SlideShare ist ein Scribd-Unternehmen logo
1 von 31
T R A D E S E C R E T S , ! P R I VA C Y & P U B L I C I T Y I N W I S C O N S I N
COVERING YOUR
CORPORATE ASSETS
Adam Brookman
Shareholder
Amy Vandamme
Vice President and Assistant General Counsel
COVERING YOUR ASSETS
•! Protect your intellectual property
•! Protect your employees
•! Protect your customers
•! Protect your business’s goodwill
•! Defend against infringement claims
•! Avoid violating rights of privacy and publicity
•! Avoid committing trade secret misappropriation
•! Avoid having your trade secrets stolen
TRADE SECRET
MISAPPROPRIATION
IT’S A BIGGER DEAL THAN YOU THINK
A FEW HEADLINES
25 Year Old Waukesha Man Given 30 Months
for Trying to Sell Trade Secrets
The man tried to sell engineering drawings belonging
to his former employer
A FEW HEADLINES
Volkswagen Settles with General Motors for
$100 Million Dollars to Redress Trade Secret
Theft by Former Senior Executive
Jose Lopez, GM’s former head of purchasing hired
away by Volkswagen, allegedly revealed plans for an
advanced assembly line and other proprietary
information to his new employer
A FEW HEADLINES
Tyson Collects $20 Million Jury Award From
ConAgra in Trade Secret Theft Case
The Court held that disclosure of trade secrets by
former Tyson executives was “inevitable
SOME NUMBERS
The FBI estimates that companies suffered more than $13 billion
in economic losses due to trade secret misappropriation in
cases opened in fiscal 2012
Trade secret “thieves” have been identified as:
•! Current Employees – 30%
•! Former Employees – 28%
•! Vendors, Consultants, Competitors, Foreign Businesses,
Foreign Governments – 42%
Another study, which relies on information gleaned from
published opinions, identified 28% of the thieves as business
partners of the victim
SOME NUMBERS
•!In 1970, there were only a handful of
decisions alleging theft of trade secrets.
•!In 2008, there were 121 decisions alleging
theft of trade secrets.
•!A recent study concluded that the
number of trade secret cases is rising
exponentially, doubling every 10 years.
EMPLOYEES ARE SCARY
•! 50% of employees who left or lost their jobs in the last 12
months kept confidential corporate data
•! 40% plan to use it in their new jobs
•! 56% of employees do not believe it is a crime to use a
competitor's trade secret information
•! 44% of employees believe a software developer who
develops source code for a company has some
ownership in his or her work
•! 42% percent do not think it's a crime to reuse the source
code, without permission, in projects for other
companies
•! 51% think it is acceptable to take corporate data
because their company does not strictly enforce policies
TRADE SECRET PROTECTION IS NOT A
GIVEN
Many countries, including India,
Singapore, Malaysia and Hong Kong,
do not provide statutory protection for
trade secrets or confidential information
DEFINITION
Trade Secret” means information,
including a formula, pattern,
compilation, program, device, method,
technique or process that . . .
DEFINITION
That . . .
•! derives independent economic value,
actual or potential, from not being generally
known to, and
•! not being readily ascertainable by proper
means by, other persons who can obtain
economic value from its disclosure or use,
and . . .
DEFINITION
And . . .
•! is the subject of efforts to maintain its
secrecy that are reasonable under the
circumstances
INFORMATION WHICH IS NOT
GENERALLY KNOWN
•! The information does not have to be
unknown to anyone else in the world
•! Matters of public knowledge or of general
knowledge in an industry cannot be
appropriated by a company as a trade
secret
REASONABLE EFFORTS TO MAINTAIN
SECRECY
•! Some steps to keep the information secret must be
taken – for example:
•! Stamping documents confidential
•! Having employees sign confidentiality agreements
•! Limiting access to those with a need to know
•! Shredding documents
•! Having vendors sign confidentiality agreements
•! Keeping visitors out of certain production areas
INFORMATION THAT IS NOT READILY
ASCERTAINABLE
•! The information does not have to be
impossible to obtain. However, there must
be sufficient secrecy so that, absent
improper means, the information would be
difficult to obtain.
•! Matters which are completely disclosed by
the goods or services which a company
markets cannot be trade secrets
WISCONSIN ISSUES
•! Customer lists have generally been held not to
constitute trade secrets
