WIPO/NIFT National Seminar on the Importance of IP for the Handicrafts Sector Hyderabad, India, April 5-7, 2005.

Slides:



Advertisements
Similar presentations
TRADE SECRETS. Outline of Presentation What are trade secrets Keeping them secret Trade secrets or patents Legal protection for trade secrets and remedies.
Advertisements

TAIEX Conference on Intellectual Property Rights for Small and Medium-Sized Enterprises Istanbul, Turkey January 2005.
A Business-Oriented Overview of IP for Law and Management Students Geneva, May 29-31, 2007 Small and Medium-Sized Enterprises (SMEs) Division World Intellectual.
The Importance of Trade Secrets for Businesses Small and Medium Sized Enterprises (SMEs) Division World Intellectual Property Organization (WIPO)
WIPO ASIA SUB-REGIONAL WORKSHOP ON THE USE OF INTELLECTUAL PROPERTY (IP) BY SME SUPPORT INSTITUTIONS FOR THE PROMOTION OF COMPETITIVENESS OF SMEs IN THE.
IN CONFIDENCE: PUTTING IN PLACE A TRADE SECRET PROTECTION PROGRAM Najmia Rahimi Senior Program Officer, SMEs Division World Intellectual Property Organization.
« In Confidence » Putting in Place a Trade Secret Protection Program in an SME Najmia Rahimi Senior Program Officer, SMEs Division, World Intellectual.
In Confidence: Putting In Place A Trade Secret Protection Program Doha, Qatar 11 April 2011 Najmia Rahimi Senior Program Officer, Small and Medium-Sized.
WIPO - TCCIA WORKSHOP ON INTELLECTUAL PROPERTY FOR BUSINESS FOR SMEs Dar-es-Salaam, Tanzania, May 10 and 11, 2005 Keeping Confidence: Trade Secrets in.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Trade Secrets and Confidential Information
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
Putting in Place a Trade Secret Protection Program in an SME WIPO-ARIPO Sub-Regional Training of Trainers Program on Effective IP Asset Management by SMEs.
A Business Oriented Overview of IP for Law Students Geneva, Switzerland, May 29 to June 1, 2006.
CONFIDENTIALITY AND NON- COMPETE IN THE WORKPLACE Connie Dai, Attorney CUTLER & WILENSKY, LLP February 21,
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
1 SSHHHH! It’s a Trade Secret Steve Baron April 6, 2006.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Protecting your company’s valuable information
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Chapter Two Ethical & Legal Issues.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Protecting Confidential Information and Trade Secrets Protecting Confidential Information and Trade Secrets Presented by Michael C. Sullivan Denise N.
Commercialization of R&D Results: How to Prepare For The Early Stages.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Security and Privacy Strategic Global Partners, LLC.
F2009 TRADE SECRET SEGMENT PROF. JANICKE JUNE 2008.
The Importance of Proper Management of Trade Secrets WIPO National Seminar on IP for SMEs in the Textile Industry Damascus October 13 and, 2010 Mrs. Lien.
Training Module 11 – Version 1.1 For Internal Use Only Communication Policy ® Corporate Communications, Disclosure and Insider Trading Policy 
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
I’VE GOT A TRADE SECRET: Protection of Trade Secrets and Trademark Due Diligence January 28, 2009 Carl C. Butzer Jackson Walker L.L.P
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
COPYRIGHT THE TRADE SECRET OFFICE, INC. ALL RIGHTS RESERVED Trade Secret Asset Management Fall 2004 Product Security and Intellectual Property.
CONFIDENTIAL © 2009 Barnes & Thornburg LLP. All Rights Reserved. This page, and all information on it, is confidential, proprietary and the property of.
How to Protect the Company’s Crown Jewels – Customers & Trade Secrets – Against Unfair Competition William M. Corrigan, Jr. Armstrong Teasdale LLP One.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
1 SSHHHH! It’s a Trade Secret Slides 1-19 Adapted from Steve Baron.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
IN CONFIDENCE: PUTTING IN PLACE A TRADE SECRET PROTECTION PROGRAM Najmia Rahimi Senior Program Officer, SMEs Division World Intellectual Property Organization.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
China IP’s Challenge Since joining the World Trade Organization (2001), China has strengthened its legal framework and amended its IPR laws and regulations.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
WIPO - CEDA REGIONAL ROVING SYMPOSIUM ON INTELLECTUAL PROPERTY FOR SMES Paramaribo, Suriname; Castries, St. Lucia; Kingston, Jamaica; and Santo Domingo,
T RADE S ECRETS Copyright © 2010 by Jeffrey Pittman.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Fundamentals of Intellectual Property
TRADE SECRET SEGMENT PROF. JANICKE JULY Trade Secret Segment2 SOURCES OF LAW 45 STATES: UNIFORM TRADE SECRETS ACT – CIVIL TEXAS: CASELAW DOCTRINES.
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
1 SSHHHH! It’s a Trade Secret Steve Baron April 3, 2003.
WIPO-NIFT “TRAINING THE TRAINERS” WORKSHOP ON INTELLECTUAL PROPERTY RIGHTS New Delhi, June 20 to 24, 2005.
Welcome to the ICT Department Unit 3_5 Security Policies.
Intellectual Property The Underdog of the Business World For More Details Please Visit:
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Drafting Key Commercial and Consumer Contract Terms
Astrachan Gunst Thomas, P.C.
Dräger US – Trade Secrets CAP Training
UNIDO-WIPO National Seminar
Presentation To: Association of Corporate Counsel January 26, 2010
Putting In Place a Trade Secret Protection Program
SSHHHH! It’s a Trade Secret
IP and legal issues Super-project.eu.
Presentation transcript:

