Healthcare data is one of the most desirable forms of data for cyber criminals to steal because its value on the cyber black market — the Dark Web — is much higher than most other forms of data. While there are several reasons for this, the recent study Your Life, Repackaged and Resold: The Deep Web Exploitation of Health Sector Breach Victims, concluded Continue reading “Why is Healthcare Data So Valuable to Cyber Criminals?”
A few years ago Texas joined most other states and enacted its version of the Uniform Trade Secrets Act (UTSA, or Texas’ TUTSA). Recently, the federal Defend Trade Secrets Act (DTSA) became law. While there are quite a few similarities between these laws, there are also some substantial differences that you need to know to protect your businesses’ trade secrets. Continue reading “What You Need to Know About Protecting Trade Secrets Under State and Federal Law”
The Texas Supreme Court recently addressed the question of when a competitor’s corporate representative can be excluded from the courtroom in a trade secrets case. Continue reading “Can Parties be Excluded from the Courtroom in Trade Secrets Cases?”
Shawn Tuma was a guest the Down the Security Rabbithole podcast where he and hosts Rafal Los (@Wh1t3Rabbit) and Michael Santarcangelo (@Catalyst) discussed recent events in the world of cyber law. Continue reading “Cyber Law Update on #DtSR Podcast with Los, Santarcangelo and Tuma”
Trade secrets are the lifeblood of a company but it can be a difficult issue to understand.
Here is a free guide to help you identify and protect your company’s trade secrets.
Yes, Your Business Has Trade Secrets
Whether they realize it or not, virtually every business has trade secrets which can be as simple as something unique or remarkable about the way it makes a product or provides a service that sets it apart from the competition. This is something that gives the business a competitive advantage and is usually something it has spent significant time and resources to develop.
Unfortunately, in today’s business environment, honor and integrity are not always the rule and many businesses find their trade secrets are being taken and used to compete against them. This can come from as close as disloyal employees or local competitors to around the world from foreign state‐sponsored organizations engaging in industrial espionage.
Preparation is the Key to Successfully Protecting Your Businesses’ Trade Secrets
The first-time many businesses ever gives serious thought to their trade secrets is when they find that they have been taken. It is then that the business begins scrambling to identify its trade secrets and, assuming it can put together a comprehensive list, hopes and prays that it has satisfied the requirements for keeping that information protected under the law of trade secrets so that it can use the legal process to keep it from being used by the businesses’ competitors. To make matters worse, when the disclosure of trade secrets is being threatened and an injunction from a court is all that will stop it, Time is precious and every minutes can make the diﬀerence between winning or losing.
Here Is The Guide
Shawn Tuma has prepared a comprehensive Guide to help you understand how to identify and protect your businesses’ trade secrets. The Guide provides a step-by-step explanation of everything from what trade secrets are in general, to how to identify your own businesses’ trade secrets, to the most common threats against trade secrets, and how to protect against those threats.
You can download a free .pdf copy of the Guide by clicking on this link: Business Guide for Identifying and Protecting Trade Secrets
Once you have downloaded the Guide, you can be proactive in protecting your businesses’ trade secrets by using it to prepare for the problem before it ever arises and, in doing so, help reduce the chances that the problem will ever arise by:
- carefully evaluating what information it has that qualifies as trade secret information;
- implementing security measures, policies, and procedures to prevent the disclosure of that information and protect its trade secret status; and,
- in the event its trade secrets are ever compromised, be much better prepared to quickly and eﬃciently make its case in a court of law and successfully prevent others from using its trade secrets.
Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity & Data Privacy Partner at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.