10 Questions Companies Should Address for a Remote-Work Environment
The proliferation of remote work has created, and will continue to create, risks for trade-secret protection with long-term consequences
June 26, 2020 at 03:17 PM
7 minute read
Companies face an unprecedented new normal—which may last for months or prove permanent—of a fully or partially remote workforce. This transition to remote work has forced rapid technology adoption (e.g., cloud-based technologies) and increased long- and short-term risk for trade-secret protection. Below are ten key questions that companies should ask, with practical guidance that they can follow, to safeguard and protect their trade secrets in a remote-work environment.
1. Do employees understand what constitutes a "trade secret"?
What constitutes a "trade secret" is broader than most employees recognize. This is problematic given that the employee creates, saves, and disseminates trade secrets.
Recommendations: Companies should deploy a learning-based, trade-secret training program, and not just a cursory section in employee on-boarding. Policies and agreements should not use boilerplate language to describe "confidential" information as it may not practically or legally put employees on notice. If a company does not have a stand-alone trade-secret policy, this is a ripe time to produce one.
2. Is access to information limited on a need-to-know basis?
Under U.S. federal, state, and EU law, a trade-secret owner must take reasonable measures to protect the information for it to qualify as a trade secret. Winston determined that more than 11% of contested federal trade-secret cases (2008–2019) were dismissed because the plaintiffs failed to take sufficient measures to protect the information. A key measure courts look at is whether access to information was limited.
Recommendations: Companies should utilize written policies obligating employees to share information only on a need-to-know basis and provide guidance on where to save information. Technical controls should be used to limit access to information on a need-to-know basis and should be audited periodically. When transitioning resources to cloud-based architecture, service providers do offer features like role-based access control and detailed auditing to ensure access to sensitive resources is restricted.
3. Are employees re-certifying understanding of compliance with security, trade secret, and confidentiality policies?
With remote-work security, trade-secret protection and confidentiality obligations need to be front of mind, and companies need to have reassurance that employees are meeting their obligations.
Recommendations: Employees should be reminded of their obligations and companies should require a re-affirmation of employee compliance; ideally, this would be updated annually. Periodic reminders of the importance of these obligations can both increase compliance and build a record for a future trade-secret theft case.
4. Are employees using free cloud-based storage or collaboration tools?
If secure business solutions are not provided, employees will circumvent restrictions to make their jobs easier and more efficient (e.g., if Slack is blacklisted on corporate laptops, employees might set up a free account to collaborate with their colleagues on a personal computer). Free versions of software may be outside of the company's view/control and create risk of IP leakage due to data being mined by the platform.
Recommendations: Companies should have policies and training on the use of free platforms, restrict unapproved programs on corporate devices, and provide enterprise solutions that employees need to work efficiently.
5. Are employees using non-secure communications platforms?
Video conferencing usage has skyrocketed with free solutions (Zoom, HouseParty) for group chats. Poor security habits expose IP to unauthorized participants.
Recommendation: Educating employees to regularly change meeting passwords and activating waiting rooms to permit the host to grant access are healthy security practices to mandate. Video conferencing solutions stored on a private cloud with default security protocols, such as not storing instant messaging logs, should be considered. Organizations should monitor use of platforms for appropriate use and access.
6. Are employees sharing data with third parties in a protected way?
Employees default to email or cloud-based platforms to share information with third parties. Such mechanisms, especially if done over personal accounts, can cause the company to lose control over its data and give a third party the ability to keep or disseminate the information.
Recommendations: Companies need to clearly articulate protocols for third-party sharing, educate employees on those tools, and explain that the existence of an NDA is not sufficient protection. Such mechanisms could include: secure transfer (such as through a password-protected FTP), limited number of downloads, and expiration dates.
7. Are security policies being deployed to protect data from outside and internal threats to personal devices?
Employees' personal devices can be more vulnerable to outside attacks than a company's secure architecture. Copying and pasting sensitive and confidential data to external media is a common tactic used by trade-secret theft offenders.
Recommendation: Companies should have security policies with minimum requirements for employees' devices and Wi-Fi settings. Employees should certify compliance. Implementing a domain-wide group policy to restrict writing to media connected via USB port can prevent copying and pasting to external media. Companies should evaluate VPN and remote-access protocols to determine what limitations a remote employee has to copy data outside that system to a local device.
8. Are hard copy or tangible trade secrets protected?
If an employee prints a document or has tangible trade secrets at home, someone outside the company may view them. This risk is high when the employee has roommates who could even be working for rival companies.
Recommendations: Companies should review "clean desk" policies and bolster them to apply to remote-work scenarios, including discouraging printing trade-secret documents. Companies should provide instructions for destruction, and educate employees on secure ways to store tangible company material, such as in a locked drawer and, where appropriate, provide tools, like shredders.
9. Are devices being collected or wiped promptly?
Prompt collection of devices and termination of access to company data when an employee resigns or is terminated is critical to minimizing theft and protecting legal options. Remote work injects logistical hurdles into this process.
Recommendations: Companies should prepare a plan, with input from HR, IT, and business managers, to ensure prompt collection and termination of access, ideally before any termination occurs. Remote covert collection, such as requesting an employee return a device for maintenance/upgrade, can be used. Companies should consider having employees consent to a review of personal devices with company data through agreements/handbook provisions.
10. Do the enterprise applications provide visibility to detect cyber threats and potential theft by remote employees?
Flagging suspicious conduct and retaining logs of activity can help quickly detect, respond to, and contain theft.
Recommendation: Companies should ensure their SaaS products provide appropriate logging to enable effective and efficient cyber investigations, and ensure that such capabilities are enabled to record key events. Companies can also use monitoring technologies to flag, in real time, behavior that violates established rules (e.g., large downloads, emails to personal accounts, impossible travel).
The proliferation of remote work has created, and will continue to create, risks for trade-secret protection with long-term consequences. While trade secrets may not be front-of-mind under current circumstances, actions companies take now can significantly impact the chance that secrets are stolen. Fortunately, there are practical, feasible, and scalable solutions that minimize these risks.
Shannon Murphy is a partner at Winston & Strawn, part of the firm's Global Privacy and Data Security Task Force, and handles trade secret audits, investigations, and litigation. Mark Clews, a senior managing director at Ankura, is an expert in digital forensics, electronic discovery, structured data and cybersecurity issues that arise in litigation and corporate investigations. Luke Tenery, a senior managing director at Ankura, is an expert in cybersecurity incident response and investigations, cybersecurity operations, security policy development and IT project management and implementation. John Stark, a managing director at Ankura, advises on accounting, economic, financial and data solutions to address issues in complex commercial litigation, corporate investigations and compliance risk management.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllNew Federal Pregnancy Regulations: Five Key Takeaways and Five Key Action Steps for Employers
7 minute readLegal Profession's Mental Health Woes Start to Take Root in Law School, Many Attorneys Say
6 minute readLaw Firms Mentioned
Trending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250