Free Essay

Protecting Trade Secrets

In:

Submitted By Bizant24
Words 2969
Pages 12
| How to Protect Trade Secrets in the Workplace | Business Law Research Paper | Anthony Arrieta
11-27-2015 |

Trade secrets
First let’s address what a “trade secret” is. It is very hard to get an exact definition of what these are but trade secrets have characteristics which most state statutes or common law recognize. They are: * Secrecy * Security * The value of the Information, and * Ease of Duplication
A customer list is a classic example of information that might be considered a trade secret. The list, by itself, would probably not be a protected trade secret. It could only be protected if the customer list is not “readily ascertainable” from sources outside the particular company. For example, a list of customers revealing their monthly purchases would more likely constitute a trade secret. The mere listing of customer names and addresses which could be obtained from a telephone book, would probably not constitute a protected trade secret.
Protecting trade secrets in the workplace is a very important part of running a successful business. Keeping parts of your business secret will differentiate you from the rest of your competitors and if you are succeeding in the industry it will keep you at the top of the industry. Successful companies stay on the top because they protect their most valuable information. Companies like Coca-Cola have protected their “secret” formula for 125 years (Coca-Cola, 2015). This is not the only reason that they have been the industry leader in soft drinks but it is a huge advantage that they have managed to keep. Now is it completely secret? No but Coca-Cola has managed to keep the formula protected. This trade secret is something that helped keep them ahead of the competitors in their industry for 125 years. This is just one company that has publically shown that they are protecting secrets. It would be reasonable to say that every company in the business world is working to protect secrets in their company. We could also say that every fortune 500 company has hundreds of secrets that they work very hard to keep, these are part of the reasons they are as successful as they are. There are many more ways and steps to protect trade secrets than putting it in a vault like Coca-Cola (Coca-Cola, 2015). This paper is going to address some important steps that every business should follow to protect their own secrets. These steps could mean the different between being successful and innovative and being unsuccessful and dead.
Updating Policies
The first step we are going to discuss is making sure that you update all of your policies. By updating any relevant employee polices you can take another step to preventing employee theft or improper disclosure of company trade secrets. So if you are taking a look at the status of your company policies, which ones should you update? Some key policies to update would include electronic policies, IT acceptable use policies, and other policies that address the use of email, internet, social media, and mobile devices (including “bring your own device” policies) (Fredrikson & Byron, 2015). Also it would be ideal to update confidentiality and trade secret protection policies, and include a policy that addresses removable media, such as flash drives (Fredrikson & Byron, 2015). These policies are the ones that need to be addressed first because they are the easiest way for someone to release your information. So if you keep your policies updated, then you will protect yourself legally.
Here is an example of a case where it shows the importance of keeping your policies updated. In Stengart v. Loving Care Agency, Inc., 990 A.2d 650 (N.J. 2010). During the course of litigation with a former employee, a company hired a forensic vendor to obtain all data stored on a company laptop used by that employee. During her employment, the former employee had used her company to access a personal, password-protected email account through which she exchanged emails with her attorney. The forensic image captured those personal emails and the company and its attorneys wanted to use the emails in the defense of the lawsuit (Fredrikson & Byron, 2015). Unfortunately, the company’s electronic use policy was found lacking. The company’s policy stated that no emails were considered private or personal, and relayed that the company had the right to review, access, and disclose all matters on the company’s system (Fredrikson & Byron, 2015). With that being said, the court found the company’s policy to be too vague to put the employee on notice that a personal email account exchanging attorney-client privileged communications could be accessed and read (as compared to a work email) (Fredrikson & Byron, 2015). Because of this, the emails had to be returned and they could not be used in litigation. Because the company’s policy did not adequately address the company’s right to monitor personal emails accessed on the company’s system, the company lost a key avenue to discover relevant evidence (Fredrikson & Byron, 2015). In a trade secret case, that source of evidence may have been critical, and the outdated and vagueness of the policy language created a bump in the road for the lawsuit.
Agreements
The next key step is to get your agreements right, this will focus on protecting trade secrets through the use of employee confidentiality, nondisclosure, noncompetition and nonsolicitation agreements (Publishing, 2014). These agreements can provide great protection, but they can also be full of tricks and traps if not well-drafted or properly executed (Fredrikson & Byron, 2015). Multi-state employers will be at a higher risk if their agreements are not well drafted because the laws within different states vary. For example, some states such as California and North Dakota prohibit non-compete agreements on almost all circumstances and many other states have unique and idiosyncratic laws limiting or restricting employee confidentiality and non-compete agreements (Fredrikson & Byron, 2015). One thing that you need to keep in mind as it relates to confidentiality agreements, is that if “everything” is confidential, then nothing is. While you should have these agreements, federal agencies, such as the Equal Employment Opportunity Commission (EEOC) and the National Labor Relations Board (NLRB) are attacking overboard confidentiality provisions (Fredrikson & Byron, 2015). They argue that such provisions interfere with employee rights under federal labor and employment laws (Fredrikson & Byron, 2015).
