Theft of Trade Secrets by Cyberattack: Mitigating the Damage

Cyberattacks are an unfortunate reality of today's business environment. Theft by hacking of confidential consumer information and the legal fallout has been well-reported some of the higher-profile victims include Target, Home Depot and the notorious Ashley Madison website. In addition to consumer information, a company's trade secrets invariably get caught up in the cyberbandits' web. As a result, businesses should be just as concerned about the compromise of these important business assets by way of cyberattacks.

The key to effectively addressing computer-based theft of confidential trade secrets actually begins prior to the hacking. Almost all businesses have trade secrets, which include things like customer lists and information, formulas and unique business processes. To obtain the legal protections afforded to trade secrets by federal and state law, however, a company must be able to show that the information is in fact confidential and that the business has taken reasonable measures to maintain that secrecy.

The first step to protecting trade secrets is to identify exactly what your trade secrets are. Too many companies take the approach that their trade secrets consist of "everything" or "the way we do business," without being able to articulate exactly what is unique or proprietary about the information. Companies should conduct a trade secret audit every year seeking input from key management and IT personnel, as well as legal counsel. Once the trade secrets are identified, they should be logged, and the list should be reviewed and updated every year. Only when something is quantified can adequate steps be taken to protect it.

Having identified its trade secrets, a business must make reasonable efforts to protect the secrecy of the information. Such steps will ideally include nondisclosure agreements executed by all employees, physical and virtual barriers to access to the materials, adherence to current best practices (usually with input from an IT consultant) for guarding computer systems from attack and the development of incident response procedures to be implemented in the event of an attack. While it is impossible to completely prevent theft of trade secrets from an outside hacker, taking reasonable steps for prevention of theft is required for obtaining legal remedies after an incident.

Despite best efforts at prevention, a breach of computer systems by an anonymous hacker can happen, and theft of trade secrets may occur as a result. To mitigate damage and try to preserve the protected status of the trade secrets, businesses must act fast. Hopefully, an incident response team will already exist, and that team can go to work to identify and remediate the source of the breach and further identify what trade secrets have been affected.