...Protecting Trade Secrets With the expansion of technology over the past several decades, the availability of the internet as well as our reliance on it, and emerging powers such as China and India, trade secrets become more valuable and harder to protect. Whether it’s computer hacking a corporation’s network, a military mainframe, or spying for another country, also called espionage, it takes a wide array security measure to protect information from leaking or being stolen by our advisories. These security measures fall with the realm of IT, background investigations, and facility security. It is obvious, given past espionage events; these procedures are not always effective. Trade secrets, by definition, is considered to be a formula, practice, process, design, instrument, or compilation of information, hardware, technology, or some other means of proprietary information which is not generally known by the public or outside of the entity that protects. A trade secret gives a business the ability to obtain an economic advantage over competitors or customers. In some legal jurisdictions (states), these secrets are referred to as "confidential information", and are generally not referred to as "classified information" in the United States, as “classified information” refers to government secrets protected by a different set of laws and practices. Although, it is very important to note that the government, but more specifically the military and NASA have issues with protecting...
Words: 1088 - Pages: 5
...There are numerous ways to protect intellectual property; one such method is through trade secrets. Unlike patents which require the secret to be inventive or non-obvious, things such as customer lists, equations, and compilation of data (which aren't eligible for copyright or patent protection) can be protected through a trade secret. Granted, though, that the company assumes the costs associated with protecting the said secret. Whereas patents expire after 20 years, and all the designs/specifications are consequently available to the public domain, trade secrets can be protected for longer; this depends on the secret holders ability to adequately establish a framework to maintain secrecy and thereby protect the intellectual property. In the cases of Coca-Cola and KFC, the process of keeping trade secrets has benefited them greatly. Granted, though, they also use a symbiotic or symphonic combination of patents, trademarks, and copyrights to protect their overall product; no competitor has been able to completely replicate their products because the processes making the syrup (for Coca-Cola) or the method of mixing the spices (for KFC) has been a closely guarded trade secret. Had these companies patented these processes, they would have received initial protection for 20 years from anyone replicating it, but would have had these processes disclosed to the public after that. Whereas these companies have been in existence for a longer time, a patent for the processes wouldn't...
Words: 618 - Pages: 3
...ISSUE: Whether the fact that the customer information was in an employee’s memory allows him to use with impunity the information that was otherwise a trade secret under the statute. RULE: As a general rule, an employee who has not signed an agreement not to compete is free, upon leaving employment, to engage in competitive employment. However, the former employee, even in the absence of an enforceable covenant not to compete, remains under a duty not to use or disclose, to the detriment of the former employer, trade secrets acquired in the course of their employment. ANALYSIS: It is evident that the employees obtained confidential information while working for Nowogroski. It is also evident that these employees used client lists and other information that was obtained at Nowogroski to get business for another agency. Three rules can be looked at to decide whether a customer list is protected as a trade secret: ( 1) whether the list is a compilation of information; ( 2) whether it is valuable because it is unknown to others; and ( 3) whether the owner has made reasonable attempts to keep the information secret. CONCLUSION: Yes, although a former employee may use general knowledge, skills, and experience acquired during the prior employment in competing with a former employer, the employee may not use or disclose trade secrets belonging to the former employer to actively solicit customers from a confidential customer list, whether written or memorized. Wal- Mart Stores...
Words: 502 - Pages: 3
...fields of human endeavor; scientific discoveries; industrial designs; trademarks; service marks and commercial names and designations; and all other rights resulting from intellectual activity in the industrial, scientific, literary and artistic fields” ("Intellectual Property and Legal Services"). There is a distinct difference between traditional property laws and intellectual property laws. Property laws would give rights to the sole owner of an object such as a car. When the owner is driving the car no one else can drive the car. In regards to intellectual property the law allows other individuals to make use of the idea or invention as long as they have met the requirements, usually in the form of payment for the right. The idea of protecting one’s ideas has deep reaching roots that stretch back to the 17th century. Philosopher John Locke promoted intellectual property law with his idea “that a person should enjoy the fruits of his labor” ("Intellectual Property and Legal Services"). Protection for ideas were spread throughout Europe and when the pilgrims settled the now United States they brought these ideas with them. After the original colonies won their independence from England they enacted their own intellectual property laws. Initially each colony, after enacting the United States Constitution, had their own versions of copyrights and patents. This presented a problem because one patent or copyright would not be...
Words: 2008 - Pages: 9
...Karen Walker Ac1108748 Ethics in Technology-PY360 Assignment #3 11/20/2013 1. Copyright Software copyright is the relatively recent extension of copyright law to machine-readable software. It is used by proprietary software companies to prevent the unauthorized copying of their software. 1. Trade Secrecy Trade secret law provides probably the best protection for the source code of a computer program. It simply requires that you take reasonable efforts to kept the source code secret, such as having agreements to keep it secret from everybody who has access to the source code. There are no formalities, such as filing with a government agency which is required. 1. Patents A patent is a government-awarded license that grants the inventor of a product or process exclusive rights to its manufacture, use or sale for a specified time period. As a condition of the patent, the inventor agrees to disclosure. However, although it is possible for others to examine the details of the patent, it is illegal to copy the product or process. 2. The five principle rights for the owner of a copyright are: 1. The right to reproduce the copyrighted work. 2. The right to distribute copies of the work to the public. 3. The right to display copies of the work in public. 4. The right to perform the work in public. 5. The rights to produce new works derived from the copyrighted work. Copyright Violations of a copyright laws is...
Words: 715 - Pages: 3
...Justification of Protection of Intellectual Property vis-a-vis Trade Secrets PAPER V Submitted By: SARTHAK KAPILA ROLL NO. 48, P.G.D.,I.P.R. – 2014 Justification of Protection of Intellectual Property vis-a-vis Trade Secrets Intellectual property pertains to any original creation of human intellect such as artistic, literally, technical or scientific creation. Intellectual Property Rights (IPR) refers to the legal rights given by the State to the inventor/creator to protect his invention/creation for a certain period of time. These legal rights confer an exclusive right to the inventor/creator or his assignee to fully utilize his invention/creation for a given period of time. Countries have laws to protect intellectual property for two main reasons. One is to give statutory expression to the moral and economic rights of creators in their creations and the rights of the public in access to those creations. The second is to promote, as a deliberate act of Government policy, creativity and the dissemination and application of its results and to encourage fair trading which would contribute to economic and social development. The term ‘Intellectual Property’, denotes rights over intangible object of the person whose mental effort created it and refers to a loose cluster of legal doctrines that regulate the uses of different sorts of ideas and insignias. The subject matter of intellectual property is very wide and includes literary and artistic works, films, computer...
Words: 8264 - Pages: 34
...Barnes Intellectual Property Clause Intellectual Property, or IP, is a broad term defining the intangible assets of a company. These assets may include special skills or talents, inventions, technologies such as software, relationships with customers or vendors, and brand identity. These examples of IP, and many more, are often among a company’s most valuable resources, and there are specific laws designed to protect them. Trade secrets, patents, trademarks, and copyrights define and control ownership rights to IP, and businesses further protect those rights by drafting IP clauses when they enter into contracts with individuals or other businesses. (Reed, Pagnattaro, Cahoy, Shedd, & Morehead, 2013). The purpose of an IP clause is to identify IP as it pertains to the respective contract, define authorized and/or unauthorized use(s), and incorporate this information into the original contract, which makes it legally binding (Connock, 1994). The following is an example of an IP clause: “Intellectual Property,” or “IP,” refers to the trade secrets, copyrights, trademarks, patents, and patentable ideas relating thereto of Developer, including but not limited to the know-how, inventions, technologies and technical data relating thereto, processes and methods of business operation, reports, manuals, other documentation and all information relating thereto, databases, pre-existing and future relationships with customers and suppliers, software, new product research, and marketing...
