[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:04.88,Default,,0000,0000,0000,,[MUSIC] Dialogue: 0,0:00:05.60,0:00:08.20,Default,,0000,0000,0000,,Sometimes an inventor or business decides Dialogue: 0,0:00:08.24,0:00:10.48,Default,,0000,0000,0000,,that the best way to protect their IP is Dialogue: 0,0:00:10.52,0:00:11.68,Default,,0000,0000,0000,,to just keep it a secret Dialogue: 0,0:00:11.72,0:00:12.68,Default,,0000,0000,0000,,from everyone else. Dialogue: 0,0:00:13.24,0:00:14.72,Default,,0000,0000,0000,,These are called trade secrets, Dialogue: 0,0:00:14.76,0:00:16.72,Default,,0000,0000,0000,,and they include things like formulas, Dialogue: 0,0:00:17.04,0:00:18.84,Default,,0000,0000,0000,,processes, designs, Dialogue: 0,0:00:19.20,0:00:20.96,Default,,0000,0000,0000,,methods of manufacturing products, Dialogue: 0,0:00:21.16,0:00:22.92,Default,,0000,0000,0000,,and compilations of information. Dialogue: 0,0:00:23.44,0:00:25.64,Default,,0000,0000,0000,,Some famous examples of trade secrets Dialogue: 0,0:00:25.76,0:00:27.52,Default,,0000,0000,0000,,include the recipe for Coca-Cola, Dialogue: 0,0:00:27.80,0:00:29.52,Default,,0000,0000,0000,,the 11-spice and herb blend used Dialogue: 0,0:00:29.56,0:00:30.88,Default,,0000,0000,0000,,by Kentucky Fried Chicken, Dialogue: 0,0:00:31.04,0:00:32.52,Default,,0000,0000,0000,,and Google's search algorithm. Dialogue: 0,0:00:35.04,0:00:36.76,Default,,0000,0000,0000,,It's important for companies to keep their Dialogue: 0,0:00:36.80,0:00:38.68,Default,,0000,0000,0000,,information safe so other people Dialogue: 0,0:00:38.72,0:00:40.64,Default,,0000,0000,0000,,and companies can't use it to create Dialogue: 0,0:00:40.68,0:00:42.92,Default,,0000,0000,0000,,a similar product and sell it themselves. Dialogue: 0,0:00:43.52,0:00:44.100,Default,,0000,0000,0000,,Protecting trade secrets is Dialogue: 0,0:00:45.04,0:00:46.52,Default,,0000,0000,0000,,a do-it-yourself process. Dialogue: 0,0:00:46.92,0:00:48.68,Default,,0000,0000,0000,,One doesn't file for formal protection Dialogue: 0,0:00:48.72,0:00:50.04,Default,,0000,0000,0000,,for trade secrets like they Dialogue: 0,0:00:50.08,0:00:51.84,Default,,0000,0000,0000,,would for patents or copyrights. Dialogue: 0,0:00:52.32,0:00:54.04,Default,,0000,0000,0000,,Owners of trade secrets simply Dialogue: 0,0:00:54.12,0:00:55.72,Default,,0000,0000,0000,,keep the information secret. Dialogue: 0,0:00:56.08,0:00:57.56,Default,,0000,0000,0000,,There are legal protections for trade Dialogue: 0,0:00:57.64,0:00:59.40,Default,,0000,0000,0000,,secrets, such as a non-disclosure Dialogue: 0,0:00:59.44,0:01:00.40,Default,,0000,0000,0000,,agreement for anyone Dialogue: 0,0:01:00.44,0:01:01.96,Default,,0000,0000,0000,,with knowledge of the information. Dialogue: 0,0:01:02.56,0:01:04.32,Default,,0000,0000,0000,,Usually, only a few people know all Dialogue: 0,0:01:04.36,0:01:05.96,Default,,0000,0000,0000,,the information that makes up a trade Dialogue: 0,0:01:06.00,0:01:06.52,Default,,0000,0000,0000,,secret, Dialogue: 0,0:01:06.96,0:01:08.44,Default,,0000,0000,0000,,and even though trade secrets aren't Dialogue: 0,0:01:08.52,0:01:10.08,Default,,0000,0000,0000,,legally registered as intellectual Dialogue: 0,0:01:10.16,0:01:11.76,Default,,0000,0000,0000,,property, stealing or publishing Dialogue: 0,0:01:11.80,0:01:13.08,Default,,0000,0000,0000,,them is still illegal. Dialogue: 0,0:01:13.24,0:01:15.16,Default,,0000,0000,0000,,Federal labs can't have trade secrets Dialogue: 0,0:01:15.20,0:01:16.52,Default,,0000,0000,0000,,on inventions and processes Dialogue: 0,0:01:16.56,0:01:17.36,Default,,0000,0000,0000,,they've developed. Dialogue: 0,0:01:17.72,0:01:18.76,Default,,0000,0000,0000,,The government equivalent Dialogue: 0,0:01:18.80,0:01:20.24,Default,,0000,0000,0000,,is classified information. Dialogue: 0,0:01:20.80,0:01:22.40,Default,,0000,0000,0000,,But when labs partner with businesses Dialogue: 0,0:01:22.44,0:01:24.48,Default,,0000,0000,0000,,and individuals, they may need to learn Dialogue: 0,0:01:24.52,0:01:26.40,Default,,0000,0000,0000,,about those partners' IP to help. Dialogue: 0,0:01:26.92,0:01:27.80,Default,,0000,0000,0000,,T2 laws have Dialogue: 0,0:01:27.84,0:01:30.08,Default,,0000,0000,0000,,been put in place that allow federal labs Dialogue: 0,0:01:30.12,0:01:31.64,Default,,0000,0000,0000,,to keep quiet about partners' trade Dialogue: 0,0:01:31.72,0:01:33.36,Default,,0000,0000,0000,,secrets so they can work together Dialogue: 0,0:01:33.68,0:01:34.100,Default,,0000,0000,0000,,and companies can be sure their Dialogue: 0,0:01:35.04,0:01:36.44,Default,,0000,0000,0000,,information is safe throughout Dialogue: 0,0:01:36.48,0:01:37.64,Default,,0000,0000,0000,,the partnering process. Dialogue: 0,0:01:37.68,0:01:49.60,Default,,0000,0000,0000,,[MUSIC]