SlideShare a Scribd company logo
Intellectual Property Rights
Presented by
Dr. B.Rajalingam
Assistant Professor
Department of Computer Science & Engineering
Priyadarshini College of Engineering & Technology, Nellore
Unit 4
Trade Secrete Litigation
Syllabus
• Trade Secrets:
Trade Secrete Law
Determination of Trade Secrete Status
Liability for Misappropriations of Trade Secrets
Protection for Submission
Trade Secrete Litigation
• Unfair Competition:
Misappropriation
Right of Publicity
False Advertising29 October 2020 2Trade Secret Law: Dr. B.Rajalingam
Trade Secret Litigation
Trade secret litigation comprises of two aspects :
1. Violations of trade secret law takes places when the confidential information is
obtained through misappropriations.
 Misappropriations means where someone acquires, uses and/or discloses
company trade secret without taking any permission from company in an
improper manner.
2. Violations of non disclosure agreement takes place when a party in the
contract from the breach to the agreement.
 Misappropriation in violation of a state trade secret law.
 If no written agreement exists, the plaintiff must rely upon case law.
 To protect trade secret violations, companies should require new employees who
will have access to confidential information to acknowledge in writing agreement
that accepting employment.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 3
Cont…
 If grounds for federal jurisdiction exist, the action may be brought in federal court.
 If the action also involves copyright or patent, it must be brought in federal court.
 Otherwise, the action will be brought in a state court.
 If the action is instituted in federal court, a federal court will apply state law
inasmuch as there is no general federal trade secret law.
 The UTSA provides that an action for misappropriation must be brought within
three years after misappropriation is discovered.
 In federal court, the action will be governed by the Federal Rules of Civil Procedure
relating to federal civil actions.
 These rules set the times for responding to the complaint, matters pertaining to
motions and discovery, and any other litigation related matters.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 4
Cont…
 After the complaint is filed, the defendant will respond by filing an answer, usually
denying that any breach of agreement.
 If the defendant has a cause of action to assert against the plaintiff relating to the
trade secret, it must be asserted by way of a counterclaim in the litigation so that all
disputes between the parties relating to the information can be resolved at the same
time.
 The plaintiff and defendant will take depositions to obtain testimony from those who
may have information about the case.
 For example, the plaintiff may depose individuals in the defendant’s company to
determine whether they were instructed to misappropriate the plaintiff’s information.
 Interrogatories may be served on either party to obtain information, such as to
inquire about experts either side may intend to call.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 5
Cont…
 If the matter cannot be resolved by private agreement, it will proceed to trial.
 The trade secret owner must prove misappropriation by a preponderance of the
evidence.
 Either party may request a jury trial; otherwise, a judge will render the decision.
 One of the difficult issues in trade secret litigation arises from the fact that the trade
secret sought to be protected often must be disclosed in the litigation so the judge or
jury can evaluate whether the information is sufficiently valuable.
 Similarly, the owner’s methods of protecting the information often must be disclosed
so the fact finder can determine whether the owner has taken reasonable measures to
protect the alleged trade secrets.
 Courts can fashion a variety of means to protect the information, from issuing
protective orders, to holding private hearings in the judge’s chambers, to closing the
courtroom to the public, to sealing court records.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 6
Trade Secret Protection Programs
 Because trade secrets are legally broken and may be lost by accidently disclosure or failure to
reasonably protect.
 Companies should implement trade secret protection programs to safeguard valuable
information.
 While it is common for businesses to assume that only scientific and technical data constitute
trade secrets.
 Protection is available for a much broader range of subjects, such as customer lists,
marketing plans, hiring tactics, and other information that would be valuable to a
competitor, and that are common to many companies.
 Companies that value their trade secrets should implement trade secret protection programs.
 Developing programs and measures to protect trade secrets is an easy way to demonstrate to a
court that an owner values its information and takes appropriate measures to maintain its
secrecy.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 7
Physical Protection
There are a variety of tangible measures a company can implement to protect trade secrets,
including the following:
 Safeguarding information under lock and key
 Protecting the information from unauthorized access
 Conducting background checks of employees who will have access to key information
 “Badging” doors and entrances so access beyond the company’s reception area requires key
code or bar code access and so that employee location is monitored
 Retaining adequate security during evenings and weekends either through alarm systems or
security services, including surveillance cameras
 Ensuring tours of the company premises do not expose outsiders to valuable processes or
information.
 Marking materials with legends or stamps such as “Confidential - Trade Secret Information”
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 8
Cont…
 Monitoring activities of former employees who had access to confidential information and
monitoring trade journals for articles that may show a competitor has gained access to
company trade secrets
 Ensuring no one person has access to critical information but rather that several people
“share” parts of the information.
 Implementing inventory control systems
 Securing computers with password or encryption protection and monitoring devices to track
which employees access certain information.
 Requiring use of paper shredders for disposal of sensitive documents
 Designating a person to be responsible for trade secret information and release to others
(including the media), and for reviewing bids, proposals, marketing materials, and plans by
employees to publish articles or speak at conferences
 Implementing photocopying policies and maintaining logbooks or electronic monitoring of
copying.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 9
Cont…
 Monitoring employees’ use of e-mail and the Internet to ensure confidential information is not being
disseminated.
 Conducting exit interviews with employees to obtain return of company materials and to remind them of
their obligations not to use or disclose proprietary company information
 Using encryption technology and antivirus protection programs to protect information stored on
computers
 Educating employees on trade secrets and protection of trade secrets
 Requiring visitors to the premises to sign in and wear badges
 Ensuring information retained on computers is available only on company networks so that access can be
easily tracked
 Most companies will not need to implement all of the measures described.
 Courts do not require absolute secrecy or that extreme measures be taken to protect information.
 The lab is in an unmarked building in a typical office park, and visitors must pass through a metal
detector that scans for camera phones.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 10
Contractual Protection
 Another method of protecting trade secrets is by contract, namely, requiring those with access to the
information to agree in writing not to disclose the information to others.
 In licensing arrangements, trade secret owners should ensure the license agreements contain sufficient
protection for trade secret information.
 Employers should use noncompetition agreements to ensure former employees do not use material
gained on the job to later compete against the employer.
 Even without formal contracts, a company should include protection policies in its employee handbooks,
routinely publish reminders about confidentiality in company newsletters and through e-mail messages,
and remind employees of their duties during their initial orientations and during exit interviews
conducted when the individuals leave the company’s employment.
 With the advent of the Internet and the increased ease of electronic communications, employers have
become concerned about the loss of trade secrets through dissemination over the Internet.
 Thus, employers have a legitimate interest in monitoring the electronic communications of their
employees.
 Generally, employers have broad discretion to regulate the use of electronic communications in the
workplace so long as the employees have been informed that the employer may do so.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 11
Intellectual Property Protection
 Companies can also rely on other complementary methods of protection to safeguard trade
secrets.
 Any material that qualifies for copyright protection may be protected by registration or, at a
minimum, by ensuring a copyright notice is placed on the material document to afford notice
to others of the owner’s right and interest in the material.
 Inventions may be subject to patent protection, and trademarks should be fully protected by
applying for registration.
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 12
Thank You
29 October 2020 Trade Secret Law: Dr. B.Rajalingam 13

More Related Content

What's hot

Intellectual property rights (IPR)
Intellectual property rights (IPR)Intellectual property rights (IPR)
Intellectual property rights (IPR)
Vasantha Raju N
 
International trade mark law & copy right law
International trade mark law & copy right lawInternational trade mark law & copy right law
International trade mark law & copy right law
Rajalingam Balakrishnan
 
Selecting and evaluating trade mark
Selecting and evaluating trade markSelecting and evaluating trade mark
Selecting and evaluating trade mark
Rajalingam Balakrishnan
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
Rajalingam Balakrishnan
 
Intellectual property-Trademark
Intellectual property-TrademarkIntellectual property-Trademark
Intellectual property-Trademark
Priyanka Agarwal
 
Trade secrets
Trade secretsTrade secrets
Geographical indication - WTO
Geographical indication - WTOGeographical indication - WTO
Geographical indication - WTO
CP default
 
Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...
Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...
Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...
raogari
 
Industrial_design
Industrial_designIndustrial_design
Industrial_design
Kamma K Babu
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
Rajalingam Balakrishnan
 
International organizations, agencies and treaties
International organizations, agencies and treatiesInternational organizations, agencies and treaties
International organizations, agencies and treaties
Rajalingam Balakrishnan
 
Industrial designs
Industrial designsIndustrial designs
Industrial designs
ADAMYA VARSHNEY
 
Functions of a trademark
Functions of a trademarkFunctions of a trademark
Functions of a trademark
Prasanna R Kovath
 
Trademark
TrademarkTrademark
Trademark
Rarichan Mathew
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
David Lizerbram
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
Vikash Kumar
 

What's hot (20)

Intellectual property rights (IPR)
Intellectual property rights (IPR)Intellectual property rights (IPR)
Intellectual property rights (IPR)
 
International trade mark law & copy right law
International trade mark law & copy right lawInternational trade mark law & copy right law
International trade mark law & copy right law
 
Selecting and evaluating trade mark
Selecting and evaluating trade markSelecting and evaluating trade mark
Selecting and evaluating trade mark
 
Intellectual property audits
Intellectual property auditsIntellectual property audits
Intellectual property audits
 
Fundamental of copy right law
Fundamental of copy right lawFundamental of copy right law
Fundamental of copy right law
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
 
Intellectual property-Trademark
Intellectual property-TrademarkIntellectual property-Trademark
Intellectual property-Trademark
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
Geographical indication - WTO
Geographical indication - WTOGeographical indication - WTO
Geographical indication - WTO
 
Protectable matter
Protectable matterProtectable matter
Protectable matter
 
Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...
Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...
Trademark Infringement,Types of Trademark Infringements and Remedies of Infri...
 
Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
Industrial_design
Industrial_designIndustrial_design
Industrial_design
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
International organizations, agencies and treaties
International organizations, agencies and treatiesInternational organizations, agencies and treaties
International organizations, agencies and treaties
 
Industrial designs
Industrial designsIndustrial designs
Industrial designs
 
Functions of a trademark
Functions of a trademarkFunctions of a trademark
Functions of a trademark
 
Trademark
TrademarkTrademark
Trademark
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
 

Similar to Trade secrete litigation

Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret LienFNian
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
IRJET Journal
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential informationAltacit Global
 
Protection of Trade Secrets in Manufacturing and Technology Transfer Agreements
Protection of Trade Secrets in Manufacturing and Technology Transfer AgreementsProtection of Trade Secrets in Manufacturing and Technology Transfer Agreements
Protection of Trade Secrets in Manufacturing and Technology Transfer Agreements
LawPlus Ltd.
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsLawPlus Ltd.
 
Protection of Trade Secrets
Protection of Trade SecretsProtection of Trade Secrets
Protection of Trade Secrets
Rajat Agrawal
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimeswelcometofacebook
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
MMMTechLaw
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
Bucacci Business Solutions
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
Cassie McGarvey, JD
 
Out
OutOut
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
asireesha
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
Badra Khairiah
 
Trade secret
Trade secretTrade secret
Trade secret
Badra Khairiah
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
dan hyde
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
Francoise Gilbert
 

Similar to Trade secrete litigation (20)

Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETSINTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
 
Unit 4 trade secret 1
Unit 4 trade secret 1Unit 4 trade secret 1
Unit 4 trade secret 1
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
Protection of Trade Secrets in Manufacturing and Technology Transfer Agreements
Protection of Trade Secrets in Manufacturing and Technology Transfer AgreementsProtection of Trade Secrets in Manufacturing and Technology Transfer Agreements
Protection of Trade Secrets in Manufacturing and Technology Transfer Agreements
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other Agreements
 
Protection of Trade Secrets
Protection of Trade SecretsProtection of Trade Secrets
Protection of Trade Secrets
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
Out
OutOut
Out
 
SPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPTSPRING BOARD DOCTRINE PPT
SPRING BOARD DOCTRINE PPT
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
 
Introduction to trade secret
Introduction to trade secretIntroduction to trade secret
Introduction to trade secret
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
 
Trade secret
Trade secretTrade secret
Trade secret
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
 

More from Rajalingam Balakrishnan

Trade mark registration processes (2)
Trade mark registration processes (2)Trade mark registration processes (2)
Trade mark registration processes (2)
Rajalingam Balakrishnan
 
The rights afforded by copyright law (2)
The rights afforded by copyright law (2)The rights afforded by copyright law (2)
The rights afforded by copyright law (2)
Rajalingam Balakrishnan
 
Subject matter of copyright law
Subject matter of copyright lawSubject matter of copyright law
Subject matter of copyright law
Rajalingam Balakrishnan
 
