Crone & Mason Trade Secret Protection
FAQ Audit Principles Audit Services Self-Assessment About Us Articles Links Contact Us

Our Assessment & Audit Service Principles

A company that protects its proprietary information, competitive advantages, trade secrets and other forms of intellectual property, simultaneously protects its ability to distinguish itself in the marketplace with the uniqueness of its know how.

A well conceived and executed assessment and audit can produce strong multiplier effects which can be leveraged to favorably affect other internal and external operations, i.e., financial, legal, insurance, IT, sales, etc.

Our assessment-audits helps decision-makers.

Our assessments-audits are not merely lists of 'do you have this'? or, 'have you done that?' types of questions which can be easily checked-off. Instead, our assessment-audit documents consist of real world, scenario-based questions divided by key topics.

This format is especially relevant to CFO's, CIO's, department heads, IT, human resources, legal counsel, R&D, and other key handlers and users of proprietary-competitive advantage information, trade secrets and intellectual property.

You can kick start this important endeavor by downloading (printing) these convenient self-assessment documents. Then, conduct this preliminary assessment in the privacy of your office.

It's Important To Conduct Periodic Assessments & Audits
Protecting - Preserving The Value of Your Proprietary-Competitive Advantage Information and Trade Secrets

Often, we don't take the time to fully 'test' our information protection and security policies and procedures until compelled to do so by external events such as the passage of a new law, the emergence of a new threat, or pending litigation.

It's important to conduct periodic assessment and audits because:

1 . Owners-originators often lose and/or relinquish key intellectual property rights early by failing to (a.) distinguish particular information as proprietary, and (b.) implement sound information protection measures through normal employee practices.

2. Traditional protections afforded through intellectual property law, i.e., patents, trademarks, trade secrets and copyrights, serve as little or no deterrent to today's highly sophisticated and 'predatorial' infringers - misappropriators.

3. Information exists in many different formats besides electronic bits and bites. Computer/IT security, no matter how much your company has, is not synonymous with information security.

4. Owners and originators of information are sometimes unfamiliar with legal requisites for designating information as proprietary (trade secret) as mandated by state trade secret statutes and the Economic Espionage Act.

5. Tangibles , such as real estate, equipment, inventory, etc., are no longer the primary source of company-institutional value, intangibles are, such as competitive advantages, intellectual capital, and trade secrets, etc.

6. Business information (intangibles) and intellectual capital routinely have rapid changes in their life and value cycles which need to be addressed.

7. Sophisticated competitor-economic-business intelligence (worldwide) regularly undermine projected competitive-economic advantages from new business initiatives and R&D projects.

8. An often overlooked consequence of hacking is that proprietary-competitive advantage information and intellectual property have been compromised.