What isn’t known can’t be protected. Every kingdom has its crown jewels, and every manufacturer should know where all of its most valuable and potentially profitable intellectual property resides.
IP can be defined as any type of financial, business, scientific, technical, customer and engineering information which is deemed proprietary. Every manufacturer files patents to protect their inventions, industrial designs and plant processes – but trade secrets can also include plans, prototypes, procedures and in-process research, among other assets. Any intangible information, even employee knowledge and ideas, is worthy of protection.
Intellectual Property can be broadly defined as:
- Patents & trademarks
- Financial data
- Industrial designs
- Manufacturing processes
- Plans & prototypes
- Plant procedures
- R&D testing
- Customer information
- Names, codes & lists
The process of identifying and classifying all of your enterprise IP is not an easy one. There is a good reason why in a previous post in this series I recommended that you form an IP Risk Committee. That body has IP protection leaders appointed from each business unit and horizontal function. They know where their jewels are hidden, including stored in cloud services which may/may not be authorized (e.g. Dropbox). They need to both lead this effort and assume accountability for the protection of their own crown jewels.
Many believe this is the job of IT, but it’s not. IT security personnel should instead help with tools, best practices and resources to identify and classify your organization’s crown jewels.
Download my e-book covering 5 key IP protection tips to follow, based on the practical experience of Digital Guardian’s manufacturing industry customers.
Read the full series:
- The Threats to Your Trade Secrets are Real
- Why Offshoring Complicates IP Protection
- Calculating the True Cost of IP Theft
- Make the Case for Investment in Ongoing IP Protection
- How to Form an IP Risk Committee
- 7 Elements of a Holistic IP Protection Plan
- Defining Intellectual Property
- Lock up your IP and Control Access to it
- Discover the Weaknesses in Your IP Security
- Improve Your Ability to Detect Cyber-Attacks
Data-Centric Security: Why You Need it, How to Get Started
Forrester VP and Principal Analyst John Kindervag explains the fundamentals of a data-centric security approach, why you need it, and how to get started. Watch the webinar on demand.
Related Articles7 Elements of a Holistic IP Protection Plan
Sixth in a Series from Former DuPont CISO on Trade Secret Protection for ManufacturersThe Threats to Your Trade Secrets are Real
New Series from Former DuPont CISO on Trade Secret Protection for ManufacturersNew Bill Aims to Better Secure U.S. IP, Supply Chain Security
The legislation, which cites a rash of Chinese IP theft, would develop a national strategy to prevent risks to U.S. tech.