficiently valuable.
 Similarly, the owner’s methods of protecting the information often must be
disclosed so the fact finder can determine whether the owner has taken reasonable
measures to protect the alleged trade secrets.
 Courts can fashion a variety of means to protect the information, from issuing
protective orders, to holding private hearings in the judge’s chambers, to closing
the courtroom to the public, to sealing court records.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 6
Trade Secret Protection Programs
 Because trade secrets are legally broken and may be lost by accidently disclosure or failure
to reasonably protect.
 Companies should implement trade secret protection programs to safeguard valuable
information.
 While it is common for businesses to assume that only scientific and technical data
constitute trade secrets.
 Protection is available for a much broader range of subjects, such as customer lists,
marketing plans, hiring tactics, and other information that would be valuable to a
competitor, and that are common to many companies.
 Companies that value their trade secrets should implement trade secret protection
programs.
 Developing programs and measures to protect trade secrets is an easy way to demonstrate
to a court that an owner values its information and takes appropriate measures to maintain
its secrecy.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 7
Physical Protection
There are a variety of tangible measures a company can implement to protect trade secrets,
including the following:
 Safeguarding information under lock and key
 Protecting the information from unauthorized access
 Conducting background checks of employees who will have access to key information
 “Badging” doors and entrances so access beyond the company’s reception area requires key
code or bar code access and so that employee location is monitored
 Retaining adequate security during evenings and weekends either through alarm systems or
security services, including surveillance cameras
 Ensuring tours of the company premises do not expose outsiders to valuable processes or
information.
 Marking materials with legends or stamps such as “Confidential - Trade Secret
Information”
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 8
Cont…
 Monitoring activities of former employees who had access to confidential information and
monitoring trade journals for articles that may show a competitor has gained access to
company trade secrets
 Ensuring no one person has access to critical information but rather that several people
“share” parts of the information.
 Implementing inventory control systems
 Securing computers with password or encryption protection and monitoring devices to
track which employees access certain information.
 Requiring use of paper shredders for disposal of sensitive documents
 Designating a person to be responsible for trade secret information and release to others
(including the media), and for reviewing bids, proposals, marketing materials, and plans by
employees to publish articles or speak at conferences
 Implementing photocopying policies and maintaining logbooks or electronic monitoring of
copying.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 9
Cont…
 Monitoring employees’ use of e-mail and the Internet to ensure confidential information is not being
disseminated.
 Conducting exit interviews with employees to obtain return of company materials and to remind them
of their obligations not to use or disclose proprietary company information
 Using encryption technology and antivirus protection programs to protect information stored on
computers
 Educating employees on trade secrets and protection of trade secrets
 Requiring visitors to the premises to sign in and wear badges
 Ensuring information retained on computers is available only on company networks so that access can
be easily tracked
 Most companies will not need to implement all of the measures described.
 Courts do not require absolute secrecy or that extreme measures be taken to protect information.
 The lab is in an unmarked building in a typical office park, and visitors must pass through a metal
detector that scans for camera phones.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 10
Contractual Protection
 Another method of protecting trade secrets is by contract, namely, requiring those with access to the
information to agree in writing not to disclose the information to others.
 In licensing arrangements, trade secret owners should ensure the license agreements contain sufficient
protection for trade secret information.
 Employers should use noncompetition agreements to ensure former employees do not use material
gained on the job to later compete against the employer.
 Even without formal contracts, a company should include protection policies in its employee handbooks,
routinely publish reminders about confidentiality in company newsletters and through e-mail messages,
and remind employees of their duties during their initial orientations and during exit interviews
conducted when the individuals leave the company’s employment.
 With the advent of the Internet and the increased ease of electronic communications, employers have
become concerned about the loss of trade secrets through dissemination over the Internet.
 Thus, employers have a legitimate interest in monitoring the electronic communications of their
employees.
 Generally, employers have broad discretion to regulate the use of electronic communications in the
workplace so long as the employees have been informed that the employer may do so.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 11
Intellectual Property Protection
 Companies can also rely on other complementary methods of protection to safeguard trade
secrets.
 Any material that qualifies for copyright protection may be protected by registration or, at a
minimum, by ensuring a copyright notice is placed on the material document to afford
notice to others of the owner’s right and interest in the material.
 Inventions may be subject to patent protection, and trademarks should be fully protected by
applying for registration.
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 12
Thank You
29 April 2020 Trade Secret Law: Dr. B.Rajalingam 13

