The basic scope of enterprise secrets mainly includes

Enterprise secrets are mainly business secrets, which are divided into two categories: technical information and business information.

1, technical information

Technical data mainly include: technical design, technical samples, quality control, application test, process flow, industrial formula, chemical formula, manufacturing process, manufacturing method, computer program, etc. As technical information, trade secrets are also called technical secrets, proprietary technologies and non-patented technologies.

2. Business information

Business information mainly includes: development plan, competition plan, management know-how, customer list, supply, production and marketing strategy, financial situation, investment and financing plan, pre-tender estimate, negotiation plan, etc. Obligation of confidentiality and restriction of non-competition, the employer and the employee may agree in the labor contract to keep the employer's business secrets and confidential matters related to intellectual property rights.

Characteristics of trade secrets

1, not for publicity

The premise of trade secrets is that they are not known to the public, while other intellectual property rights are open, and even patent rights should be made public to a considerable extent.

2. Non-exclusivity

Trade secret is a relative right. The owner of a trade secret can neither prevent the person who developed and mastered the information before him from using or transferring the information, nor prevent the person who developed and mastered the information after him from using or transferring the information.

3. Related interests

It can make operators gain benefits, gain competitive advantages, or have potential commercial benefits.

4. Terminology protection

The term of protection of trade secrets is not legal, which depends on the confidentiality measures of the obligee and the disclosure of the secrets by others. A technical secret may last for a long time because of the effective security measures of the right holder and the application value of the technology itself, far exceeding the protection period of the patented technology.