Words: 1104 - Pages: 5
...worrying about potential steal of knowledge, LEGO could work to strengthen their relationship with their tool suppliers, which could ultimately lead to building trust. Preventing knowledge spillovers is hardly practical. Employees who left a company carried knowledge in their heads with them, so they posed a spillover risk, especially in the emerging market where loyalty to a firm was low and multiple companies set up manufacturing plants within small geographical regions. Even if it were possible, the cost would be really high. In this case, it might involved setting up a secret and highly isolated manufacturing plant where only certain people are allowed to have access and all bound by contract or some kind of agreement to disclose everything. Question 2: How should the LEGO group protect their intellectual property of the molding platform? Focus on the trade-off between patenting, trade secrets and open disclosure. Obtaining a patent...
Words: 661 - Pages: 3
...The Relationship between Principals and Agents in Business BUS311: Business Law I (BNJ1151A) Prof. Samantha Hodapp January 30, 2012 The Relationship between Principals and Agents in Business The relationship between a prinicipal and agent in business can and have been great; benefitting both parties involved while providing the best services or products to the consumer. Many businesses, or prinicipals, use an agent, such as an employee or sales representative, to represent the business when dealing with third-parties, also know as the consumer or client. For the sake of this writing this relationship will be based on the principal (A.O.I.), special agent(s) (sales representatives) and third-parties (clients). A special agent is a person delegated to act only in a particular transaction, under definite instructions, and with specific limits on the scope of his or her authority. (Liuzzo, 2009, pg. 259) An example in this case would be a sales representative who has authority to negotiate the price of a sale to a limit predetermined by the principal. Another example of prinicipal and agent relationships is GNC who argued that the conduct of McCreadies was sufficient to represent they had authority to enter a binding agreement on behalf of O2. McCreadies was hired by O2 to negotiate the terms of the contract and GPN argued that agents are commonly used to negotiate and enter into contracts and that O2 had at no time informed them of any restrictions of McCreadies’ authority...
Words: 2646 - Pages: 11
...General Code of Conduct The company expects the employees to exercise sound judgement and safeguard the interest of every individual working under the organisation. The comrades are expected to maintain a healthy, cooperative, positive and sound working environment to increase the productivity of the work. These standards apply while working for the company whether inside the premises or at some offset location or any other company event. The company is committed to work ethically and maintain the safety and protection measures for the employees. Every employee is expected to follow the code of conduct and respect others religious and emotional sentiments. In case of any violation of the code, the decision of the chief regional officer shall be binding and the jurisdiction of the area shall be binding. The employees are expected to follow the chain of command as listed down in the company’s circular provided to each employee at the time of joining. Anyone not doing so shall be held liable for wrong doings and will be prosecuted for disregarding the interest of the company. Hierarchies should be followed along with cross-departmental communication for efficient working and synergy should be maintained while doing so. Some other ethics to be followed by the members, employees, directors and anyone associated with the working of the company are: Honest and Ethical Conduct The company expects its employees to be honest and maintain their moral values at all the times working...
Words: 1281 - Pages: 6
...relationship-based selling. As long as these agreements are done according to state law, they can be enforceable in the court of law. Any company that believes it has a competitive lead should consider using non-competes to protect themselves from employees who can walk out the door with their trade secrets. Many businesses today require employees to sign non-compete clauses when hired to protect the company, but it can have many negative effects for the employee as well. Non-Compete Agreements are contracts between an employer and employee. Employees promise not to take what they learn while working for you and use it against you while working for a competitor. A typical non-compete agreement states the employee agrees not to work for rivals, solicit business from current clients, or otherwise compete with you for some period, such as two years, after leaving your company. Key principles that almost all states go by when it comes to non-compete clauses are reasonableness rule, independent consideration, duration, distance, blue pencil rule, and liability for new employers.(lawyers.com) All of this is done so that way the company is protected from anyone trying to steal important trade secrets to share with their new employer. The company that I currently work for has a non-compete clause. It states that I cannot work for another payday loan company one year from the date of termination and I cannot open a similar company in any town in the state that I work. There is even...
