Preview

Trade Secrets

Best Essays
Open Document
Open Document
2228 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Trade Secrets
ADVANCED IP PROJECT TRADE SECRETS

Submitted By Sonal Biswas ID-208111 5th yr LLB Introduction
This paper deals with trade secret and the various theories related to them. The researcher basically tries to take a look into what are problems with trade secrets and the tools that can be used to protect these trade secrets. To put it simply, every product, service or enterprise has something unique and original to it. The Original confidential information, knowledge and expertise lends that very business a competitive quality and edge which helps to attract customers. This very knowledge or information is considered a kind of intellectual property and is protected under the name of Trade secret. As given in restatement of torts also, Trade secret is 'any formula, pattern, device or compilation of information which is used in one 's business and presents an opportunity to obtain an advantage over competitors who do not know or use it. There are some conditions for the information to be considered a trade secret. The conditions might vary depending on other factors like the state’s policy or legal regime etc. But, Art. 39 of TRIPS Agreement can be considered a reference for uniform guidelines: * The information must be secret (i.e. it is not generally known among, or readily accessible to, circles that normally deal with the kind of information in question). * It must have commercial value because it is a secret. * It must have been subject to reasonable steps by the rightful holder of the information to keep it secret (e.g., through confidentiality agreements).
Protected trade secrets can range from technical knowledge, formulas or ingredients, to strategic decision-making such as pricing, marketing strategies, product development and budget information. However trade secret is to be differentiated from confidential information. Person who receives valuable or sensitive secret information in



Bibliography: By Robert Brown (JD.), Emerging Companies Guide: A Resources for Professionals And Entrepreneurs, American Bar association publication, USA, 2005, 1st Edn. Last visited on 27th March, 2013, URL-http://www.slideshare.net/altacitglobal/trade-secrets-vs-confidential-information Last visited on 25th March, 2013, http://euro.ecom.cmu.edu/program/law/08-732/TradeSecrets/utsa.pdf http://www.slideshare.net/altacitglobal/trade-secrets-vs-confidential-information Last visited on 8th march , 2013 http://spicyipindia.blogspot.in/2008/10/breaking-news-india-unveils-national.html [ 3 ]. Last visited on 28th march, 2013, http://www.wipo.int/sme/en/ip_business/trade_secrets/protection.htm [ 4 ] [ 5 ]. M. D Krishna, confidential Information on Trade secrets, Intellectual Property rights, Dr. C B Raju (edn.) Serials Publication, New Delhi, 2006, 1st Edn. [ 12 ]. Last visited on 8th march , 2013, http://spicyipindia.blogspot.in/2008/10/breaking-news-india-unveils-national.html [ 13 ] [ 16 ]. Last visited on 26th feb, 2013, URL http://www.ladas.com/BULLETINS/1995/1195Bulletin/US_InevitableMisappropTS.html [ 17 ]

You May Also Find These Documents Helpful

  • Good Essays

    MGT 5015 Ch Questions

    • 542 Words
    • 2 Pages

    An entrepreneur can use trade secret law to protect his or her business plans, concepts, and strategies as legal trade secrets by demonstrating to the court that reasonable security measures were adopted and continued in order to maintain the secrecy of their information. The entrepreneur must designate the appropriate information as confidential and proprietary and then protecting it by lock and key and passwords. For example, when sending emails containing confidential information, they can use a system where a password must be…

    • 542 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    2) The advantages of Trade Secrets are that it protects secret processes, formulas, methods, procedures, and lists that provide the owner with economic advantage. The Downfall to Trade Secrets is that once the secret is made public, anyone may have access to it and use it at will and if someone else comes to the trade secret by legitimate means then it can be patented. Patents give the inventor the right to stop others from manufacturing, copying, selling or importing the patented goods without consent from the patent holder. The patent holder has exclusive commercial rights to use the patented invention. Some disadvantages of patents are after the exclusive patent period of 20 years has passed, other individuals or companies can freely use the invention without permission from the inventor.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The Uniform Trade Secrets Act imposes civil penalties such as damages and injunctions on those who improperly find out about and use trade secrets and provides remedies for the aggrieved party. Many companies have binding contracts or workplace policies, which prohibit employees from sharing confidential information. Steve is violating the elements of the Uniform Trade Secret Act by divulging secret information from BUGusa to WIRETIME.…

    • 877 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    clear that information will be kept confidential and dealt with sensitively, unless there is reason to…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ‘Confidentiality’ can be maintained by remaining aware and conscious of the information you share or discuss.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Unit 001 Outcome 1 3 4

    • 265 Words
    • 1 Page

    4.3) Describe situations where information normally considered to be confidential might need to be passed on.…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    | |accessing such information and the information should be kept confidential.. According to the Human | |…

    • 4189 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Confidentiality is the protection of personal information. Confidentiality means keeping a client’s information between you and the client, and not telling others including co-workers, friends, family, etc.…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Maintaining Confidentiality

    • 2947 Words
    • 12 Pages

    Privileged information is a term that refers to all information shared between an attorney and his client. This information is considered confidential and is not admissible in court.…

    • 2947 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    • Confidentiality and data protection are vital when running a home based childcare service. Write an explanation of the importance of both.…

    • 702 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bugusa, Inc.

    • 754 Words
    • 4 Pages

    A patent can be viewed as an agreement between an inventor and the US government. The government grants the inventor a temporary monopoly, exclusive rights to make, use, and sell the invention, in exchange for making the invention public. Patents protect functional features, such as a special kind of disposal used in Kenmore dish washers. The patent law provides that the patentee’s exclusive rights exist until the expiration of…

    • 754 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    SA IBL TB8e Ch17

    • 2611 Words
    • 16 Pages

    Under TRIPS, until a pharmaceutical patent is actually granted, a country has no obligation to protect potential prospective rights (during the pendency of the patent application).…

    • 2611 Words
    • 16 Pages
    Powerful Essays

Related Topics