Tag Archives: Trade secrets

Hiring From a Competitor? Play Defense to Limit Trade Secret Risk

When discussing trade secrets and strategies to protect valuable proprietary information, most companies focus on their outbound risk. In other words, companies pay close attention to protecting their own valuable trade secrets and proprietary information by implementing strong protections and policies such as to limit access to this information and to require employees to sign … Continue reading this entry

2014: An Exciting and Challenging Time for American Manufacturing

2014, the Manufacturing Industry Advisor’s inaugural year, marked an exciting but challenging time for American manufacturers. In our final blog post for the year, we will highlight some of the trends and developments we noted in 2014, with links to our earlier observations. Here, at Foley & Lardner, we aim to do more than monitor … Continue reading this entry

To Sue or Not to Sue: That Is the Trade Secret Question

Trade Secrets
You have just learned that a senior member of the company research and development team has resigned. The employee had access to important confidential information about your company’s product development, manufacturing process improvement, business strategy and other proprietary information. The departing employee did not identify his new destination, but you have no doubt that he … Continue reading this entry

Six Tips for Protecting Manufacturers' Most Valuable Assets – Trade Secrets

Long gone are the days when spies needed physical access to information to steal, copy, or photograph it; modern technology now enables instantaneous global access and transmission. Protecting trade secrets ranks high on manufacturers’ priority lists, yet understanding “how” to protect these most valuable assets may be challenging. A vast majority of states have adopted … Continue reading this entry

Trade Secrets – Protecting the (Corporate) Family Jewels

Disputes regarding trade secrets and corporate espionage are becoming perpetual fixtures in the news. One of the most common scenarios is that a key employee departs to join a competitor and his or her former employer quickly learns that, just before departing, the former employee copied critical proprietary information to an external drive or uploaded … Continue reading this entry