Identify, classify, and score your trade secrets with software from the Trade Secret Office.

Trade Secret Examiner® - Feature Package List

General

  • Manages trade secret metadata, not the actual trade secret, leaving the actual trade secret in its current, secure locations.
  • Simple data entry screen permits general employees to enter trade secret metadata without specialized training or legal help.
  • One-to-five scoring of the six factors of a trade secret.
  • Classification using intuitive SFP (Subject, Format, Product) methodology.
  • Specialized database developed for trade secret asset management.
  • Two-stage system providing review of employee inputs, permitting acceptance, rejection, or editing of employee input data before adding trade secret metadata to the trade secret inventory.
  • Retains audit trail of all additions and changes, including username and date/timestamp of all additions and changes. No data is ever deleted.
  • Security analysis tools assist tailoring security measures to trade secret values, increasing security effectiveness while reducing costs.
  • Litigation support tools assist attorneys in preparing for trade secrets litigation, reducing attorney hours and costs.
  • Data integrity ensured through the use of court-accepted hashcode blockchaining.
  • Five user permission levels - Entry, Analyst, Reviewer, Legal, Administrator -- allow restricting users to data and actions appropriate to their job assignment.
  • Compatible with all state trade secret laws, the federal Defend Trade Secrets Act of 2016, and current international trade secret protections.
  • Robust and scalable platform using Microsoft Visual C# and SQL Server.
  • Available in standalone workstation, multi-user server, and cloud-based platforms.

Contained in Version 1

  • Capture location information for each trade secret. Multiple locations possible per trade secret. Configure locations. Track location security.
  • Hold captured info for review to either accept or reject the potential trade secrets.
  • Inventory pages with sort functions.
  • Edit pages to allow editing trade secret metadata.
  • Analyze security page for finding security problems with trade secrets.
  • Analyze history page for looking at historical data about a trade secret.
  • Means for obsoleting a trade secret when it becomes generally known or is published.
  • Means for printing any page or list.
  • Division field for companies organized into divisions.
  • Parameters of a trade secret: status, confidentiality level, negative know-how, patentable subject matter, combination.
  • Means of configuring subjects, formats, products, locations, divisions, the six factors, status, confidentiality level.
  • Means for managing user accounts and passwords.

Added in Version 2

  • Internal blockchaining of all trade secret metadata to ensure data integrity and prove metadata contents and dates.
  • Keyword assistance to aid customers in selecting keywords appropriate to a trade secret.
  • Retention of all prior trade secret metadata reports for historical records.
  • Parent/child relationships between trade secrets allows trade secret metadata to be gathered into combinations of trade secrets, or for large trade secrets to be decomposed into their component trade secrets.
  • Parent/child relationships between products allows the definition of product lines and product groups, allowing trade secrets to be assigned to multiple products with a single entry.
  • Capability to store open-format notes to trade secrets for archiving additional information.
  • Litigation codes allow trade secrets to be given aliases so they can be referenced in open court.
  • Archiving of hash codes from trade secret source files to relate database entries back to the actual trade secret information.
  • One-button report download of all metadata relating to a trade secret or trade secrets as of a specific date.

Added in Version 3

  • Third-party disclosure tracking, including inbound and outbound trade secrets.
  • Storing and archiving of NDA documents within the system. NDAs are hashed and block-chained for proof certain of contents and dates.
  • Graphics package for graphing in multiple formats trade secret metadata within the database.
  • Multi-user server and cloud-based capabilities.
  • Multi-user collision detection and resolution.
  • Bulk updates performed in background to enable users to continue without waiting for the bulk updates to complete.
  • Assign specific products and product lines to an individual user, blocking that user's access to other products' and product lines' trade secret metadata.
  • Assign specific subjects (e.g. Manufacturing, or Engineering) to an individual user, blocking that user's access to other subject's trade secret metadata.

Added in Version 4

  • Automated, assisted, and manual elimination of redundancies in trade secret data resulting from multiple employees entering the same trade secret.
  • Secure mobile access to trade secret entry via both iPad and smartphone.
  • Importing of employee data from company payroll system.
  • Storing and archiving of employee agreements within the system. Employee agreements are hashed and blockchained for proof certain of contents and dates.
  • Configuring and recording specific security measures applied to trade secrets on a company-wide, location-specific, and trade secret specific basis.
  • IP address whitelisting specifies IP address ranges to which the Trade Secret Examiner server will respond. All login and page requests received from other IP addresses will be ignored, making trade secret metadata unavailable to the broader Internet.

Added in Version 5

  • Two-stage blockchaining, allowing daily certification of database contents through a secondary blockchain operated on the Trade Secret Office� server. Independent third-party verification of the database without the necessity for continuous communications between the Trade Secret Examiner server and the Trade Secret Office server.
  • Management Report
  • Hash Verification Utilities

Added in Version 6

  • Enhanced search capabilities within the database.
  • Enhanced user configuration features to allow users to access partial trade secret database based on division, subject, and product.
  • User-configurable import of trade secret data from spreadsheets, allowing existing trade secret inventory to be imported to the TSE database.
  • Windows Active Directory login, allowing corporate users already logged into the corporate system to access TSE without additional login steps.