- Marriott International HackedPosted 10 hours ago
- California To T-Mobile, Sprint: Not So Fast!Posted 10 hours ago
- Recent IP Law HighlightsPosted 24 hours ago
- Supreme Court Will Soon Decide If 27,000 Health Workers Should Be DeportedPosted 24 hours ago
- They All Won Academy AwardsPosted 4 days ago
- Dissecting Supreme Court Opinions to See How They are ReachedPosted 5 days ago
A Trade Secret Wake-Up Call
Executive Summary of an article written by
Pamela Passman, Center for Responsible Enterprise and Trade
Anthony Levandowski was the co-founder and technical leader of Google’s Waymo project, which produced Google’s self-driving car. A U.S. federal grand jury in California has issued a 33-count criminal indictment against Levandowski, charging him with theft and attempted theft of Google’s self-driving car trade secrets. According to the indictment, Levandowski downloaded numerous engineering, manufacturing and business files concerning Google’s technology.
Those claims seem to appear on a regular basis in trade secret litigation. They raise questions faced by most companies: How can they maintain a trusting and collegial ethos but still protect the technologies and other trade secrets that represent the bulk of their value?
Think in terms of areas of management system protections related to people, processes and technology that can help an organization manage, mitigate and measure its trade secret risks. These include implementing relevant policies, procedures, records and training to help staff understand, manage and document what is done with trade secrets. Having an assigned cross-functional team manage the company’s confidential information and managing suppliers’ and other relevant third-parties’ access and use of such information, are also vital.
Additionally, a clear understanding of what the company’s “crown jewels” are — where they are located, and how they are used internally and externally — and conducting systematic risk assessments to help determine the most useful and cost-effective ways of protecting such information are needed to keep a company’s technical, physical and other protections at their most effective.Read the full article at:
Today's General Counsel