NH Legal Perspective: Adopting a Proactive Strategy for Employee Mobility

This article was originally published in the Union Leader and can found here. It was also published in the NH Business Review and can be found here.

NH Legal Perspective: Adopting a Proactive Strategy for Employee Mobility

By: Chris Cole

September 7, 2019

The challenge: Almost every company today and, perhaps, in New Hampshire in particular, is engaged in something of a multidimensional war. There is as intense a competition for talented employees, skilled workers and seasoned executives as any time in our history.

At the same time, two issues animate and confuse the competition for talent.

First, the talent is exceptionally mobile — moving in unprecedented numbers. Employees do not observe old standards of company loyalty. The career employee seems to be largely a thing of the past; online tools for viewing and evaluating supposed greener pastures have come into widespread use and have become easier to use. Employees can post their resumes in dozens of sites. LinkedIn personal “networks” essentially function as job-sharing resources. And companies turn to recruiters to leverage the best employees out of one company and into another.

Second, employees have access to a broad universe of know-how, confidential and proprietary information and trade secrets, accessed and used with digital tools and systems that can capture, copy and send that information with breadth and speed. Employees are perhaps the biggest single threat to the competitive position of any company in any industry.

The solution is an employee mobility and trade secret policy and program:

Know what you have: the audit.

Every company needs an employee mobility strategy, one that accounts for the risks associated with employee mobility from proverbial cradle to grave — and requires skilled and experienced counsel.

This “Employee Mobility and Trade Secret Protection Program” begins with an effort to understand what facets of the business might be important, confidential and secret, and to identify the manner and means by which that information can be protected. This is sometimes called an IP audit or a trade secret audit, either of which identifies information, formulae and processes that advance the company’s competitive position and constitute protectable interests.

Protect what you have from misuse.

Once the company understands what needs to be protected, it can secure the physical space effectively, and implement proper and proportionate internal security measures applicable to all employees, including system password protections, internet, email and text-messaging policies, and restricted access to trade secret information. Not every employee needs access to the company’s pricing worksheets, for example.

Remote employees pose separate and different concerns, which should be addressed. Certain information should never be emailed, and certain information should be sent only with appropriate encryption. It is, perhaps, just as important as any other part of a policy to educate employees — making security and confidentiality a meaningful part of their daily lives, and creating an overall ethos within the company of care, caution and confidentiality.

The Program then determines the means to protect that information from use, misuse or misappropriation by existing and departing employees, through the execution and enforcement of agreements requiring the return of company property at the end of employment, and containing so-called “post-employment restrictive covenants:” nondisclosure, nonsolicitation, anti-piracy and noncompete provisions. These sorts of agreements need to be carefully constructed and measured against the company’s legitimate interests in protecting information and employee, customer and other important business relationships.

Protect the company at the gateways.

The Employee Mobility Program should also game-plan for the issues posed by the onboarding of new employees and the exit of departing employees.

Most companies focus only on departing employees. But candidates and applicants for employment need, in many industries and disciplines, to be screened. Some questions and issues include these:

  • Has the company made it clear from the outset that it honors the reasonable and valid post-employment obligations?
  • Has the company made clear from the outset that the employee should neither bring nor use any confidential information from a prior employer?
  • Do they currently work for a competitor?
  • Do they have post-employment agreements that restrict or disable their ability to work for you?
  • Are those agreements valid and enforceable against the employee if she joins your company in the anticipated role(s)?
  • Does that agreement include a provision requiring “return of company property”? If the applicant has already departed, has she carefully honored this obligation?
  • Do they possess knowledge that their former employer might consider confidential and at risk in the new role with your company?

Resolution of these and other questions in advance of making an offer can resolve a potentially deep thicket of discord and, maybe, litigation with the former employer.

Before parting ways: The departing employee poses different risks, because it opens a window to the loss of confidential information and trade secrets, as well as valuable goodwill residing in that departing employee. Once the company knows an employee is leaving, it should take certain steps to prevent continued access to information and assets and to remind the person of their ongoing obligations, including:

  • Shutting off access to email and other communication systems;
  • Placing automatic notifications on email and cellphones to direct business callers to the person now responsible for the duties once carried out by the departing employee;
  • Removing movement privileges around the facility;
  • Sequestering of company-owned and issued laptops, phones and other devices so that evidence of activities in the immediate term can, if necessary, be reviewed and preserved;
  • Gathering of all other company property; and
  • Conducting an exit interview if possible, that includes an explicit discussion of post-employment obligations and a description of the categories of information that the company considers confidential, proprietary and trade secrets.

Every company hopes to retain employees who materially help carry out the company’s mission. But planning for departure from day one — and putting into place an Employee Mobility and Trade Secret Protection Policy and Program — is necessary in today’s workplace.