•! Wisconsin courts have denied efforts seeking to
prevent former employees and third parties from
using or disclosing information that is merely
confidential for more than two years
•! Inter-company agreements that require
confidentiality for more than two years can be
problematic
WHAT TO DO
•! Conduct a trade secret audit to figure out if and to what extent the company
has trade secrets
•! Before hiring a new employee or committing to a new vendor, make sure they
understand that third party trade secrets are not welcome
•! Enter into enforceable confidentiality and non-compete agreements with all
employees and relevant vendors
•! Take appropriate security measures – lock cabinets, rooms and areas, encrypt
and password restrict access, stamp documents, shred old paper and limit
access to “need to know”
•! Take steps upon employee termination - conduct exit interviews and remind
employees of their obligations, wipe all devices (including personal ones) and
change passwords.
•! Provide training to employees about intellectual property protection and
enforcement
PRIVACY AND PUBLICITY IN
WISCONSIN
SOCIAL MEDIA HAS CHANGED EVERYTHING
ROOTS
•! S.C. Johnson introduced a
shaving gel for women and
called it “Crazylegs”
ROOTS
•! Crazylegs (Elroy) Hirsch
sued S.C. Johnson for
violation of Hirsch’s right of
privacy under Wisconsin
common law
•! The right of privacy at issue
was the right of Crazylegs
Hirsch to take advantage
of his own name
ROOTS
In holding that Hirsch could maintain his claim the Wisconsin
Supreme Court concluded that the right of privacy is actually a
combination of four separate rights:
•! The right to prevent intrusion into a person’s private affairs;
•! The right to prevent public disclosure of embarrassing private
facts;
•! The right to prevent publicity that places a person in a false
light; and
•! The right to prevent the misappropriation of a person’s name
or likeness.
WISCONSIN STATUTE
•! The results of the Hirsch decisions substantially
matched the (then) recently promulgated
Wisconsin Statute §995.50.
•! The statute protects against an “invasion of
privacy” providing:
•! Equitable relief (injunctions, etc.);
•! Compensatory damages (actual damages or unjust
enrichment); and
•! Reasonable attorneys’ fees.
WISCONSIN STATUTE
•! The statute defines “invasion of privacy” as:
•! Intrusion upon the privacy of another of a nature highly
offensive to a reasonable person, in a place that a
reasonable person would consider private or in a manner
which is actionable for trespass;
•! The use, for advertising purposes or for purposes of trade, of
the name, portrait or picture of any living person, without
having first obtained the written consent of the person or, if
the person is a minor, of his or her parent or guardian; or
WISCONSIN STATUTE
•! Publicity given to a matter concerning the private
life of another, of a kind highly offensive to a
reasonable person, if the defendant has acted
either unreasonably or recklessly as to whether
there was a legitimate public interest in the
matter involved, or with actual knowledge that
none existed. It is not an invasion of privacy to
communicate any information available to the
public as a matter of public record.
PRIVACY RIGHTS UNDER FEDERAL LAW
ARE LIMITED
•! FTC Polices Compliance with Stated Privacy Policies
•! Gramm-Leach-Bliley Act
•! Financial Institutions (including insurance companies) have
an obligation to respect the privacy of their customers and
to protect the security and confidentiality of those
customers’ nonpublic personal information
•! The Electronic Communications Privacy Act
•! Protects transmission and storage of electronic
communications
PRIVACY RIGHTS UNDER FEDERAL LAW
ARE LIMITED
•! The Fair Crediting Reporting Act
•! Health Insurance Portability and
Accountability Act (HIPPA)
•! Child On-Line Privacy Protection Act
(COPPA)
•! COPPA requires websites to obtain parental
consent before collecting information from
children under the age of thirteen
PRACTICAL CONCERNS
•! Facebook
•! Employee Use
•! Posts
•! Monitoring
•! Pre-employment Review
•! Twitter
•! Employee Use
•! Tweets
•! Monitoring
•! Advertising
•! Likenesses
•! Names
QUESTIONS?
WE HAVE ALL THE ANSWERS*
*As with anything you ask a lawyer, the answer is likely to be, “it depends.”
You have been warned.
W E A P P R E C I AT E I T
THANKS FOR LISTENING!
Adam Brookman
Shareholder
Amy Vandamme
Vice President and Assistant General Counsel

Weitere ähnliche Inhalte

Was ist angesagt?

Trademarks, Copyrights & Trade Secrets
Trademarks, Copyrights & Trade SecretsTrademarks, Copyrights & Trade Secrets
Trademarks, Copyrights & Trade SecretsMyCorporation
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Nicole Fucile-Borsian
 
Employment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start UpsEmployment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start UpsParsons Behle & Latimer
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesThomas Benjamin Huggett
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breachRob Jackson
 
Mktg350 lecture 11132013
Mktg350 lecture 11132013Mktg350 lecture 11132013
Mktg350 lecture 11132013lkirkman
 

Was ist angesagt? (20)

Trademarks, Copyrights & Trade Secrets
Trademarks, Copyrights & Trade SecretsTrademarks, Copyrights & Trade Secrets
Trademarks, Copyrights & Trade Secrets
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
File000159
File000159File000159
File000159
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
Employment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start UpsEmployment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start Ups
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Pls 780 week 3
Pls 780 week 3Pls 780 week 3
Pls 780 week 3
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Workplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer ResponsesWorkplace Behavior and Privacy Issues - Employer Responses
Workplace Behavior and Privacy Issues - Employer Responses
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breach
 
Plss780 week 10
Plss780 week 10Plss780 week 10
Plss780 week 10
 
Mktg350 lecture 11132013
Mktg350 lecture 11132013Mktg350 lecture 11132013
Mktg350 lecture 11132013
 

Andere mochten auch

Detersivi alla spina_sapospina_igien bucato
Detersivi alla spina_sapospina_igien bucatoDetersivi alla spina_sapospina_igien bucato
Detersivi alla spina_sapospina_igien bucatoRampi s.r.l.
 
08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer
08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer
08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -AppsflyerMobile Marketing Association
 
Dicas para anúncios em Mídias Sociais
Dicas para anúncios em Mídias SociaisDicas para anúncios em Mídias Sociais
Dicas para anúncios em Mídias SociaisAdriana Soares
 
Detersivi alla spina_sapospina_natale2012
Detersivi alla spina_sapospina_natale2012Detersivi alla spina_sapospina_natale2012
Detersivi alla spina_sapospina_natale2012Rampi s.r.l.
 
ADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTION
ADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTIONADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTION
ADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTIONZhenis Nigmet
 
Successful Interactions with Student Veterans
Successful Interactions with Student VeteransSuccessful Interactions with Student Veterans
Successful Interactions with Student VeteransMelissa Johnson
 
Orientaciones para la evaluación casa del arbol
Orientaciones para la evaluación casa del arbolOrientaciones para la evaluación casa del arbol
Orientaciones para la evaluación casa del arbolAlberto Rivas
 
Gamificación, concepto, definición y parentescos #gamifica mooc
Gamificación, concepto, definición y parentescos #gamifica moocGamificación, concepto, definición y parentescos #gamifica mooc
Gamificación, concepto, definición y parentescos #gamifica moocJimena Acebes Sevilla
 
Rotulacion de hermana kevin
Rotulacion de hermana kevinRotulacion de hermana kevin
Rotulacion de hermana kevinAlberto Rivas
 
Q&A 2013 Agency Overview: Clients, Capabilities & Creative
Q&A 2013 Agency Overview: Clients, Capabilities & CreativeQ&A 2013 Agency Overview: Clients, Capabilities & Creative
Q&A 2013 Agency Overview: Clients, Capabilities & CreativeQuenzel & Associates, Inc
 
Barceló & hotels resorts
Barceló & hotels resortsBarceló & hotels resorts
Barceló & hotels resortsdoloresherrero
 
Resume sales engineer
Resume sales  engineerResume sales  engineer
Resume sales engineerNaveen Mathew
 
Convegno AdB Puglia - 10marzo2010
Convegno AdB Puglia - 10marzo2010Convegno AdB Puglia - 10marzo2010
Convegno AdB Puglia - 10marzo2010Lia Romano
 

Andere mochten auch (20)

