Trade Secret Theft Study
Read the following scenario. Futuretek sells high-tech computer chips and software to smartphone manufacturers worldwide. Futuretek maintains two software databases: one containing Futuretek’s customer list with nonpublic contact information for key personnel, and the other containing customer purchasing trends. The information in the two databases is available for employees to view and use in connection […]


