Protecting Electronic Data and Trade Secrets
|
|
|
- Johnathan Parks
- 10 years ago
- Views:
Transcription
1 Protecting Electronic Data and Trade Secrets Presenter: Robert W. Kent, Jr. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a partner means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an office means an office of any such law firm.
2 Overview Basics of trade secret law Reasonable Efforts Reasons to go beyond Reasonable Efforts The Sentencing Guidelines and trade secrets What to do when a key employee leaves
3 The Basics Patents v. Trade Secrets Definitions Uniform Trade Secrets Act: information, including a formula, compilation, device or process, that derives independent economic value from not being generally known to, and not being readily ascertainable by proper means by, others who can obtain economic value from its disclosure, and is the subject of efforts that are reasonable under the circumstances to maintain its secrecy Economic Espionage Act (18 USC 1849) Same as UTSA except: (1) required secrecy is from the public, and (2) the effort requirement is phrased as reasonable measures to keep such information secret Essentially the same
4 Reasonable Efforts Extremely fact driven. Case law not particularly helpful. One thing clear: perfect secrecy not required Depends on the circumstances Nature of the alleged trade secret How it is stored How it is used Nature of industry Type of company
5 Reasonable Efforts DOJ s typical factors Keeping the secret physically, secure in locked drawers, cabinets, or rooms Restricting access to those with a need to know Restricting visitors to secret areas Requiring recipients to sign confidentiality, nondisclosure or noncompetition agreements Marking documents as confidential or secret Encrypting electronic documents Protecting computer files and directories with passwords Splitting tasks among people or entities to avoid concentrating too much information in one place
6 Reasons To Go Beyond Reasonable Efforts Achieving reasonable efforts should not be the goal Hard to predict how a court will interpret Being able to sue in the event of trade secret theft is not the only objective Trade secrets are most valuable when not stolen
7 U.S. Sentencing Guidelines The Gold Standard of compliance programs Risk assessment Tone at the top Policies and procedures Training Auditing and reporting Enforcement and discipline Due diligence on employees and contractors
8 Risk Assessment Identify which information should be protected Apply classifications Determine perceived risks Outsider theft, departing employees, third parties, natural disaster Determine likelihood of each perceived risk Determine potential loss associated with each risk Identify and evaluate existing policies Determine risk tolerance of company Determine resource availability and costs of solutions
9 Tone At The Top Real risk assessment will not happen without it Senior management statements Senior management and board training Senior management makes clear that compensation depends on compliance
10 Policies and Procedures Code of Conduct should refer to intellectual property Every employee should sign a confidentiality agreement Agreement should identify the trade secrets Every third party to whom trade secrets are disclosed should sign a nondisclosure agreement Confidential materials should be marked as such Do not overuse the Confidential stamp
11 Policies and Procedures Implement appropriate facilities measures Perimeter security Building and room security Visitor security Signage Technology and personnel assigned to keep track of distribution Shredders Exit interviews
12 Policies and Procedures Implement appropriate computer protections Firewall on network Passwords Encryption Need to know access Restrictions on printing Restrictions on ing
13 Training For many companies, employee mistakes are the biggest risk Repetition is key Creativity is key
14 Auditing, Reporting and Discipline Review to make sure procedures are being followed Use technology as appropriate to monitor Incorporate trade secret compliance into compensation decisions Report results to decisionmakers Implement appropriate sanctions in response to discovered noncompliance
15 Due Diligence Thieves and spies Your corporation as victim Your corporation as perpetrator
16 What To Do When A Key Employee Departs Have a plan in place beforehand Identify the trade secrets in jeopardy Review the employee s confidentiality agreement Exit interview Explain your concern and his obligations Identify the trade secrets Ask him to describe in writing his future employment and how he can perform while honoring his obligations Remind him of obligation to return all materials
17 What To Do When A Key Employee Departs Consider whether to contact the new employer Ask for description of duties Ask for plan re avoidance of trade secret disclosure Interview remaining employees to see if they know anything Consider litigation Trade secret theft, breach of contract, breach of fiduciary duty Inevitable trade secret theft Consider reporting the situation to law enforcement
18 Questions Robert W. Kent, Jr. Baker & McKenzie LLP One Prudential Plaza Chicago, IL (312)
Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies
Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Professor Prabuddha Ganguli Advisor, VISION-IPR & Adjunct Professor, SJM School of Management, Indian Institute
Checklist for Buying a Business
Checklist for Buying a Business Buying a business can sometimes be a daunting and confusing process. This checklist highlights the main legal risks you need to consider when undertaking the process. It
A buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business:
Buying a business This briefing highlights the main legal risks to consider when buying another business or enterprise. A buyer should always take legal advice at the outset of any acquisition. Structuring
Intellectual Property. For Designers
Intellectual Property For Designers Jefferson Coulter PLLC Legal Solutions 1216 Pine Street Suite 201 Seattle, WA 98101 206.957.8181 www.coultertm.com 2 What Intellectual Property Rights Are Implicated
Financial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Cash Receipts 2016 Association of Certified Fraud Examiners, Inc. Fraud Tree 2016 Association of Certified Fraud Examiners, Inc. 2 of 27
MOBILE DEVICE SECURITY POLICY
State of Illinois Department of Central Management Services MOBILE DEVICE SECURITY Effective: October 01, 2009 State of Illinois Department of Central Management Services Bureau of Communication and Computer
SCDA and SCDA Member Benefits Group
SCDA and SCDA Member Benefits Group HIPAA Privacy Policy 1. PURPOSE The purpose of this policy is to protect personal health information (PHI) and other personally identifiable information for all individuals
