Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

Cybersecurity: Vital to Legal and Technical Protection of Trade Secrets

By Pamela Passman
secrets
February 14, 2017

Hardly a week goes by without a new hack or cyber breach being reported in the news, and companies are spending lot of time and attention in improving their IT security.  But as companies set out to “raise their game” in protecting their confidential information from cyberattacks, it is important to understand and act on the fact that cybersecurity is not just a technology issue.

Cybersecurity initiatives increasingly have legal as well as practical consequences – including for protecting the value and competitiveness of such items as “trade secrets” – and the trend, in line with such voluntary initiatives such as the NIST Cybersecurity Framework, is to look more holistically at relevant management processes and people issues throughout a company, not just its IT protections, to assess and address the adequacy of cybersecurity.

Cybersecurity is coming under the scrutiny of a variety of laws and regulations. These range from direct regulation of data security in the financial and health care sectors, to more general securities, shareholder derivative and “unfair competition” laws used to sue companies for inadequate cybersecurity when vital data gets hacked. (A 2016 whitepaper from CREATe.org summarizes this “rising tide” of legal scrutiny of cybersecurity.)

For trade secrets in particular – a company’s confidential business and technical information that adds value and enhances competitiveness precisely because it is kept secret – good cybersecurity provides an important legal as well as a practical benefit.  

Trade secrets are defined in U.S. and many countries’ laws as valuable confidential information as to which “reasonable steps” or “reasonable efforts” have been taken to keep it secret. This definition is important because if a court determines that a company has not made such “reasonable efforts,” the court will not treat information as a trade secret and won’t give it any legal protection even if it is stolen or otherwise misappropriated.

Cyber hacking and theft of trade secrets is very much on the rise – up 56 percent year-on-year according to IBM’s 2016 Cybersecurity Landscape survey. Trade secrets cases involving cybersecurity issues thus are also on the rise, and courts have started to look at companies’ cybersecurity efforts to determine whether “reasonable efforts” have been taken.

For example, courts in trade secrets cases have already looked at such things such as a company’s identity and access management (such as password protection, “need to know” access, and secure server storage), data security measures (such as USB stick use restrictions and distribution controls), perimeter and network defences (including firewalls, data encryption, and online use restrictions), and activity monitoring, as evidence of the required “reasonable efforts” to protect trade secrets.  As a company is implementing and improving its overall cybersecurity, therefore, it is of vital importance to understand and adequately address the cyber risks posed to its trade secrets in particular.

Cybersecurity is also evolving both as a technical and a legal matter in the trend to take a holistic risk-management approach to protecting a company’s confidential information. This involves dealing not just with technical protections, but also the people and process issues that need to be well managed in every area that deals in any way with trade secrets and other confidential information at a company.

This trend is perhaps best illustrated by the growing take-up in the U.S. of the NIST Cybersecurity Framework, a set of guidelines that recent Dell/Tenable surveys found is being used by 82 percent of U.S. government IT and security professionals to improve cybersecurity, and is viewed by 70 percent of private-sector professionals as a leading practice.

The NIST Framework is focused on risk-assessment and not merely technology based. It does not just recommend that particular technical protections be implemented. Instead, it calls for a company’s overall priorities, cybersecurity risks and responses to be identified and prioritized, and for specific cataloguing, implementation and ongoing monitoring and review to be carried out in a whole range of areas. 

The growing trend to implement cybersecurity in more holistic ways as outlined in the NIST Framework may in the future also provide additional legal protections for companies who do so. Although the NIST Framework is by definition voluntary, PwC has noted, “In effect, the Framework may become the de facto standard for cybersecurity and privacy regulation and may impact legal definitions and enforcement guidelines for cybersecurity moving forward.” 

In short, cybersecurity – done well – helps provide needed technical, people, process and now legal defences for a company’s trade secrets and other confidential data. For more information, see CREATe.org’s recent whitepaper, The Importance of Cybersecurity for Trade Secret Protection.   

KEYWORDS: cyber attack costs data breach incident response information security security compliance trade secrets

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pamela Passman is the founding President and CEO of the Center for Responsible Enterprise And Trade (CREATe.org), a non-profit business association that develops policies and practices to drive greater compliance and responsibility along global supply chains as a predicate for creating sustainable jobs, growth and innovation. Prior to founding CREATe, Passman was the Corporate Vice President and Deputy General Counsel, Global Corporate and Regulatory Affairs, Microsoft Corporation. She was also included among Security magazine’s list of the Most Influential People in Security in 2014.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Just Released, Administration Strategy on Mitigating Theft of U.S. Trade Secrets

    See More
  • U.S. Strategy Aims to Protect Trade Secrets from Hackers

    See More
  • Indiana Scientist Accused of Stealing Trade Secrets

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing