Fri Apr 8 06:49:41 PDT 2016

Content control: How is intellectual property protected?


Options:

[Trade secrets / Patents / Copyrights / Trademarks / Other IP] are protected by [Limiting it to very specific identified items / Marking it properly / Segregating it from other content / Controlling who has access to it / Limiting disclosure to identified parties / Having relevant contracts in place with all accessing parties / Not disclosing it / Filing timely legal papers / Actively applying it / Actively protecting it / Explicitly inventorying it / Tracking actual access / Tracking and following jurisdictional requirements / Practices commensurate with its business utility]

Decision:

Trade secrets should be protected by:

  • Limiting them to very specific identified items,
  • Marking them properly.
  • Segregating them from other content,
  • Controlling who has access to them,
  • Limiting disclosure to identified parties,
  • Having relevant contracts in place with all accessing parties
  • Not disclosing them,
  • Actively protecting them,
  • Explicitly inventorying them,
  • Tracking actual access, and
  • Tracking and following jurisdictional requirements.

Patents should be protected by: >ul>

  • Marking them properly,
  • Not disclosing them prior to filing,
  • Filing timely legal papers, and
  • Tracking and following jurisdictional requirements.

    Copyrights should be protected by:

    • Marking them properly and
    • Explicitly inventorying them.

    Trademarks should be protected by

    • Limiting them to very specific identified items,
    • Marking them properly,
    • Actively applying them,
    • Actively protecting them, and
    • Explicitly inventorying them.

    Other Intellectual Property should be protected by practices commensurate with its business utility.


    Basis:

    [Trade secrets] are protected by [Limiting it to very specific identified items / Marking it properly / Segregating it from other content / Controlling who has access to it / Limiting disclosure to identified parties / Having relevant contracts in place with all accessing parties / Not disclosing it / Actively protecting it / Explicitly inventorying it / Tracking actual access / Tracking and following jurisdictional requirements]

    While state-by-state and country-by-country laws vary, trade secrets are protected only by the holder preventing unauthorized parties from gaining access to it. In order to prove that trade secrets have been violated, and thus be compensated for their release, it is generally necessary to prove that an authorized party improperly disclosed those secrets, that they were otherwise properly protected, and that they were in fact legitimate trade secrets. Generally, this means:

    • They must be secret. That is, only a small number of known and authorized individuals may know them. If someone else knows them independently of the moment they became trade secrets and identified trade secret communication after that point, they are not secret. For example, a customer list is almost certainly not a trade secret, because the customers know who they are, and the aggregated set of non-trade secrets is not a trade secret.
    • They must be valuable. The value must be very substantial for each piece of trade secret information. For example, I know what the things in my safe deposit box are, and nobody else does, but since this has little real value, it is not a trade secret, even if it might be a secret.
    • They must not be obvious or generally known. If someone independently stumbles across the same thing and reveals it, if it was published somewhere at some time, or if it is patented, it cannot be a trade secret.

    For legal protection to apply to trade secrets, that is, in order to win a law suit if someone steals them, there has to be effective protection in place. Generally, this includes things like:

    • Separate trade secrets from non-trade secrets: Don't keep them in the same physical location, not on the same computer, disk, directory, file cabinet drawer, etc. In the case of computer systems which can maintain adequate separation, you might place them in segregated areas, encrypted with different keys, etc.
    • Label documents, items, software, files, etc. containing trade secrets: Typical labels indicate "TRADE SECRET" and this marking should be present on every page or screen displaying the document containing the information, as well as on the outer cover, front and back. "This document contains confidential and proprietary unpublished information of [entity name]. Do not copy or circulate.
    • Execute nondisclosure agreements: Anyone with access must sign such an agreement BEFORE access is granted and the entity protecting the secrets better have properly signed and countersigned agreements in hand.
    • Use employee manuals and awareness programs to emphasize trade secret protection: Everybody with potential to access, intentionally or otherwise, should have adequate notice and awareness. This typically includes initial briefings, written notices, exit interviews, etc.
    • Use physical security controls: Unauthorized parties should not be allowed to be in physical proximity to trade secrets, and physical barriers to entry are an important part of this.
    • Don't disclose in any form: Disclosure in any form may constitute loss of trade secret value. It doesn't matter whether it is spoken, written, electronic, sign language, or anything else. Disclosure is disclosure.
    • Log all accesses: Every access to the physical area or specific information should produce a log identifying who accessed what trade secret and when. These should be timely, reliable, and unalterable whenever possible.
    • Some other typical steps: Each copy should be identified and numbered/marked with each access associated with such a copy tracked and limited to the party authorized to that copy. Controls over the entire lifecycle from initial creation to final disposition should be meticulously maintained. Inventory should be kept and accurately maintained. Generally, the protection program as a whole should be at the Defined level or higher.
    • Conduct periodic reviews: A periodic audit process should verify that all measures to protect trade secrets are in place and operating properly.

    [Patents] are protected by [Marking it properly / Not disclosing it prior to filing / Filing timely legal papers / Tracking and following jurisdictional requirements]

    Unlike trade secrets, the protection of which is all in the hands of the holder, patents, once files, can generally be disclosed without loss of rights. Confidentiality only applied prior to filing, and then there are different specific limitations in different time frames and jurisdictions.

    • Marking Pat. Pend. for pending patents, and Pat. along with the patent numbers protects patented items in terms of adequate notice to others. Filing timely legal documents is necessary, and there is the "race to the patent office" effect in that the first to file generally wins the patent.

    [Copyrights] are protected by [Marking it properly / Explicitly inventorying it] Generally, anything reduced to tangible form is copyrighted de-facto. Additional protection may be attained by sending a copy to the copyright office, having adequate proof of the date of the creation of the document, etc. But copyright is a relatively weak protection, protecting the specifics of the material and not the ideas, methods, processes, or concepts.

    [Trademarks] are protected by [Limiting it to very specific identified items / Marking it properly / Actively applying it / Actively protecting it / Explicitly inventorying it] Trademarks and similar markings are typically in the form of shapes, colors, markings, etc. that are unique at the time of inception and protected through their lifecycle by aggressively pursuing those who use those markings in the legal system.

    [Other IP] are protected by [Practices commensurate with its business utility] In general, that's what the standard of practice is about.

    Copyright(c) Fred Cohen, 1988-2015 - All Rights Reserved