The difference between having a trade secret and not can come down to the steps that a company takes to protect its secrets. The Uniform Trade Secrets Act, a version of which has been adopted in 46 states, provides that information qualifies for trade secret protection only if the owner takes steps that are reasonable under the circumstances to protect its secrecy. Employers commonly take the obvious steps to protect their trade secrets – for example, requiring employees to sign confidentiality agreements or restrictive covenants, implementing electronic controls; and let’s not forget sending demand letters and threatening litigation. These steps are obvious and therefore widely observed. But what about proactive monitoring? If you have a trade secret, you ought to keep an eye and ear out to make sure it’s not being used or disclosed. But, be careful; doing so is not without its risks.
With recent (and not so recent) advances in technology, employers have substantial means at their disposal to monitor their employees’ conduct and communications. Available options range from reviewing employees’ email communications and computer usage to monitoring telephone discussions. In general, these tactics are lawful unless specifically prohibited by statute or the employee has a reasonable expectation of privacy under the circumstances.
Please see full article below for more information.
Firefox recommends the PDF Plugin for Mac OS X for viewing PDF documents in your browser.
We can also show you Legal Updates using the Google Viewer; however, you will need to be logged into Google Docs to view them.
Please choose one of the above to proceed!
LOADING PDF: If there are any problems, click here to download the file.