Here at the Law Office of Vincent Miletti, Esq. and the home of the #UnusuallyMotivated movement, we take pride as a resilient and dependable legal services firm, providing such services in both a traditional and online, web-based environment. With mastered specialization in areas such as Employment and Labor Law, Intellectual Property (IP) (trademark, copyright, patent), Entertainment Law, and e-Commerce (Supply Chain, Distribution, Fulfillment, Standard Legal & Regulatory), we provide a range of legal services including, but not limited to traditional legal representation (litigation, mediation, arbitration, opinion letters, and advisory), non-litigated business legal representation and legal counsel, and unique, online legal services such as smart forms, mobile training, legal marketing, and development.

Still, here at Miletti Law®, we feel obligated to enlighten, educate, and create awareness about how these issues and many others affect our unusually motivated® readers and/or their businesses. Accordingly, to achieve this goal, we have committed ourselves to create authoritative, trustworthy, & distinctive content. Usually, this content is featured as videos posted on our YouTube Channel https://www.youtube.com/channel/UCtvUryqkkMAJLwrLu2BBt6w and blogs that are published on our website WWW.MILETTILAW.COM. With that, the ball is in your court and you have an effortless obligation to subscribe to the channel and sign up for the Newsletter on the website, which encompasses the best way to ensure that you stay in the loop and feel the positive impact of the knowledge bombs that we drop here!

As the authoritative force in Employment Law, it only seemed right to introduce one of the many upcoming series where we remain persistent in introducing a variety of topics, which will look to not only educate but also deliver in a sense that only Miletti Law® can. In this regard, this blog is Part XIV of our series on “Cybersecurity Measures to Protect Employers.” In Part XIII, we provided you with a hands-on guide on “Cybersecurity Precautions upon Employee Termination/Resignation.” Concerning this, we mentioned that as part of the typical termination procedure, it is advisable for employers to implement investigation and preservation protocols for every employee who terminates, whether willingly or unwilling, their employment. We also added that employers should implement cybersecurity measures such as limiting access to the source code, requiring programmers to work in their own locked office, requiring all employees to use RSA security tokens, storing computer servers in a locked room, and using passwords and encryption software. These measures include taking reasonable efforts to keep source codes safe and terminating any employees found to have participated in such misconduct. At this point, we now switch gears and focus on “Employer Must Dos Following a Trade Secret Data Breach, I”in this blog and Part XIV of our series.

Employer Must Dos Following a Trade Secret Data Breach, I

Employers usually face a number of issues that require their attention following a data breach involving trade secrets. Three of these issues include the need to (1) assess any loss of value to the business, (2) identify who caused or was involved with the breach, and (3) identify the lost, stolen, and/or misappropriated trade secrets. As usual and for the purposes of clarity, each issue shall be discussed in an individual blog.

Assessing any Loss of Value to the Business

One of the most negative outcomes of a trade secret data breach is the loss of value to the business. As such, the need for employers to protect their trade secrets and their ability to implement and adopt effective cybersecurity measures may be triggered by the difference between going out of business and expanding the same business. In addition to the risk of the business being shuttered altogether, some of the most significant repercussions of trade secret misappropriation include, but are not limited to, harm to business reputation and customer goodwill and loss of the value of the business.

  • Loss of business, customer goodwill, and reputational harm – in addition to the public, business partners, investors, and customers losing faith in their ability to protect information, particularly that which relates to people (such as customer lists), employers may suffer reputational harm, loose customer goodwill, and may even lose the business if they are unable to protect their trade secrets. To ensure such reputational harms and business losses do not happen, employers should, upon learning about possible misappropriation of their trade secrets, seek immediate injunctive relief. We invite you to read our blog titled “Tips for Seeking Injunctive Reliefs/Injunctions (Preliminary Injunctions)” and “Tips for Seeking Injunctive Reliefs/Injunctions (Temporary Restraining Orders (TROs)),” published under the series “Trade Secret Misappropriation & Restrictive Covenant Claims,” and accessible at https://milettilaw.com/blog/f/tips-for-seeking-injunctive-relief-preliminary-injunctions and https://milettilaw.com/blog/f/tips-for-seeking-injunctive-relief-temporary-restraining-orders, respectively, for more information on how to seek injunctive relief, which includes (Temporary Restraining Orders (TROs) and/or Preliminary Injunctions).
  • Loss of business value – getting economic & competitive advantage over competitors in return, employers have to ensure that they have kept their trade secrets valuable by maintaining their secrecy. Usually, such economic & competitive advantage is at risk of being jeopardized after trade secrets are misappropriated. Underscoring why employers need to take all reasonable efforts to protect their trade secrets and other confidential information, employers may not enjoy any economic value forthcoming with any compromised trade secrets, which leads to the loss of business value.

In Part XV, we shall move the discussion forward by hammering on “identifying who caused or was involved with the breach” in our blog titled “Employer Must Dos Following a Trade Secret Data Breach, II.”

Until then, stay tuned for more legal guidance, training, and education. In the interim, if there are any questions or comments, please let us know at the Contact Us page!

Always rising above the bar,

Isaac T.,

Legal Writer & Author.