Part 3 of a Series on the Three Most Frequently Asked Questions Following the FTC’s Final Noncompete Rule

This is the final installment of our three-part series discussing employers’ most frequently asked questions in response to the Federal Trade Commission’s (FTC) Final Noncompete Rule (the “Noncompete Rule”).

As reported in Part 2, there are continued attempts at both the federal and state level to ban or restrict the use of noncompetes.  As a result of this ongoing attack on noncompetes, employers have asked a third – and most important – question: “In light of the Noncompete Rule and push by many states to restrict the use of noncompetes, what should we be doing now to best protect our business interests?”

The answer to this often-asked question is to ensure that the company’s trade secret and confidential information is protected to the fullest extent possible through the use of a Trade Secret Assessment, or as we have referred to it: a “Trade Secret Tune-Up."

One of the primary reasons employers enter into noncompetes with their employees is to protect their intellectual property, trade secrets, and confidential information so that it does not get into the hands of a competitor or other third party.  The uncertainty surrounding noncompetes has highlighted – now more than ever – the importance for employers to take steps (beyond noncompetes) to protect their confidential information and trade secrets. 

So, What Is a Trade Secret Tune-Up?

It is a holistic approach aimed at identifying the company’s most valuable assets followed by assessing and improving upon the methods employed to protect those assets.  The ultimate goal is to ensure that the company’s crown jewels are best protected, and in the event of a misappropriation of that valuable information, the company is well-positioned to detect that misappropriation and swiftly respond to it through legal action.  A Trade Secret Tune-Up involves a four-step approach.

The first step is to evaluate the company’s trade secrets and other confidential information, as well as the documentation aimed at protecting those valuable assets.  This includes: (i) cataloguing the company’s trade secrets; (ii) reviewing and bolstering confidentiality agreements with employees and non-disclosure agreements with vendors; and (iii) updating policies and procedures aimed at protecting the information. 

The second step is the discussion of the implementation of the procedures with key stakeholders, including Human Resources, Information Technology/Information Security, the Legal team, and the appropriate business leaders.

The third step is to examine the company’s detection and response.  This includes evaluating the company’s security measures, training, and exit interviews, as well as other processes that would best enable the company to swiftly respond in the event it discovers a misappropriation of its confidential information.

The final step is to discuss methods aimed at improving the company’s blind spots so that they are in the best position to protect their confidential information.  In the event of a theft of confidential information the company will be well-positioned to swiftly respond to take appropriate action.

Epstein Becker Green is well experienced in leading its clients through a Trade Secret Tune-Up.  You should feel free to reach out to Dan Levy to discuss conducting a Trade Secret Tune-Up to protect your organization’s trade secrets.   

Gianna Dano, a Summer Associate in Epstein Becker Green’s Newark office (not admitted to practice) contributed to the preparation of this piece.

Read the Rest of the Series

Part 1: Three-Part Series: Three Most Asked Questions Following the FTC’s Final Noncompete Rule

Part 2: Should Employers Continue to Enter into Noncompetes with New Hires or Other Employees?

Back to Trade Secrets & Employee Mobility Blog

Search This Blog

Blog Editors

Authors

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Trade Secrets & Employee Mobility posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.