Skip to content

January 11, 2010


Identifying Trade Secrets & The Special Case of Customer Lists

by agutterman

Trade secret protection has been made available to a wide array of items and proper design of a trade secret protection program begins with identifying trade secrets that are kept and used within the company.  Once the universe of trade secrets has been defined the company can determine the most appropriate types of security procedures.  This post includes a report that describes the process of identifying trade secrets in general as well as particular issues that may arise with a particularly important and sensitive item–customer lists!

4 Comments Post a comment
  1. Nov 12 2013

    Great delivery. Outstanding arguments. Keep up the great spirit.


  2. Very rappidly this site will be famous amid alll blog people, due to it’s pleasant articles or reviews


  3. Nov 12 2013

    I知 not that much of a online reader too be hones but your sites really nice, keep it up! I’ll go ahead and bookmark your site to come back in the future. Cheers


  4. Nov 13 2013

    Hello there! Do you know if they make any plugins to safeguard against hackers? I’m kinda paranoid about losing everything I’ve worked hard on. Anyy suggestions?



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Note: HTML is allowed. Your email address will never be published.

Subscribe to comments

%d bloggers like this: