AustLII Home | Databases | WorldLII | Search | Feedback

Edited Legal Collections Data

You are here:  AustLII >> Databases >> Edited Legal Collections Data >> 2013 >> [2013] ELECD 613

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

Pittard, Marilyn --- "Devices at law to protect employers: a conspectus of approaches" [2013] ELECD 613; in Pittard, Marilyn; Monotti, L. Ann; Duns, John (eds), "Business Innovation and the Law" (Edward Elgar Publishing, 2013) 315

Book Title: Business Innovation and the Law

Editor(s): Pittard, Marilyn; Monotti, L. Ann; Duns, John

Publisher: Edward Elgar Publishing

ISBN (hard cover): 9781781001615

Section: Chapter 19

Section Title: Devices at law to protect employers: a conspectus of approaches

Author(s): Pittard, Marilyn

Number of pages: 15

Abstract/Description:

This chapter sets the stage for the discussion in this Part of the legal devices used by businesses and employers to protect themselves from internal attack, through the unauthorized misappropriation of data, information or innovations, and attempts by business to secure the complete loyalty of their workers to work only for and in the interests of the employer and business. Employers who have fostered innovation within their organization may perceive a threat that an employee will take an invention, or otherwise utilize the discovered knowledge and information, for the employee’s own benefit: for example, by setting up a company controlled by the employee and realizing the fruits of the invention by effectively competing against his or her former employer. Alternatively, the threat could come from the employee seeking employment with another employer and ‘divulging all’ – and thereby conferring on the new employer, which has not supported, or invested in, the development of the innovation or invention, the ability to ‘reap where they have not sewn’. The threat may not come from the inventor himself or herself, but from another source internal to the employer’s business – perhaps another employee or a contractor who has access to the confidential information, trade secret or relevant knowledge of the device or process. This threat may be particularly real where teams of workers have contributed to the innovation, so that knowledge is not centralized in one inventor but available to many. John Hull’s chapter identifies some case examples of divulging trade secrets and analyses these cases.


AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.austlii.edu.au/au/journals/ELECD/2013/613.html