ARTICLE
1 August 2018

Webinar Recap! Protecting Trade Secrets From Cyber And Other Threats

SS
Seyfarth Shaw LLP

Contributor

With more than 900 lawyers across 18 offices, Seyfarth Shaw LLP provides advisory, litigation, and transactional legal services to clients worldwide. Our high-caliber legal representation and advanced delivery capabilities allow us to take on our clients’ unique challenges and opportunities-no matter the scale or complexity. Whether navigating complex litigation, negotiating transformational deals, or advising on cross-border projects, our attorneys achieve exceptional legal outcomes. Our drive for excellence leads us to seek out better ways to work with our clients and each other. We have been first-to-market on many legal service delivery innovations-and we continue to break new ground with our clients every day. This long history of excellence and innovation has created a culture with a sense of purpose and belonging for all. In turn, our culture drives our commitment to the growth of our clients, the diversity of our people, and the resilience of our workforce.
Building a culture of trade secret protection is essential for protecting against cyber threats.
United States Intellectual Property

In Seyfarth's fourth installment in its 2018 Trade Secrets Webinar Series, Seyfarth attorneys Robert Milligan and Scott Atkinson, along with Center for Responsible Enterprise and Trade CEO Pamela Passman, focused on identifying the greatest threats to trade secrets, implementing an effective trade secret protection program, and enacting effective risk reduction processes across an organization.

As a conclusion to this well-received webinar, we compiled a summary of takeaways:

  • Building a culture of trade secret protection is essential for protecting against cyber threats. Simply having policies is not enough; companies need to follow up with training, acknowledgements/record keeping, and engaged leaders who lead by example.
  • One key part of an effective trade secret protection plan is having an effective onboarding and off-boarding process, including exit interviews. Exit interviews should typically be conducted, and employees should be reminded of their continuing confidentiality and other obligations to the company. Don't forget to ask for any passwords to any company-owned mobile devices.
  • As companies build internal capabilities to protect trade secrets and ensure robust cybersecurity, those capabilities should be required of key supply chain partners or vendors that have access to trade secrets and should be measured and monitored to ensure they are effective.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More