<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Patent Your IP Archives - Morin Legal</title>
	<atom:link href="https://www.morinentlaw.com/tag/patent-your-ip/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Making the practice of law, look like an art.</description>
	<lastBuildDate>Thu, 25 Apr 2024 19:06:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.morinentlaw.com/wp-content/uploads/2022/01/favicon_design_morinentlaw-copy-2-150x150.jpg</url>
	<title>Patent Your IP Archives - Morin Legal</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How To Protect Your Trade Secrets</title>
		<link>https://www.morinentlaw.com/how-to-protect-your-trade-secrets/</link>
		
		<dc:creator><![CDATA[Lee Morin]]></dc:creator>
		<pubDate>Mon, 14 Nov 2022 09:13:33 +0000</pubDate>
				<category><![CDATA[Intellectual Property Law]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[intellectual property]]></category>
		<category><![CDATA[Patent Your IP]]></category>
		<category><![CDATA[small business]]></category>
		<category><![CDATA[Trademark]]></category>
		<guid isPermaLink="false">https://www.morinentlaw.com/?p=31279</guid>

					<description><![CDATA[<p>What Are Trade Secrets? Oxford dictionary defines trade secrets as: A secret device or technique used by a company in manufacturing its products. To dive in deeper, trade secrets are intellectual properties (IP) that include formulas, practices, processes, designs, instruments, patterns, or compilations of information that have inherent economic or pecuniary value. They are not [&#8230;]</p>
<p>The post <a href="https://www.morinentlaw.com/how-to-protect-your-trade-secrets/">How To Protect Your Trade Secrets</a> appeared first on <a href="https://www.morinentlaw.com">Morin Legal</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="font-weight: 400;">What Are Trade Secrets?<img fetchpriority="high" decoding="async" class="size-medium wp-image-31282 alignright" src="https://www.morinentlaw.com/wp-content/uploads/2022/11/1-300x300.jpg" alt="What Are Trade Secrets?" width="300" height="300" srcset="https://www.morinentlaw.com/wp-content/uploads/2022/11/1-300x300.jpg 300w, https://www.morinentlaw.com/wp-content/uploads/2022/11/1-1024x1024.jpg 1024w, https://www.morinentlaw.com/wp-content/uploads/2022/11/1-150x150.jpg 150w, https://www.morinentlaw.com/wp-content/uploads/2022/11/1-768x768.jpg 768w, https://www.morinentlaw.com/wp-content/uploads/2022/11/1-600x600.jpg 600w, https://www.morinentlaw.com/wp-content/uploads/2022/11/1.jpg 1080w" sizes="(max-width: 300px) 100vw, 300px" /></span></h2>
<p><span style="font-weight: 400;">Oxford dictionary defines trade secrets as: </span><i><span style="font-weight: 400;">A secret </span></i><b><i>device</i></b><i><span style="font-weight: 400;"> or </span></i><b><i>technique</i></b><i><span style="font-weight: 400;"> used by a company in manufacturing its products. </span></i><span style="font-weight: 400;">To dive in deeper, </span><span style="font-weight: 400;">trade secrets are </span><a href="https://en.wikipedia.org/wiki/Intellectual_property"><span style="font-weight: 400;">intellectual proper</span></a><span style="font-weight: 400;">ties (IP) that include </span><a href="https://en.wikipedia.org/wiki/Formula"><span style="font-weight: 400;">formulas</span></a><span style="font-weight: 400;">, </span><a href="https://en.wikipedia.org/wiki/Best_practice"><span style="font-weight: 400;">practices</span></a><span style="font-weight: 400;">, </span><a href="https://en.wikipedia.org/wiki/Business_process"><span style="font-weight: 400;">processes</span></a><span style="font-weight: 400;">, </span><a href="https://en.wikipedia.org/wiki/Design"><span style="font-weight: 400;">designs</span></a><span style="font-weight: 400;">, </span><a href="https://en.wikipedia.org/wiki/Legal_instrument"><span style="font-weight: 400;">instruments</span></a><span style="font-weight: 400;">, </span><a href="https://en.wikipedia.org/wiki/Pattern"><span style="font-weight: 400;">patterns</span></a><span style="font-weight: 400;">, or compilations of information that have inherent </span><a href="https://en.wikipedia.org/wiki/Economic_value"><span style="font-weight: 400;">economic or pecuniary value</span></a><span style="font-weight: 400;">. They are not known by the general public and are not readily ascertainable by others. The owner of this type of IP typically will take </span><i><span style="font-weight: 400;">reasonable</span></i><span style="font-weight: 400;"> action to keep it a secret. </span></p>
<p><span style="font-weight: 400;">The 3 main components of a trade secret are as follows:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It is confidential information.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It has economic value because it is unknown to others.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Its owner has made reasonable efforts to keep it secret.</span></li>
</ol>
<p><span style="font-weight: 400;">In general, trade secret protection grants owners the right to prevent the information from being disclosed, taken, or used by others without the owner&#8217;s consent. </span></p>
<h2><span style="font-weight: 400;">What Is Trade Secret Theft?</span></h2>
<p><span style="font-weight: 400;">Trade secret theft occurs when someone knowingly steals or </span><span style="font-weight: 400;">unfairly takes a trade secret to the economic benefit of anyone other than the original owner. These thieves can be from both inside and outside of the organization that they steal from. </span></p>
<h3><span style="font-weight: 400;">5 Steps To Protect Trade Secrets</span></h3>
<p><span style="font-weight: 400;">Did you know that one 64GB flash drive can hold approximately 4 million pages? It would take an 18-wheeler to carry the physical copies, but a pocket-sized flash drive can be used to whisk away 4 million pages worth of company secrets. It’s that easy and that’s why it is so important to protect your trade secrets. The U.S. Patent and Trademark Office estimates </span><a href="https://www.iwf.org/2022/04/26/intellectual-property-theft/"><span style="font-weight: 400;">$250 billion in losses</span></a><span style="font-weight: 400;"> due to trade secret theft. </span></p>
<p><span style="font-weight: 400;">Typically, you need to protect your IP from these 3 parties:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Thieves</b><span style="font-weight: 400;"> – They want to take your intellectual property for personal gain.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Competitors</b><span style="font-weight: 400;"> – They want your intellectual property to outdo or compete with you.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Adversaries</b><span style="font-weight: 400;"> – They want your intellectual property for the purpose of putting you out of business.</span></li>
</ul>
<p><span style="font-weight: 400;">To protect yourself and your business against trade secret theft, implement these 5 steps.</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Register the copyright, trademark, or patent for your IP</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Protect your IP from within the business</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Limit access to IP (both physical and digital)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identify and assess risks</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Train employees &amp; vendors as needed</span></li>
</ol>
<h2><span style="font-weight: 400;">Copyright, Trademark, or Patent Your IP <img decoding="async" class="size-medium wp-image-31283 alignright" src="https://www.morinentlaw.com/wp-content/uploads/2022/11/3-300x300.jpg" alt=" Protect Trade Secrets
" width="300" height="300" srcset="https://www.morinentlaw.com/wp-content/uploads/2022/11/3-300x300.jpg 300w, https://www.morinentlaw.com/wp-content/uploads/2022/11/3-1024x1024.jpg 1024w, https://www.morinentlaw.com/wp-content/uploads/2022/11/3-150x150.jpg 150w, https://www.morinentlaw.com/wp-content/uploads/2022/11/3-768x768.jpg 768w, https://www.morinentlaw.com/wp-content/uploads/2022/11/3-600x600.jpg 600w, https://www.morinentlaw.com/wp-content/uploads/2022/11/3.jpg 1080w" sizes="(max-width: 300px) 100vw, 300px" /></span></h2>
