Lawrence G. Townsend Intellectual Property Lawyer
Schedule a consultation
415-882-3288
  • Facebook
  • Google Plus
  • Linkedin
  • Twitter

Impact of technology on trade-secret security

News and Notes Focused on the 3 Public Faces of IP Law

  • Brand Image Protection - Trademark Law
  • Visual Image Protection - Copyright Law
  • Personal Image Protection - Right of Publicity Law

The Image Protection Law blog has been created in order to share stories and information on the legal aspects of: 1) the marketplace reputation of a company or product captured in its trademark, 2) published or publicly-displayed artwork, photography, and any created visual design, and 3) use of a person's photograph or likeness for product promotion or other commercial purposes.

The "IP3" share at least one thing in common: Image is everything. In these posts let's look at what that means in the realm of intellectual property in the news, but let's also be prepared to explore if there's something more beyond "everything." Don't forget, the intellectual in "intellectual property" doesn't mean smart or brainy, although by nature true creators often are. The word is used to refer to any creation, i.e., a "product of the mind." While this blog will be regularly updated, you are encouraged to share your thoughts on these posts.

In recent posts, we have been discussing the nature of trade secrets, the importance of nondisclosure policies and agreements with employees and business partners, and the remedies provided under California law for trade-secret misappropriation. One of the reasons these issues have quickly risen to the forefront of intellectual-property protection is the explosion of technological advances. 

First, the American Bar Association or ABA reported that from 1978 to 2016, intangible assets as a proportion of total assets of companies rose from about 20 percent to almost 90 percent. By nature, an intangible asset is easier to steal, of course, because intangible assets have no physical presence. Intangible assets that can also be trade secrets could include customer lists, formulas, manufacturing processes, source code, designs and so on.

Second, it has never been easier for employees or business partners to illegally make off with trade secrets because of personal technology that can aid in such theft. For example, employees and contractors can use mobile phones to photograph valuable data and information and which can be easily loaded onto tablets, thumb drives, or similar technology. Even a technology novice can send trade-secret information over the Internet. 

Cyber security 

The ABA cited a 2014 Trustwave Global Security Report for the statistic that 71 percent of data breaches are never detected. So how can you protect your trade secrets in this sophisticated technological environment? Enlist the advice and services of a respected and proven data security company to make your technology as secure as you can. 

Cyber security is not a one-time investment. Business owners need to engage in regular consultation with experts to keep business systems as secure as possible in light of continually developing vulnerabilities. 

Pair data security with solid policies and procedures that require trade-secret confidentiality of employees and business partners, especially at onboarding and end of professional relationship, including binding nondisclosure agreements. Regularly have legal counsel review policies, procedures, and nondisclosure agreements to keep them timely and to incorporate protections in response to new kinds of trade secrets as the business evolves.

 

 

 

 

 

 

 

No Comments

Leave a comment
Comment Information

Contact Me to Discuss Your Specific Concerns

Bold labels are required.

Contact Information
disclaimer.

The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.

close

Privacy Policy