March 26, 2020
WFH (“working-from-home”)? It’s the new normal. We know the coronavirus pandemic is temporary, but in a few months, when the work-at-home-quarantine is no more than a bad memory, we also may be forced to engage in damage control to address serious and unintended consequences of the access given employees to company networks and databases enabling work from home. At this time, many companies are either preparing their employees to operate from their homes for the foreseeable future or the employees have started to work-from-home already. With various states issuing executive orders requiring many individuals to stay home, companies must adapt quickly. As these companies are creating and otherwise checking their lists, they have to be sure not to forget about protecting their trade secrets and confidential information from misappropriation.
A company may lose trade secret protection if it does not implement and enforce proper procedures. Courts consider many factors when deciding whether to grant trade secret protection to a company. For example, one factor courts have examined is whether employees have the ability to download company information onto their own personal computers. With the current landscape of our society and, in particular, the increased number of employees working from home due to the coronavirus, some companies may feel compelled to increase their employee’s remote access to information. As a result, confidential information may be at risk of being transferred surreptitiously, including protected trade secrets.
Trade secrets include those items of information that generally are not known to competitors and that the company takes reasonable steps to keep secure and confidential. This information has an independent economic value. For example, client lists are generally (but not in all states) considered to be trade secrets. In Florida and Georgia, client/customer lists are specifically mentioned in trade secret statutes. In Delaware, Massachusetts, and Washington, under the right circumstances, courts have found that client lists should be afforded trade secret protection. Other examples of trade secrets may include chemical formulas, pricing formulas, logistics techniques, software codes, business plans, marketing data, and advertising plans. In short, if the confidential information creates value for your company because your competitor does not know it, then we recommend you treat it like a trade secret.
How can a company safeguard its trade secrets? Take steps to protect it. For example, if the trade secret is a formula stored electronically, password protect it separately, and do not allow all employees to have access—just those who have a need to know. If it is software code, then consider implementing the same or similar protections. Protecting trade secrets becomes more difficult when the number of employees with access to the protected information increases. Protecting client lists becomes more difficult when a company uses outside sales people—those people who need to continue to make connections with your customers to keep your supply chain moving. Keeping your client lists in a single source (SalesForce®, for example) helps control access and prevents copying and distribution. Compare that to an excel spreadsheet that can be printed, emailed, changed, imported and exported into a variety of mediums. If your company is using a medium that is that flexible, now is the time to move that information to a secure place.
A few tips and reminders:
Similar to the warning in the notice, if employees can sign on to company databases through a portal, remind those engaging in remote access that the information beyond this point is confidential and subject to restrictions. This is particularly important if your employees have not signed confidentiality agreements at the outset of their employment. If your company currently does not require employees to sign confidentiality agreements, the company should seriously reconsider. A basic confidentiality agreement is a keystone to protecting any type of trade secret. Such agreements can be tailored to meet your company’s particular needs.
When customizing a plan, there is no universal or a one size-fits-all approach to protecting trade secrets. Instead, each company must ensure that its efforts are reasonable under the circumstances to maintain or otherwise preserve its confidential information. If you have any questions regarding protecting your trade secrets or maintaining your cybersecurity, please contact Bret Cohen, Erika Birg, or Lynda Jensen.
These materials have been prepared for informational purposes only and are not legal advice. This information is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Internet subscribers and online readers should not act upon this information without seeking professional counsel.