We have identified a more suitable language of this document. To change language to please click here or close
We have identified a more suitable language of this document. To change language to please click here or close
For storing your preferred CMS location, analysing referrals from LinkedIn and embedding third party content we need your consent (which you can withdraw any time).
This website uses cookies so that we can provide you with the best user experience possible. Our Cookie Notice is part of our Privacy Policy and explains in detail how and why we use cookies. To take full advantage of our website, we recommend that you click on “Accept All”. You can change these settings at any time via the button “Update Cookie Preferences” in our Cookie Notice.
Technical cookies (required)
Technical cookies are required for the site to function properly, to be legally compliant and secure. Session cookies only last for the duration of your visit and are deleted from your device when you close your internet browser. Persistent cookies, however, remain and continue functioning on repeat visits.
Analytics
CMS does not use any cookie based Analytics or tracking on our websites; see details here.
Personalisation cookies
Personalisation cookies collect information about your website browsing habits and offer you a personalised user experience based on past visits, your location or browser settings. They also allow you to log in to personalised areas and to access third party tools that may be embedded in our website. Some functionality will not work if you don’t accept these cookies.
Social media cookies
Social Media cookies collect information about you sharing information from our website via social media tools, or analytics to understand your browsing between social media tools or our Social Media campaigns and our own websites. We do this to optimise the mix of channels to provide you with our content. Details concerning the tools in use are in our privacy policy.
Protective measures at the top of the C-suite agenda
Which of the following practices would be most effective in preventing any of the potential threats to trade secrets? (% of responses)
Enhancing cybersecurity efforts
82%
of corporate executives agree that leveraging technology and cybersecurity software is key to their organisation’s long-term success in protecting trade secret.
53%
of corporate executives believe leveraging cybersecurity software is the most effective countermeasure to trade secret theft.
Source: EIU Trade Secrets Survey (2021)
More than four in five respondents identify cybersecurity as a vital component of their companies’ successful trade secret protection strategy. Cybersecurity is regarded as particularly important by executives in industries where the costs of a data breach are high, including the finance, energy and natural resources, manufacturing, and technology, media and telecommunications sectors.
1
https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/
Survey respondents rank basic cybersecurity measures such as digital watermarks and encryption of confidential materials as among the most effective measures firms can take to protect trade secrets, with one in five respondents ranking these as the most important measures overall.
2
https://akki-greatlearning.medium.com/advanced-cyber-security-innovations-and-updates-for-2020-65b8d48fc256
Other cyber risk mitigation efforts to consider include providing sufficient training for all employees on cybersecurity best practices, planning incident-response scenarios and regularly revisiting the company’s overall cybersecurity strategy. Such measures are expected to remain at the top of executives’ agendas. Indeed, one-fifth of all surveyed respondents’ companies plan to roll out these measures over the next two years.
Employee regulation
Importance of staff off-boarding measures
50%
Have already implemented these measures
31%
Plan to implement in the next two years
Source: EIU Trade Secrets Survey (2021)
Our survey finds that firms have, on the whole, already implemented key cybersecurity measures to shore up their trade secrets against threats from external actors. Looking ahead, however, firms are increasingly turning to measures to prevent threats from within. With employees posing a growing threat as a source of trade secret disclosure, company executives are increasingly focused on preventing threats from disgruntled or departing employees.
4
https://blog.lighthouseglobal.com/prevent-ip-theft-during-a-covid-rif-dont-let-your-trade-secrets-depart-with-employees;
A third of the surveyed executives report plans to implement surveillance of employees’ communications and electronic activity. Willingness to snoop is highest in China, Singapore and the United States. Respondents in Europe are less likely to report such plans due to the complexities of balancing surveillance with the requirements of restrictive data protection regulations. Employee surveillance is a top priority for executives in the technology, media and telecommunications sector, where 36% of respondents plan to implement surveillance over the next two years, reflecting growing tensions between employers and employees in the technology sector in recent years.
Employees in the spotlight
Four of the top five measures that companies are planning to implement over the next two years focus on minimising employee leaks
If you’re a small company, or even a less reputable larger company, you may not have the power to enforce confidentiality. This depends on your kind of status as a company.
Professor Matt Marx, Bruce F. Failing Sr. Professor of Entrepreneurship at Cornell University
Bolstering contracts and business procedures
A notable line of defence for businesses with trade secrets is strengthening policies and procedures to maintain confidentiality.
7
https://www.lexology.com/library/detail.aspx?g=0330e373-3f7e-4b38-9f63-d472baaf27b1
This is the second most effective countermeasure, according to 46% of survey respondents. Useful agreements range from non-disclosure agreements, work-for-hire, non-competition and non-solicitation obligations. However, while respondents recognise the effectiveness of these measures, over half also agree that their organisations’ contractual protections to safeguard intangible assets are currently insufficient to protect their business, suggesting that more still needs to be done in this space.
Case study 3: Kerry Ingredients
Threat: Lack of confidentiality agreements
What happened?: In 2016 the UK High Court ruled that the Bakkavor Group, a food supplier, improperly used confidential information that food company Kerry Ingredients had supplied regarding its trade secret (edible infused oils). Kerry Ingredients had shared this information to meet food safety and labelling requirements, but the Bakkavor Group used it to develop its own competing product.
Result: Kerry Ingredients was granted damages, legal costs and a time-limited injunction to prevent further use of this information by the Bakkavor Group.24
Lesson learned: This case underscores the importance of being able to prove the confidentiality of information in the event of trade secret theft.
“These confidentiality contracts are pretty standard, but where you see failure to do this is with smaller start-ups, especially at a very early stage,” says Professor Matt Marx from Cornell University. This is evident in our survey findings, which reveal an almost 30% gap between small companies’ and more established companies’ implementation of confidentiality agreements and policies.
8
Small companies are defined as those with annual revenue below $500m or less; larger companies are defined as those with annual revenue greater than $500m
A common example is the case against Facebook by Tyler and Cameron Winklevoss, who argued that Facebook founder Mark Zuckerberg stole the idea of the social networking platform from them. Their argument fell short because they were unable to prove that they had taken reasonable steps to maintain confidentiality and ultimately could not prove that theft had occurred.
That 55% of people surveyed are limiting access to confidential documents suggests 45% are not. This is worrying. It seems nearly half are not putting in place routine practices to safeguard information. Improving legal protection through measures like document storage and restricting access to information is an achievable, non-costly thing companies can do to prevent the worst from happening.
Tom Scourfield, Co-Head, Intellectual Property Group, CMS
Restricting access to confidential information
55%
of corporate executives have already implemented measures to restrict digital and physical access to confidential information
Source: EIU Trade Secrets Survey (2021)
A more obvious proactive strategy for safeguarding intangible assets is limiting access to confidential information. However, only 55% of the surveyed executives report that their firms currently employ this strategy. The more people who have access to confidential information, the higher the threat of theft. Despite this, 13% of executives' companies do not plan to implement such measures. Companies that are thinking about this are increasingly restricting physical and digital access to important documents, limiting access to “need-to-know” personnel or even destroying old information that is no longer needed.
9
https://www.hoover.org/sites/default/files/corporatecybersecurityrealism.pdf
If companies cannot limit access, they need to clearly communicate the importance of keeping certain information confidential through regular reminders, training and clear labelling of confidential material.
Integrating trade secrets into company culture
33%
of corporate executives plan to introduce a company culture and values that incentivise trade secret protection
Each approach has a significant impact on safeguarding trade secrets but there are clear links between them. Companies that are looking to maximise legal protection in trade secret theft cases need to be able to prove that they have taken reasonable steps to protect their trade secrets, which will involve implementing a diverse combination of relevant elements of each approach to maximise resilience.
12
https://www.uschamber.com/co/start/startup/how-to-define-and-protect-trade-secrets
This will allow companies to cover any potential threat vectors – from the digital to the physical – while building proof that reasonable protective steps are being taken.
Social Media cookies collect information about you sharing information from our website via social media tools, or analytics to understand your browsing between social media tools or our Social Media campaigns and our own websites. We do this to optimise the mix of channels to provide you with our content. Details concerning the tools in use are in our privacy policy.