<p><span style="font-weight: 400;">Depending on what type of <a href="https://www.morinentlaw.com/services/businesslaw/" target="_blank" rel="noopener">intellectual property</a> you have created, it will most likely need to be protected in one of 3 ways, or a combination: a trademark, a patent, and/or a copyright. For example, computer software is eligible for copyright protection because it is text; however some believe to keep it confidential it should remain a trade secret, while certain versions of code may express novel processes that arise to the level of patent protection.</span></p>
<p><span style="font-weight: 400;">Protecting your intellectual property prevents anyone from using it without your knowledge and permission. It also creates a presumption (in Latin, </span><i><span style="font-weight: 400;">prima facie</span></i><span style="font-weight: 400;">) of ownership, and that you are compensated properly for your work.</span></p>
<p><span style="font-weight: 400;">Trade secrets, if protected by a patent, are no longer a secret after they publish and/or grant. Patents protect novel inventions that are non-obvious to one skilled in the art. Inventions can be anything with a utilitarian or functional purpose: from a machine to a hybrid plant to chemical compositions to business methods.</span></p>
<p><span style="font-weight: 400;">A patent will grant you the right to produce your invention without the worry of competitors replicating it for the duration of the patent’s protection. </span></p>
<p><span style="font-weight: 400;">More examples of what a patent will protect are phone applications, pharmaceuticals, engines, and even plants. </span></p>
<p><span style="font-weight: 400;">There are 3 different types of patents: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Utility patents</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Design patents</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Plant patents</span></li>
</ul>
<p><span style="font-weight: 400;">In basic terms, utility patents protect a new or improved process, machine, or composition. </span><a href="https://www.morinentlaw.com/copyright-an-origin-story-in-a-digital-era/"><span style="font-weight: 400;">Plant patents</span></a><span style="font-weight: 400;"> protect asexually reproducible plants and new plant characteristics. Design patents protect unique looks or designs, for example, the curvy structure of a Volkswagen Beetle or women’s underwear. </span></p>
<p><a href="https://www.morinentlaw.com/the-difference-between-trademarks-patents-copyrights/"><span style="font-weight: 400;">Learn more about patents, trademarks, and copyright here.</span></a><span style="font-weight: 400;"> </span></p>
<h2><span style="font-weight: 400;">Protect Your IP From Within the Business</span></h2>
<p><span style="font-weight: 400;">The first line of defense against trade secret theft is confidentiality and non-disclosure agreements (NDAs) with employees, business partners, and anyone else who has access to the IP. </span></p>
<p><span style="font-weight: 400;">Policies and procedures should be in place to support confidentiality and they need to be followed consistently.</span></p>
<p><span style="font-weight: 400;">PatientPoint health information services lost a case against a former employee who used information he had access to help a competitor. They had not asked for an NDA until one year into his employment and hadn’t asked him to return his laptop until six months after his termination. Therefore, PatientPoint hadn’t taken “reasonable steps” to secure its trade secrets. </span></p>
<h2><span style="font-weight: 400;">Limit Access to IP (Both Physical and Digital)<img decoding="async" class="size-medium wp-image-31281 alignright" src="https://www.morinentlaw.com/wp-content/uploads/2022/11/st-300x300.jpg" alt="Protect Your IP From Within the Business
" width="300" height="300" srcset="https://www.morinentlaw.com/wp-content/uploads/2022/11/st-300x300.jpg 300w, https://www.morinentlaw.com/wp-content/uploads/2022/11/st-1024x1024.jpg 1024w, https://www.morinentlaw.com/wp-content/uploads/2022/11/st-150x150.jpg 150w, https://www.morinentlaw.com/wp-content/uploads/2022/11/st-768x768.jpg 768w, https://www.morinentlaw.com/wp-content/uploads/2022/11/st-600x600.jpg 600w, https://www.morinentlaw.com/wp-content/uploads/2022/11/st.jpg 1080w" sizes="(max-width: 300px) 100vw, 300px" /></span></h2>
