The Importance of Proper Management of Trade Secrets WIPO National Seminar on IP for SMEs in the Textile Industry Damascus October 13 and, 2010 Mrs. Lien.

Slides:



Advertisements
Similar presentations
TRADE SECRETS. Outline of Presentation What are trade secrets Keeping them secret Trade secrets or patents Legal protection for trade secrets and remedies.
Advertisements

TAIEX Conference on Intellectual Property Rights for Small and Medium-Sized Enterprises Istanbul, Turkey January 2005.
A Business-Oriented Overview of IP for Law and Management Students Geneva, May 29-31, 2007 Small and Medium-Sized Enterprises (SMEs) Division World Intellectual.
The Importance of Trade Secrets for Businesses Small and Medium Sized Enterprises (SMEs) Division World Intellectual Property Organization (WIPO)
WIPO ASIA SUB-REGIONAL WORKSHOP ON THE USE OF INTELLECTUAL PROPERTY (IP) BY SME SUPPORT INSTITUTIONS FOR THE PROMOTION OF COMPETITIVENESS OF SMEs IN THE.
IN CONFIDENCE: PUTTING IN PLACE A TRADE SECRET PROTECTION PROGRAM Najmia Rahimi Senior Program Officer, SMEs Division World Intellectual Property Organization.
« In Confidence » Putting in Place a Trade Secret Protection Program in an SME Najmia Rahimi Senior Program Officer, SMEs Division, World Intellectual.
In Confidence: Putting In Place A Trade Secret Protection Program Doha, Qatar 11 April 2011 Najmia Rahimi Senior Program Officer, Small and Medium-Sized.
WIPO - TCCIA WORKSHOP ON INTELLECTUAL PROPERTY FOR BUSINESS FOR SMEs Dar-es-Salaam, Tanzania, May 10 and 11, 2005 Keeping Confidence: Trade Secrets in.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Trade Secrets and Confidential Information
Restrictive Covenants, Confidentiality Agreements, and Trade Secrets.
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
Putting in Place a Trade Secret Protection Program in an SME WIPO-ARIPO Sub-Regional Training of Trainers Program on Effective IP Asset Management by SMEs.
A Business Oriented Overview of IP for Law Students Geneva, Switzerland, May 29 to June 1, 2006.
CONFIDENTIALITY AND NON- COMPETE IN THE WORKPLACE Connie Dai, Attorney CUTLER & WILENSKY, LLP February 21,
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Trade Secrets Introduction Let’s begin our discussion of trade secrets with the following video and article (Video) “Shh! Food trade secrets you'll never.
IP=Increased Profits How to Make Your IP Work For You Rachel Lerner COSE Fall 2006.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Protecting your company’s valuable information
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
HOT LEGAL TOPICS FOR BUSINESS CONNIE DAI CUTLER & WILENSKY, LLP JUNE 18,
WIPO/NIFT National Seminar on the Importance of IP for the Handicrafts Sector Hyderabad, India, April 5-7, 2005.
Chapter Two Ethical & Legal Issues.
Protecting Confidential Information and Trade Secrets Protecting Confidential Information and Trade Secrets Presented by Michael C. Sullivan Denise N.
Commercialization of R&D Results: How to Prepare For The Early Stages.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
F2009 TRADE SECRET SEGMENT PROF. JANICKE JUNE 2008.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
I’VE GOT A TRADE SECRET: Protection of Trade Secrets and Trademark Due Diligence January 28, 2009 Carl C. Butzer Jackson Walker L.L.P
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
CONFIDENTIAL © 2009 Barnes & Thornburg LLP. All Rights Reserved. This page, and all information on it, is confidential, proprietary and the property of.
How to Protect the Company’s Crown Jewels – Customers & Trade Secrets – Against Unfair Competition William M. Corrigan, Jr. Armstrong Teasdale LLP One.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure,
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
Protecting Data Rights Under DoD Contracts October 14, 2009 NCMA Workshop Cape Canaveral Chapter Keith R. Szeliga Sheppard Mullin Richter & Hampton.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
IN CONFIDENCE: PUTTING IN PLACE A TRADE SECRET PROTECTION PROGRAM Najmia Rahimi Senior Program Officer, SMEs Division World Intellectual Property Organization.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
China IP’s Challenge Since joining the World Trade Organization (2001), China has strengthened its legal framework and amended its IPR laws and regulations.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
Intellectual Property Basics: What Rules Apply to Faculty, Staff, and Student Work Product? Dave Broome Vice Chancellor and General Counsel October 15,
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
UNECE April 2009 Commercialization of IPR A Business Perspective Jason Bucha, Compliance Counsel April 2, 2009.
WIPO - CEDA REGIONAL ROVING SYMPOSIUM ON INTELLECTUAL PROPERTY FOR SMES Paramaribo, Suriname; Castries, St. Lucia; Kingston, Jamaica; and Santo Domingo,
T RADE S ECRETS Copyright © 2010 by Jeffrey Pittman.
Legal and Ethical Issues in Computer Security Csilla Farkas
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Fundamentals of Intellectual Property
TRADE SECRET SEGMENT PROF. JANICKE JULY Trade Secret Segment2 SOURCES OF LAW 45 STATES: UNIFORM TRADE SECRETS ACT – CIVIL TEXAS: CASELAW DOCTRINES.
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
1 SSHHHH! It’s a Trade Secret Steve Baron April 3, 2003.
WIPO-NIFT “TRAINING THE TRAINERS” WORKSHOP ON INTELLECTUAL PROPERTY RIGHTS New Delhi, June 20 to 24, 2005.
Lecture 11. Intellectual Property SPRING 2016 GE105 Introduction to Engineering Design College of Engineering King Saud University.
Intellectual Property The Underdog of the Business World For More Details Please Visit:
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Technology Transfer Office
Trade secrets Designed and Developed by IP Laboratory, MNNIT Allahabad , Uttar Pradesh, India.
Drafting Key Commercial and Consumer Contract Terms
Astrachan Gunst Thomas, P.C.
Dräger US – Trade Secrets CAP Training
UNIDO-WIPO National Seminar
Putting In Place a Trade Secret Protection Program
IP and legal issues Super-project.eu.
Protecting Trade Secrets in the US
Presentation transcript:

The Importance of Proper Management of Trade Secrets WIPO National Seminar on IP for SMEs in the Textile Industry Damascus October 13 and, 2010 Mrs. Lien Verbauwhede Koglin Consultant, SMEs Division, WIPO

Idea: By keeping valuable information secret, you can prevent competitors from learning about and using it and thereby enjoy a competitive advantage in the marketplace. Do-it-yourself form of IP What are Trade Secrets?

Information that has commercial value and that has been scrupulously kept confidential will be considered a trade secret (TS). Owner will be entitled to court relief against those who have stolen or divulged it in an illegal manner. But: if others find out in legal manner → not much you can do about it. General Principles:

1. What information qualifies as a TS? 2. What makes something a TS? 3. When can you get court relief? 4. How are TS lost or stolen? 5. How to protect your TS? 6. May TS be sold? 7. How is TS protection enforced? This Presentation

Question 1 WHAT KIND OF INFORMATION QUALIFIES AS A TRADE SECRET ?

TRADE SECRET Financial information Technical & scientific information Commercial information Negative information

Product information technical composition of a product (e.g. fibers, biosensors in smart clothes) technical data about product performance (e.g. breathable, waterproof) product design information Manufacture information manufacturing methods and processes (e.g. weaving technique, coating process) production costs, refinery processes, raw materials specialized machinery (e.g. specialized cameras to detect color variations in textile fabrics) Know-how necessary to perform a particular operation (e.g. how to apply a dye to textile fabric) Examples Technical and Scientific Information

Drawings, designs, motifs, patterns Computer technology hardware + software (esp. source code) algorithms, formulas, data flow charts, specific procedures that are implemented in the software or website Software design documents Software development agreements Laboratory notebooks Pending patent applications (e.g. waterproof article for use in protective clothing)

The trade secret of cotton dyeing Indian textiles were also noted for their brilliant colors and prints. Cotton, like linen, naturally resists dyes, but Indian craftsman learned early on the secrets of mordants and dyes and how to manipulate them. Remarkably, India managed to keep the complex technique of cotton dyeing secret from the world until the seventeenth century. Colorfast dyeing in Europe prior to the seventeenth century was rare and expensive, available only to the wealthy and/or aristocratic.

