
Article content
By Howard Levitt and Robert Taylor
THIS CONTENT IS RESERVED FOR SUBSCRIBERS ONLY
Subscribe now to read the latest news in your city and across Canada.
- Exclusive articles from Barbara Shecter, Joe O'Connor, Gabriel Friedman, and others.
- Daily content from Financial Times, the world's leading global business publication.
- Unlimited online access to read articles from Financial Post, National Post and 15 news sites across Canada with one account.
- National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
- Daily puzzles, including the New York Times Crossword.
SUBSCRIBE TO UNLOCK MORE ARTICLES
Subscribe now to read the latest news in your city and across Canada.
- Exclusive articles from Barbara Shecter, Joe O'Connor, Gabriel Friedman and others.
- Daily content from Financial Times, the world's leading global business publication.
- Unlimited online access to read articles from Financial Post, National Post and 15 news sites across Canada with one account.
- National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
- Daily puzzles, including the New York Times Crossword.
REGISTER / SIGN IN TO UNLOCK MORE ARTICLES
Create an account or sign in to continue with your reading experience.
- Access articles from across Canada with one account.
- Share your thoughts and join the conversation in the comments.
- Enjoy additional articles per month.
- Get email updates from your favourite authors.
THIS ARTICLE IS FREE TO READ REGISTER TO UNLOCK.
Create an account or sign in to continue with your reading experience.
- Access articles from across Canada with one account
- Share your thoughts and join the conversation in the comments
- Enjoy additional articles per month
- Get email updates from your favourite authors
Sign In or Create an Account
or
Article content
Article content
Have you heard the expression “protecting the family jewels?” For a business, the family jewels are often its confidential information — arguably its most valuable asset. So much so that companies will go to great lengths to protect it from improper disclosure or usage.
Article content
Confidential information can include trade secrets, product designs, financial information, business strategies, marketing plans, customer or supplier information — anything the company has acquired or developed, often at great cost, that is valuable and important for its success and must be kept secret.
Article content
Article content
What is not confidential information is anything already in the public domain — i.e., anything that is publicly available. If you can find it on the Internet, it is almost certainly not confidential. Therefore, any intellectual property, such as patents, industrial designs, copyright (if they have been registered) is not confidential information either, although it is often very valuable.
Article content
By signing up you consent to receive the above newsletter from Postmedia Network Inc.
Article content
Many companies have separate policies defining what information is “confidential” and setting out an employee’s obligations, in the form of written agreements, to protect such information and not disclose it to any third parties, especially competitors. If there is no written agreement, an employee would have an implied obligation not to disclose or use confidential information, but the advantage of written agreements is that they ensure employees have a clear understanding of what their obligations are.
Article content
The definitions of confidential information usually specify what information the company wants to protect, which, if disclosed, could cause significant harm to the business. These definitions are often expansive, listing obvious items such as financial reports and marketing plans, but might also include generic words, such as “data” or “documents,” which would only be protected if they contain confidential information.
Article content
Article content
Some confidential information provisions have exclusions permitting use or disclosure of, for example, information that is in the public domain, compellable by legal process or used with the permission of the company.
Article content
Article content
While it is important to have written agreements defining a company’s confidential information, it is just as important that a company take concrete steps to protect it — such as keeping electronic information password protected, maintaining paper copies under lock and key and making such information only available on a need-to-know basis.
Article content
If the company displays a cavalier attitude towards protecting its confidential information, there is a risk a court may find it is no longer considered confidential. Courts will strive to protect confidential information from improper use or disclosure by, say, former employees who might use it to compete with the company they left. There are powerful remedies, such as injunctions, that would guard against this.
Article content
If the company seeks the protection of the courts, it is essential that it a) precisely defines the confidential information it seeks to protect; b) explains why it is confidential; and c) seeks a protective order to prevent its disclosure through the litigation process.