WIPO/NIFT National Seminar on the Importance of IP for the Handicrafts Sector Hyderabad, India, April 5-7, 2005

Keeping Confidence: The Role of Trade Secret Protection in Business Success Lien Verbauwhede Consultant, Keeping Confidence: The Role of Trade Secret Protection in Business Success Lien Verbauwhede Consultant, SMEs Division World Intellectual Property Organization (WIPO)

This Presentation PART 1 - Outline –Definition –Legal requirements –Rights –Enforcement PART 2 - Protection Strategies

PART 1 WHAT ARE TRADE SECRETS ?

What are trade secrets? Broadly speaking any confidential information which provides an enterprise with a competitive edge can qualify as a trade secret  entitled to legal protection

Metal Mirrors of Aranmula

Some undisclosed metals are alloyed with copper and tin to cast the Aranmula kannadi in typical clay moulds. The exact proportions of the two metals and the techniques of crafting it into an excellent reflecting surface is always kept as a trade secret. The method is the age-old lost-wax process in traditional style after melting the metals in a furnace fitted with a manual blower. Today, only five artisan families know the the metallurgical secret of the Aranmula kannadi, the world-famous metal mirrors.

Cotton Dyeing Technique 5 th century BC: the Greek historian Herodotus, marveled at the quality of Indian cotton. Textile trade: cotton, silk, woven textiles. The beauty, brilliance, color range and fastness of Indian fabrics was held in high esteem. India managed to keep the technique of cotton dyeing a secret from the world until the 17 th century.

What are trade secrets? A trade secret can relate to different types of information: –technical and scientific –commercial –financial –negative information

Examples (1) Technical and scientific information: –technical composition of a product paint –manufacturing methods weaving technique, baking clay, metal casting, embroidery –know-how necessary to perform a particular operation how to dye with natural Dyes? –designs, drawings, patterns, motifs

Examples (2) Commercial information: –list of clients –customer buying preferences –supplier arrangements –business plan –marketing strategy

Examples (3) Financial information: –internal cost structure –price lists Negative information: –details of failed efforts to remedy problems in the manufacture of certain products –unsuccessful attempts to interest customers in purchasing a product

What qualifies as a trade secret? Three essential legal requirements: 1. The information must be secret * wheel technique for pottery is no trade secret 2. It must have commercial value because it’s secret 3. You must have taken reasonable steps to keep it secret * “not generally known among or readily accessible to persons within the circles that normally deal with this kind of information”

Only protection against improperly acquiring, disclosing or using: –people who are automatically bound by duty of confidentiality (incl. employees) –people who have signed non-disclosure agreement –people who acquire a trade secret through improper means theft, industrial espionage, bribery

Some people cannot be stopped from using information under trade secret law: –people who discover the secret independently, without using illegal means or violating agreements or state law –people who discover through reverse engineering

Independent discovery and reverse engineering : no trade secret protection - bamboo blinds -

Reverse engineering - van Eyck’s visual effects -

Reverse engineering - van Eyck van Eyck's methods for achieving his breathtaking visual effects Washington National Gallery of Art - technical study: microscopic examination of the surface technical analysis of the painting infrared reflectography  underdrawing is visible

