Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Trade secret protection

in Blog, Document Security, DRM, PDF Security

Protection of trade secrets from theft.

There are many reasons why sensitive corporate information has to be handled as a trade secret rather than Copyright or Patent.  Here’s how to protect trade secrets in digital documents from unauthorized access and passing on.

Choosing methods of information protection

It may not seem obvious, but you can choose what kind of legal protection can be applied to different information held by an individual or an organization.

Patent protection

The strongest form of legal protection is the patent.  It is applied to methods and designs to make an object.  It can also be used on methods for doing something (e.g. using a computer system to guide a robotic arm or paint a picture) although it is questionable if you could get a patent over how to create and run a Sales Ledger system by using a computer.  There are fees to pay for getting a patent.

Patent information must be kept secret before the patent is awarded (or filed) or it may not be protected.  Once a patent is granted, the information has to be made publicly accessible.  So it is not a secret anymore, but you have exploitation rights over the information.  So the irony is that you have to reveal your secret to the world to get a Patent – but before the patent you have a trade secret (see later).

Copyright protection

This is a way of publishing information that allows you to license the rights to reproduce it.  The author(s) may also be granted associated rights.  The actual rights you get depend on the country you create the work(s) in.  The information being Copyrighted can be literary, music, film, picture, sculpture, multi-media and similar.  Generally Copyright is created when the work(s) are although some countries charge a fee to register a Copyright.

Enforcing Copyright control can be expensive, particularly if there is no obvious person or organization that you can identify to litigate against (and they can afford to pay if you win).  You also risk becoming involved in dealing with countries that you have no presence in and cannot readily fund such an operation.

Trade Secret protection

This is what you use when other approaches will not work for you.  Or when you are looking to file a patent but are not there yet.

There are many things that are trade secrets.  Amongst the best known is the formulation for the liqueur Benedictine.  You must mix the right quantities of 27 flowers.  It is said that only three people at any one time know the exact amounts.  But there are many many trade secrets.  The procedures manual used by bank staff to determine creditworthiness, is an example, as is a specialist training methodology or an organization’s risk analysis parameters for trade or banking.  Documents relating to mergers and acquisitions need to be kept secret, as do those relating to market development (selling or purchasing or developing) and so on.

Although few documents are Top Secret (for the military), there are a lot of trade secrets documents that need to be given the same security treatment.

In fact, it turns out that there are a huge number of documents that have to be dealt with as trade secrets even if they later become patents or Copyright work.  But the biggest collection of documents are those that have to be shown to people without leaving them the ability to steal or misuse the content.  And that is where things get slightly more complicated.

Copyright litigation has determined that if you leave a confidential document next to a window which looks out onto a public area, and someone outside looks through the window and reads it, or takes a photograph of the document – they have not broken a law and you cannot stop them from using that information for their own purposes.  The law is expecting you to take all reasonable steps to protect your information and not to be careless.  It’s why you need to make it clear to people whet responsibilities they have for keeping secrets.

You can take positive steps to safeguard your digital documents and the trade secrets within using a tool such as Locklizard Safeguard.  This allows you to make to the authorised user respect secrecy and not to be careless with protected documents.

So all the discussions by document control system providers about who has control of a document are unhelpful when you are giving people the ability to reveal your trade secrets by printing them out or copying them or forwarding them to unknown destinations that happen to have control of an email address (the banks regularly warn that email account hacking is a commonplace – and they should know) that is supposedly trusted.

Suitable document controls for protecting trade secret information

It is clear that the controls that you need for trade secrets are essentially identical with those of a DRM Management system.  So you will be needing an overarching series of controls that:

  • Prevent Saving or Saving As functions
  • Do not use ‘temporary files’ to hold uncontrolled copies of protected documents for ‘performance’ reasons
  • Resist screen grabbing systems, especially those using remote screen copying such as the hosted meeting systems
  • Prevent printing and stop printing to file driver applications
  • Prevent using on an unauthorized device and/or in an unauthorized location
  • Have start and end of access dates that can be dynamically changed as required (document expiry)
  • Record when documents are opened, and by whom (track & log document use)
  • Record when documents are printed, and by whom
  • Allow access to be ceased instantly, either temporarily or permanently (revoke document access)
  • Enforce dynamic watermarks that identify the user using the document to be added to screen views or print outs

Although no single control secures a document from being seen by an unauthorized party, the ability to use a suitable combination to meet the specific requirements of a particular document is essential.  Just as there are no two people the same, there are no two documents the same.

So any system you choose for trade secret protection must have the ability to use any of a wide range of capabilities selectively to achieve your objectives: which are to protect your commercial information to the most cost-effective level.

Compare the features provided by Locklizard Safeguard PDF Security with the controls outlined above and you will see a very good fit between the two.  Locklizard document protection provides you with a comprehensive approach to being able to protect trade secrets and make it very difficult for unauthorized access to and passing on of trade secrets.  Protect your trade secrets, and keep them that way.

Tags: copyright protection, document control, document drm, document protection, document rights management, document security, drm, information protection, patent protection, protect confidential documents, protect documents, protect sensitive documents, protect trade secrets, protecting documents, protecting trade secrets, trade secret protection, trade secrets
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Protecting confidential documents Link to: Protecting confidential documents Protecting confidential documentsLink to: Brexit, GDPR & data protection Link to: Brexit, GDPR & data protection Brexit, GDPR & data protection
Scroll to top Scroll to top Scroll to top