More Related Content

What's hot

Copyright – a powerful and effective weapon to repress trademark and industri...
Copyright – a powerful and effective weapon to repress trademark and industri...Copyright – a powerful and effective weapon to repress trademark and industri...
Copyright – a powerful and effective weapon to repress trademark and industri...KENFOX IP & Law Office
 
Defend Trade Secrets Act of 2016: A Polsinelli Update Series
Defend Trade Secrets Act of 2016: A Polsinelli Update SeriesDefend Trade Secrets Act of 2016: A Polsinelli Update Series
Defend Trade Secrets Act of 2016: A Polsinelli Update SeriesPolsinelli PC
 
Trade Secrets: Presentation on Trade Secret Protection in India - BananaIP
Trade Secrets: Presentation on Trade Secret Protection in India - BananaIPTrade Secrets: Presentation on Trade Secret Protection in India - BananaIP
Trade Secrets: Presentation on Trade Secret Protection in India - BananaIPBananaIP Counsels
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimeswelcometofacebook
 
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...Kelley Keller, Esq.
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineeringwelcometofacebook
 
The Yin and Yang of IP Law
The Yin and Yang of IP LawThe Yin and Yang of IP Law
The Yin and Yang of IP LawKlemchuk LLP
 
Trade Secret in Nutshell
Trade Secret in Nutshell Trade Secret in Nutshell
Trade Secret in Nutshell Richa Yadav
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Financial Poise
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
protecting brands and identity trademark trademark implication
protecting brands and identity  trademark trademark implicationprotecting brands and identity  trademark trademark implication
protecting brands and identity trademark trademark implicationwelcometofacebook
 
Legal issues for the entreprenuer
Legal issues for the entreprenuerLegal issues for the entreprenuer
Legal issues for the entreprenuerRajesh Patel
 
UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final nycgarcia
 

What's hot (20)

Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
 
Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics Trade Secrets 2011 University Basics
Trade Secrets 2011 University Basics
 
Copyright – a powerful and effective weapon to repress trademark and industri...
Copyright – a powerful and effective weapon to repress trademark and industri...Copyright – a powerful and effective weapon to repress trademark and industri...
Copyright – a powerful and effective weapon to repress trademark and industri...
 
Defend Trade Secrets Act of 2016: A Polsinelli Update Series
Defend Trade Secrets Act of 2016: A Polsinelli Update SeriesDefend Trade Secrets Act of 2016: A Polsinelli Update Series
Defend Trade Secrets Act of 2016: A Polsinelli Update Series
 
Trade Secrets: Presentation on Trade Secret Protection in India - BananaIP
Trade Secrets: Presentation on Trade Secret Protection in India - BananaIPTrade Secrets: Presentation on Trade Secret Protection in India - BananaIP
Trade Secrets: Presentation on Trade Secret Protection in India - BananaIP
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
 
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
A Strategic Approach to Identifying and Managing Valuable Intellectual Proper...
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineering
 
The Yin and Yang of IP Law
The Yin and Yang of IP LawThe Yin and Yang of IP Law
The Yin and Yang of IP Law
 
Trade Secret in Nutshell
Trade Secret in Nutshell Trade Secret in Nutshell
Trade Secret in Nutshell
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
 
Law: Bill Loginov
Law: Bill LoginovLaw: Bill Loginov
Law: Bill Loginov
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
protecting brands and identity trademark trademark implication
protecting brands and identity  trademark trademark implicationprotecting brands and identity  trademark trademark implication
protecting brands and identity trademark trademark implication
 
Legal issues for the entreprenuer
Legal issues for the entreprenuerLegal issues for the entreprenuer
Legal issues for the entreprenuer
 
UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
 

More from Rajalingam Balakrishnan

The rights afforded by copyright law (2)
The rights afforded by copyright law (2)The rights afforded by copyright law (2)
The rights afforded by copyright law (2)Rajalingam Balakrishnan
 
The rights afforded by copyright law (3)
The rights afforded by copyright law (3)The rights afforded by copyright law (3)
The rights afforded by copyright law (3)Rajalingam Balakrishnan
 
Purpose, function & acquisition of trade marks
Purpose, function & acquisition of trade marksPurpose, function & acquisition of trade marks
Purpose, function & acquisition of trade marksRajalingam Balakrishnan
 
Patent searching process & ownership rights and transfer
Patent searching process & ownership rights and transferPatent searching process & ownership rights and transfer
Patent searching process & ownership rights and transferRajalingam Balakrishnan
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property lawRajalingam Balakrishnan
 

More from Rajalingam Balakrishnan (20)

Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
Unit 4
Unit 4Unit 4
Unit 4
 
Trade secret litigation
Trade secret litigationTrade secret litigation
Trade secret litigation
 
Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
Trade mark registration processes (2)
Trade mark registration processes (2)Trade mark registration processes (2)
Trade mark registration processes (2)
 
The rights afforded by copyright law (2)
The rights afforded by copyright law (2)The rights afforded by copyright law (2)
The rights afforded by copyright law (2)
 
Subject matter of copyright law
Subject matter of copyright lawSubject matter of copyright law
Subject matter of copyright law
 
The rights afforded by copyright law (3)
The rights afforded by copyright law (3)The rights afforded by copyright law (3)
The rights afforded by copyright law (3)
 
Purpose, function & acquisition of trade marks
Purpose, function & acquisition of trade marksPurpose, function & acquisition of trade marks
Purpose, function & acquisition of trade marks
 
Selecting and evaluating trade mark
Selecting and evaluating trade markSelecting and evaluating trade mark
Selecting and evaluating trade mark
 
Trade mark registration processes
Trade mark registration processesTrade mark registration processes
Trade mark registration processes
 
The rights afforded by copyright law
The rights afforded by copyright lawThe rights afforded by copyright law
The rights afforded by copyright law
 
Protection for submission
Protection for submissionProtection for submission
Protection for submission
 
Patent searching process & ownership rights and transfer
Patent searching process & ownership rights and transferPatent searching process & ownership rights and transfer
Patent searching process & ownership rights and transfer
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
 
Protectable matter
Protectable matterProtectable matter
Protectable matter
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
 

Trade secrete litigation

  • 1. Intellectual Property Rights Presented by Dr. B.Rajalingam Assistant Professor Department of Computer Science & Engineering Priyadarshini College of Engineering & Technology, Nellore Unit 4 Trade Secrete Litigation
  • 2. Syllabus • Trade Secrets: Trade Secrete Law Determination of Trade Secrete Status Liability for Misappropriations of Trade Secrets Protection for Submission Trade Secrete Litigation • Unfair Competition: Misappropriation Right of Publicity False Advertising 29 April 2020 2 Trade Secret Law: Dr. B.Rajalingam
  • 3. Trade Secret Litigation Trade secret litigation comprises of two aspects : 1. Violations of trade secret law takes places when the confidential information is obtained through misappropriations.  Misappropriations means where someone acquires, uses and/or discloses company trade secret without taking any permission from company in an improper manner. 2. Violations of non disclosure agreement takes place when a party in the contract from the breach to the agreement.  Misappropriation in violation of a state trade secret law.  If no written agreement exists, the plaintiff must rely upon case law.  To protect trade secret violations, companies should require new employees who will have access to confidential information to acknowledge in writing agreement that accepting employment. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 3
  • 4. Cont…  If grounds for federal jurisdiction exist, the action may be brought in federal court.  If the action also involves copyright or patent, it must be brought in federal court.  Otherwise, the action will be brought in a state court.  If the action is instituted in federal court, a federal court will apply state law inasmuch as there is no general federal trade secret law.  The UTSA provides that an action for misappropriation must be brought within three years after misappropriation is discovered.  In federal court, the action will be governed by the Federal Rules of Civil Procedure relating to federal civil actions.  These rules set the times for responding to the complaint, matters pertaining to motions and discovery, and any other litigation related matters. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 4
  • 5. Cont…  After the complaint is filed, the defendant will respond by filing an answer, usually denying that any breach of agreement.  If the defendant has a cause of action to assert against the plaintiff relating to the trade secret, it must be asserted by way of a counterclaim in the litigation so that all disputes between the parties relating to the information can be resolved at the same time.  The plaintiff and defendant will take depositions to obtain testimony from those who may have information about the case.  For example, the plaintiff may depose individuals in the defendant’s company to determine whether they were instructed to misappropriate the plaintiff’s information.  Interrogatories may be served on either party to obtain information, such as to inquire about experts either side may intend to call. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 5
  • 6. Cont…  If the matter cannot be resolved by private agreement, it will proceed to trial.  The trade secret owner must prove misappropriation by a preponderance of the evidence.  Either party may request a jury trial; otherwise, a judge will render the decision.  One of the difficult issues in trade secret litigation arises from the fact that the trade secret sought to be protected often must be disclosed in the litigation so the judge or jury can evaluate whether the information is sufficiently valuable.  Similarly, the owner’s methods of protecting the information often must be disclosed so the fact finder can determine whether the owner has taken reasonable measures to protect the alleged trade secrets.  Courts can fashion a variety of means to protect the information, from issuing protective orders, to holding private hearings in the judge’s chambers, to closing the courtroom to the public, to sealing court records. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 6
  • 7. Trade Secret Protection Programs  Because trade secrets are legally broken and may be lost by accidently disclosure or failure to reasonably protect.  Companies should implement trade secret protection programs to safeguard valuable information.  While it is common for businesses to assume that only scientific and technical data constitute trade secrets.  Protection is available for a much broader range of subjects, such as customer lists, marketing plans, hiring tactics, and other information that would be valuable to a competitor, and that are common to many companies.  Companies that value their trade secrets should implement trade secret protection programs.  Developing programs and measures to protect trade secrets is an easy way to demonstrate to a court that an owner values its information and takes appropriate measures to maintain its secrecy. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 7
  • 8. Physical Protection There are a variety of tangible measures a company can implement to protect trade secrets, including the following:  Safeguarding information under lock and key  Protecting the information from unauthorized access  Conducting background checks of employees who will have access to key information  “Badging” doors and entrances so access beyond the company’s reception area requires key code or bar code access and so that employee location is monitored  Retaining adequate security during evenings and weekends either through alarm systems or security services, including surveillance cameras  Ensuring tours of the company premises do not expose outsiders to valuable processes or information.  Marking materials with legends or stamps such as “Confidential - Trade Secret Information” 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 8
  • 9. Cont…  Monitoring activities of former employees who had access to confidential information and monitoring trade journals for articles that may show a competitor has gained access to company trade secrets  Ensuring no one person has access to critical information but rather that several people “share” parts of the information.  Implementing inventory control systems  Securing computers with password or encryption protection and monitoring devices to track which employees access certain information.  Requiring use of paper shredders for disposal of sensitive documents  Designating a person to be responsible for trade secret information and release to others (including the media), and for reviewing bids, proposals, marketing materials, and plans by employees to publish articles or speak at conferences  Implementing photocopying policies and maintaining logbooks or electronic monitoring of copying. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 9
  • 10. Cont…  Monitoring employees’ use of e-mail and the Internet to ensure confidential information is not being disseminated.  Conducting exit interviews with employees to obtain return of company materials and to remind them of their obligations not to use or disclose proprietary company information  Using encryption technology and antivirus protection programs to protect information stored on computers  Educating employees on trade secrets and protection of trade secrets  Requiring visitors to the premises to sign in and wear badges  Ensuring information retained on computers is available only on company networks so that access can be easily tracked  Most companies will not need to implement all of the measures described.  Courts do not require absolute secrecy or that extreme measures be taken to protect information.  The lab is in an unmarked building in a typical office park, and visitors must pass through a metal detector that scans for camera phones. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 10
  • 11. Contractual Protection  Another method of protecting trade secrets is by contract, namely, requiring those with access to the information to agree in writing not to disclose the information to others.  In licensing arrangements, trade secret owners should ensure the license agreements contain sufficient protection for trade secret information.  Employers should use noncompetition agreements to ensure former employees do not use material gained on the job to later compete against the employer.  Even without formal contracts, a company should include protection policies in its employee handbooks, routinely publish reminders about confidentiality in company newsletters and through e-mail messages, and remind employees of their duties during their initial orientations and during exit interviews conducted when the individuals leave the company’s employment.  With the advent of the Internet and the increased ease of electronic communications, employers have become concerned about the loss of trade secrets through dissemination over the Internet.  Thus, employers have a legitimate interest in monitoring the electronic communications of their employees.  Generally, employers have broad discretion to regulate the use of electronic communications in the workplace so long as the employees have been informed that the employer may do so. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 11
  • 12. Intellectual Property Protection  Companies can also rely on other complementary methods of protection to safeguard trade secrets.  Any material that qualifies for copyright protection may be protected by registration or, at a minimum, by ensuring a copyright notice is placed on the material document to afford notice to others of the owner’s right and interest in the material.  Inventions may be subject to patent protection, and trademarks should be fully protected by applying for registration. 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 12
  • 13. Thank You 29 April 2020 Trade Secret Law: Dr. B.Rajalingam 13