17
Protecting Confidential Information In the Digital Age

Proprietary Information

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Proprietary Information

Protecting Confidential Information

In the Digital Age

Page 2: Proprietary Information

Protecting Trade Secrets

Are You Prepared?

Page 3: Proprietary Information

Agenda• Introduction • What Is a Trade Secret?• Protecting Your Trade Secrets

• Internal and External Threats • Are You Ready to Litigate?• Technology to Help

Page 4: Proprietary Information

Why is this vital to your organization?

Cost of Design and Implementation vs.

Loss of Trade Secrets and Attorneys Fees

IT IS AN EXPEN$IVE CHOICE!

Page 5: Proprietary Information

What is a Trade Secret?

1) the information must not be generally known or readily ascertainable;

2) the information must derive independent economic value from secrecy; and

3) the plaintiff must make reasonable efforts to maintain the secrecy of the information.

Minnesota courts identify three statutory elements for trade secrets under the MUTSA:

Page 6: Proprietary Information

Information is Risky

• Internal Risks: • Departing Employees

• External Risks• Industrial Espionage

Page 7: Proprietary Information

Internal Risks:Departing Employees

• Non-Compete Agreements or Non-Disclosure Agreements• Identify the Confidential Information

• Reasonable Protections for Confidential Information• Passwords, Notifications, and Monitoring

Page 8: Proprietary Information

External Risks:Industrial Espionage

Secure Office Space: (Reasonable Measures to Limit and Track Access)

• ID Badges• Video• Biometrics

Page 9: Proprietary Information

External Risks:Industrial Espionage

Secure Electronic Data• Password Protections

•Computers at a Minimum •Files & Databases

• Secure Backup• Firewalls• Secure Wireless• Tracking Users Access

Page 10: Proprietary Information

Are You Positioned to Legally Protect Your Trade Secrets with an Injunction?

• Can your organization establish the three elements necessary to legally enforce your trade secrets?

• Can you prove misappropriation?• Who has the information?• Was it taken improperly?• Is the information being used?

Page 11: Proprietary Information

“So, How Can I Do This?”

Technology and

Legal Advice

Page 12: Proprietary Information

Technology to Aid YouEnsure Redundancy• Off-site Data Backup

• Backup critical data in the event of loss• Backup off-site to protect against fire• Keep multiple revisions of documents in the backup

Page 13: Proprietary Information

Protect Yourself from Intruders• Firewall

• Keep people who don’t belong in your network out• Intrusion Detection Systems

• Know and stop intruders when they DO get in• Anti-Malware Systems

• Keep Malicious software out of your network• Secure Wireless Systems

• Prevent war-driving and other malicious wireless activity

Technology to Aid You

Page 14: Proprietary Information

Track User Access• What if you could…

• Discover where confidential information is stored throughout your network.

• Monitor where sensitive data travels in and out of your network.

• Protect confidential data and information from misuse.

• Keep of a record of who touched what data, and when it occurred.

Technology to Aid You

Page 15: Proprietary Information

Enter…

Data Security Suite

Technology to Aid You

Page 16: Proprietary Information

Any Questions?

Q&A

Page 17: Proprietary Information

Thank You! For Further Questions:

Benjamin R. SkjoldLitigation & Business Attorney Licensed in MN and IL

[p] 612.746.2560[f] [email protected]