The Sedona Conference, Working Group 12 on Trade Secrets, has released for public comment its guidance on the governance and management of trade secrets. This valuable Commentary outlines the inherent challenges in developing a trade secret protection program that aligns with a business’s goals and measurable objectives.
The Commentary recommends businesses focus on the following factors to evaluate trade secret protection programs:
- The size, maturity, industry, and location of the business;
- The nature and value of a business’s trade secrets;
- How the business can leverage its trade secrets to commercialize new services and extract additional value, maintain its competitive advantage, and incentivize innovation;
- The different measures available to protect the business’s trade secrets and their varying effectiveness; and
- The extent and cost of measures taken and the rationale for measures not taken.
In the end, the Commentary advocates an “integrated enterprise” approach to trade secret governance in order to accommodate multiple and potentially conflicting corporate interests. This approach requires several steps:
Continue Reading The Sedona Conference Solicits Public Comment on its Commentary on the Governance and Management of Trade Secrets



Recent United States Department of Justice (“DOJ”) indictments of Chinese hackers provide a reminder that trade secrets and other intellectual property stored on databases are attractive targets to bad actors. The DOJ
The COVID-19 crisis has presented an array of novel issues for companies, including new and unexpected cybersecurity threats. In addition to the now well-known security limitations of video platforms such as Zoom, we are seeing cyber-attacks in the form of COVID-19 related phishing attempts and ransomware attacks. In at least some of these attempted hacks, cybercriminals are hoping to steal trade secrets.
Crowell & Moring invites you to attend the fifth installment of our Trade Secrets Webinar Series –
The COVID-19 pandemic presents unique and unprecedented challenges to the ongoing need to protect confidential information and trade secrets. The massive business disruptions that enterprises of all kinds now face include (1) entire workforces forced to work remotely, accessing and using confidential information and trade secrets from home; (2) exigent circumstances created by the cessation or substantial slowing of commercial activity that may result in the disclosure of confidential information or trade secrets to third parties outside normal procedures; and (3) the off-boarding of remote employees who are accessing confidential information and trade secrets remotely.
Companies and other organizations increasingly must face serious and complex threats to their business and infrastructure. Whether the threat is trade secret theft, rogue insiders, cybercrime adversaries, aggressive competitors, or misconduct by business and supply chain partners, companies should remain constantly vigilant and defense ready. Adversaries, including especially cybercriminals operating exclusively in the digital domain, are often highly motivated, sophisticated, resourced, and innovative. The opaque, pervasive, and global nature of modern digital networked environments presents opportunities for criminals. The sophistication and relentless creativity of these bad actors pose significant challenges to companies and law enforcement agencies in being able to detect, assess, mitigate, attribute, and deter these threats. Because available tools and real-world practices to address these threats often outpace the law, companies are called upon to develop their own comprehensive approaches to investigate and remediate these forms of risk. In doing so, companies must be willing to assume a certain level of risk to effectively investigate and obtain sufficient insight to counter the problems.
DOJ announced Tan’s guilty plea this week which revealed that he copied substantial research and development files that he knew contained protected company