Customer lists Customer profiles, buying preferences List of fabrics importers Business plans and strategies New product names Supplier arrangements Sales methods Personnel performance Info re: new business opportunities Examples Commercial information

Financial projections Cost & pricing information Sales data, price lists Internal cost structure Salary and compensation plans Examples Financial information

Details of failed efforts to remedy problems in the manufacture of certain products Dead-ends in research (e.g. treatment for dry wrinkle resistance) Unsuccessful attempts to interest customers in purchasing a product Examples Negative information

Question 2 WHAT MAKES SOMETHING A TRADE SECRET ? When do you have legal protection?

The information must be secret It must have commercial value because it’s secret Owner must have taken reasonable steps to keep it secret Three Essential Legal Requirements:

What if many employees need to know? What if others need to know? suppliers, joint development agreement, due diligence investigation, etc. What if you want to license technology? 1. Secret Required that be known only by one person?

“not generally known among or easily accessible to persons within the circles that normally deal with this kind of information” What is ‘generally known’ ? matters of common knowledge information you find at library, online database, trade journals, patent information, etc price list on website 1. Secret

Not required that be known only by one person If you need to share If you license technology which has limited distribution  possible to protect confidential information by contractual means 1. Secret

Must confer some economic benefit How to demonstrate benefits derived from use costs of developing the TS licensing offers, etc. actual or potential 2. Commercial value

Under most TS regimes, you cannot have a TS unless you have taken reasonable precautions to keep the information confidential ‘Reasonable’  case by case reasonable security procedures Non-disclosure agreements (NDA) such that the information could be obtained by others only through improper means Importance of proper TS management program 3. Reasonable steps

TS developed by employee TS developed by external contractor E.g. technique providing very good home laundering durability To avoid disputes: WRITTEN AGREEMENT + ASSIGN in advance all trade secrets developed during employment or commission Tip for SME: Who Owns the TS?

Question 3 WHEN CAN YOU GET COURT RELIEF ?

COURT RELIEF if: TS + “THEFT” Courts will only grant relief if someone has improperly acquired, disclosed or used the information Only theft if wrongful !

2. Confidentiality agreement or NDA e.g., employees, suppliers, consultants, financial advisors 1. Duty of trust implied or imposed by law e.g., employees, directors, lawyers 3. Industrial espionage, theft, bribery, hacking, eavesdropping What is Typically Wrongful?

1. Independent creation Discovery of the TS without using illegal means or violating agreements or law  patent TS protection provides no exclusivity ! What is Lawful?

2. Reverse engineering – What? Take product apart and see how it works E.g. reverse engineering a hand bag E.g. laboratory analyses of coating Common practice among software companies: to make software that can interoperate with the software being studied to make a software product that will compete with it What is Lawful?

Reverse engineering of machines New technologies (e.g. CAD/CAM, 3D scanners and lasers) allow to measure an object and then reconstruct it as a 3D model - Make a 3D model of your own product - Asses competitor’s products Textile machine CAD

2. Reverse engineering – Why? Interoperability Product analysis: How does it work? What components does it consist of? Cost? Potential patent and copyright infringements? Digital update/correction Security auditing Military or commercial espionage Removal of copy protection, circumvention of access restrictions Creation of unlicensed/unapproved duplicates Academic/learning purposes or curiosity Competitive technical intelligence

2. Reverse engineering – Solution? Contractually forbid RE (in software license agreement) “The customer may not carry out any "reverse engineering", decompile or depacketize the software, or try by any other means to discover the source code of... Technological protection measures E.g. employ sensors to detect and prevent this attack. BUT! Legality in question Inconsistent with copyright or antitrust laws?

Trade SecretPatent Prevent others to imitate invention because of unawareness of it Prevent others to imitate invention by publishing it + getting exclusivity right for 20 y. Very low cost Cost If invention cannot be learnt from the product sold E.g. methods of manufacturing E.g. pyhisical process to manufacture a certain chemical substance (temperature, pressure) If product itself shows the inventions: only way to protect is to file patent application before marketing E.g. structural inventions related to an engine Tip for SME: Patent or TS?

Trade Secret Permanent risk that others become legally aware of invention (esp. transfer of employee) → Other can make unrestricted use of invention → Other can get patent protection If other gets patent → you keep right of prior use, but limited: → only to the same kind of use (e.g. if only sold, you cannot manufacture) → only using the invention, not licensing → only in the country where the TS was used before (no exports) TIP: Documentation TIP: « Hidden » publication Tip for SME: TS and Pitfalls

Question 4 HOW ARE TRADE SECRETS LOST OR STOLEN ?

Way we do business today: increased use of contractors, temporary workers, out-sourcing Declining employee loyalty: more job changes Organized crime: discovered the money to be made in stealing high tech IP Storage facilities: external memories, keys A Growing Problem – Why Does It Occur?

Question 5 HOW TO PROTECT YOUR TRADE SECRETS?

1. Identify Trade Secrets Accurate record keeping is important

2. Develop a Protection Policy Advantages of a written policy: Clarity (how to identify and protect) How to reveal (in-house or to outsiders) Demonstrates commitment to protection  important in litigation

Educate and train: Clear communication and repetition Copy of policy, intranet, periodic training & audit, etc. Make known that disclosure of a TS may result in termination and/or legal action Monitor compliance, prosecute violators

3. Restrict Access to only those persons having a need to know the information  computer system should limit each employee’s access to data actually utilized or needed for a transaction

4. Mark Documents Help employees recognize TS  prevents inadvertent disclosure paper based electronic (e.g. ‘confidential’ button on standard screen)

5. Physically Isolate & Protect Separate locked depository Authorization Access control log of access: person, document reviewed biometric palm readers Surveillance of depository/company premises guards, surveillance cameras Shredding

6. Restrict Public Access to Facilities Log and visitor’s pass Accompany visitor Sometimes NDA/CA Visible to anyone walking through a company’s premises type of machinery, layout, designs, physical handling of work in progress, etc

7. Maintain Computer Secrecy Secure online transactions, intranet, website Password; access control Mark confidential or secret (legend pop, or before and after sensitive information) Lock up: computer tapes, discs, other storage media Firewalls; anti-virus software; encryption

8. Measures for Employees 1. New employees Brief on protection expectations early Obligations towards former employer! Assign all rights to inventions developed in the course of employment NDA/CA Non-compete provision Requirements Limits

2. Current employees Prevent inadvertent disclosure (ignorance) Train and educate NDA for particular task 3. Departing employees exit interview letter to new employer treat fairly & compensate reasonably for patent work

Non-Competition Clauses (covenants not to compete) in Labor Contracts After employee leaves prior employer: May he work for competitor? May he work in related job? May he open a competing business? Is covenant not to compete enforceable?

Some jurisdictions: NC covenant binding if ‘reasonable’ limited in time limited in area limited in type of industry special compensation to be paid to employee for his obligation not to compete Some jurisdictions: in writing + payment

9. Measures for Third Parties Sharing for exploitation Consultants, financial advisors, computer programmers, website host, designers, subcontractors, joint ventures, etc. Confidentiality agreement, NDA Limit access on need-to-know basis

Question 6 MAY TRADE SECRETS BE SOLD OR LICENSED?

Most TS sales occur as part of the sale of the business Sale e.g. in combination with patent license e.g. part of franchise Advantage: additional revenues Disadvantage: risk of disclosure (potential loss) In some countries, restrictions License

Question 7 HOW IS TRADE SECRET PROTECTION ENFORCED? What can you do if someone steals or improperly discloses your TS?

1. Order to stop the misuse 2. Claim damages actual damages caused as a result of the misuse (lost profits) amount by which defendant unjustly benefited from the misappropriation (unjust enrichment) 3. Seizure order can be obtained in civil actions to search the defendant's premises in order to obtain the evidence to establish the theft of TS at trial Remedies

infringement provides competitive advantage reasonable steps to maintain secret information obtained, used or disclosed in violation of the honest commercial practices (misuse) To Establish Violation, the Owner Must Be Able to Show :

TRADE SECRETS FOR BUSINESSES CONCLUSIONS

develop effective internal TS program to maintain trade secret status restrict access impose obligation of confidentiality to anyone who has access (1) TS Protection for Financial, Commercial and Technical Information :

information or technology which is part of a product sold to the public and can be reverse- engineered mass-marketed technology or products where competition is so intense, that very likely to be independently developed by others within short time if great deal of personnel movement between competitors (2) Certain Aspects of Business/Products Cannot Be Maintained as a TS :

Make reverse engineering difficult Technological protection measures Patents or utility models Copyright protection (4) Be careful about signing confidentiality agreements and non-compete covenants (3) Alternative or Additional Protection for TS :

Thank You! The Importance of Proper Management of Trade Secrets