Feature

Intellectual property protection do's and don'ts

Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Nine tips to guarding your intellectual property."

Download it now to read this article plus other related content.

Checklist

    Requires Free Membership to View

Here are some Tips that can help protect your company's trade secrets.
  1. Identify a champion within the C-suite who can provide the credibility and support you will need in implementing an enterprise-wide program.


  2. Create an inventory of your company's trade secrets and the form they take (paper-based, electronic, undocumented employee knowledge).


  3. Prioritize the trade secrets according to their value to your organization based on the risk of loss, compromise or theft. To keep things simple, consider using a high/medium/low scale in terms of likelihood and impact.


  4. Analyze how your company's trade secrets map to organizational business processes throughout their entire lifecycle.


  5. Perform a risk assessment against the mapped trade secrets to determine which ones are exposed to vulnerabilities that have a high likelihood of happening, and the impact their exposure would have on your organization.


  6. Based on the risk assessment, establish a clearly documented enterprise-wide data protection framework supported by specific actions laid out in processes and procedures; roles and responsibilities; and monitoring and enforcement activities employees can easily follow.


  7. Perform a "gap analysis" to determine how well your existing practices protect your trade secrets versus the data protection framework.


  8. Address gaps using a combination of security and data protection policies and procedures, process-level controls, technology controls, physical controls and education/ awareness.


  9. Establish metrics to continuously assess the effectiveness of your protection program.

The Crown Jewels
Intellectual property (IP) is ex-tremely important to the U.S. economy. As of 2003, IP accounted for approximately 33 percent of the value of U.S. corporations, or more than $5 trillion, according to Stephen Siwek, principal at Econo- mists Incorporated, a consulting firm based in Washington, D.C. Yet many companies are ill prepared to adequately protect their IP in the face of increased attempts to steal it.

At least part of the problem is due to economic pressure on U.S. firms to control costs, says Abe Michael Smith, CSO at Xilinx, a digital programmable logic device maker based in San Jose, Calif. As more enterprises outsource part or even all of their research and development and product development activities to overseas partners, there is far greater risk that important information can slip through the cracks. And establishing overseas divisions that play a significant role in developing IP can be risky when strong IP laws do not exist within those countries. "Balancing the need for improving profit margins with the kind of security required to adequately protect IP can be very difficult," says Smith.

Moreover, the unique characteristics of trade secrets make companies particularly vulnerable to their loss.

"Once a trade secret is out of the bag you can't get it back in," says Sabett. "If you are talking about something like source code, that represents the crown jewels of the company. And when its status as a trade secret is gone, it's gone."

Worse, it can take years until a trade secret theft is detected, says Smith: "You wouldn't even know it [your IP] was missing for five years, when a competitor would suddenly introduce a product that sold for one-third to one-fifth of the price of yours."

And it is important to note that trade secrets are vulnerable not just to malicious theft but also to accidental leakage in the normal course of business. For example, an engineer who has not been properly trained in what constitutes trade secrets might make a seemingly innocuous conference presentation that includes them.

This was first published in May 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: