Trade secrets refer to technical information and business information that are not known to the public, can bring economic benefits to the right holder, are practical and the right holder has taken confidentiality measures. Therefore, trade secrets include two parts: non-patented technology and business information. Such as management methods, production and marketing strategies, customer lists, supply information and other operating information; production formulas, process flows, technical know-how, design drawings and other technical information.
Legal protection of trade secrets: The Anti-Unfair Competition Law regulates the infringement of trade secrets through unfair means
Protection of corporate trade secrets:
(1) Use of fax machines and protection of trade secrets 1. Senior managers of enterprises should be equipped with dedicated fax machines. Because senior managers generally have separate office rooms, and other unrelated personnel cannot enter their rooms at will. In this way, when the other party faxes, the senior managers of the company can receive the fax directly without going through other intermediate links. Sometimes, senior managers will ask their secretaries to send and receive faxes. However, for corporate core business secret documents, we believe that senior corporate personnel should send and receive them directly to reduce unnecessary links in information dissemination. 2. Waiting to send and receive faxes. Many company employees directly send the fax content to the other party without notifying the other party in advance and without confirming it afterwards. Even if your company's senior managers are equipped with a dedicated fax machine, the other party is likely to place the fax machine in a public area of ??the company. If you send a fax without notification, the content of the fax is likely to be leaked by the other company. Irrelevant personnel know that, therefore, for faxes containing corporate confidential information, the person in charge of the other party should be contacted in advance and asked to personally or arrange for someone to wait for the fax to be output. If the other party wants to fax to your company, you should ask the other party in advance to confirm the fax before faxing, and let your company arrange personnel to wait for the output. After the output is completed, you should confirm the number of pages and content with the other party to prevent the other party from mistakenly thinking that the fax is complete due to unexpected interruption of the fax machine, and then continuing to fax without anyone waiting for output. Sometimes paper jams occur in fax machines. At this time, you must take away the bad pages of the fax, because the bad pages may also contain part of the fax content and cannot be discarded. 3. Arrange for administrative personnel to receive faxes. If an enterprise adopts the method of centrally placing fax machines in a public place, in order to prevent the contents of the fax from being known to other unrelated persons passing by or other persons who send and receive faxes, the enterprise should place the fax machine close to administrative personnel. place, and require administrative staff to collect the fax immediately and hand it over to the recipient of the fax if a fax is sent to them. This can minimize unnecessary links in the middle of the fax. 4. Do not leave while faxing. Sometimes fax personnel are very busy at work and see that there are many fax pages and the fax speed is very slow. Therefore, after starting the fax, they go directly to their own work and come back after almost completing the transmission; some people come back after get off work. I started faxing, and because I didn't want to wait for the fax to be completed before leaving work, I took the fax away when I went to work the next day. Since the fax person is not present during the faxing process, the transmitted faxes will be scattered on the table. Other unrelated personnel passing by or sending and receiving faxes will inadvertently see the contents of the faxes, leading to leaks, and it is difficult to know the facts of the leaks at this time. occurrence. Therefore, even if the fax contains a lot of content, the fax person cannot leave midway to avoid leaks. 5. Important corporate secret documents can be delivered by hand. Faxing documents containing company secrets through faxes still has the possibility of leaks. Nowadays, technology is highly developed, and the fax content may also be maliciously stolen by a third party during the fax process. Therefore, companies do not fax some important documents. , and using hand delivery can better ensure the safety of corporate confidential information. (2) Use of printers and protection of trade secrets 1. Equip with special printers. Personnel who possess corporate trade secrets, especially corporate senior managers, are equipped with special printers to prevent the contents of printed documents from being known to others.
3. Disable copying of files. When the company's trade secret files are stored in the computer and do not want to be copied by others, you can set up a prohibition on copying. This approach is especially suitable for senior managers of enterprises and important business secrets stored by enterprises. Some trade secrets are so extensive and detailed that they cannot be remembered by the mind alone. Therefore, even if someone glances at them in a short period of time, they cannot remember all the contents. If copy prohibition is set, the business secrets in the file will not be easily disclosed. Enterprises should be selective about which files are prohibited from being copied, and should not arbitrarily expand the scope of files that are prohibited from being copied. 4. Remove the floppy disk, USB interface and CD burning, etc. Nowadays, an important way to leak trade secrets is to use a USB flash drive to copy them directly from the computer and take them out of the company without being easily detected. Therefore, enterprises should, based on internal work needs, dismantle the relevant interfaces on the computers of staff who do not need the above-mentioned external devices to prevent anyone from stealing business secrets through the above methods. 5. Clear computer contents. Enterprises often have personnel movements, such as job transfers from one department to another, or employees resigning and hiring new employees. Therefore, units often assign previously used computers to employees, which may leak business information. secret. Because there may be a large amount of customer transaction information and other business secrets in the used computer. If all are not cleared, then the employees behind will usually carefully check all the files in the computer with curiosity. In this way, the number of business secrets will increase. Risk of leakage. Therefore, whenever a work computer is assigned to an employee, as long as it is not a new computer, the computer-savvy staff within the company must clear all unnecessary information left by former employees on the computer. 6. The internal network should be set up to avoid containing commercial secret information. Many companies have set up internal networks so that employees can easily obtain the company's fixed-format materials, experience, etc. However, many companies also put the company's customer details on the internal network, and there are also other people who have business secrets in order to avoid It is very dangerous for his or her work computer to accidentally store trade secret information in personal files on the internal network. In this way, other employees can easily obtain the company's trade secrets through the internal network. Therefore, the company should not put the company's trade secrets on the internal network. At the same time, it should also educate employees not to store files containing trade secrets on the internal network. . 7. Install the computer operation history recording program. The purpose of installing this program is to keep a history of all operations on the computer. If the trade secret files in the computer are stolen or viewed by others, the historical record may be used to reflect information such as when it was stolen or peeked. This will help discover the fact that the trade secret has been leaked and find out the truth. And can also be used as evidence. (4) Network use and trade secret protection 1. Do not access the Internet on computers involving confidential information. Nowadays, hacker technology has reached the level of detecting information on the hard drives of connected computers through the Internet. Therefore, it is very dangerous to access the Internet on confidential computers. Therefore, enterprises should place the computers that store the enterprise's core competitiveness business secrets and business secrets with important economic value separately, and do not connect them to the Internet. For general trade secrets, relevant personnel should note that if they want to access the Internet, they should use a USB flash drive to copy all the trade secret files in advance, and delete all trade secret information in the computer before going online. In this way, by keeping confidential information off the Internet and keeping online information confidential, hackers can be prevented from stealing corporate trade secrets through espionage means. 2. Restrict online chat and prohibit the installation of cameras. Many employees like to chat online on QQ, MSN, etc. during working hours. Since the above-mentioned online chats have the function of sending files instantly, it is easy for corporate trade secrets to be leaked through online chat. Therefore, in order to reduce the risk of trade secret leaks, companies should prohibit Ordinary employees chat online. Of course, some companies need to use MSN to contact business, etc. The company can allow specific employees to use MSN, which can effectively protect business secrets and not affect the company's business development.
Therefore, signing a long-term labor relationship contract is conducive to establishing a long-term and stable labor relationship, and a long-term and stable labor relationship can protect business secrets. 4. Make talents become shareholders of the company. This method is to allow the inventor of trade secrets and key employees who have access to and master trade secrets to own part of the company's equity and become shareholders of the company, so that they and the company can form a shared destiny of honor, disgrace, and mutual benefit. Since these talents are shareholders of the company themselves, they generally will not disclose the company's business secrets based on their own interests.