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Protecting Trade Secrets: Best Practices for New and Departing Employees
NOVEMBER 6, 2014 Protecting Trade Secrets: Best Practices for New and Departing Employees Robert S. Shwarts What is Intellectual Property? Trade Secrets Trademarks / Trade Dress Copyrights Patents 2 Trade
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Wealth Management. Global. Informed choices
Wealth Management Global Informed choices YOUR CHALLENGE There are many legal intricacies to growing and preserving wealth. Wealth management paradigms are shifting as transparency developments take hold
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
HIPAA Audit Risk Assessment - Risk Factors
I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,
5/23/2011 31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY WHEREAS, The Fair and Accurate Credit Transactions Act of 2003, Public Law 108-159, requires municipalities to promulgate
CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING
CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING Ira S. Winkler National Computer Security Association 10 South Courthouse Avenue Carlisle, Pennsylvania 17013 [email protected] (717) 258-1816
82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff
82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff Social engineering is the term that hackers use to describe attempts to obtain information about computer systems through
Toll Manufacturing Transactions: Trade Secret and IP Protection
Toll Manufacturing Transactions: Trade Secret and IP Protection Bruce Goldner and Jonathan Hillel, Skadden, Arps, Slate, Meagher & Flom LLP, with PLC Intellectual Property & Technology A Practice Note
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
The need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
Baker & McKenzie LLP is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with
Baker & McKenzie LLP is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations,
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
Ten Actions You Can Take Now to Protect Your Company s Trade Secrets. www.networkedlawyers.com
Ten Actions You Can Take Now to Protect Your Company s Trade Secrets www.networkedlawyers.com Businesses face increasing threats to valuable trade secrets and other critical business information. To combat
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
To date, U.S. federal courts have imposed monitors for violations of competition laws in two matters:
Alternative Remedies Corporate Monitors and U.S. Antitrust Enforcement 2014 ICN Cartel Workshop October 3, 2014 (Taipei, Taiwan) Robert W. Tarun [email protected] Baker & McKenzie LLP is a
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
Internal Audit Report. Right of Way Acquisition TxDOT Office of Internal Audit
Internal Audit Report Right of Way Acquisition TxDOT Office of Internal Audit Objective Evaluate the right of way acquisition process for efficiency and compliance. Opinion Based on the audit scope areas
IP Audit and Management
WIPO Training of Trainers Program on Asset Management by Small and IP Audit and Management 10 12 June 2013 Presented by Mowafak Al Yafi Ph.D Discussion points What is IP Audit What are the types of assets
Third Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
Central and Eastern European Data Theft Survey 2012
FORENSIC Central and Eastern European Data Theft Survey 2012 kpmg.com/cee KPMG in Central and Eastern Europe Ever had the feeling that your competitors seem to be in the know about your strategic plans
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Opportunity. for Greater Relevance LEVERAGING ENTERPRISE RISK MANAGEMENT: By Janice M. Abraham, Robert Baird, and Frank Neugebauer
LEVERAGING ENTERPRISE RISK MANAGEMENT: Opportunity for Greater Relevance By Janice M. Abraham, Robert Baird, and Frank Neugebauer Enterprise Risk Management (ERM) gained a foothold in higher education
Chief Clerk of the Assembly. Secretary of the Senate. Private Secretary of the Governor
Assembly Bill No. 22 Passed the Assembly September 8, 2011 Chief Clerk of the Assembly Passed the Senate September 8, 2011 Secretary of the Senate This bill was received by the Governor this day of, 2011,
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
Silent Safety: Best Practices for Protecting the Affluent
Security Checklists Security Checklists 1. Operational Security Checklist 2. Physical Security Checklist 3. Systems Security Checklist 4. Travel Protocol Checklist 5. Financial Controls Checklist In a
Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013
Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is
Due Diligence Request List: IP and IT
PLC Intellectual Property & Technology An intellectual property (IP) and information technology (IT) due diligence request list for use in connection with an M&A transaction. This request list is designed
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
Winning Initiatives and Best Practices for Physical Security
Winning Initiatives and Best Practices for Physical Security Today s Presentation 1. Using a risk-based strategy for security 2. The balanced security approach 3. Concentric circles of protection concept
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Brief. The BakerHostetler Data Security Incident Response Report 2015
Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798
PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 Updated 12/8/15 PSYBAR, L. L. C. INDEPENDENT CONTRACTOR AGREEMENT PsyBar attempts to
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY
POLICY NO: 8 (Group) Issued: November 2007 Revision No: 1 GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY Original Issued: 22 August, 2003 Effective: November 2007 Date Reviewed: February 2007 By:
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER
NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
Public Use Considerations During Mobile App Development
Public Use Considerations During Mobile App Development March 19 th, 2015 Jeff Ranck Garrett Hall John Collins Prior Art Under the AIA Under the AIA, prior art includes anything in a printed publication
CAP CONSULTING SERVICES AGREEMENT
CAP CONSULTING SERVICES AGREEMENT This Agreement is made on this day of, by and between the College of American Pathologists, a not-for-profit Illinois corporation with offices at 325 Waukegan Road, Northfield,
The Latest Wave of Securities Enforcement Actions And What To Do About It
The Latest Wave of Securities Enforcement Actions And What To Do About It Robert Kent Chicago, IL 6 June 2012 Regulatory and Enforcement Environment Regulatory and Enforcement History Looking Back on a
How To Protect Your Data From Theft
Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness
HIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