Procedure - Altarpiece of the Holy Lamb in Ghent: a first layer in grayish blues establishing light and shade; a second solid blue layer to soften the contrast of the first; a final, rich blue glaze of ultramarine in a water-based protein medium such as glue Composition of paint: linseed oil, no water-based protein admixtures to the oil Technique: preliminary layer of vermilion, different layers of glaze

TRADE SECRET PROTECTION PROVIDES NO EXCLUSIVITY

What can you do if someone steals or improperly discloses your trade secret?  Enforcement What can you do if someone steals or improperly discloses your trade secret?  Enforcement

Enforcement Remedies 1.Order to stop the misusing 2.Compensation for damages caused as a result of the misuse 3.Recover profits (‘unjust enrichment’) 4.In India: seizure order can be obtained to search the violator's premises in order to obtain the evidence to establish the theft of trade secrets at trial

Enforcement To establish violation, the owner must be able to show : –infringement provides competitive advantage –reasonable steps to maintain secret –information obtained, used or disclosed in violation of the honest commercial practices (misuse)

PART 2 BUSINESS STRATEGIES TO HANDLE & PROTECT TRADE SECRETS

Loss of trade secrets - a growing problem (1) Why is this occurring? –way we do business today (increased use of contractors, temporary workers, out-sourcing) –declining employee loyalty, more job changes –organized crime : discovered the money to be made in stealing high tech IP –storage facilities (CD-ROM, floppies, etc) –expanding use of wireless technology

Loss of trade secrets - a growing problem (2) Examples of outside threats –burglaries by professional criminals targeting specific technology –attempted network attacks (hacks) –laptop computer theft: source code, product designs, marketing plans, customer lists –calls headhunters, presenting themselves as employee –corporate spies

Loss of trade secrets - a growing problem (3) Examples of inside threats –80% of information crimes < employees, contractors, trusted insiders! –malicious destruction/erasure of R&D data by avenging employee –theft by former employee of business plans –ignorance

What can be done?  9 basic protection strategies

1. Identify trade secrets Considerations in determining whether information is a trade secret: –Is it known outside your enterprise? –Is it widely known by employees and others involved within your enterprise? –Have measures been taken to guard its secrecy?

–What is the value of the information for your business? –What is the potential value for your competitors? –How much effort/money spent in collecting or developing it? –How difficult would it be for others to acquire, collect of duplicate it?

2. Develop a protection policy Advantages of a written policy: –Clarity (how to identify and protect) –How to reveal (in-house or to outsiders) –Demonstrates commitment to protection  important in litigation

3. Educate employees –Prevent inadvertent disclosure (ignorance) –Employment contract : Brief on protection expectations early NDA/CA/NCA obligations towards former employer! –Departing employees : exit interview, letter to new employer, treat fairly & compensate reasonably for patent work, further limit access to data

–Educate and train: Copy of policy, periodic training & audit, etc. Make known that disclosure of a trade secret may result in termination and/or legal action Clear communication and repetition –TS protection must be part of the enterprise culture Every employee must contribute to maintain the security environment –Monitor compliance, prosecute violators

4. Restrict access to only those persons having a need to know the information 

5. Mark documents –Help employees recognize trade secrets  prevents inadvertent disclosure –Uniform system of marking documents paper based electronic (e.g. ‘confidential’ button on standard screen)

6. Physically isolate and protect –Separate locked depository –Authorization –Access control log of access: person, document reviewed –Surveillance of premises guards, surveillance cameras –Shredding

7. Maintain computer secrecy –Secure online transactions, intranet, website –Access control (authorization, password) –Mark confidential or secret (legend pop, or before and after sensitive information) –Physically isolate and lock: computer tapes, discs, other storage media –Monitor remote access to servers –Firewalls; anti-virus software; encryption

8. Restrict public access to facilities –Log and visitor’s pass –Accompany visitor –Sometimes NDA/CA –Visible to anyone walking through a company’s premises type of machinery, layout, physical handling of work in progress, etc –Overheard conversations –Documents left in plain view –Unattended waste baskets

9. Third parties –Sharing for exploitation –Consultants, financial advisors, computer programmers, website host, designers, subcontractors, joint ventures, etc. –Confidentiality agreement, non-disclosure agreement –Limit access on need-to-know basis

Remember  No registration, but 3 requirements for legal protection  No need for absolute secrecy, but ‘reasonable measures’  Developing and maintaining TS program < good business practice to prevent < legal requirement to enforce TS protection

 Only legal protection against dishonest acquisition/disclosure/use  Consider alternative protection

TRADE SECRET PROTECTION IS LIKE AN INSURANCE …

Thank You! WIPO’s website for SMEs :