<p><span style="font-weight: 400;">It is vital to have security for both physical and digital intellectual property. More and more, courts are requiring it, ruling that if the information is deemed secret, the company must take action to implement physical and electronic access restrictions.   </span></p>
<p><span style="font-weight: 400;">The information technology security system should also be regularly assessed and updated. </span></p>
<h2><span style="font-weight: 400;">Identify and Assess Risks</span></h2>
<p><span style="font-weight: 400;">Make sure you, first, identify what information should be kept confidential. Trade secrets should be documented internally. Once the trade secrets have been identified, risk assessments should be run to determine what information is at risk, is most vulnerable, and could do the most damage in the event it was stolen. Are there particular departments within the company that are more at risk, such as salespersons with access to customer lists, vendors, and other third parties valuable to the business? Make sure measures are taken to better secure those areas. </span></p>
<h2><span style="font-weight: 400;">Train Employees &amp; Vendors As Needed</span></h2>
<p><span style="font-weight: 400;">Both third parties and employees should be trained so that they know exactly what is expected of them when handling Confidential Information. Companies that fail to inform their employees what is and isn’t confidential in their training have been known to lose cases against employees who have stolen trade secrets.  </span></p>
<h2><span style="font-weight: 400;">How Morin Legal Can Help You <img loading="lazy" decoding="async" class="size-medium wp-image-31284 alignright" src="https://www.morinentlaw.com/wp-content/uploads/2022/11/4-300x300.jpg" alt="Morin Legal" width="300" height="300" srcset="https://www.morinentlaw.com/wp-content/uploads/2022/11/4-300x300.jpg 300w, https://www.morinentlaw.com/wp-content/uploads/2022/11/4-1024x1024.jpg 1024w, https://www.morinentlaw.com/wp-content/uploads/2022/11/4-150x150.jpg 150w, https://www.morinentlaw.com/wp-content/uploads/2022/11/4-768x768.jpg 768w, https://www.morinentlaw.com/wp-content/uploads/2022/11/4-600x600.jpg 600w, https://www.morinentlaw.com/wp-content/uploads/2022/11/4.jpg 1080w" sizes="(max-width: 300px) 100vw, 300px" /></span></h2>
<p><span style="font-weight: 400;">Morin Legal has 18 years of experience in </span><a href="https://www.morinentlaw.com/services/iplaw/"><span style="font-weight: 400;">intellectual property (IP) law</span></a><span style="font-weight: 400;">. Of that, we have ten years of experience in United States trademarks, copyrights, and trade secrets. Coupled with a background in </span><a href="https://www.morinentlaw.com/the-difference-between-trademarks-patents-copyrights/"><span style="font-weight: 400;">patents</span></a><span style="font-weight: 400;"> and working relationships with a global network of IP attorneys, we identify your ideas, creations, and brands and develop a strategy to help you to fiercely protect them. </span></p>
<p><span style="font-weight: 400;">We also offer guidance for developing and maintaining a portfolio of your intellectual property assets for the long-term success of your estate.</span></p>
<p><span style="font-weight: 400;">We offer copyright, </span><a href="https://www.morinentlaw.com/how-to-register-renew-trademarks-plus-how-long-they-will-last/"><span style="font-weight: 400;">trademark</span></a><span style="font-weight: 400;">, and trade secret IP legal services as well as guide you in how to develop and maintain an IP portfolio.</span></p>
<p><a href="https://calendly.com/morinlegal/dc"><span style="font-weight: 400;">Learn more and book a discovery call with Morin Legal today.</span></a></p>
<p>The post <a href="https://www.morinentlaw.com/how-to-protect-your-trade-secrets/">How To Protect Your Trade Secrets</a> appeared first on <a href="https://www.morinentlaw.com">Morin Legal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
