Take Survey
MEDIA, JOBS & RESOURCES for the COMMON GOOD
NEWS  |  Leadership

Be Proactive to Protect Information: Report


Monday, 2nd September 2013 at 10:28 am
Staff Reporter, Journalist
A new Australian analysis underscores the importance of employers taking practical and legal steps to prevent current or former employees from misusing their confidential information.

Monday, 2nd September 2013
at 10:28 am
Staff Reporter, Journalist


0 Comments


FREE SOCIAL
SECTOR NEWS

 Print
Be Proactive to Protect Information: Report
Monday, 2nd September 2013 at 10:28 am

A new Australian analysis underscores the importance of employers taking practical and legal steps to prevent current or former employees from misusing their confidential information.

The paper, ‘Confidential information and departing employees – the threat from within’ by Richard Hoad and James Neil of law firm Clayton Utz said that “the risks posed to businesses by their former employees have never been greater.”

Published in the August 2013 issue of the Employment Law Bulletin, Hoad and Neil said organisations could most effectively protect their data through contractual agreements, exit procedures for departing employees and alertness of confidentiality in day-to-day business practice.

Key questions to help determine whether an employee is entitled to use information gained during the course of employment included contractual inclusions and the kind of information to be used.

“The nature of the relevant information is vital to determining whether the (former) employee may use it, and when,” the paper concluded.

Whether the information was a trade secret, ‘know-how’ developed during the course of employment, or merely trivial influenced how it could be used by ex-employees.

Trade secrets, for example, could not legally be used after an employee had left whether or not there was a contractual agreement restricting such use.

Trade secrets included ‘information which, if disclosed to a competitor, would be liable to cause real (or significant) harm to the owner of the secret’.

Examples of trade secrets could include customer lists, pricing information, costing information and profit-and-loss information, the paper said.

However, contractual protection of specific types of information was still the best course of action due to the difficulty in determining what may and may not be classified as a trade secret.

For example, although employees could not create a list of their employer's customers specifically to solicit their business after they leave, a former employee could use their memory of the identity of those customers to canvass their business after leaving their job, as such knowledge fell under the category of  ‘know-how’.

Former employees are free to use the know-how they have gained after they leave, even if that information is confidential to their former employer.

Hoad and Neil said contracts were the primary legal means by which a business could protect its confidential information by imposing specific prohibitions in employment contracts.

Employers could prevent their former employees from using ‘know-how’ through specific restrictions in an employee’s contract.

It was best to set out specific descriptions of the information employees are forbidden to use both during and after the term of employment in employment contracts.

“Obligations relating to confidential information should be tailored to the employee concerned. “One size does not fit all,” the paper said.

It was also recommended that practical steps be taken in the workplace to protect information.

“It is important to build a fence around corporate confidential information, and keep the gate shut. Knowing what is within the fence is the first step. This can be achieved by conducting regular audits. If you do not know what confidential information is held within your business, you cannot properly develop, commercialise and protect it.”

Other Recommendations included:

  • Mark confidential documents as such.

  • Only record and share confidential information as appropriate.

  • Limit disclosure to those who need to know.

  • At the exit interview, remind the employee of their confidentiality obligations and require them to hand over personal electronic devices.

  • Where an employee leaves to go to a competitor or to start up their own competing business, quarantine their computer for a short period following their departure.

  • Investigate concerns and take swift action where appropriate.


Read the full analysis here.


Staff Reporter  |  Journalist  |  @ProBonoNews



Got a story to share?

Got a news tip or article idea for Pro Bono News? Or perhaps you would like to write an article and join a growing community of sector leaders sharing their thoughts and analysis with Pro Bono News readers?

Get in touch at news@probonoaustralia.com.au

Get more stories like this

FREE SOCIAL
SECTOR NEWS

Write a Reply or Comment

Your email address will not be published. Required fields are marked *



YOU MAY ALSO LIKE

Stone Throwing

Marilyn Jones

Monday, 10th December 2018 at 7:30 am

Mapping Out Health Justice Partnerships Identifies Gaps

Maggie Coggan

Monday, 3rd September 2018 at 5:15 pm

A Dose of Reason, Perspective and Clarity

Mark Fowler

Friday, 3rd August 2018 at 2:59 pm

Why NFPs Should Volunteer to File a Modern Slavery Statement

Rob Jackson

Thursday, 26th July 2018 at 1:59 pm

POPULAR

NDIS Service Providers Cautious Over Complex Needs Pricing Shake-Up

Maggie Coggan

Monday, 10th December 2018 at 5:11 pm

Australians With Disability Twice as Likely to be Evicted Without Cause

Luke Michael

Wednesday, 5th December 2018 at 5:29 pm

Putting Disability and Leadership in the Same Sentence

Maggie Coggan

Monday, 3rd December 2018 at 8:56 am

Glyn Davis Confirmed as New Head of the Ramsay Foundation

Maggie Coggan

Wednesday, 5th December 2018 at 6:00 pm

Take Survey
pba inverse logo
Subscribe Twitter Facebook

Get the social sector's most essential news coverage. Delivered free to your inbox every Tuesday and Thursday morning.

You have Successfully Subscribed!