Good 360
MEDIA, JOBS & RESOURCES FOR THE COMMON GOOD
NEWS  |  Leadership

Be Proactive to Protect Information: Report


Monday, 2nd September 2013 at 10:28 am
Staff Reporter, Journalist
A new Australian analysis underscores the importance of employers taking practical and legal steps to prevent current or former employees from misusing their confidential information.

Monday, 2nd September 2013
at 10:28 am
Staff Reporter, Journalist


0 Comments


FREE SOCIAL
SECTOR NEWS

 Print
Be Proactive to Protect Information: Report
Monday, 2nd September 2013 at 10:28 am

A new Australian analysis underscores the importance of employers taking practical and legal steps to prevent current or former employees from misusing their confidential information.

The paper, ‘Confidential information and departing employees – the threat from within’ by Richard Hoad and James Neil of law firm Clayton Utz said that “the risks posed to businesses by their former employees have never been greater.”

Published in the August 2013 issue of the Employment Law Bulletin, Hoad and Neil said organisations could most effectively protect their data through contractual agreements, exit procedures for departing employees and alertness of confidentiality in day-to-day business practice.

Key questions to help determine whether an employee is entitled to use information gained during the course of employment included contractual inclusions and the kind of information to be used.

“The nature of the relevant information is vital to determining whether the (former) employee may use it, and when,” the paper concluded.

Whether the information was a trade secret, ‘know-how’ developed during the course of employment, or merely trivial influenced how it could be used by ex-employees.

Trade secrets, for example, could not legally be used after an employee had left whether or not there was a contractual agreement restricting such use.

Trade secrets included ‘information which, if disclosed to a competitor, would be liable to cause real (or significant) harm to the owner of the secret’.

Examples of trade secrets could include customer lists, pricing information, costing information and profit-and-loss information, the paper said.

However, contractual protection of specific types of information was still the best course of action due to the difficulty in determining what may and may not be classified as a trade secret.

For example, although employees could not create a list of their employer's customers specifically to solicit their business after they leave, a former employee could use their memory of the identity of those customers to canvass their business after leaving their job, as such knowledge fell under the category of  ‘know-how’.

Former employees are free to use the know-how they have gained after they leave, even if that information is confidential to their former employer.

Hoad and Neil said contracts were the primary legal means by which a business could protect its confidential information by imposing specific prohibitions in employment contracts.

Employers could prevent their former employees from using ‘know-how’ through specific restrictions in an employee’s contract.

It was best to set out specific descriptions of the information employees are forbidden to use both during and after the term of employment in employment contracts.

“Obligations relating to confidential information should be tailored to the employee concerned. “One size does not fit all,” the paper said.

It was also recommended that practical steps be taken in the workplace to protect information.

“It is important to build a fence around corporate confidential information, and keep the gate shut. Knowing what is within the fence is the first step. This can be achieved by conducting regular audits. If you do not know what confidential information is held within your business, you cannot properly develop, commercialise and protect it.”

Other Recommendations included:

  • Mark confidential documents as such.

  • Only record and share confidential information as appropriate.

  • Limit disclosure to those who need to know.

  • At the exit interview, remind the employee of their confidentiality obligations and require them to hand over personal electronic devices.

  • Where an employee leaves to go to a competitor or to start up their own competing business, quarantine their computer for a short period following their departure.

  • Investigate concerns and take swift action where appropriate.


Read the full analysis here.


Staff Reporter  |  Journalist |  @ProBonoNews


FEATURED SUPPLIERS


Yes we’re lawyers, but we do a lot more....

Moores

Helping the helpers fund their mission…...

FrontStream Pty Ltd (FrontStream AsiaPacific)

HLB Mann Judd is a specialist Accounting and Advisory firm t...

HLB Mann Judd

...


More Suppliers

Get more stories like this

FREE SOCIAL
SECTOR NEWS

YOU MAY ALSO LIKE

Five Ways The Future of Work Could Change For Women

Victoria George

Friday, 27th October 2017 at 4:13 pm

Anglicare Report Finds Lack of Entry-Level Jobs in Australia

Luke Michael

Thursday, 19th October 2017 at 9:22 am

Why is Digital Information Management So Important for NFPs?

Contributor

Tuesday, 12th September 2017 at 8:19 am

POPULAR

Red Cross Moves to Wage-Based Fundraising Model

Lina Caneva

Thursday, 16th November 2017 at 8:30 am

Disability Advocacy Group Fights to Restore State Funding

Luke Michael

Thursday, 9th November 2017 at 8:37 am

Concerns Raised Over New ACNC Board Appointments

Luke Michael

Monday, 20th November 2017 at 2:28 pm

New Same-Sex Marriage Bill Looks to Protect Faith-Based Charities

Luke Michael

Monday, 13th November 2017 at 5:25 pm

Write a Reply or Comment

Your email address will not be published. Required fields are marked *


Good 360
pba inverse logo
Subscribe Twitter Facebook

Get the social sector's most essential news coverage. Delivered free to your inbox every Tuesday and Thursday morning.

You have Successfully Subscribed!