For example, in Muse School CA v. Trudy Perry, a NLRB Administrative Law Judge (ALJ) ruled that the MUSE elementary school’s confidentiality policy violated the National Labor Relations Act (NLRA) because its prohibition against disclosing confidential information included not only MUSE trade secrets and confidential business information, but also information about MUSE employees and “compensation paid to MUSE owners and employees.” (Fredrikson & Byron, 2015). This type of restriction, according to the NLRB, “suppresses” employees’ right under the NRLA to discuss their wages and other terms and conditions of employment, and is unlawful (Fredrikson & Byron, 2015). Additionally, while the school argued that it could not have violated the NLRA because it never actually enforced the confidentiality language, the ALJ disagreed, ruling that even maintaining such language is a violation of the NLRA.
So after hearing one example of a poorly crafted agreement we can say that having well-crafted, enforceable contracts in place with your employees is a critical part of any trade secret protection program. This also means doing all of your homework when it comes to following the laws set in place by the NLRA and NLRB, and not stepping overboard when it comes to the protections that these acts and federal agencies have put in place.
Workplace Culture
The next step would be to establish a workplace culture that treats confidential information like it is actually confidential (Fredrikson & Byron, 2015). This will help prevent inadvertent disclosures, as well as deter intentional ones. This will also play a pivotal role when seeking to support a claim for trade secret misappropriation. If an employer cannot show that it took reasonable steps to maintain the secrecy of its information, it may not be able to establish a claim for misappropriation (Fredrikson & Byron, 2015).
For example, in Alpine Glass v. Adams, 2002 Minn. App. LEXIS 1392 (MINN. Ct. App. 2002), an employer failed to provide employees a written policy prohibiting them from taking home confidential information and the company did not appropriately limit dissemination of confidential, “found that the employer failed to undertake any effort to keep its information confidential. As a result, the employer did not have a protectable interest in information it believed was confidential (Fredrikson & Byron, 2015). The first part of establishing a culture of confidentiality is to “talk the talk.” (Fredrikson & Byron, 2015). This means you need to take the necessary steps in training employees and managers on how to protect confidential information and why it matters by explaining and giving examples of confidential and trade secret information. With this, as an employer you should establish “dos and don’ts” regarding data security, focusing on both intentional and inadvertent disclosures as well as appropriate and inappropriate use. Also employers should warn the employees of the consequences of these disclosures (discipline, termination, and possibly legal action) (Fredrikson & Byron, 2015).
When we talk about the “walk the walk” portion of this step, this means actually treating confidential information like it is confidential. If the employer places its information in a public domain, then they can waive its protectable interests (Fredrikson & Byron, 2015). So each file should be placed in secure locations. Also it is important to only give access to these files to employees who need the access (Publishing, 2014). This means that you should be constantly monitoring which employees have access and why they have the access that they do. This will keep the information more secure because employees who do not need the files won’t have access to the secure information. Also you should always use watermarks with labels like “CONFIDENTIAL” or “TRADE SECRET” this will only help you more when it comes to a legal issue.
Employee Training
Next when we are talking about training employees, this means that employers should provide confidentiality training sessions to employees with access to protected information (Fredrikson & Byron, 2015). This will remind them of their confidentiality obligations and the importance of protecting the company’s protected material. Along with confidentiality training sessions, employers should also give these employees periodic reminders regarding their confidentiality obligations, which the employees are then required to acknowledge in writing (Fredrikson & Byron, 2015). This is just another way to protect yourself when it comes to legal protection for your business. Ultimately, these steps will help an employer demonstrate in court that it has taken active steps to protect confidential information (Fredrikson & Byron, 2015).
Social Media
The next step is to watch out for social media pitfalls (Fredrikson & Byron, 2015). Social media represents a unique new challenge related to the protection of confidential and trade secret information. This biggest thing is that it is a relatively new concept. Particularly as far as the courts are concerned, and the law is still trying to catch up.
