Protecting Confidential Information When Sheltering in Place
As employers adjust their policies to maintain business operations and enable workers to work from home, they should also take steps to mitigate the risks of trade secret misappropriation.
April 07, 2020 at 12:55 PM
7 minute read
The COVID-19 pandemic has caused many state and local governments to issue orders directing workers to shelter in place and direct businesses to allow workers to work from home. Even when not ordered to do so, companies throughout the United States have quickly adapted to allow their employees to work at home. These accommodations often include allowing employees remote access to a broad range of company information. They also may put company trade secrets and other highly confidential information at risk. As employers adjust their policies to maintain business operations and enable workers to work from home, they should also take steps to mitigate the risks of trade secret misappropriation.
Federal and state trade secret statutes, and state common law, almost universally require that a trade secret owner take reasonable measures under the circumstances to protect a trade secret. Another quality of a trade secret is that the information is not generally known or easily discoverable through proper means by the public. Read together, courts have interpreted these statutes to require a company to exercise continued diligence in applying protective measures to keep information as a trade secret. Similarly, contractual provisions protecting company confidential information many times extend only to information that otherwise does not become publicly available. Again, to protect confidential information, and like a trade secret, the owner of the information should take continuing steps to keep the information confidential.
Increasing Risks. Shifting a company's workforce to operate almost entirely with remote access may increase risks to the company's confidential information and trade secrets. For example, in many cases companies implement security procedures for information access based on information or employee location. Implementing a wholly remote workplace may make such restrictions on information access impractical to maintaining employee productivity, which potentially leads to unanticipated or ad hoc relaxation of location-based security procedures (for example, allowing information access through a remote access point). Allowing greater access can increase the risk of unauthorized access to sensitive company information, even from unintended activities of household members. A lapse in protection, for example, temporary changes to policies to facilitate information sharing, can result in placing such information at greater risk of misappropriation; it may also mean in a later dispute that the information is not considered a trade secret (or confidential information).
In addition, increased remote accessibility to company information presents greater cybersecurity risks. In many instances, the wireless routers, computer hardware and modems employed in homes are less secure than the hardware used to implement corporate networks. Home networking software may lack current security patches or bug fixes utilized in on-premises systems, potentially providing a security hole in the home network that may be exploited. In other instances, the potential presence of corporate information on a computer connected to the network can be at risk through phishing activity targeting other members of an employee's household. Clicking on a phishing email even by a different household member can lead to the unintended consequence of providing broad access to the family network on which the employee is connected.
Risk Mitigation. Companies can mitigate these risks as they accommodate broader remote employee activity. Companies should consider approaching the issue with a documented plan providing some detail on changes to how company trade secrets and confidential information may be accessed during a period of extended remote activity by company employees. Companies should consider identifying changes to the types of information that may be accessed remotely or the protocols for accessing that information. Many times companies are making these decisions rapidly in response to changing government directives and public health information. While this may make a proactive written plan unfeasible, companies should still consider generating a contemporaneous document detailing the implemented plan and changes, whether temporary or permanent, so there is record of the decisions made. From a litigation context, when the protectability of information as a trade secret may be challenged and memories have faded, this documentation may be used to demonstrate the protective measures that have been taken and adapted over time. A defendant may argue that the deviations from the initial plan were unreasonable and meant that the information was not protected with reasonable measures. But having contemporaneous documentation of the plan and decisions may be used by the trade secret owner to rebut that argument and create a story that the shift in protection policies was a measured and reasonable response to the events at hand.
Companies should consider implementing additional employee training to address cybersecurity risks. Such training may include directing employees to refresh home networking hardware with newly available firmware updates, as well as reset networking and administrative passwords to make networks more secure and passwords more difficult to guess. Companies should also consider implementing minimum hardware standard requirements for home network systems that will interface with company systems. Employees could also be refreshed on best practices for cybersecurity and data safety steps and the risks of phishing. Training may also focus on improving employee awareness of how company information is being transmitted, particularly when communicating with other business partners. Employees should continue to rely on company-based communications systems instead of other private email services. In communications with other companies, employees should likewise be sensitive to the addresses to which they are sending sensitive company information.
At some point, people will return to the workplace. Despite best intentions through proactive corporate policies and conscientious employees, there still may be instances of corporate confidential or trade secret information being saved to off-site locations. Employers should consider developing a reentry plan for its employees. This plan could include having employees search personal machines upon the return to work and deleting company information that may be found. Employers should further remind employees to return physical trade secret information that employees may have used while working from home. The company should also consider documenting these activities with sign certifications from each employee that these activities have been completed. The certification acts as a record for the company to use to track compliance.
Trying to be reasonable. The overall goal for an owner of trade secrets or other confidential information is to protect the information using measures that later may be deemed reasonable under the circumstances. If at a later date the information is the subject of dispute, a fact finder may consider whether any changes implemented for protecting company confidential and trade secret information were still reasonable. If they were not, the lack of reasonable efforts to maintain the confidentiality of trade secrets could lead to a loss of protection. On one hand, taking no additional precautions or instituting ad hoc security measure changes in the present circumstances may be met with greater skepticism by a fact-finder as to whether newly implemented procedures were reasonable under the circumstances. On the other hand, implementing a plan with defined steps and procedures can provide helpful documentation in the event of any future dispute. Having this type of documentation helps persuade a fact finder that the measures adopted were reasonable and thought through, ultimately helping to demonstrate that, despite changes, the protective measures are still reasonable under the circumstances.
David A. Prange is a partner at Robins Kaplan and leads the trade secrets subpractice. His practice focuses in complex business litigation with an emphasis on intellectual property, including patents, trade secrets, trademarks, and licensing disputes in federal and state courts across the United States. [email protected]
Christopher K. Larus chairs the national intellectual property and technology litigation group at the firm. For more than 25 years, he has helped his clients protect their IP rights. He tries complex trade secret, patent, trademark copyright, and licensing cases in courts around throughout the United States and in both national and international arbitration. [email protected]
|
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllA Blueprint for Targeted Enhancements to Corporate Compliance Programs
7 minute readThree Legal Technology Trends That Can Maximize Legal Team Efficiency and Productivity
Corporate Confidentiality Unlocked: Leveraging Common Interest Privilege for Effective Collaboration
11 minute readLaw Firms Mentioned
Trending Stories
- 1How Amy Harris Leverages Diversity to Give UMB Financial a Competitive Edge
- 2Pa. Judicial Nominee Advances While Trump Demands GOP Unity Against Biden Picks
- 3The Unraveling of Sean Combs: How Legislation from the #MeToo Movement Brought Diddy Down
- 4Publication of Information Regarding Client Matters
- 5The State of Cost Recovery — Post COVID
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250