SlideShare a Scribd company logo
1 of 30
Download to read offline
Trade Secret Basics
for
Small Business
and Start-ups
Protecting Your Invisible Assets
UCEDC March 23, 2015
TRADE SECRETS
•  “Studies regularly show that most businesses care
more about trade secrets than either copyrights or
patents. In fact, trade secrets are (involved in) every
aspect of a company’s operations, including dealings
with employees, vendors and customers. And while there
are millions of issued patents and registered copyrights,
the total number of protectable trade secrets is
nearly infinite.”
•  Eric Goldman, Forbes.com, Sept. 16, 2014
3/23/15UCEDC 1
Tonight’s Objectives
•  Identify the trade secrets in your business
•  Recognize the potential weak links in your
business that could lead to loss of your secrets
•  Understand ways you can protect your secrets
o  Identify steps to secure legal protection for your
business
3/23/15UCEDC 2
Brief Outline
•  Defining what a trade secret is
•  Specific examples
•  Likely ways trade secrets are exposed
•  Applicable federal and state law
•  Steps to follow to “reasonably protect” your
trade secrets
3/23/15UCEDC 3
Trade Secrets
•  Any information which would give a business an
economic competitive advantage –AN EDGE
•  What you don’t want your competitor to know
•  Need not be novel, original or inventive
•  A formula, pattern, compilation (such as a
customer list), program device, method, technique,
or process
² Successful method for meeting a customer’s
needs that could produce independent economic
value
² Depends on the effort and time expended
developing contact or customer lists
3/23/15UCEDC 4
Trade Secret Principles
•  A trade secret is protected as
long as it remains a secret
•  “Reasonable” efforts to
maintain secrecy are required
3/23/15UCEDC 5
Trade Secret Examples
•  Proprietary information
•  Special discounts granted to some
customers
•  Special vendor discounts
•  Recipes
•  Techniques
•  Exclusive marketing studies
•  Customer data
3/23/15UCEDC 6
Specific Trade Secret Examples
•  Banking and Commercial Real Estate
•  TD Bank v. Kearny Federal Savings Bank
o  Term sheets
o  Appraisals
o  Environmental assessments
o  Customer’s leases with tenants
o  Personal tax returns of the owners of the corporate entity
o  Analysis of rental income
o  Cost estimates
o  Site plans
o  Pictures of related properties
o  Credit approvals
3/23/15UCEDC 7
Specific Trade Secret Examples
•  Biotech
•  GenScript USA of Piscataway v. Genewiz of South
Plainfield
•  $10 Million verdict
o Technology (gene synthesis)
o Standard Operating Procedures (SOP’s)
o Training Materials
3/23/15UCEDC 8
Specific Trade Secret Examples
•  Restaurants and Food Preparation
•  Mr. Holmes Bakehouse, San Francisco
o  Binders containing 230 recipes including the CRUFFIN™ muffin-
croissant recipe stolen
o  Recipe did not describe the technique of making the dough on
day 1 and buttering and folding the dough on day 2.
o  Recipe did not include that the butter must be from Isigny-sur-
Mer France, but OOPS, owner told the reporter about it who then
published it
o  Binders left out on the shelves and not secured at closing
o  Rear door found unlocked when worker opened kitchen at 3 am
– inside job perhaps
3/23/15UCEDC 9
New Forms of Trade
Secrets: Social Media
o Who owns the LinkedIn® account connecting
to customers? The employee (Eagle v.
Morgan) or the employer (Cellular
Accessories for Less v. Trinitas)
o Who owns the followers on Twitter if postings
are related to a business? Phonedog v.
Kravitz
o Who owns the password to accounts?
o Who owns the blog and its followers?
3/23/15UCEDC 10
EXPOSURE
•  Intentional
ü  Employees
•  Disgruntled
•  Leaving the company
ü  Competitors
•  Espionage and intelligence gathering
« Hackers
•  Unintentional
ü  Employees
ü  3rd Party Contractors
ü  Customers and vendors
3/23/15UCEDC 11
Trade Secret Protection
State Law
•  48 states have statutory laws including New
Jersey based on UTSA (Uniform Trade Secrets Act)
•  New York, our neighbor, and Massachusetts use
common law torts of conversion, breach of duty,
tortious interference in employment,
misappropriation and unjust enrichment as well
as contract law
3/23/15UCEDC 12
New Jersey Statute 1/9/12
•  Title 56 Chapter 15. New Jersey Trade Secrets
Act §§1-9 - C.56:15-1 to 56:15-9 §10 – Note
•  "Trade secret" means information, held by one or more
people, without regard to form, including a formula, pattern,
business data compilation, program, device, method,
technique, design, diagram, drawing, invention, plan,
procedure, prototype or process, that:
•  (1) Derives independent economic value, actual or potential,
from not being generally known to, and not being readily
ascertainable by proper means by, other persons who can
obtain economic value from its disclosure or use; and
•  (2) Is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy.
3/23/15UCEDC 13
Federal Law
•  Federal Economic Espionage Act of 1996
o  Generally protects against 3rd party theft of trade secrets, but not