For example, in Cellular Accessories for Less v. Trinitas, LLC, the company claimed a former employee’s LinkedIn contacts constituted trade secrets and should be protected as such. In that case, privacy settings were set to keep his contacts secret or not (Fredrikson & Byron, 2015). As a result, it was impossible to determine the very basic concept of whether the information was actually secret (Fredrikson & Byron, 2015). This is a great example of the need to be thoughtful about addressing how your company and your employees are using social media. In this instance, had the corporation prohibited an employee’s ability to upload company contacts to LinkedIn via a policy or an agreement with the employee, it would have had a better opportunity to prove that it took steps to keep those contacts confidential (Fredrikson & Byron, 2015). Another example, is employees venting about work on media sites like Facebook or Twitter. When this happens, they could be inadvertently or intentionally disclosing confidential product information, protected health information, strategic marketing information, or sensitive/non-public financial information (Publishing, 2014). Employers must tread carefully before terminating an employee for their social media posts because there are many “Facebook firing” cases coming out of the National Labor Relations Board.
Red Flag Behaviors
Next you need to identify red flag behaviors (Publishing, 2014). As the employer, it can be very hard to stop a behavior like printing off confidential information and taking it home, or maliciously deleting or altering information. But here are some characteristics that an employer can look out for so that they may be able to prevent these things from happening: * Greed, financial need. * Feelings of anger/revenge against the organization. So you can investigate problems within the workplace that might cause these things. * Divided loyalty-allegiance to another person, company, or country. * Compulsive or destructive behavior, or family problems: drug or alcohol abuse, other addictive behaviors, marital conflicts, or separation from loved ones. * Employees who were laid off, passed over for a promotion, terminated, demoted, or required to follow a performance improvement plan.
(Fredrikson & Byron, 2015)
These are just a few important characteristics that you could be on the lookout when identifying red flag behaviors. Red flag behaviors that are not identified can result in you losing trade secrets or confidential information and could result in unwanted legal battle and money spent on fighting these battles.
Exit Interviews
The last step that we will cover is making the most of exit interviews (Fredrikson & Byron, 2015). Exit interviews are a standard Human Resource procedure and should be taken seriously and documented accordingly. This is a critical opportunity to discuss the return of property and find out an employee’s new employment plans. There are a few procedures an employer can take have a better exit interview.
First go beyond just asking yes or no and “soft questions (Fredrikson & Byron, 2015). Don’t just ask about the experience the employee had with your company. Ask where the employee plans to work next and in what capacity (Fredrikson & Byron, 2015). If the employee is being honest, you will gain a great deal of insight into what potential exposure of your trade secrets there might be (Fredrikson & Byron, 2015). If the employee is vague or will not answer, this could be a red flag for you. You could then involve your IT department and determine if any information has already been taken or been deleted (Fredrikson & Byron, 2015).
Next you need to ask the employee for all passwords for work-related computers, devices, accounts and files and then change all the passwords. Changing all of the passwords that they have access to should be something that is done before you execute the firing. By doing this, you will be avoiding the possibility of them taking or deleting information out of anger of being terminated (Me, 2015).
Next you should setup a return of property review, whereby the employee discloses all company information or devices in their control. Set up a procedure for their return and set a deadline (Fredrikson & Byron, 2015). Collect all keys, access cards, badges, company credit cards, and other property.
Next have the employee disclose what information they have in paper or electronic format on personal devices, at home, or in cloud based storage. At the end of this, have the employee sign an acknowledgement that all company property and information has been returned (Fredrikson & Byron, 2015).
Make sure you have the protocol set in place for when IT should terminate access and change passwords. Preferably this should be done before the employee is terminated.
Next, if the employee is subject to confidentiality and/or non-compete agreements, remind the employee of their ongoing obligations. Similarly, review any separation or severance agreement to emphasize the obligation to preserve confidential information (Fredrikson & Byron, 2015).
Last, immediately following the exit interview, send the departing employee a letter reminding them of continuing obligations to the company to honor any agreements-including the obligation to not use any company information (Fredrikson & Byron, 2015).
Following these basic steps when conducting an exit interview will help you gage what is going on in the mind of the employee, their intentions, and gain back any access, property, or passwords that the employee had. These things will protect your intellectual property and your trade secrets.
Conclusion
In today’s competitive business environment, employees can “make or break” an enterprise when it comes to intellectual property protection (Sheikh, 2015). When have decided that information is a trade secret, companies must build a strong protection system around such information (Sheikh, 2015). In addition, companies should work to establish a strong loyalty among its employees to make the non-disclosure agreements and non-compete agreements have a better chance of being effective and thus safeguarding its trade secrets. Trade secrets are of the utmost importance to a business. The protection of these secrets could determine the life of your company and how successful it becomes. Business should invest mass amounts of thought and time into building the employee loyalty and protecting the information that your business holds most dear.

Bibliography
Coca-Cola. (2015). Retrieved from Worldofcoca-cola: https://www.worldofcoca-cola.com/media-alert/coca-cola-moves-its-secret-formula/
Fredrikson & Byron, P. (2015). Retrieved from FredLaw: http://www.fredlaw.com/_asset/6050or/trade-secret-10-step-guide.pdf
Me. (2015). (A. Arrieta, Interviewer)
Publishing, N. Y. (2014). Retrieved from DrinkerBiddle: http://www.drinkerbiddle.com/resources/publications/1996/12-step-program-to-protect-employers-trade-secrets
Sheikh, T. (2015). Retrieved from WIPO: http://www.wipo.int/sme/en/documents/trade_secrets_employee_loyalty.html

Similar Documents

Free Essay

Trade Secrets

...Protecting Trade Secrets With the expansion of technology over the past several decades, the availability of the internet as well as our reliance on it, and emerging powers such as China and India, trade secrets become more valuable and harder to protect. Whether it’s computer hacking a corporation’s network, a military mainframe, or spying for another country, also called espionage, it takes a wide array security measure to protect information from leaking or being stolen by our advisories. These security measures fall with the realm of IT, background investigations, and facility security. It is obvious, given past espionage events; these procedures are not always effective. Trade secrets, by definition, is considered to be a formula, practice, process, design, instrument, or compilation of information, hardware, technology, or some other means of proprietary information which is not generally known by the public or outside of the entity that protects. A trade secret gives a business the ability to obtain an economic advantage over competitors or customers. In some legal jurisdictions (states), these secrets are referred to as "confidential information", and are generally not referred to as "classified information" in the United States, as “classified information” refers to government secrets protected by a different set of laws and practices. Although, it is very important to note that the government, but more specifically the military and NASA have issues with protecting...

Words: 1088 - Pages: 5

Free Essay

Trade Secrets

...There are numerous ways to protect intellectual property; one such method is through trade secrets. Unlike patents which require the secret to be inventive or non-obvious, things such as customer lists, equations, and compilation of data (which aren't eligible for copyright or patent protection) can be protected through a trade secret. Granted, though, that the company assumes the costs associated with protecting the said secret. Whereas patents expire after 20 years, and all the designs/specifications are consequently available to the public domain, trade secrets can be protected for longer; this depends on the secret holders ability to adequately establish a framework to maintain secrecy and thereby protect the intellectual property. In the cases of Coca-Cola and KFC, the process of keeping trade secrets has benefited them greatly. Granted, though, they also use a symbiotic or symphonic combination of patents, trademarks, and copyrights to protect their overall product; no competitor has been able to completely replicate their products because the processes making the syrup (for Coca-Cola) or the method of mixing the spices (for KFC) has been a closely guarded trade secret. Had these companies patented these processes, they would have received initial protection for 20 years from anyone replicating it, but would have had these processes disclosed to the public after that. Whereas these companies have been in existence for a longer time, a patent for the processes wouldn't...

Words: 618 - Pages: 3

Premium Essay

The Law

...ISSUE: Whether the fact that the customer information was in an employee’s memory allows him to use with impunity the information that was otherwise a trade secret under the statute. RULE: As a general rule, an employee who has not signed an agreement not to compete is free, upon leaving employment, to engage in competitive employment. However, the former employee, even in the absence of an enforceable covenant not to compete, remains under a duty not to use or disclose, to the detriment of the former employer, trade secrets acquired in the course of their employment. ANALYSIS: It is evident that the employees obtained confidential information while working for Nowogroski. It is also evident that these employees used client lists and other information that was obtained at Nowogroski to get business for another agency. Three rules can be looked at to decide whether a customer list is protected as a trade secret: ( 1) whether the list is a compilation of information; ( 2) whether it is valuable because it is unknown to others; and ( 3) whether the owner has made reasonable attempts to keep the information secret. CONCLUSION: Yes, although a former employee may use general knowledge, skills, and experience acquired during the prior employment in competing with a former employer, the employee may not use or disclose trade secrets belonging to the former employer to actively solicit customers from a confidential customer list, whether written or memorized.   Wal- Mart Stores...

Words: 502 - Pages: 3

Premium Essay

Intellectual Property

...fields of human endeavor; scientific discoveries; industrial designs; trademarks; service marks and commercial names and designations; and all other rights resulting from intellectual activity in the industrial, scientific, literary and artistic fields” ("Intellectual Property and Legal Services"). There is a distinct difference between traditional property laws and intellectual property laws. Property laws would give rights to the sole owner of an object such as a car. When the owner is driving the car no one else can drive the car. In regards to intellectual property the law allows other individuals to make use of the idea or invention as long as they have met the requirements, usually in the form of payment for the right. The idea of protecting one’s ideas has deep reaching roots that stretch back to the 17th century. Philosopher John Locke promoted intellectual property law with his idea “that a person should enjoy the fruits of his labor” ("Intellectual Property and Legal Services"). Protection for ideas were spread throughout Europe and when the pilgrims settled the now United States they brought these ideas with them. After the original colonies won their independence from England they enacted their own intellectual property laws. Initially each colony, after enacting the United States Constitution, had their own versions of copyrights and patents. This presented a problem because one patent or copyright would not be...