The rights afforded by copyright law (3)
The rights afforded by copyright law (3)The rights afforded by copyright law (3)
The rights afforded by copyright law (3)
Rajalingam Balakrishnan
 
Trade mark registration processes
Trade mark registration processesTrade mark registration processes
Trade mark registration processes
Rajalingam Balakrishnan
 
The rights afforded by copyright law
The rights afforded by copyright lawThe rights afforded by copyright law
The rights afforded by copyright law
Rajalingam Balakrishnan
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
Rajalingam Balakrishnan
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
Rajalingam Balakrishnan
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
Rajalingam Balakrishnan
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
Rajalingam Balakrishnan
 

More from Rajalingam Balakrishnan (13)

Unit 4
Unit 4Unit 4
Unit 4
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
Trade mark registration processes (2)
Trade mark registration processes (2)Trade mark registration processes (2)
Trade mark registration processes (2)
 
The rights afforded by copyright law (2)
The rights afforded by copyright law (2)The rights afforded by copyright law (2)
The rights afforded by copyright law (2)
 
Subject matter of copyright law
Subject matter of copyright lawSubject matter of copyright law
Subject matter of copyright law
 
The rights afforded by copyright law (3)
The rights afforded by copyright law (3)The rights afforded by copyright law (3)
The rights afforded by copyright law (3)
 
Trade mark registration processes
Trade mark registration processesTrade mark registration processes
Trade mark registration processes
 
The rights afforded by copyright law
The rights afforded by copyright lawThe rights afforded by copyright law
The rights afforded by copyright law
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
 
Intellectual property audits 1
Intellectual property audits 1Intellectual property audits 1
Intellectual property audits 1
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Trade secrete litigation

