No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Compliance

Trust but Verify: The Power of Audits to Protect Your Competitive Edge

Regardless of outcome of challenges, companies should audit their protection plans around trade secrets

by Jennifer L. Anderson, Adam S. Baldridge and Nicole Berkowitz Riccio
August 21, 2024
in Compliance, Featured
documents protected with lock

Companies using noncompete agreements to safeguard their competitive edge are rightly concerned as the FTC’s noncompete ban remains in limbo after a Texas judge ruled the agency lacked authority to ban such agreements. A group from law firm Baker Donelson suggest incorporating regular audits as part of your plan for securing protected information.

Corporate leaders concerned about protecting the recipe for their company’s success have been following the fitful path of the FTC’s rule banning noncompetes. A judge in Texas just this week blocked the rule, which was set to take effect in early September. (An agency spokeswoman said the FTC is considering an appeal.) A previous ruling in Pennsylvania had left the regulation in place, which could set up a review by higher courts.

Regardless of the ultimate outcome, noncompetes are not the only or even the most effective way to prevent losing customers and revenue. Companies across all industries, including energy, financial services, healthcare, manufacturing, technology, telecommunications, retail and hospitality, must above all be proactive in identifying and guarding the non-public ideas, strategies, plans, customer lists, documents, data and other valuable information that uniquely makes them tick. 

This information may qualify for protection as a trade secret — a specific type of confidential information protected by federal and state trade secret laws ­— or may be protected under various types of contracts, such as confidentiality, nondisclosure and employment agreements; corporate policies and employee handbooks; and other laws that create obligations arising from employment relationships.

Regardless of the legal theory, the business must be able to prove that it took reasonable steps to keep its information confidential and reasonably and properly protected its trade secrets. Proving reasonable steps requires both a plan and verification that the plan is operating effectively.

The primary way to verify that a protection plan is working is by conducting routine audits, which also help create a culture of confidentiality, security and compliance. Auditing should involve a group or team ­­— avoid siloed employees who can act without checks or balances — responsible for reviewing that protocols have been implemented, are being followed and are shored up against potential weaknesses and breaches. 

supreme court chevron ruling-01
Compliance

Regulatory Compliance in a Post-Chevron World: Fasten Your Seatbelts

by Jennifer L. Gaskin
July 16, 2024

The cracks are already showing. A U.S. District Court in Texas, less than a week after the Supreme Court issued its Loper Bright decision, cited the ruling in partially striking down the FTC’s controversial ban on noncompete agreements in employment.

Read moreDetails

Companies should create an audit checklist identifying the auditors, items reviewed and actions taken, as well as the dates and other details for each audit conducted, which for all items should occur at least annually. Consider including the activities below in your checklist.

  1. Review personnel files to verify they contain current and executed policy acknowledgments, training certificates or confirmations, employment contracts, confidentiality and nondisclosure agreements
  2. Review contractor and vendor files or records to verify they contain current and executed confidentiality and nondisclosure agreements
  3. Update and provide training on confidentiality and security policies to all employees at least annually
  4. Train human resources, risk management and other appropriate personnel on prompt and thorough investigation and handling of suspected unauthorized disclosure, misappropriation and misuse of protected information
  5. Evaluate the investigation and handling of any incidents to identify the root cause of any issues and actions needed to prevent or minimize the opportunity for recurrence
  6. Monitor password protocol compliance, including employee practices for storing passwords (such as the use of password management software as opposed to sticky notes or personal mobile phones)
  7. Work with counsel to update all personnel policies and workplace rules relating to technology usage and protecting confidential information
  8. Verify that limitations on the access to protected information are being observed, that only those individuals who need access have it and that effective technology is in place to lawfully monitor and record who accesses and uses confidential information and trade secrets
  9. Verify that confidential information and trade secret information is marked confidential, proprietary or trade secret, as applicable, and handled properly and carefully, i.e., not being displayed on computers without screen savers in view of those who do not need access and not being left uncovered on desks when an office is unattended and unsecured
  10. Verify that employee departure and onboarding protocols are developed, documented and followed

Trust without verification is merely a hope or a wish, as one company recently learned when its request for a preliminary injunction in a trade secrets case was denied. In Freedom Capital Group LLC v. Blue Metric Group Freedom Capital requested an injunction under federal and state trade secret laws to prevent misappropriation by its former outside counsel and an independent contractor. Freedom Capital asserted that it took reasonable steps to keep its trade secrets and confidential information, including secure access credentials and training representatives on confidentiality rules. The court found, however, that Freedom Capital gave independent contractors access to purportedly sensitive information without any confidentiality or nondisclosure agreements. The court also rejected Freedom’s assertion that it trained its representatives on confidentiality obligations because it failed to produce any evidence of relevant training materials or communications.

This case illustrates the need to have a plan for securing your protected information and regularly auditing the efficacy of that plan. Verifying that the protection plan is working will place your company in a strong position to prevent and, if necessary, successfully pursue legal relief in the event of disclosure, misappropriation and misuse of your confidential information and trade secrets.


Tags: Employment LawFederal Trade Commission (FTC)
Previous Post

Seeking to Incentivize Voluntary Disclosure, DOJ Rolls Out New Whistleblower Pilot Program

Next Post

News Roundup: Private-Company CCOs See Earnings Drop

Jennifer L. Anderson, Adam S. Baldridge and Nicole Berkowitz Riccio

Jennifer L. Anderson, Adam S. Baldridge and Nicole Berkowitz Riccio

Jennifer L. Anderson is a shareholder in the Houston and Baton Rouge offices of Baker Donelson. She is an employment litigator focusing on wage and hour compliance and litigation, having represented employers in more than 200 Fair Labor Standards Act cases, including more than 60 class and/or collective actions.
Adam S. Baldridge is chair of Baker Donelson's intellectual property group, concentrates his practice in intellectual property and technology litigation, with extensive experience in copyright, trade secret, trademark, trade dress, patent, unfair competition and right-of-publicity cases.
A shareholder in Baker Donelson's Memphis and Fort Lauderdale offices, Nicole Berkowitz Riccio focuses her practice in the areas of patent, trademark, copyright, trade secret, and unfair competition litigation.

Related Posts

federal trade commission building

[Q&A] Big Tech & Free Speech Under the Microscope: FTC’s New Direction

by FTI Consulting
April 28, 2025

What compliance teams need to know about the changing approach to consumer protection and data privacy

data governance concept

The US Still Lacks Its Own GDPR, But That Doesn’t Mean Data Privacy Enforcement Isn’t Happening

by Brian McGinnis and Maddie San Jose
April 16, 2025

Despite the absence of comprehensive federal privacy legislation, American businesses face mounting regulatory pressure from multiple directions. Brian McGinnis and...

trump rally maga hat

Trump: White House Must OK New Rules From Independent Agencies

by Staff and Wire Reports
February 19, 2025

Executive order seeks to further expand presidential control over regulatory bodies

uncle sam playing chess with robot political cartoon

New White House, New AI Rules: Corporate America’s Next Move

by Alla Digilova, Eugene Goryunov and Alok Choksi
February 5, 2025

Biden-era AI guidelines may be gone, but the SEC and FTC have made it clear they're watching (for now) how...

Next Post
news roundup bw

News Roundup: Private-Company CCOs See Earnings Drop

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights