Technology and “bring your own device” (BOD) have made it easier for employees to make  confidential business information vulnerable to view by a competitor or others.  Perhaps an employee moved customer contact information to their smartphone, e-mailed marketing plans to their personal email, to a third party, or transferred documents to a flash drive.

This has become an especially relevant worry now that some 80% of Americans are under shelter-in-place orders and are working remotely. Concerns have even been raised about the safeguarding of information when using videoconferencing software such as Zoom or GoToMeeting.

Protecting Your Confidential Information

With this sudden proliferation of remote work, companies should consider taking additional precautions to protect valuable trade secrets and proprietary information. Such steps may reduce the chances of theft of trade secrets during remote work. They may also serve to position companies to continue to keep their information protected by trade secret laws by taking “reasonable efforts” to ensure the information remains “secret.” Below are a few ways companies can protect their confidential information.  This list is not exhaustive, and time will only tell what courts later decide qualifies as “reasonable efforts”. It is certain, however, that taking no action to protect confidential information, will not be considered reasonable efforts .

  • Revise non-disclosure or proprietary information agreements to specifically apply to remote work.
  • Express and repeat statements of company policy that emphasize:  during any remote-work situation, employees are not permitted to disseminate any trade secret or proprietary information to anyone who is not authorized by the company to receive that information.
  • Require that any employee who needs to communicate about or transmit trade secret or proprietary information do so only through the secured servers or drives.
  • Require that all employees who are working remotely and using personal or home WiFi to secure those points of access with a password.
  • Remind employees of the proliferation of malware, phishing, and other scams, especially during a time of crisis.
  • Establish a designated point of contact person or persons at the company to address questions about remote access, and to oversee the means and methods of obtaining access.
  • Review agreements with vendors who host or facilitate access to the company’s proprietary or trade secret information and, if necessary,revise those relationships.

This recent Quarterly Report from Southern Methodist University also includes COVID-related tips for working securely.

See our COVID-19 Quick Reference page for additional articles.

By Published On: April 9, 2020Categories: Business LawTags: ,

ABOUT THE AUTHOR:

Avatar of Casey Erick
Casey Erick is a Shareholder and focuses on Commercial Litigation and Employment Law. He has represented clients in both litigation and transactional matters that span across commercial law, labor and employment, real estate, consumer protection, and general litigation including, but not limited to breach of contract, corporate trade secret theft, tortious interference, defamation, personal injury, fraud, and various other kinds of civil litigation. He has represented high-profile clients as well as defended against high-profile national and global entities in matters related to commercial litigation, defamation, privacy, negligence, the Stored Communications Act, the Texas Harmful Access by Computer Act, Texas identity Theft Enforcement and Protection Act, and the Computer Fraud and Abuse Act. Casey is Board Certified in Civil Trial Law.