Protecting Yourself Against Corporate Espionage
It may sound like James Bond, but really, it’s just stealing
By Judy Malmon, J.D. | Last updated on January 24, 2023Use these links to jump to different sections:
Corporate espionage is also regularly referred to as employee defection, unfair competition, industrial espionage and theft of trade secrets. But Usama Kahf, an employment attorney with Fisher Phillips in Irvine, notes that corporate espionage is the term that makes people think of the movies. “It’s a cool term,” he says.
At the Hiring Stage
Risks related to hiring can arise when a new employee brings over proprietary information from their former employer—such as a client list, contract terms, specific details about prior transactions or special pricing. If the stolen information is used in a way that benefits the new employer, giving it a competitive advantage, they can potentially be liable, whether the new employer was aware of the practice or not. “This is one of the areas a lot of people miss,” says Kahf. “Employees will download stuff on their last day.” He works with clients to pre-screen new hires before they start, and to establish verbally and in writing that they are not to bring anything with them from their former employer. Kahf adds, “It’s even worse when you’re hiring someone who’s going to be an officer of the company. If they’re a rank and file employee, you can at least have the defense that you had no idea. With an officer, you can’t say you didn’t know—their knowledge is essentially the company’s knowledge.” Kahf recommends having “robust” confidentiality agreements to ensure company information is protected. “A lot of the ones I see are old or badly written, and opposing counsels have figured out a way to argue around them,” he says.When Employees Leave
It’s also key to have security practices in place to prevent theft from happening when employees leave. Modern technology makes it easy for employees to transfer information to themselves without walking out the door with a bulging box of files. But technology also makes it feasible to monitor questionable behavior. Computer forensics can allow an employer information security to find out if a departing employee has downloaded data to a USB drive with valuable information, accessed documents that were not related to their final days of work, emailed information to themselves, or even exported information to Google Drive.It’s Getting More Complicated
As technology evolves, so must employers. Many people blur the lines between work and personal technology, like using a personal cell phone to check work email, or working from a laptop or tablet at home. Kahf advises his clients that the answer to handling many of these evolving technology issues is contracts. “Put it in contracts and then actually enforce them.” If you are concerned about protecting your confidential business information, talk to an experienced employment attorney. For more information on this area, see our overviews of employment law for employers and labor law.What do I do next?
Enter your location below to get connected with a qualified attorney today.Related topics
Attorney directory searches
Helpful links
Find top lawyers with confidence
The Super Lawyers patented selection process is peer influenced and research driven, selecting the top 5% of attorneys to the Super Lawyers lists each year. We know lawyers and make it easy to connect with them.
Find a lawyer near you