Resume en
Resume enResume en
Resume en
 
Detersivi alla spina_sapospina_igien bucato
Detersivi alla spina_sapospina_igien bucatoDetersivi alla spina_sapospina_igien bucato
Detersivi alla spina_sapospina_igien bucato
 
08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer
08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer
08- MMA Forum Argentina 2016 - 5 Etapas en la Medición de anuncios -Appsflyer
 
Dicas para anúncios em Mídias Sociais
Dicas para anúncios em Mídias SociaisDicas para anúncios em Mídias Sociais
Dicas para anúncios em Mídias Sociais
 
MBA CVP presentation 2016
MBA CVP presentation 2016MBA CVP presentation 2016
MBA CVP presentation 2016
 
Detersivi alla spina_sapospina_natale2012
Detersivi alla spina_sapospina_natale2012Detersivi alla spina_sapospina_natale2012
Detersivi alla spina_sapospina_natale2012
 
ADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTION
ADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTIONADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTION
ADDENDUM TO DIPLOMA THE SAFETY OF HUMAN LIFE AND PROTECTION
 
Successful Interactions with Student Veterans
Successful Interactions with Student VeteransSuccessful Interactions with Student Veterans
Successful Interactions with Student Veterans
 
Orientaciones para la evaluación casa del arbol
Orientaciones para la evaluación casa del arbolOrientaciones para la evaluación casa del arbol
Orientaciones para la evaluación casa del arbol
 
Gamificación, concepto, definición y parentescos #gamifica mooc
Gamificación, concepto, definición y parentescos #gamifica moocGamificación, concepto, definición y parentescos #gamifica mooc
Gamificación, concepto, definición y parentescos #gamifica mooc
 
Café com Seguro ANSP - Sustentabilidade em Seguros - Maria Elena Bidino
Café com Seguro  ANSP - Sustentabilidade em Seguros - Maria Elena BidinoCafé com Seguro  ANSP - Sustentabilidade em Seguros - Maria Elena Bidino
Café com Seguro ANSP - Sustentabilidade em Seguros - Maria Elena Bidino
 
HR Optimization
HR OptimizationHR Optimization
HR Optimization
 
Café com Seguro: Riscos Cibernéticos - Guilheme Procopio
Café com Seguro: Riscos Cibernéticos - Guilheme Procopio  Café com Seguro: Riscos Cibernéticos - Guilheme Procopio
Café com Seguro: Riscos Cibernéticos - Guilheme Procopio
 
Rotulacion de hermana kevin
Rotulacion de hermana kevinRotulacion de hermana kevin
Rotulacion de hermana kevin
 
Q&A 2013 Agency Overview: Clients, Capabilities & Creative
Q&A 2013 Agency Overview: Clients, Capabilities & CreativeQ&A 2013 Agency Overview: Clients, Capabilities & Creative
Q&A 2013 Agency Overview: Clients, Capabilities & Creative
 
Barceló & hotels resorts
Barceló & hotels resortsBarceló & hotels resorts
Barceló & hotels resorts
 
Resume sales engineer
Resume sales  engineerResume sales  engineer
Resume sales engineer
 
IUH theory
IUH theoryIUH theory
IUH theory
 
Charles Oko Agyiri CV
Charles Oko Agyiri CVCharles Oko Agyiri CV
Charles Oko Agyiri CV
 
Convegno AdB Puglia - 10marzo2010
Convegno AdB Puglia - 10marzo2010Convegno AdB Puglia - 10marzo2010
Convegno AdB Puglia - 10marzo2010
 

Ähnlich wie Privacy & publicity trade secrets in Wisconsin

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Ethisphere
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!Shawn Tuma
 
Want a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to KnowWant a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to KnowCareer Communications Group
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Quarles & Brady
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)J. Kim Scholes
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationKerry Rego
 
Business Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ BrownBusiness Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ BrownAnnArborSPARK
 

Ähnlich wie Privacy & publicity trade secrets in Wisconsin (20)

Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
 
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!
 
