Preserving Competitive Edge Workplace Tools for Preserving and Protecting Trade Secrets February 9, 2015 By Andre castaybert Castaybert pllc Co-CHAIR.

Slides:



Advertisements
Similar presentations
WIPO - TCCIA WORKSHOP ON INTELLECTUAL PROPERTY FOR BUSINESS FOR SMEs Dar-es-Salaam, Tanzania, May 10 and 11, 2005 Keeping Confidence: Trade Secrets in.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Indicator 3.02 Use communication skills to foster open, honest communications.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
A Primer on Trade Secrets Law NYSBA CLE November 20, 2014
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Developing a Records & Information Retention & Disposition Program:
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Trade Secrets Introduction Let’s begin our discussion of trade secrets with the following video and article (Video) “Shh! Food trade secrets you'll never.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Protecting your company’s valuable information
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Protecting Confidential Information and Trade Secrets Protecting Confidential Information and Trade Secrets Presented by Michael C. Sullivan Denise N.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
I’VE GOT A TRADE SECRET: Protection of Trade Secrets and Trademark Due Diligence January 28, 2009 Carl C. Butzer Jackson Walker L.L.P
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
COPYRIGHT THE TRADE SECRET OFFICE, INC. ALL RIGHTS RESERVED Trade Secret Asset Management Fall 2004 Product Security and Intellectual Property.
How to Protect the Company’s Crown Jewels – Customers & Trade Secrets – Against Unfair Competition William M. Corrigan, Jr. Armstrong Teasdale LLP One.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
T RADE S ECRETS Copyright © 2010 by Jeffrey Pittman.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
February,  On October 23, 2015 the Commodity Futures Trading Commission (“CFTC”)approved National Futures Association’s (“NFA”) interpretive notice.
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
Protecting your Managed Services Practice: Are you at Risk?
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
K. Lance Anderson Of Counsel Greenberg Traurig, LLP “Innovate Lea County” Conference A Model for Innovation.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Proposal and Company Information Document CONTENT About Indagatio Research Our Research Offerings Why Indagatio Research Our Work Process Project Snapshot.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
E&O Risk Management: Meeting the Challenge of Change
Drafting Key Commercial and Consumer Contract Terms
Protection of CONSUMER information
Chapter 3: IRS and FTC Data Security Rules
Dräger US – Trade Secrets CAP Training
Red Flags Rule An Introduction County College of Morris
Presentation To: Association of Corporate Counsel January 26, 2010
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Indicator 3.02 Use communication skills to foster open, honest communications.
Presentation transcript:

Preserving Competitive Edge Workplace Tools for Preserving and Protecting Trade Secrets February 9, 2015 By Andre castaybert Castaybert pllc Co-CHAIR Of trade secrets Subcommittee NYSBA ip section

What is the economic impact of trade secret theft to U.S. companies? The loss of trade secret information impacts a large percentage of businesses, and causes significant monetary damage. Estimate of Total Losses3 Average Damage – Manufacturing Sector2 % of Companies Reporting Lost Trade Secrets1 Avg. Cost Incurred When a Business Partner Exploits Its Access to Data4 63% $50 Million (per incident) $53-59 Billion $362,269 (incurred by companies per incident) 1-ASIS/PwC “Trends in Proprietary Information Loss Survey,” 2007 2-ASIS/PwC “Trends in Proprietary Information Loss Survey,” 1999 3-ASIS/PwC “Trends in Proprietary Information Loss Survey,” 2002 4-Center for Responsible Enterprise and Trade “Trade Secret Theft – Managing the Growing Threat in Supply Chains,” 2012 1, 2, 3: Surveys polled CEOs of Fortune 1000 companies and US Chamber of Commerce members

What is the economic impact of trade secret theft to U.S. companies? Trade secrets provide a competitive advantage For many companies, intangible assets, including trade secrets, are the most valuable assets they hold. And some sources say the ratio has shifted from 80/20 tangible to intangible in 1975 to 20/80 in 2013

What is the economic impact of trade secret theft to U.S. companies? Estimates of trade secret theft range from 1-3% of the GDP of the United States and other advanced industrial economies* U.S. Senators Coons and Hatch: Estimate $160 to $480 billion lost to trade secrets theft in U.S. each year *CREATe and PWC: “Economic Impact of Trade Secret Theft: A framework for companies to safegaurss trade secrets and mitigate potential threats

What is a Trade Secret? The UTSA Definition of Trade Secret The Uniform Trade Secret Act enacted by all states and DC, except New York and Massachusetts, defines a trade secret as: information, including a formula, pattern, compilation, program, device, method, technique, or process that derives independent economic value, actual or potential, from not being generally known to, or readily ascertainable through appropriate means, by other persons who might obtain economic value from its disclosure or use; and is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

Examples of Trade Secret Information R&D Lab tests Prototypes Project research Recipe development Strategy Manufacturing Processes Equipment Recipes Marketing Advertising plans Consumer surveys Product Pipeline Sales Incentive plans Customer contact lists Sales promotions Financial Finance plans Financial projections Quarterly results Negative know-how Formulations solutions that did not work HR Org. charts Compensation plans Severance plans

How Are Trade Secret Rights Lost? Most losses do not occur by theft. In fact, most losses occur through simple carelessness. The most common mistakes that contribute to loss of trade secrets include: Failure to incorporate or emphasize trade secret protection in the hiring process Failure to limit distribution of sensitive information on a “need to know” basis Failure to follow existing policies and procedures Lack of communication with employees regarding the importance of trade secret protection Failure to perform exit interviews and remind departing Employees of their confidentiality obligations

Framework for Companies to Safeguard Trade Secrets and Mitigate Potential Threats Identify Document Educate Assess Secure

Identify Trade Secrets Identify, locate, and inventory those trade secrets whose theft would cause the most harm Build a cross-functional team of key stakeholders to define the company’s trade secrets Compliance and legal counsel Chief information security officer/ IT Business unit leaders and corporate function leaders Human Resources Categories of trade secrets Product information: new hardware designs; updates of existing products Research & Development: basic or applied research Critical and unique business processes: inventory/distribution; manufacturing processes; business models Sensitive business information: M&A plans; market research; customer lists; info on key suppliers; corporate strategy IT systems and applications: system architecture designs; source code; algorithms

Questions to Ask What is the company’s competitive advantage? What is unique about the product or process? What confidential information would competitors want to know? What would you consider the most important trade secrets?

Identify and Assess Threats and Vulnerabilities To determine which trade secrets merit the highest protection, and to implement more effective protective measures, you need to identify and assess the potential threats.

Potential Threat Actors Malicious insiders Current employees Lack of training Inadvertence (publication, disposal of assets, oversharing) Beware social media Beware disgruntled employees Former employees Employee mobility Home computers Thumb drives

Potential Threat Actors Competitors New employees from competitors Disgruntled employees who go to competitors Competitive intelligence programs and market research spies

Potential Threat Actors Suppliers, consultants, and customers Access to your site Working with competitors Encouraging your competition Loose lips

Potential Threat Actors Nation states and places of business Transnational organized crime Hacktivists

Identify Threat and Vulnerabilities Which trade secrets are most vulnerable? Who is a threat? What is the probability of a theft? How severe would the impact be if stolen? What policies, procedures, and controls exist to mitigate theft?

Identify and Rank the Threat How significantly would the company’s reputation be impacted by theft? How critical is the trade secret to the fundamental operation of the business? How core is the trade secret the company’s corporate culture? Is the trade secret especially unique in the industry? How valuable would the trade secret be to competitors? How important is the trade secret to current or projected revenue?

Document trade secrets and efforts to preserve them Document the nature of the trade secret Document the company’s investments in the trade secret Document the steps taken to preserve the trade secret and to maintain confidentiality Written company policies and procedures Employee manuals Confidentiality and NDA provisions in employee, supplier, consultant, and agreements Onboarding interviews with confidentiality instructions Office access and computer access policies and protections Visitor sign-in, sign-out, badges and identification Password policies

Educate Start from the time you onboard new employees Distribution trade secret policies and procedures and obtain acknowledgements Trade secret training Consistent communication and reminders Education and reminders for departing employees

Protecting Trade Secrets Limit access to trade secret materials on a need-to-know basis. Locked filing cabinets with limited access Create secure passwords for computer-stored trade secret information Consider shredding (rather than throwing away) documents containing trade secrets Obliterate or wipe clean (rather than merely deleting) any trade secret information contained on computer hard drives

Protecting Trade Secrets Require all employees with access to confidential company information to sign confidentiality agreements Have clear written policies that leave no doubt that any access and use of company information, for purposes other than company business is strictly prohibited and have employees acknowledge receiving copies Send out regular reminders of the policies and require acknowledgment of receipt. Beware: Under many federal and state laws, employees have privacy rights in their personal information, even if it is stored on company computers

Protecting Trade Secrets Companies should safeguard proprietary information by: conducting entrance and exit interviews with employees; educating managers and HR sources professionals regarding the company-owned items that employees must return upon departure communicating the company’s policies regarding the monitoring of employees’ electronic devices and communications to employees disabling employees’ access to company and computer networks at the time of departure creating a culture of compliance and confidentiality where employees recognize the value of protecting trade secrets; and sharing best practices within their industries to protect valuable business data

Practical Measures: BYOD Policies In light of identified risks to trade secrets portfolio, implement BYOD policy or require employees to use company-issued devices? Different policies for different levels of employees? If adopt BYOD policy: Specify which devices are permitted Provide clear restrictions regarding use and transfer of company data Explain when company gets access to device and data Incorporate into exit interview process Explain investigation, incident remote wiping procedures Address personal data/privacy concerns consistent with applicable law

Practical Measures Exit Interviews Identify the trade secret and confidential information the employee accessed or used. Question the departing employee: Ask employee why he is leaving Ask employee what his new position will be Check employee’s computer activities and work activities in advance of the meeting Ensure that all company property, hardware, and devices have been returned, including e-mail and cloud data, and social media accounts

Practical Measures Exit Interviews Ensure that arrangements are made to have all company data removed from any personal devices Disable access to company computer networks Make sure to obtain user names and passwords for all company social media accounts Inform the employee of continuing obligation under agreements with the Company Consider letter to new employer and employee with reminder of continuing obligations Consider having departing employee’s emails preserved and electronic devices forensically imaged as appropriate Consider using an exit interview certification

Practical Measures Post-Termination Investigation Interview employee’s co-workers; gauge whether employees are hearing about employee in the marketplace Examine employee’s email activity Conduct a forensic investigation of employee’s computer activities Examine and analyze badge records and access logs Examine phone records Check employee’s social media accounts as appropriate

Prepared by Andre Castaybert Esq. CASTAYBERT PLLC 830 Third Avenue, 5th floor New York, N.Y. 10022 WWW.accounsel.com If you would like a copy of this presentation, please email Andre at: acastaybert@ac-counsel.com