Article Detail

News & Knowledge

Here's What You Need To Know About Protecting Trade Secrets

January 15, 2020

By: Steve Thomas

The Fine Print 

What do you do when a key employee leaves and you believe he/she has taken your company’s trade secrets to a competitor? Or when a strategic business partner uses your trade secret information to compete against you? 

The likelihood of recovering damages, or securing injunctive relief, in these scenarios will depend on the steps that were taken to identify and protect trade secret information prior to the breach. As many businesses have learned, deficiencies in your trade secret protection approach can become glaringly obvious in hindsight, and may even prevent recovery of damages or injunctive relief. This is truly a situation in which an ounce of prevention is worth a pound of cure. Failure to adequately protect trade secret information may also amount to an actionable breach of an officer’s duty to the corporation.

There are two common scenarios in which trade secret information is typically lost. The first scenario occurs when courting potential strategic partners or customers. In the rush to impress such parties, too much information may be shared too soon, sometimes even before confidentiality agreements are executed. The second scenario occurs when employees are exposed to company trade secrets unnecessarily, or without confidentiality obligations. The key in both scenarios is diligence. 

The general rules are simple:

  1. Never share trade secret information without enforceable confidentiality obligations. 
  2. Never share trade secret information unless it is absolutely necessary to do so. 

Here are some key points from litigated lessons learned:

  • Not all confidentiality agreements will protect your trade secrets.

Beware of any confidentiality agreement that does not specifically address trade secrets. Trade secret information that is shared under a confidentiality agreement that expires without any following requirement for confidentiality may lose its trade secret status, making it fair game for use by anyone. All confidentiality agreements and Non-Disclosure Agreements should be reviewed by qualified counsel. Unfortunately many of these agreements are executed as a matter of course, without legal review, usually due to time pressure. 

  • Identify, Protect, Monitor. 

If you have never categorized your company’s intellectual assets into trade secret and non-trade secret buckets, you would be wise to do so soon. Be deliberate about the process of identifying this information. Design steps now to keep such information secret. Key steps often include having employees execute fresh, enforceable confidentiality agreements (even as often as at each annual employee review), compartmentalizing information on password protected, encrypted servers (possibly even using nonnetworked computers for this purpose), and establishing access-controlled work areas in which trade secret processes are used. And what about backup files? Are they maintained in a secure manner? You may want to review those cloud backup services agreements. In some instances, trade secret processes may be divided into multiple sub-processes, with no employee having knowledge of the overall trade secret processes. In other cases the process may be easier to manage — for example, in the case in which the process is implemented in software. In such cases, the focus is on protecting the code and preventing code decompilation, even to the point  of implementing critical portions of code in a separate firmware device or hard logic. Each situation is specific, requiring a specific technical approach to protection. This is where technically competent legal counsel can make a tremendous difference in creating an effective, streamlined approach to protecting valuable trade secret information. 

Once the plan is in place a monitoring system should be implemented. The results of the monitoring should be reported at the executive level, along with a risk assessment that identifies any individual or entity that represents a risk. Appropriate mitigation should be implemented. These steps are not particularly expensive or time consuming, and they could make all the difference in recovering damages. There are effective statutory tools such as the federal Defense of Trade Secrets Act (DTSA) and state statutes, but these tools generally require that steps be taken to maintain the confidentiality of trade secret information in the first place. 

Still, you may be asking if all this is really necessary, as you don’t see your competitors talking about their trade secrets, or the steps they are taking to protect such assets. And that is precisely the point. 

This article is informational only. You should consult an attorney before acting or failing to act. The law may change rapidly and no warranty is given. LOWNDES DISCLAIMS ALL IMPLIED WARRANTIES AND WITHOUT LIMITATION, ANY WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE. ALL ARTICLES ARE PROVIDED AS IS AND WITH ALL FAULTS. Consult a Lowndes attorney if you wish to establish an attorney/client relationship.

A registered U.S. patent attorney and former engineer and program manager, Stephen Thomas is a shareholder in the firm’s Intellectual Property Group. In this role, he advises business and university clients, many of whom have both domestic U.S. and global IP portfolios, in a variety of markets.

Stephen provides his clients with a full spectrum of guidance regarding IP licensing and royalty strategy, technology law, IP acquisition strategiesIP enforcement and litigation, Federal Trade Commission (FTC) compliance, building and maintaining an enforceable IP asset portfolio, teaming/partnering strategies for global product roll-out, time-phased product and software development, joint ventures, agreements for engineering services, subcontractor management, supply chain management and related matters. He remains engaged in prosecuting numerous patent and trademark applications before the USPTO and actively manages foreign patent and trademark filings in numerous foreign jurisdictions including jurisdictions in North America, Europe, Asia, Africa, and South America.

Stephen has defended challenged patents under the new Inter Partes Review (IPR) rules at the Patent Trial and Appeal Board (PTAB) as well as challenged and defended trademarks at the Trademark Trial and Appeal Board (TTAB).

An experienced litigator, Stephen has enforced intellectual property claims against Fortune 100 companies, as well as numerous general business and contract related matters, in both the Federal and state courts. He is also a frequent lecturer in IP and business matters for Central Florida business incubators, universities and other organizations.

Meritas Law Firms Worldwide logo
Do Your Part Logo