Want a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to KnowWant a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to Know
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)
 
Turnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentationTurnson Point Risks and Reputation Management presentation
Turnson Point Risks and Reputation Management presentation
 
Business Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ BrownBusiness Law & Order - June 18, 2012 - Russ Brown
Business Law & Order - June 18, 2012 - Russ Brown
 

Kürzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Kürzlich hochgeladen (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Privacy & publicity trade secrets in Wisconsin

  • 1. T R A D E S E C R E T S , ! P R I VA C Y & P U B L I C I T Y I N W I S C O N S I N COVERING YOUR CORPORATE ASSETS
  • 2. Adam Brookman Shareholder Amy Vandamme Vice President and Assistant General Counsel
  • 3. COVERING YOUR ASSETS •! Protect your intellectual property •! Protect your employees •! Protect your customers •! Protect your business’s goodwill •! Defend against infringement claims •! Avoid violating rights of privacy and publicity •! Avoid committing trade secret misappropriation •! Avoid having your trade secrets stolen
  • 4. TRADE SECRET MISAPPROPRIATION IT’S A BIGGER DEAL THAN YOU THINK
  • 5. A FEW HEADLINES 25 Year Old Waukesha Man Given 30 Months for Trying to Sell Trade Secrets The man tried to sell engineering drawings belonging to his former employer
  • 6. A FEW HEADLINES Volkswagen Settles with General Motors for $100 Million Dollars to Redress Trade Secret Theft by Former Senior Executive Jose Lopez, GM’s former head of purchasing hired away by Volkswagen, allegedly revealed plans for an advanced assembly line and other proprietary information to his new employer
  • 7. A FEW HEADLINES Tyson Collects $20 Million Jury Award From ConAgra in Trade Secret Theft Case The Court held that disclosure of trade secrets by former Tyson executives was “inevitable
  • 8. SOME NUMBERS The FBI estimates that companies suffered more than $13 billion in economic losses due to trade secret misappropriation in cases opened in fiscal 2012 Trade secret “thieves” have been identified as: •! Current Employees – 30% •! Former Employees – 28% •! Vendors, Consultants, Competitors, Foreign Businesses, Foreign Governments – 42% Another study, which relies on information gleaned from published opinions, identified 28% of the thieves as business partners of the victim
  • 9. SOME NUMBERS •!In 1970, there were only a handful of decisions alleging theft of trade secrets. •!In 2008, there were 121 decisions alleging theft of trade secrets. •!A recent study concluded that the number of trade secret cases is rising exponentially, doubling every 10 years.
  • 10. EMPLOYEES ARE SCARY •! 50% of employees who left or lost their jobs in the last 12 months kept confidential corporate data •! 40% plan to use it in their new jobs •! 56% of employees do not believe it is a crime to use a competitor's trade secret information •! 44% of employees believe a software developer who develops source code for a company has some ownership in his or her work •! 42% percent do not think it's a crime to reuse the source code, without permission, in projects for other companies •! 51% think it is acceptable to take corporate data because their company does not strictly enforce policies
  • 11. TRADE SECRET PROTECTION IS NOT A GIVEN Many countries, including India, Singapore, Malaysia and Hong Kong, do not provide statutory protection for trade secrets or confidential information
  • 12. DEFINITION Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique or process that . . .
  • 13. DEFINITION That . . . •! derives independent economic value, actual or potential, from not being generally known to, and •! not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and . . .
  • 14. DEFINITION And . . . •! is the subject of efforts to maintain its secrecy that are reasonable under the circumstances
  • 15. INFORMATION WHICH IS NOT GENERALLY KNOWN •! The information does not have to be unknown to anyone else in the world •! Matters of public knowledge or of general knowledge in an industry cannot be appropriated by a company as a trade secret
  • 16. REASONABLE EFFORTS TO MAINTAIN SECRECY •! Some steps to keep the information secret must be taken – for example: •! Stamping documents confidential •! Having employees sign confidentiality agreements •! Limiting access to those with a need to know •! Shredding documents •! Having vendors sign confidentiality agreements •! Keeping visitors out of certain production areas