as relevant for internal breaches whether intentional or
inadvertent
•  Computer Fraud & Abuse Act
o  Trade secrets and misuse of computer assets
•  The Defend Trade Secrets Act of 2014 in the
Senate and The Trade Secrets Protection Act of
2014 in the House are
o  Designed to create federal criminal and civil charges, especially
against foreign hackers
3/23/15UCEDC 14
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 0: Identify your trade
secrets and group them
o Electronic
o Physical
3/23/15UCEDC 15
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 1: Update your IT policies
o Policies need to define what is acceptable,
what are the limits in clear language
o Company owned electronics:
•  Monitoring
•  Acceptable use
•  Expectation of privacy for email (personal,
business)
•  Internet access
•  Removable Media (thumb drives, DVD’s, etc.)
3/23/15UCEDC 16
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 1: Update your IT policies
o BYOD (Bring your own device)
•  Require lockout if lost or stolen
•  Allow remote wiping
•  Require use of strong passwords to unlock
•  Define ownership of applications and data
o  Remember, every time a call to a customer is made
on a personal cell phone, the information is in the cell
phone records for access without accessing your
database
3/23/15UCEDC 17
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 2: Get your agreements
in place
•  Confidentiality with employees
•  Nondisclosure with employees and vendors
•  Non-compete
o NJ law – must be “reasonable” as to
time and geographic limitation
•  Non-solicitation of current customers
3/23/15UCEDC 18
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 3: Create a culture
o  Training on do’s and don’t’s
o  Establish consequences: discipline, termination, legal
action including criminal prosecution
o  Treating confidential information properly – physical or
electronic
•  Secure location – lock it up!
•  Limited access (physical or passwords)
•  Encryption
•  Labels and watermarks
•  Access logs
3/23/15UCEDC 19
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 4: Track the hardware
o Make sure all company owned devices are
returned
o Make sure that the SIM card is in the phone
o Require password protection on BYOD
o Require reporting of any lost or stolen devices
3/23/15UCEDC 20
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 5: Establish Social Media
Policy
o Have clear policy who owns the social media
accounts that are created for and by the
company
o Clarify what type of postings are acceptable
and what are not
o Cannot interfere with employees’ rights to
organize
3/23/15UCEDC 21
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 6: Telecommuting – out
of sight – not out of mind
o Telecommuting agreement
•  protecting sensitive and confidential information
•  define electronic resources
•  company vs. personal equipment
•  physical security
•  retrieval upon termination
3/23/15UCEDC 22
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 7: Identify red flags
o  Greed or vulnerability to blackmail
o  Feelings of anger/revenge against the organization
o  Divided loyalty – allegiance to another person,
company, or country.
o  Compulsive or destructive behavior, or family
problems: drug or alcohol abuse
o  Employees who are laid off, subject to a reduction in
force, passed over for a promotion, terminated,
demoted, or required to follow a performance
improvement plan.
3/23/15UCEDC 23
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 8: EXIT Interviews
•  Ask where the employee is going to work next
and in what capacity.
•  Ask the employee for all passwords for work-
related computers, devices, accounts and files,
keys, access cards, badges, company credit
cards, and other property.
•  Change all passwords or disable accounts
3/23/15UCEDC 24
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 8: EXIT Interviews
•  Have the employee sign an acknowledgment
that all company property and information has
been returned.
•  If the employee is subject to confidentiality
agreements, employers should remind the
employee of their ongoing obligations. Send
follow-up letter.
•  Make this standard practice.
3/23/15UCEDC 25
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 9: Preserve the evidence
o Analyze the risk: if the employee resigns
without notice, refuses an exit interview or is
vague about their future employment plans,
be aware that these are all red flag behaviors.
o Check to see if any unusual email activity,
server activity, electronic copying, printing of
files, photocopying prior to the employee
leaving
3/23/15UCEDC 26
10 Steps to Reasonably Protect
Your Trade Secrets
• Step 10: Be a good example
o Clean desk top
o Destroy outdated documents
o Wipe devices
o Lock it up
3/23/15UCEDC 27
Contact Information
3/23/15UCEDC 28
For Further Information
Patricia P. Werschulz, Esq.
Of Counsel
Chipperson Law Group, P.C.
Morristown Location
163 Madison Ave, Suite 220-40
Morristown, New Jersey 07960
Phone: (973) 845-9071
Fax: (973) 845-6176
http://www.chippersonlaw.com/
3/23/15UCEDC 29