Words: 2008 - Pages: 9

Free Essay

Justification of Protection of Intellectual Property Vis-a-Vis Trade Secrets

...Justification of Protection of Intellectual Property vis-a-vis Trade Secrets PAPER V Submitted By: SARTHAK KAPILA ROLL NO. 48, P.G.D.,I.P.R. – 2014 Justification of Protection of Intellectual Property vis-a-vis Trade Secrets Intellectual property pertains to any original creation of human intellect such as artistic, literally, technical or scientific creation. Intellectual Property Rights (IPR) refers to the legal rights given by the State to the inventor/creator to protect his invention/creation for a certain period of time. These legal rights confer an exclusive right to the inventor/creator or his assignee to fully utilize his invention/creation for a given period of time. Countries have laws to protect intellectual property for two main reasons. One is to give statutory expression to the moral and economic rights of creators in their creations and the rights of the public in access to those creations. The second is to promote, as a deliberate act of Government policy, creativity and the dissemination and application of its results and to encourage fair trading which would contribute to economic and social development. The term ‘Intellectual Property’, denotes rights over intangible object of the person whose mental effort created it and refers to a loose cluster of legal doctrines that regulate the uses of different sorts of ideas and insignias. The subject matter of intellectual property is very wide and includes literary and artistic works, films, computer...

Words: 8264 - Pages: 34

Premium Essay

Ethics in Technology

...Karen Walker Ac1108748 Ethics in Technology-PY360 Assignment #3 11/20/2013 1. Copyright Software copyright is the relatively recent extension of copyright law to machine-readable software. It is used by proprietary software companies to prevent the unauthorized copying of their software. 1. Trade Secrecy Trade secret law provides probably the best protection for the source code of a computer program. It simply requires that you take reasonable efforts to kept the source code secret, such as having agreements to keep it secret from everybody who has access to the source code. There are no formalities, such as filing with a government agency which is required. 1. Patents A patent is a government-awarded license that grants the inventor of a product or process exclusive rights to its manufacture, use or sale for a specified time period.  As a condition of the patent, the inventor agrees to disclosure. However, although it is possible for others to examine the details of the patent, it is illegal to copy the product or process. 2. The five principle rights for the owner of a copyright are: 1. The right to reproduce the copyrighted work. 2. The right to distribute copies of the work to the public. 3. The right to display copies of the work in public. 4. The right to perform the work in public. 5. The rights to produce new works derived from the copyrighted work. Copyright Violations of a copyright laws is...

Words: 715 - Pages: 3

Premium Essay

Intellectual Property Clause

...Barnes Intellectual Property Clause Intellectual Property, or IP, is a broad term defining the intangible assets of a company. These assets may include special skills or talents, inventions, technologies such as software, relationships with customers or vendors, and brand identity. These examples of IP, and many more, are often among a company’s most valuable resources, and there are specific laws designed to protect them. Trade secrets, patents, trademarks, and copyrights define and control ownership rights to IP, and businesses further protect those rights by drafting IP clauses when they enter into contracts with individuals or other businesses. (Reed, Pagnattaro, Cahoy, Shedd, & Morehead, 2013). The purpose of an IP clause is to identify IP as it pertains to the respective contract, define authorized and/or unauthorized use(s), and incorporate this information into the original contract, which makes it legally binding (Connock, 1994). The following is an example of an IP clause: “Intellectual Property,” or “IP,” refers to the trade secrets, copyrights, trademarks, patents, and patentable ideas relating thereto of Developer, including but not limited to the know-how, inventions, technologies and technical data relating thereto, processes and methods of business operation, reports, manuals, other documentation and all information relating thereto, databases, pre-existing and future relationships with customers and suppliers, software, new product research, and marketing...

Words: 1104 - Pages: 5

Premium Essay

Harvard Case Lego

...worrying about potential steal of knowledge, LEGO could work to strengthen their relationship with their tool suppliers, which could ultimately lead to building trust. Preventing knowledge spillovers is hardly practical. Employees who left a company carried knowledge in their heads with them, so they posed a spillover risk, especially in the emerging market where loyalty to a firm was low and multiple companies set up manufacturing plants within small geographical regions. Even if it were possible, the cost would be really high. In this case, it might involved setting up a secret and highly isolated manufacturing plant where only certain people are allowed to have access and all bound by contract or some kind of agreement to disclose everything. Question 2: How should the LEGO group protect their intellectual property of the molding platform? Focus on the trade-off between patenting, trade secrets and open disclosure. Obtaining a patent...

Words: 661 - Pages: 3

Premium Essay

Non Compete Clauses

...relationship-based selling. As long as these agreements are done according to state law, they can be enforceable in the court of law. Any company that believes it has a competitive lead should consider using non-competes to protect themselves from employees who can walk out the door with their trade secrets. Many businesses today require employees to sign non-compete clauses when hired to protect the company, but it can have many negative effects for the employee as well. Non-Compete Agreements are contracts between an employer and employee. Employees promise not to take what they learn while working for you and use it against you while working for a competitor. A typical non-compete agreement states the employee agrees not to work for rivals, solicit business from current clients, or otherwise compete with you for some period, such as two years, after leaving your company. Key principles that almost all states go by when it comes to non-compete clauses are reasonableness rule, independent consideration, duration, distance, blue pencil rule, and liability for new employers.(lawyers.com) All of this is done so that way the company is protected from anyone trying to steal important trade secrets to share with their new employer. The company that I currently work for has a non-compete clause. It states that I cannot work for another payday loan company one year from the date of termination and I cannot open a similar company in any town in the state that I work. There is even...

Words: 2038 - Pages: 9

Premium Essay

The Relationship Between Principals and Agents in Business

...The Relationship between Principals and Agents in Business BUS311: Business Law I (BNJ1151A) Prof. Samantha Hodapp January 30, 2012 The Relationship between Principals and Agents in Business The relationship between a prinicipal and agent in business can and have been great; benefitting both parties involved while providing the best services or products to the consumer. Many businesses, or prinicipals, use an agent, such as an employee or sales representative, to represent the business when dealing with third-parties, also know as the consumer or client. For the sake of this writing this relationship will be based on the principal (A.O.I.), special agent(s) (sales representatives) and third-parties (clients). A special agent is a person delegated to act only in a particular transaction, under definite instructions, and with specific limits on the scope of his or her authority. (Liuzzo, 2009, pg. 259) An example in this case would be a sales representative who has authority to negotiate the price of a sale to a limit predetermined by the principal. Another example of prinicipal and agent relationships is GNC who argued that the conduct of McCreadies was sufficient to represent they had authority to enter a binding agreement on behalf of O2. McCreadies was hired by O2 to negotiate the terms of the contract and GPN argued that agents are commonly used to negotiate and enter into contracts and that O2 had at no time informed them of any restrictions of McCreadies’ authority...

Words: 2646 - Pages: 11

Premium Essay

General Code of Conduct

...General Code of Conduct The company expects the employees to exercise sound judgement and safeguard the interest of every individual working under the organisation. The comrades are expected to maintain a healthy, cooperative, positive and sound working environment to increase the productivity of the work. These standards apply while working for the company whether inside the premises or at some offset location or any other company event. The company is committed to work ethically and maintain the safety and protection measures for the employees. Every employee is expected to follow the code of conduct and respect others religious and emotional sentiments. In case of any violation of the code, the decision of the chief regional officer shall be binding and the jurisdiction of the area shall be binding. The employees are expected to follow the chain of command as listed down in the company’s circular provided to each employee at the time of joining. Anyone not doing so shall be held liable for wrong doings and will be prosecuted for disregarding the interest of the company. Hierarchies should be followed along with cross-departmental communication for efficient working and synergy should be maintained while doing so. Some other ethics to be followed by the members, employees, directors and anyone associated with the working of the company are: Honest and Ethical Conduct The company expects its employees to be honest and maintain their moral values at all the times working...

Words: 1281 - Pages: 6

Free Essay

Introduction to Business

...demonstrate the differences between the product and competing products to induce purchasing. Example - Products or services that appeal to the general public are often advertised on radio and television because they reach a broad audience. * Institutional advertising - focuses on touting the benefits, ideas, or philosophies of your business, or its entire industry, to enhance or repair its reputation rather than selling a product or service. Since institutional advertising attempts to build a positive image, it's closely related to public relations. In fact, it's a form of advertising that may be used in a public relations campaign. Institutional advertising relating to an entire industry is usually funded and developed by industrial, trade or professional associations rather than individual businesses. Example- a tobacco company can use institutional advertising to produce an antismoking commercial that warns consumers of the dangers of its products. Beer and liquor companies can also run commercials that warn consumers of the dangers of drinking and driving * Cause advertising- institutional messaging that promotes a specific viewpoint on a public issue as a way to influence public opinion and the legislative process Example - Your Company can incorporate cause advertising into its mission and marketing tactics by donating time, rather than money, to a charitable cause or organization. You and your...

Words: 1749 - Pages: 7

Free Essay

Cyberespionage and Intellectual Property Theft

...confidential and sensitive data continues to expand exponentially (Online Trust Alliance, 2014, p. 3). “Breaches and data loss incidents have become a fact of life for organizations of every size and throughout the public and private sectors” (Online Trust Alliance, 2014, p. 4) making no organization immune. Given the growth of data and, therefore, data breaches the threat to the U.S. economy and individual U.S. businesses from trade secret theft is real and growing, therefore; a multi-pronged approach must be implemented by the public and private sectors alike. “Businesses must do their part to harden their cyber defenses, but the “take-home message here is that protecting IP from ‘them’ is an incomplete and inadequate strategy—understanding that ‘we’ are sometimes our own enemy is important to building good policy and practice for defending the crown jewels” (Verizon DBIR Snapshot, 2012, p. 3). However, to avoid continued, significant and irreversible harm to U.S. companies and the overall economy, robust public policy tools—including in particular trade tools—must also be utilized...

Words: 2645 - Pages: 11

Premium Essay

Code of Ethics for a Company

...Ditto Inc. Code of Ethics Tanner Hammontree (Quality of Service, Protecting the Environment, Safe Workplace, Confidential Information, Intellectual Property, The Network, and Use of Ditto’s Equipment and Facilities) Titus Hayden (Integrity, Usefulness, Privacy and Security, Preserving the Community, and Equal Opportunity Employment) Jaren Holt (Drugs and Alcohol, Inventions, Accepting Gifts, Entertainment and Other Business Courtesies, and Use of Ditto Products and Services) Derrick Meyers (Values of the company, Services our company offers, Simply who are you and what do you stand for, Ensure Financial Integrity and Responsibility, Anti-Bribery Laws, Competition Laws, Obey the Law, Signing a Contract, Spending Dittos Money, and Ensure Financial Integrity and Responsibility) English 3606-003 Ms. Adams February 11, 2015 Who Must Follow Our Code? What If I Have a Code-Related Question or Concern? No Retaliation. We at Ditto want to say that “You are the Key to the Future” and expects all of our employees, Stockholders, and Board members to know and comply with the Code of Ethics. If you can not uphold the code of ethics and Failure to do so can result in disciplinary action, including termination of employment and subject to...

Words: 2886 - Pages: 12

Free Essay

Trade Secret

...Trade secret In regards of Schlossberger’s suggestion that the duty to respect trade secrets has limit and is overridden, it seem more emphasizing in whistle blowing aspect. So the question rises that under what conditions is whistle blowing moral justified? In my opinion, it does not matter what one’s obligations or confidentiality agreements, one is never exempt from the general obligations we have to our fellow human beings. One of the most fundamental of these obligations is not to cause harm to others. In particular, obligations of confidentiality and loyalty cannot take precedence over the fundamental duty to act in ways that prevent unnecessary harm to others. Agreements to keep something secret should have no moral standing unless that secret is morally justifiable itself. Such agreements should be morally void if the organization is engaged in illegal or immoral activities. In that case, one’s obligation to the public overrides one’s obligation to maintain secrecy. For example, one cannot have an obligation to keep secret a conspiracy to murder someone, because murder is an immoral act. It is for this reason also that employees have a legal obligation to report an employer who has committed or is about to commit a felony. For the same reason, an employee cannot justify participation in an illegal or immoral activity by arguing that one was merely following orders. Some people have argued that whistle blowing is never justified because employees have absolute obligations...

Words: 3633 - Pages: 15