SlideShare a Scribd company logo
SCHILLING 2017
TRADE SECRET
Badra Khairiah
Sistem Informasi
Uin Suska Riau
Rather than disclose detailed information about a
proprietary product or process in exchange for the grant of a
patent, inventors or firms often will choose to protect their
intellectual property by holding it as a trade secret. A trade
secret is information that belongs to a business that is generally
unknown to others. Trade secrets need not meet many of the
stringent requirements of patent law, enabling a broader class of
assets and activities to be protectable. For example, while the
formula for a beverage is not patentable, it can be considered a
trade secret.
.
Trade secret law traces its history back to Roman law
punishing individuals who induced someone to reveal the
details of their employer’s commercial affairs Information is
typically considered to be a trade secret only if it (a) offers a
distinctive advantage to the company in the form of
economic rents, and (b) remains valuable only as long as
the information remains private. Examples of trade secrets
might include information about a firm’s customers, its
marketing strategies, or its manufacturing processes. Trade
secret law protects such information from being wrongfully
taken by another party. In the United States, trade secret
law is implemented at thestate level, but the Uniform Trade
Secret Act attempts to make these laws consistent from
state to state.
For information to qualify as a trade secret under the Uniform
Trade Secret Act, the information must meet the following
three criteria:
• The information must not be generally known or readily
ascertainable through legitimate means.
• The information must have economic importance that is
contingent upon its secrecy.
• The trade secret holder must exercise reasonable
measures to protect the secrecy of the information.
If information meets these criteria, the Uniform Trade Secret
Act stipulates that its owner can prevent others from benefiting
from this information without the owner’s trade secret
Information that belongs to a business that is held private.
permission. In particular, the act states that no individual or
group can copy, use, or otherwise benefit from a trade secret
without the owner’s authorization if they meet any of the
following conditions:
1. They are bound by a duty of confidentiality (e.g., employees,
lawyers).
2. They have signed a nondisclosure agreement.
3. They acquire the secret through improper means such as
theft or bribery.
4. They acquire the information from someone who did not
have the right to disclose it.
5. They learn about the secret by mistake but have reason to
know that the information was a protected trade secret.
In most U.S. states, if owners of a trade secret believe that
another party has stolen or improperly disclosed their trade
secret, they can ask a court to issue an injunction against
further use of the secrets, and they may also be able to
collect damages for any economic harm suffered by the
improper use of the trade secret. For example, in November
2002, Procter & Gamble sued Potlatch Corporation,
claiming that Potlatch had stolen trade secret methods used
to produce Bounty paper towels and Charmin bath tissue by
hiring away two of Procter & Gamble’s paper manufacturing
experts. Potlatch is a large, private-label tissue
manufacturer that produces toilet paper, facial tissues,
napkins, and paper towels for grocery store chains such as
Albertsons and Safeway. By March 2003, the two
companies had reached an agreement to settle out of court,
keeping the terms of the settlementconfidential

More Related Content

Similar to Trade secret

Protection for submission
Protection for submissionProtection for submission
Protection for submission
Rajalingam Balakrishnan
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
RST ECOENERGY PVT. LTD.
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
RST ECOENERGY PVT. LTD.
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
Nickkisha Farrell
 
SPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPTSPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPT
Suneeta Mohapatra
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
Rajalingam Balakrishnan
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
David Lizerbram
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Financial Poise
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Financial Poise
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
FNian
 
IICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationIICJ Article Trade Secret Mediation
IICJ Article Trade Secret Mediation
Erica Bristol
 
Common Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A DealsCommon Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A Deals
Matheson Law Firm
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
dan hyde
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
canadianlawyer
 
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part IProtecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
John Watkins
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
EveryNDA
 
Confidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxConfidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptx
Felger Tilos
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other Agreements
LawPlus Ltd.
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Financial Poise
 
Presentation2
Presentation2Presentation2
Presentation2
Steven Smith
 

Similar to Trade secret (20)

Protection for submission
Protection for submissionProtection for submission
Protection for submission
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
 
SPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPTSPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPT
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
 
IICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationIICJ Article Trade Secret Mediation
IICJ Article Trade Secret Mediation
 
Common Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A DealsCommon Data Protection Issues in Managing M&A Deals
Common Data Protection Issues in Managing M&A Deals
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
 
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part IProtecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part I
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
 
Confidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxConfidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptx
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other Agreements
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: INTELLECTU...
 
Presentation2
Presentation2Presentation2
Presentation2
 

More from Badra Khairiah

Birth of the snowboarding industry
Birth of the snowboarding industryBirth of the snowboarding industry
Birth of the snowboarding industry
Badra Khairiah
 
Organizing for i nnovation at google
Organizing for i nnovation at googleOrganizing for i nnovation at google
Organizing for i nnovation at google
Badra Khairiah
 
Qualitative methods for choosing projects
Qualitative methods for choosing projectsQualitative methods for choosing projects
Qualitative methods for choosing projects
Badra Khairiah
 
Presentation1
Presentation1Presentation1
Presentation1
Badra Khairiah
 
STRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONSSTRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONS
Badra Khairiah
 
ORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLEORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLE
Badra Khairiah
 
QUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTSQUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTS
Badra Khairiah
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
Badra Khairiah
 
Birth of the Snowboarding Industry
Birth of the Snowboarding IndustryBirth of the Snowboarding Industry
Birth of the Snowboarding Industry
Badra Khairiah
 
Badra1
Badra1Badra1

More from Badra Khairiah (10)

Birth of the snowboarding industry
Birth of the snowboarding industryBirth of the snowboarding industry
Birth of the snowboarding industry
 
Organizing for i nnovation at google
Organizing for i nnovation at googleOrganizing for i nnovation at google
Organizing for i nnovation at google
 
Qualitative methods for choosing projects
Qualitative methods for choosing projectsQualitative methods for choosing projects
Qualitative methods for choosing projects
 
Presentation1
Presentation1Presentation1
Presentation1
 
STRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONSSTRATEGIES TO IMPROVE TIMING OPTIONS
STRATEGIES TO IMPROVE TIMING OPTIONS
 
ORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLEORGANIZING FOR iNNOVATION AT GOOGLE
ORGANIZING FOR iNNOVATION AT GOOGLE
 
QUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTSQUALITATIVE METHODS FOR CHOOSING PROJECTS
QUALITATIVE METHODS FOR CHOOSING PROJECTS
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
 
Birth of the Snowboarding Industry
Birth of the Snowboarding IndustryBirth of the Snowboarding Industry
Birth of the Snowboarding Industry
 
Badra1
Badra1Badra1
Badra1
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Trade secret

  • 1. SCHILLING 2017 TRADE SECRET Badra Khairiah Sistem Informasi Uin Suska Riau
  • 2. Rather than disclose detailed information about a proprietary product or process in exchange for the grant of a patent, inventors or firms often will choose to protect their intellectual property by holding it as a trade secret. A trade secret is information that belongs to a business that is generally unknown to others. Trade secrets need not meet many of the stringent requirements of patent law, enabling a broader class of assets and activities to be protectable. For example, while the formula for a beverage is not patentable, it can be considered a trade secret. .
  • 3. Trade secret law traces its history back to Roman law punishing individuals who induced someone to reveal the details of their employer’s commercial affairs Information is typically considered to be a trade secret only if it (a) offers a distinctive advantage to the company in the form of economic rents, and (b) remains valuable only as long as the information remains private. Examples of trade secrets might include information about a firm’s customers, its marketing strategies, or its manufacturing processes. Trade secret law protects such information from being wrongfully taken by another party. In the United States, trade secret law is implemented at thestate level, but the Uniform Trade Secret Act attempts to make these laws consistent from state to state.
  • 4. For information to qualify as a trade secret under the Uniform Trade Secret Act, the information must meet the following three criteria: • The information must not be generally known or readily ascertainable through legitimate means. • The information must have economic importance that is contingent upon its secrecy. • The trade secret holder must exercise reasonable measures to protect the secrecy of the information. If information meets these criteria, the Uniform Trade Secret Act stipulates that its owner can prevent others from benefiting from this information without the owner’s trade secret Information that belongs to a business that is held private. permission. In particular, the act states that no individual or group can copy, use, or otherwise benefit from a trade secret without the owner’s authorization if they meet any of the following conditions:
  • 5. 1. They are bound by a duty of confidentiality (e.g., employees, lawyers). 2. They have signed a nondisclosure agreement. 3. They acquire the secret through improper means such as theft or bribery. 4. They acquire the information from someone who did not have the right to disclose it. 5. They learn about the secret by mistake but have reason to know that the information was a protected trade secret.
  • 6. In most U.S. states, if owners of a trade secret believe that another party has stolen or improperly disclosed their trade secret, they can ask a court to issue an injunction against further use of the secrets, and they may also be able to collect damages for any economic harm suffered by the improper use of the trade secret. For example, in November 2002, Procter & Gamble sued Potlatch Corporation, claiming that Potlatch had stolen trade secret methods used to produce Bounty paper towels and Charmin bath tissue by hiring away two of Procter & Gamble’s paper manufacturing experts. Potlatch is a large, private-label tissue manufacturer that produces toilet paper, facial tissues, napkins, and paper towels for grocery store chains such as Albertsons and Safeway. By March 2003, the two companies had reached an agreement to settle out of court, keeping the terms of the settlementconfidential