Words: 2038 - Pages: 9
...demonstrate the differences between the product and competing products to induce purchasing. Example - Products or services that appeal to the general public are often advertised on radio and television because they reach a broad audience. * Institutional advertising - focuses on touting the benefits, ideas, or philosophies of your business, or its entire industry, to enhance or repair its reputation rather than selling a product or service. Since institutional advertising attempts to build a positive image, it's closely related to public relations. In fact, it's a form of advertising that may be used in a public relations campaign. Institutional advertising relating to an entire industry is usually funded and developed by industrial, trade or professional associations rather than individual businesses. Example- a tobacco company can use institutional advertising to produce an antismoking commercial that warns consumers of the dangers of its products. Beer and liquor companies can also run commercials that warn consumers of the dangers of drinking and driving * Cause advertising- institutional messaging that promotes a specific viewpoint on a public issue as a way to influence public opinion and the legislative process Example - Your Company can incorporate cause advertising into its mission and marketing tactics by donating time, rather than money, to a charitable cause or organization. You and your...
Words: 1749 - Pages: 7
...confidential and sensitive data continues to expand exponentially (Online Trust Alliance, 2014, p. 3). “Breaches and data loss incidents have become a fact of life for organizations of every size and throughout the public and private sectors” (Online Trust Alliance, 2014, p. 4) making no organization immune. Given the growth of data and, therefore, data breaches the threat to the U.S. economy and individual U.S. businesses from trade secret theft is real and growing, therefore; a multi-pronged approach must be implemented by the public and private sectors alike. “Businesses must do their part to harden their cyber defenses, but the “take-home message here is that protecting IP from ‘them’ is an incomplete and inadequate strategy—understanding that ‘we’ are sometimes our own enemy is important to building good policy and practice for defending the crown jewels” (Verizon DBIR Snapshot, 2012, p. 3). However, to avoid continued, significant and irreversible harm to U.S. companies and the overall economy, robust public policy tools—including in particular trade tools—must also be utilized...
Words: 2645 - Pages: 11
...Ditto Inc. Code of Ethics Tanner Hammontree (Quality of Service, Protecting the Environment, Safe Workplace, Confidential Information, Intellectual Property, The Network, and Use of Ditto’s Equipment and Facilities) Titus Hayden (Integrity, Usefulness, Privacy and Security, Preserving the Community, and Equal Opportunity Employment) Jaren Holt (Drugs and Alcohol, Inventions, Accepting Gifts, Entertainment and Other Business Courtesies, and Use of Ditto Products and Services) Derrick Meyers (Values of the company, Services our company offers, Simply who are you and what do you stand for, Ensure Financial Integrity and Responsibility, Anti-Bribery Laws, Competition Laws, Obey the Law, Signing a Contract, Spending Dittos Money, and Ensure Financial Integrity and Responsibility) English 3606-003 Ms. Adams February 11, 2015 Who Must Follow Our Code? What If I Have a Code-Related Question or Concern? No Retaliation. We at Ditto want to say that “You are the Key to the Future” and expects all of our employees, Stockholders, and Board members to know and comply with the Code of Ethics. If you can not uphold the code of ethics and Failure to do so can result in disciplinary action, including termination of employment and subject to...
Words: 2886 - Pages: 12
...Trade secret In regards of Schlossberger’s suggestion that the duty to respect trade secrets has limit and is overridden, it seem more emphasizing in whistle blowing aspect. So the question rises that under what conditions is whistle blowing moral justified? In my opinion, it does not matter what one’s obligations or confidentiality agreements, one is never exempt from the general obligations we have to our fellow human beings. One of the most fundamental of these obligations is not to cause harm to others. In particular, obligations of confidentiality and loyalty cannot take precedence over the fundamental duty to act in ways that prevent unnecessary harm to others. Agreements to keep something secret should have no moral standing unless that secret is morally justifiable itself. Such agreements should be morally void if the organization is engaged in illegal or immoral activities. In that case, one’s obligation to the public overrides one’s obligation to maintain secrecy. For example, one cannot have an obligation to keep secret a conspiracy to murder someone, because murder is an immoral act. It is for this reason also that employees have a legal obligation to report an employer who has committed or is about to commit a felony. For the same reason, an employee cannot justify participation in an illegal or immoral activity by arguing that one was merely following orders. Some people have argued that whistle blowing is never justified because employees have absolute obligations...
Words: 3633 - Pages: 15