Académique Documents
Professionnel Documents
Culture Documents
Residential Training
Program
Professor & Lawyer Puttu. Guru
Prasad
M.B.A., M.Com., M.Phil., PGDFTM., APSET., PhD at
JNTUK
Trade secretes
Professor & Lawyer Puttu. Guru
Prasad
M.B.A., M.Com., M.Phil., PGDFTM., APSET., PhD at
JNTUK
Financial
information
Technical &
scientific
information
Commercial
information
Negative
information
Secrecy
Secret Recipes
Kentucky fried chicken
The secret recipe of 11 herbs and spices lies in a bank
vault. Few people know it, and they are contractually
obligated to secrecy.
The ingredients are mixed by two different companies in
two different locations and then combined elsewhere in a
third, separate location.
To mix the final formula, a computer processing system is
used to blend the mixtures together and ensure that no
one outside KFC has the complete recipe
Initially
Later stage
Not patentable
patentable
Secret !
TS
TS
Strategic
business
decision
patent
ID
Part of the idea
TS
T r a d e S e c r e ts
P a te n ts
n o r e g is t r a t io n
r e g is t r a t io n
- le s s c o s t s ( b u t : c o s t s t o k e e p s e c r e t)
- im m e d ia t e ly a v a ila b le
- f e e s ( r e g is t r a t io n + m a in t e n a n c e )
- t a k e s t im e t o g e t p a t e n t
c a n la s t lo n g e r
lim it e d in t im e
- b u t : lim it e d t o e c o n o m ic life
- u n c e r t a in lif e s p a n : le a k o u t is ir re m e d ia b le
- g e n e r a lly : m a x 2 0 y
- b u t : c a n b e in v a lid e d
n o p u b lic d is c lo s u r e
p u b lic d is c lo s u r e
- b u t: p r a c t ic a l n e e d t o d is c lo s e
- if le a k o u t : T S lo s t
Remedies to Misappropriation
1
Court
2. Monetary damages
Actual damages caused as a result of the
misuse (lost profits)
Amount
by
which
defendant
unjustly
benefited from the misappropriation (unjust
enrichment)
3. Seizure order
A Growing Problem.
Why Does It Occur?
80% of trade secret loss
A Growing Problem.
Why Does It Occur?
The Way we do business today
(increased use of contractors, temporary
workers, out-sourcing)
Declining employee loyalty: more job
changes
Organized crime : discovered the
money to be made in stealing high tech
IP
Storage facilities (DVD, external
memories, keys)
Independent invention
Reverse engineering:-
What is lawful?
TS protection
provides
no exclusivity !
What is lawful?
2.
Reverse engineering
Common practice among software
companies: studying competitors'
products
to make software that can
interoperate with the software being
studied
to make a product that will compete
with it
E.g. decompile object code to reveal its
structure and figure out the interface
specifications for interoperability
33
Cell :
Mail:
puttuvvit@gamil.com.
Reference :
BS Publication ;
Fundamentals of Intellectual
Property for Engineers.
Cengage Learning: Intellectual Property by
Deborah.