Trade Secret Management and Protection Practices

Managing trade secrets and proprietary information and preventing its misappropriation is vital to corporate survival. Managing and safeguarding these important assets requires enterprise-wide diligence. As this study notes, the risk of loss comes from several entities, both from outside the organization and from trusted insiders.

Our Trade Secret and Proprietary Information Management Study takes a comprehensive, global look at best practices for managing trade secrets and proprietary information. To ensure this study investigated the most pertinent topics, we organized an advisory group of IP leaders representing diverse industries.

  • How are companies capturing and managing trade secrets?
  • Who is responsible for evaluating and managing trade secrets?
  • What type of training achieves competency in handling trade secrets and proprietary information for corporate personnel and stakeholders?
  • How are companies controlling trade secrets and proprietary information conveyance (leakage), loss, and misappropriation?

This multi-volume report includes a thorough executive summary with key highlights and recommendations. The full report provides more than 75 descriptive charts and more than 150 pages of detailed statistics.

Additional trade secret management practices analysis conducted are:

Companies With Risk Assessment Procedures vs. Without Risk Assessment Procedures
This analysis evaluates respondents who have risk assessment procedures or protocols relating to the protection of trade secrets or the risk of loss of trade secrets and those who do not.

Companies With Formal Procedures in Place vs. No Formal Procedures in Place
This analysis evaluates respondents who have formal processes in place for identifying and classifying trade secrets and those who do not. Sixty-one percent of respondents indicated that they have procedures or protocols.

Companies With An Incidence vs. No Incidence
This analysis evaluates respondents who experienced a loss or misappropriation incident due to trusted insiders, foreign economic espionage, or domestic economic espionage.

Learn how we provide intellectual property best practices that you can use to improve your operation.

Contact Us