More Related Content

Similar to Trade Secrets: Critical Business Intellectual Property

FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareTRUSTe
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
BA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBealCollegeOnline
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality KelbySchwender
 
Trade Secrets and Business
Trade Secrets and BusinessTrade Secrets and Business
Trade Secrets and BusinessVincent BIROT
 
Trade Secrets and Business
Trade Secrets and BusinessTrade Secrets and Business
Trade Secrets and BusinessLawPlus Ltd.
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxMeleniaCabatan3
 
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...Knobbe Martens - Intellectual Property Law
 
European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Intellectual property for small businesses
Intellectual property for small businessesIntellectual property for small businesses
Intellectual property for small businessesPat Werschulz
 
Protecting your most valuable business asset
Protecting your most valuable business assetProtecting your most valuable business asset
Protecting your most valuable business assetMurray Procter
 

Similar to Trade Secrets: Critical Business Intellectual Property (20)

FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
How to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer CareHow to Integrate Privacy into Your Customer Care
How to Integrate Privacy into Your Customer Care
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
BA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_ppt
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
Trade Secrets and Business
Trade Secrets and BusinessTrade Secrets and Business
Trade Secrets and Business
 
Trade Secrets and Business
Trade Secrets and BusinessTrade Secrets and Business
Trade Secrets and Business
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptx
 
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
 
European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Tradesecrets
TradesecretsTradesecrets
Tradesecrets
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
ipr Paper.ppt
ipr Paper.pptipr Paper.ppt
ipr Paper.ppt
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Intellectual property for small businesses
Intellectual property for small businessesIntellectual property for small businesses
Intellectual property for small businesses
 
Protecting your most valuable business asset
Protecting your most valuable business assetProtecting your most valuable business asset
Protecting your most valuable business asset
 

Recently uploaded

如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 

Recently uploaded (20)

Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 

Trade Secrets: Critical Business Intellectual Property

  • 1. Trade Secret Basics for Small Business and Start-ups Protecting Your Invisible Assets UCEDC March 23, 2015
  • 2. TRADE SECRETS •  “Studies regularly show that most businesses care more about trade secrets than either copyrights or patents. In fact, trade secrets are (involved in) every aspect of a company’s operations, including dealings with employees, vendors and customers. And while there are millions of issued patents and registered copyrights, the total number of protectable trade secrets is nearly infinite.” •  Eric Goldman, Forbes.com, Sept. 16, 2014 3/23/15UCEDC 1
  • 3. Tonight’s Objectives •  Identify the trade secrets in your business •  Recognize the potential weak links in your business that could lead to loss of your secrets •  Understand ways you can protect your secrets o  Identify steps to secure legal protection for your business 3/23/15UCEDC 2
  • 4. Brief Outline •  Defining what a trade secret is •  Specific examples •  Likely ways trade secrets are exposed •  Applicable federal and state law •  Steps to follow to “reasonably protect” your trade secrets 3/23/15UCEDC 3
  • 5. Trade Secrets •  Any information which would give a business an economic competitive advantage –AN EDGE •  What you don’t want your competitor to know •  Need not be novel, original or inventive •  A formula, pattern, compilation (such as a customer list), program device, method, technique, or process ² Successful method for meeting a customer’s needs that could produce independent economic value ² Depends on the effort and time expended developing contact or customer lists 3/23/15UCEDC 4
  • 6. Trade Secret Principles •  A trade secret is protected as long as it remains a secret •  “Reasonable” efforts to maintain secrecy are required 3/23/15UCEDC 5
  • 7. Trade Secret Examples •  Proprietary information •  Special discounts granted to some customers •  Special vendor discounts •  Recipes •  Techniques •  Exclusive marketing studies •  Customer data 3/23/15UCEDC 6
  • 8. Specific Trade Secret Examples •  Banking and Commercial Real Estate •  TD Bank v. Kearny Federal Savings Bank o  Term sheets o  Appraisals o  Environmental assessments o  Customer’s leases with tenants o  Personal tax returns of the owners of the corporate entity o  Analysis of rental income o  Cost estimates o  Site plans o  Pictures of related properties o  Credit approvals 3/23/15UCEDC 7
  • 9. Specific Trade Secret Examples •  Biotech •  GenScript USA of Piscataway v. Genewiz of South Plainfield •  $10 Million verdict o Technology (gene synthesis) o Standard Operating Procedures (SOP’s) o Training Materials 3/23/15UCEDC 8
  • 10. Specific Trade Secret Examples •  Restaurants and Food Preparation •  Mr. Holmes Bakehouse, San Francisco o  Binders containing 230 recipes including the CRUFFIN™ muffin- croissant recipe stolen o  Recipe did not describe the technique of making the dough on day 1 and buttering and folding the dough on day 2. o  Recipe did not include that the butter must be from Isigny-sur- Mer France, but OOPS, owner told the reporter about it who then published it o  Binders left out on the shelves and not secured at closing o  Rear door found unlocked when worker opened kitchen at 3 am – inside job perhaps 3/23/15UCEDC 9
  • 11. New Forms of Trade Secrets: Social Media o Who owns the LinkedIn® account connecting to customers? The employee (Eagle v. Morgan) or the employer (Cellular Accessories for Less v. Trinitas) o Who owns the followers on Twitter if postings are related to a business? Phonedog v. Kravitz o Who owns the password to accounts? o Who owns the blog and its followers? 3/23/15UCEDC 10
  • 12. EXPOSURE •  Intentional ü  Employees •  Disgruntled •  Leaving the company ü  Competitors •  Espionage and intelligence gathering « Hackers •  Unintentional ü  Employees ü  3rd Party Contractors ü  Customers and vendors 3/23/15UCEDC 11
  • 13. Trade Secret Protection State Law •  48 states have statutory laws including New Jersey based on UTSA (Uniform Trade Secrets Act) •  New York, our neighbor, and Massachusetts use common law torts of conversion, breach of duty, tortious interference in employment, misappropriation and unjust enrichment as well as contract law 3/23/15UCEDC 12
  • 14. New Jersey Statute 1/9/12 •  Title 56 Chapter 15. New Jersey Trade Secrets Act §§1-9 - C.56:15-1 to 56:15-9 §10 – Note •  "Trade secret" means information, held by one or more people, without regard to form, including a formula, pattern, business data compilation, program, device, method, technique, design, diagram, drawing, invention, plan, procedure, prototype or process, that: •  (1) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and •  (2) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. 3/23/15UCEDC 13
  • 15. Federal Law •  Federal Economic Espionage Act of 1996 o  Generally protects against 3rd party theft of trade secrets, but not as relevant for internal breaches whether intentional or inadvertent •  Computer Fraud & Abuse Act o  Trade secrets and misuse of computer assets •  The Defend Trade Secrets Act of 2014 in the Senate and The Trade Secrets Protection Act of 2014 in the House are o  Designed to create federal criminal and civil charges, especially against foreign hackers 3/23/15UCEDC 14
  • 16. 10 Steps to Reasonably Protect Your Trade Secrets • Step 0: Identify your trade secrets and group them o Electronic o Physical 3/23/15UCEDC 15
  • 17. 10 Steps to Reasonably Protect Your Trade Secrets • Step 1: Update your IT policies o Policies need to define what is acceptable, what are the limits in clear language o Company owned electronics: •  Monitoring •  Acceptable use •  Expectation of privacy for email (personal, business) •  Internet access •  Removable Media (thumb drives, DVD’s, etc.) 3/23/15UCEDC 16
  • 18. 10 Steps to Reasonably Protect Your Trade Secrets • Step 1: Update your IT policies o BYOD (Bring your own device) •  Require lockout if lost or stolen •  Allow remote wiping •  Require use of strong passwords to unlock •  Define ownership of applications and data o  Remember, every time a call to a customer is made on a personal cell phone, the information is in the cell phone records for access without accessing your database 3/23/15UCEDC 17
  • 19. 10 Steps to Reasonably Protect Your Trade Secrets • Step 2: Get your agreements in place •  Confidentiality with employees •  Nondisclosure with employees and vendors •  Non-compete o NJ law – must be “reasonable” as to time and geographic limitation •  Non-solicitation of current customers 3/23/15UCEDC 18
  • 20. 10 Steps to Reasonably Protect Your Trade Secrets • Step 3: Create a culture o  Training on do’s and don’t’s o  Establish consequences: discipline, termination, legal action including criminal prosecution o  Treating confidential information properly – physical or electronic •  Secure location – lock it up! •  Limited access (physical or passwords) •  Encryption •  Labels and watermarks •  Access logs 3/23/15UCEDC 19
  • 21. 10 Steps to Reasonably Protect Your Trade Secrets • Step 4: Track the hardware o Make sure all company owned devices are returned o Make sure that the SIM card is in the phone o Require password protection on BYOD o Require reporting of any lost or stolen devices 3/23/15UCEDC 20
  • 22. 10 Steps to Reasonably Protect Your Trade Secrets • Step 5: Establish Social Media Policy o Have clear policy who owns the social media accounts that are created for and by the company o Clarify what type of postings are acceptable and what are not o Cannot interfere with employees’ rights to organize 3/23/15UCEDC 21
  • 23. 10 Steps to Reasonably Protect Your Trade Secrets • Step 6: Telecommuting – out of sight – not out of mind o Telecommuting agreement •  protecting sensitive and confidential information •  define electronic resources •  company vs. personal equipment •  physical security •  retrieval upon termination 3/23/15UCEDC 22
  • 24. 10 Steps to Reasonably Protect Your Trade Secrets • Step 7: Identify red flags o  Greed or vulnerability to blackmail o  Feelings of anger/revenge against the organization o  Divided loyalty – allegiance to another person, company, or country. o  Compulsive or destructive behavior, or family problems: drug or alcohol abuse o  Employees who are laid off, subject to a reduction in force, passed over for a promotion, terminated, demoted, or required to follow a performance improvement plan. 3/23/15UCEDC 23
  • 25. 10 Steps to Reasonably Protect Your Trade Secrets • Step 8: EXIT Interviews •  Ask where the employee is going to work next and in what capacity. •  Ask the employee for all passwords for work- related computers, devices, accounts and files, keys, access cards, badges, company credit cards, and other property. •  Change all passwords or disable accounts 3/23/15UCEDC 24
  • 26. 10 Steps to Reasonably Protect Your Trade Secrets • Step 8: EXIT Interviews •  Have the employee sign an acknowledgment that all company property and information has been returned. •  If the employee is subject to confidentiality agreements, employers should remind the employee of their ongoing obligations. Send follow-up letter. •  Make this standard practice. 3/23/15UCEDC 25
  • 27. 10 Steps to Reasonably Protect Your Trade Secrets • Step 9: Preserve the evidence o Analyze the risk: if the employee resigns without notice, refuses an exit interview or is vague about their future employment plans, be aware that these are all red flag behaviors. o Check to see if any unusual email activity, server activity, electronic copying, printing of files, photocopying prior to the employee leaving 3/23/15UCEDC 26
  • 28. 10 Steps to Reasonably Protect Your Trade Secrets • Step 10: Be a good example o Clean desk top o Destroy outdated documents o Wipe devices o Lock it up 3/23/15UCEDC 27
  • 30. For Further Information Patricia P. Werschulz, Esq. Of Counsel Chipperson Law Group, P.C. Morristown Location 163 Madison Ave, Suite 220-40 Morristown, New Jersey 07960 Phone: (973) 845-9071 Fax: (973) 845-6176 http://www.chippersonlaw.com/ 3/23/15UCEDC 29