No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home HR Compliance

How to Protect Precious IP From Layoff-Related Insider Theft

Don’t let trade secrets escape along with departing employees

by Walter Pfeffer and Harman Deol
June 7, 2023
in HR Compliance, Risk
layoffs

2023 has seen dozens of companies issue layoffs, and some predictions call for even more through the end of the year. Aside from a potential loss of institutional memory, companies undergoing a reduction in force also open themselves up to another threat: trade secret theft. Walter Pfeffer and Harman Deol of Littler offer their tips for keeping intellectual property safe before, during and after layoffs.

With 61% of business leaders reporting that their companies will likely see layoffs in 2023, the reductions in force we’ve seen this spring may be only the tip of the iceberg. Given that the vast majority of trade secret theft is committed by those within the business — 85% according to one study, supported by the fact that 70% of trade secret cases also include a claim for breach of contract — few will be surprised to see a sharp rise in trade secret misappropriation accompanying these reductions in force. While protecting key confidential and trade secret information is always a balancing act between best practices and the realities of a functioning business, here are some steps that may help companies avoid harm when employees depart.

Restrict access during employment

Employees cannot take trade secret information if they do not have access to it. Of course, no business can simply lock away its trade secrets and still function. In order for those trade secrets to offer value, some employees must be able to access and use them. Nonetheless, employers can reduce their risk by implementing IT protocols that permit access to key documents by only those employees who need it.

trade secrets
Risk

Inside Job: How Businesses Can Protect Valuable Trade Secrets

by María Amelia Calaf
October 5, 2022

A relatively new law (the Defend Trade Secrets Act) aims to give businesses a legal framework to fight against theft of trade secrets by insiders.

Read moreDetails

Monitor for misappropriation

IT departments can often set up systems capable of monitoring for warning signs of misappropriation and logging activity for future review. Examples of a warning sign might include downloading numerous files at the same time, accessing company file repositories at unusual hours, connecting to non-work email and cloud storage sites, plugging in non-work external storage devices and running anti-forensic software designed to cover the user’s electronic trail. As always, these protocols will need to be balanced against the need to stay flexible and permit employees to access data necessary for their jobs, but such monitoring can be a useful tool in identifying potential misappropriation before documents go out the door and for determining what happened and minimizing damage when they do.

Educate employees

Many employees end up retaining trade secret information out of ignorance rather than malice — they simply do not realize that they are not permitted to keep the documents they worked on. It may not be possible to educate employees in the middle of a reduction in force, but measures like yearly training sessions, consistently instituting disciplinary action for failure to maintain confidentiality and including discussions of confidential information requirements in exit interviews can reduce the threat of unknowing misappropriation.

Update contracts regularly

Laws and regulations involving trade secrets and unfair competition are constantly changing, as shown by the FTC’s new rulemaking efforts and the National Labor Relation Board’s recent McLaren decision. While forceful, one-sided provisions may seem powerful, the adroit compliance professional recognizes that an unenforceable contract is often worse than no contract at all because it can open the company to additional liability. To ensure that contracts offer as much protection as possible without running afoul of changes in the law, employers should review their employment contracts regularly.

Remove access on termination

Where feasible, reductions in force should be planned so that terminated employees’ access to company documents, including locally saved materials and cloud systems, is cut off immediately upon the announcement of their termination. Companies with sophisticated IT capabilities can institute regular remote backups of employee computers so that the computers of affected employees can be remotely locked at the time of termination without losing any data (including potential evidence of pre-termination misappropriation).

Conduct exit interviews

Exit interviews can be a source of intelligence for addressing misappropriation risk, as they may permit employers to determine which employees’ pre-termination activities may warrant additional review, which employees may be heading to competitors and which employees or business units may not have observed the company’s information protection policies previously. Interviews can also provide an employer with a final chance to educate employees with regard to their continuing obligations to the company.

Consider severance agreements

While severance agreements are not appropriate for all situations, they can be a useful tool for incentivizing employee cooperation after termination. In the trade secret context, a severance agreement can require the exiting employee to search physical and electronic file repositories for any company documents, return those to the company and permanently destroy any copies. A severance agreement can also provide a final opportunity to update the employee’s duties with regard to confidential information and unfair competition, especially if the company’s employment documents have not been recently refreshed.

Preserve evidence

When employees leave, businesses may feel pressure to repurpose their devices and eliminate their accounts — the purpose of layoffs is to reduce overhead, after all. But a small investment in preserving these repositories for a period of time can often be the difference between suspecting trade secret misappropriation and being able to prove it. Not all businesses will be able to do so. It is worth taking the time to determine whether there are cost-effective ways to temporarily preserve the information repositories of ex-employees, which could run the gamut from creating forensic images of the devices to simply storing laptops in a locked cabinet.


Tags: Business Continuity Planning
Previous Post

Building a Better Office: How Employers Can Support Gender Diversity

Next Post

Hard Pill to Swallow: Sorting Out Conflicting Guidance for Pharma Speaker Programs

Walter Pfeffer and Harman Deol

Walter Pfeffer and Harman Deol

Walter C. Pfeffer is a shareholder at Littler in San Francisco. He has extensive experience litigating and advising on matters involving trade secrets, trademarks and business disputes. His work involves managing all aspects of litigation, including pleadings, motions, discovery disputes, fact and expert depositions, and hearings. In addition to handling active litigation, Walt provides pre-litigation counseling, handles alternative dispute resolutions, negotiates settlement agreements and assists in strategy development and implementation. He has represented clients in a wide range of industries, including banking, retail, construction, food, electronics, and technology. With a particular skillset in discovery and eDiscovery, he has achieved multiple pre-discovery dismissals and managed several large eDiscovery teams.
Harman Deol is an associate at Littler who focuses on labor and employment law matters. Previously, Harman was a summer associate at Littler and served as a research intern at a full service law firm in Sacramento and as a research assistant for Professor Menesh Patel. While in law school, he was president of the Middle Eastern, North African and South Asian Law Students Association and judge recruitment chair for the Trial Practice Honors Board. Harman was also a below line editor for the UC Davis Business Law Journal and a member of the King Hall Labor and Employment Law Association.

Related Posts

crowdstrike

Risk Lessons From CrowdStrike’s Blunder

by Staff and Wire Reports
July 24, 2024

Organizations continue to grapple with faulty update fallout

Mayer Brown Business Transformation

Seven Dimensions of Successful Business Transformation

by Corporate Compliance Insights
July 10, 2024

Business leaders increasingly thinking about how to keep pace with AI Survey Seven Dimensions of Successful Business Transformation What’s in...

A Silicon Valley Bank sign

Business Continuity Lessons From Our Year of Banking Failures

by Jim Wetekamp
August 14, 2023

In the nearly six months since the failure of Silicon Valley Bank (SVB), three others have gone belly-up, the most...

natural disaster flood

Business Continuity & Disaster Planning 101

by Chris Axton
August 1, 2023

Disaster doesn’t come in one shape. From pandemics to extreme weather to cyber attacks, effective business continuity and disaster planning...

Next Post
pharma

Hard Pill to Swallow: Sorting Out Conflicting Guidance for Pharma Speaker Programs

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights