Trade Secrets04 - 2002
Trade Secrets04 - 2002
12
BUSINESS
GOLD NUGGETS:
WIPO Magazine/April 2002
IP AND
PROTECT THEM
All businesses have trade secrets. Today’s business environment has ership from senior management in
Some are so acutely aware of their increased the importance of trade companies in order that trade se-
importance that they make formal secret protection for business by crets may be propertly identified
statements like the one of Stantec developing and implementing infor- and protected as valuable assets.
below. Many only become aware of mation protection practices that
them when competitors attempt to address the risks associated with a Strategies for Staying
acquire their client lists or market- global marketplace, rapid advances Ahead
ing plans, or to talk to their employ- in technology and telecommunica-
ees and copy the way they do busi- tions, a mobile, highly-skilled work While discussing the issue of em-
ness. Only then does it become force, and networked strategic busi- ployees taking secrets to a competi-
obvious that they have something ness relationships, including exten- tor in his book entitled The Pursuit
valuable to protect. A growing num- sive outsourcing. Technology is of Wow!, Tom Peters suggests that
ber of successful enterprises real- changing so rapidly that trade se- the trick for any sensible company
izes that valuable information or cret protection is, in some cases, to survive and thrive is to keep top-
knowledge is what gives them an the most attractive, effective and ping itself – so that stolen secrets
edge on the competition. Original readily available intellectual prop- are the secrets of yesterday’s suc-
confidential information, knowl- erty right. As with all intellectual cess. Most companies would in-
edge and expertise provide a property, trade secrets can be valu- deed find this a difficult feat to
unique competitive quality that able to a company’s growth and emulate.
helps businesses attract customers. competitive advantage, and some-
times even its survival. Another strategy, ordinarily sui-
Much valuable information may ap- cidal, would be to post business
pear trivial and therefore may not be Trade secret protection also pro- secrets on a website for all to see,
sufficiently appreciated. Many enter- tects a business against tomorrow’s copy and use. Interestingly, a start-
prises are unaware moreover that se- competitors. These may include up software company, Open Cola,
cret information is considered intel- former employees or customers. posted a secret recipe for cola on
lectual property – frequently re- Accordingly, there is need for lead- its website as a marketing strategy
ferred to as trade secrets – and often
protected by legislation. Companies
also face a perpetual struggle be-
tween developing lasting relation-
ships with customers, stakeholders
Courtesy : Stantec Inc.
Computer Corporation
valuable to its owner and not gen- Y Financial information;
erally known or readily Y Personnel records;
Dell, the computer company, has a
ascertainable by the public, and Y Schedules; number of patents and some pending
which the owner has made a rea- Y Manuals; applications in the United States on its
sonable effort to keep secret. A Y Ingredients; unique business models. A patent may
reveal a lot of valuable information, but
trade secret generally has some cost Y Information about research and at the same time, it provides exclusivity in
associated with its development, development activities. the marketplace. In 1999, Dell used its
and is not common knowledge in patent portfolio as collateral in a $16
billion cross-licensing deal with IBM that
the industry. Even negative informa- A trade secret may be made up of a provided Dell with lower cost computer
tion, such as research options that combination of characteristics and components. This freed Dell from having
have been explored and found components, each of which by itself to pay IBM several millions of dollars in
royalties and further reduced Dell’s cost
worthless, can be a trade secret. is in the public domain, but where of doing business.
Practically any type of technical the unified process, design and op-
and business information can be eration of such characteristics or Wal-Mart
protected as a trade secret provided components, in combination, pro-
vides a competitive advantage. Wal-Mart, on the other hand, appears to
that it meets these requirements.
rely more on the protection afforded by
The following are a few sample cat- the law of trade secrets for protection of
egories: Products and processes that are not its business model, regardless of the fact
patentable can be protected under that the law protecting secret information
is often regarded as a relatively
Y Data compilations, for example trade secret law. However, enter- ineffective mechanism for protection
lists of customers (the more in- prises rely on trade secret law, against theft of proprietary information
formation a list contains, the which does not require registration, from past key employees to competitors.
more likely it is to qualify for to safeguard the details of research
trade secret protection); and development, including draft
patent applications and patent ap-
plications before their publication.
>>>
KOREAN
14
ART EXHIBITION
WIPO Magazine/April 2002
>>>
Even after the grant of a patent, WIPO hosted from March 5 to 15