  • 17. INFORMATION THAT IS NOT READILY ASCERTAINABLE •! The information does not have to be impossible to obtain. However, there must be sufficient secrecy so that, absent improper means, the information would be difficult to obtain. •! Matters which are completely disclosed by the goods or services which a company markets cannot be trade secrets
  • 18. WISCONSIN ISSUES •! Customer lists have generally been held not to constitute trade secrets •! Wisconsin courts have denied efforts seeking to prevent former employees and third parties from using or disclosing information that is merely confidential for more than two years •! Inter-company agreements that require confidentiality for more than two years can be problematic
  • 19. WHAT TO DO •! Conduct a trade secret audit to figure out if and to what extent the company has trade secrets •! Before hiring a new employee or committing to a new vendor, make sure they understand that third party trade secrets are not welcome •! Enter into enforceable confidentiality and non-compete agreements with all employees and relevant vendors •! Take appropriate security measures – lock cabinets, rooms and areas, encrypt and password restrict access, stamp documents, shred old paper and limit access to “need to know” •! Take steps upon employee termination - conduct exit interviews and remind employees of their obligations, wipe all devices (including personal ones) and change passwords. •! Provide training to employees about intellectual property protection and enforcement
  • 20. PRIVACY AND PUBLICITY IN WISCONSIN SOCIAL MEDIA HAS CHANGED EVERYTHING
  • 21. ROOTS •! S.C. Johnson introduced a shaving gel for women and called it “Crazylegs”
  • 22. ROOTS •! Crazylegs (Elroy) Hirsch sued S.C. Johnson for violation of Hirsch’s right of privacy under Wisconsin common law •! The right of privacy at issue was the right of Crazylegs Hirsch to take advantage of his own name
  • 23. ROOTS In holding that Hirsch could maintain his claim the Wisconsin Supreme Court concluded that the right of privacy is actually a combination of four separate rights: •! The right to prevent intrusion into a person’s private affairs; •! The right to prevent public disclosure of embarrassing private facts; •! The right to prevent publicity that places a person in a false light; and •! The right to prevent the misappropriation of a person’s name or likeness.
  • 24. WISCONSIN STATUTE •! The results of the Hirsch decisions substantially matched the (then) recently promulgated Wisconsin Statute §995.50. •! The statute protects against an “invasion of privacy” providing: •! Equitable relief (injunctions, etc.); •! Compensatory damages (actual damages or unjust enrichment); and •! Reasonable attorneys’ fees.
  • 25. WISCONSIN STATUTE •! The statute defines “invasion of privacy” as: •! Intrusion upon the privacy of another of a nature highly offensive to a reasonable person, in a place that a reasonable person would consider private or in a manner which is actionable for trespass; •! The use, for advertising purposes or for purposes of trade, of the name, portrait or picture of any living person, without having first obtained the written consent of the person or, if the person is a minor, of his or her parent or guardian; or
  • 26. WISCONSIN STATUTE •! Publicity given to a matter concerning the private life of another, of a kind highly offensive to a reasonable person, if the defendant has acted either unreasonably or recklessly as to whether there was a legitimate public interest in the matter involved, or with actual knowledge that none existed. It is not an invasion of privacy to communicate any information available to the public as a matter of public record.
  • 27. PRIVACY RIGHTS UNDER FEDERAL LAW ARE LIMITED •! FTC Polices Compliance with Stated Privacy Policies •! Gramm-Leach-Bliley Act •! Financial Institutions (including insurance companies) have an obligation to respect the privacy of their customers and to protect the security and confidentiality of those customers’ nonpublic personal information •! The Electronic Communications Privacy Act •! Protects transmission and storage of electronic communications
  • 28. PRIVACY RIGHTS UNDER FEDERAL LAW ARE LIMITED •! The Fair Crediting Reporting Act •! Health Insurance Portability and Accountability Act (HIPPA) •! Child On-Line Privacy Protection Act (COPPA) •! COPPA requires websites to obtain parental consent before collecting information from children under the age of thirteen
  • 29. PRACTICAL CONCERNS •! Facebook •! Employee Use •! Posts •! Monitoring •! Pre-employment Review •! Twitter •! Employee Use •! Tweets •! Monitoring •! Advertising •! Likenesses •! Names
  • 30. QUESTIONS? WE HAVE ALL THE ANSWERS* *As with anything you ask a lawyer, the answer is likely to be, “it depends.” You have been warned.
  • 31. W E A P P R E C I AT E I T THANKS FOR LISTENING! Adam Brookman Shareholder Amy Vandamme Vice President and Assistant General Counsel