  • 1. Intellectual Property Rights Presented by Dr. B.Rajalingam Assistant Professor Department of Computer Science & Engineering Priyadarshini College of Engineering & Technology, Nellore Unit 4 Trade Secrete Litigation
  • 2. Syllabus • Trade Secrets: Trade Secrete Law Determination of Trade Secrete Status Liability for Misappropriations of Trade Secrets Protection for Submission Trade Secrete Litigation • Unfair Competition: Misappropriation Right of Publicity False Advertising29 October 2020 2Trade Secret Law: Dr. B.Rajalingam
  • 3. Trade Secret Litigation Trade secret litigation comprises of two aspects : 1. Violations of trade secret law takes places when the confidential information is obtained through misappropriations.  Misappropriations means where someone acquires, uses and/or discloses company trade secret without taking any permission from company in an improper manner. 2. Violations of non disclosure agreement takes place when a party in the contract from the breach to the agreement.  Misappropriation in violation of a state trade secret law.  If no written agreement exists, the plaintiff must rely upon case law.  To protect trade secret violations, companies should require new employees who will have access to confidential information to acknowledge in writing agreement that accepting employment. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 3
  • 4. Cont…  If grounds for federal jurisdiction exist, the action may be brought in federal court.  If the action also involves copyright or patent, it must be brought in federal court.  Otherwise, the action will be brought in a state court.  If the action is instituted in federal court, a federal court will apply state law inasmuch as there is no general federal trade secret law.  The UTSA provides that an action for misappropriation must be brought within three years after misappropriation is discovered.  In federal court, the action will be governed by the Federal Rules of Civil Procedure relating to federal civil actions.  These rules set the times for responding to the complaint, matters pertaining to motions and discovery, and any other litigation related matters. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 4
  • 5. Cont…  After the complaint is filed, the defendant will respond by filing an answer, usually denying that any breach of agreement.  If the defendant has a cause of action to assert against the plaintiff relating to the trade secret, it must be asserted by way of a counterclaim in the litigation so that all disputes between the parties relating to the information can be resolved at the same time.  The plaintiff and defendant will take depositions to obtain testimony from those who may have information about the case.  For example, the plaintiff may depose individuals in the defendant’s company to determine whether they were instructed to misappropriate the plaintiff’s information.  Interrogatories may be served on either party to obtain information, such as to inquire about experts either side may intend to call. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 5
  • 6. Cont…  If the matter cannot be resolved by private agreement, it will proceed to trial.  The trade secret owner must prove misappropriation by a preponderance of the evidence.  Either party may request a jury trial; otherwise, a judge will render the decision.  One of the difficult issues in trade secret litigation arises from the fact that the trade secret sought to be protected often must be disclosed in the litigation so the judge or jury can evaluate whether the information is sufficiently valuable.  Similarly, the owner’s methods of protecting the information often must be disclosed so the fact finder can determine whether the owner has taken reasonable measures to protect the alleged trade secrets.  Courts can fashion a variety of means to protect the information, from issuing protective orders, to holding private hearings in the judge’s chambers, to closing the courtroom to the public, to sealing court records. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 6
  • 7. Trade Secret Protection Programs  Because trade secrets are legally broken and may be lost by accidently disclosure or failure to reasonably protect.  Companies should implement trade secret protection programs to safeguard valuable information.  While it is common for businesses to assume that only scientific and technical data constitute trade secrets.  Protection is available for a much broader range of subjects, such as customer lists, marketing plans, hiring tactics, and other information that would be valuable to a competitor, and that are common to many companies.  Companies that value their trade secrets should implement trade secret protection programs.  Developing programs and measures to protect trade secrets is an easy way to demonstrate to a court that an owner values its information and takes appropriate measures to maintain its secrecy. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 7
  • 8. Physical Protection There are a variety of tangible measures a company can implement to protect trade secrets, including the following:  Safeguarding information under lock and key  Protecting the information from unauthorized access  Conducting background checks of employees who will have access to key information  “Badging” doors and entrances so access beyond the company’s reception area requires key code or bar code access and so that employee location is monitored  Retaining adequate security during evenings and weekends either through alarm systems or security services, including surveillance cameras  Ensuring tours of the company premises do not expose outsiders to valuable processes or information.  Marking materials with legends or stamps such as “Confidential - Trade Secret Information” 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 8
  • 9. Cont…  Monitoring activities of former employees who had access to confidential information and monitoring trade journals for articles that may show a competitor has gained access to company trade secrets  Ensuring no one person has access to critical information but rather that several people “share” parts of the information.  Implementing inventory control systems  Securing computers with password or encryption protection and monitoring devices to track which employees access certain information.  Requiring use of paper shredders for disposal of sensitive documents  Designating a person to be responsible for trade secret information and release to others (including the media), and for reviewing bids, proposals, marketing materials, and plans by employees to publish articles or speak at conferences  Implementing photocopying policies and maintaining logbooks or electronic monitoring of copying. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 9
  • 10. Cont…  Monitoring employees’ use of e-mail and the Internet to ensure confidential information is not being disseminated.  Conducting exit interviews with employees to obtain return of company materials and to remind them of their obligations not to use or disclose proprietary company information  Using encryption technology and antivirus protection programs to protect information stored on computers  Educating employees on trade secrets and protection of trade secrets  Requiring visitors to the premises to sign in and wear badges  Ensuring information retained on computers is available only on company networks so that access can be easily tracked  Most companies will not need to implement all of the measures described.  Courts do not require absolute secrecy or that extreme measures be taken to protect information.  The lab is in an unmarked building in a typical office park, and visitors must pass through a metal detector that scans for camera phones. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 10
  • 11. Contractual Protection  Another method of protecting trade secrets is by contract, namely, requiring those with access to the information to agree in writing not to disclose the information to others.  In licensing arrangements, trade secret owners should ensure the license agreements contain sufficient protection for trade secret information.  Employers should use noncompetition agreements to ensure former employees do not use material gained on the job to later compete against the employer.  Even without formal contracts, a company should include protection policies in its employee handbooks, routinely publish reminders about confidentiality in company newsletters and through e-mail messages, and remind employees of their duties during their initial orientations and during exit interviews conducted when the individuals leave the company’s employment.  With the advent of the Internet and the increased ease of electronic communications, employers have become concerned about the loss of trade secrets through dissemination over the Internet.  Thus, employers have a legitimate interest in monitoring the electronic communications of their employees.  Generally, employers have broad discretion to regulate the use of electronic communications in the workplace so long as the employees have been informed that the employer may do so. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 11
  • 12. Intellectual Property Protection  Companies can also rely on other complementary methods of protection to safeguard trade secrets.  Any material that qualifies for copyright protection may be protected by registration or, at a minimum, by ensuring a copyright notice is placed on the material document to afford notice to others of the owner’s right and interest in the material.  Inventions may be subject to patent protection, and trademarks should be fully protected by applying for registration. 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 12
  • 13. Thank You 29 October 2020 Trade Secret Law: Dr. B.Rajalingam 13