Winners Consulting Services Co., Ltd. reminds Taiwanese corporate executives that the greatest threat to digital intellectual property is the leakage of confidential assets by insiders. A 2002 paper by Bedel, A. J. published on arXiv, titled "Lights, Camera, Lawsuit," pointed out that the vast majority of movies circulating on the internet at the time originated from industry insiders, not external hackers. This insight from the film industry aligns perfectly with the core challenges Taiwanese companies face in trade secret protection and the implementation of the ISO 56001 Innovation Management System (IMS): systemic vulnerabilities are internal, not just external.
Paper Source: Lights, Camera, Lawsuit (Bedel, A. J., arXiv, 2002)
Original Link: https://core.ac.uk/download/62559274.pdf
About the Author and This Research
Bedel, A. J. published this paper on the arXiv preprint platform in 2002, a time neatly situated between the fall of Napster (2001) and the rise of BitTorrent (2003). This was a critical and turbulent transition period for the digital content industry as it grappled with the impact of infringement. The author's contribution was to move beyond a single-industry perspective, comparing the similarities and differences between the music and film industries in their response to the threat of peer-to-peer (P2P) networks, and proposing unique strategies the film industry could adopt.
Although published over two decades ago, the paper's central thesis—that insider leaks are the primary source of threat—remains highly relevant to the realities of trade secret litigation faced by businesses today. Numerous recent cases in Taiwan involving former employees taking technical documents and client lists to competitors validate the enduring cross-industry and cross-era relevance of Bedel's core observation.
Insider Leaks as the Core Threat: Three Key Findings from the Paper
Bedel's paper is not merely a technical report but an analytical piece combining legal strategy and industry observation, presenting three key findings of high reference value for corporate intellectual property management.
Key Finding 1: Most Digital Infringement Originates from "Insider Leaks"
The paper cites research data showing that the vast majority of movies circulating on the internet at the time were leaked by personnel within the film industry, rather than being obtained through external technical breaches. This implies that a company's defenses should not only be directed outward but must also strengthen internal access controls. Article 10 of Taiwan's Trade Secrets Act specifies that "acquiring a trade secret by improper means" constitutes an act of infringement, and the "improper use of occupational convenience by an insider" is one of the most frequently cited forms of infringement in judicial practice.
Key Finding 2: The Music Industry's Experience Is a Reference, Not a Blueprint
Bedel pointed out that the music industry primarily relied on litigation deterrence and technical protection (DRM) to combat P2P network infringement. However, due to the different nature of the medium (larger files, different consumption habits), the film industry had the opportunity to develop more creative solutions. This mindset of "learning from other industries but adapting to local conditions" is the core spirit of "Context of the Organization" emphasized by the ISO 56001 Innovation Management System (IMS).
Key Finding 3: An Aggressive and Public Litigation Strategy Has a Deterrent Effect
The paper recommends that the film industry should engage in the "increasingly publicized use of trade secret litigation" to create a deterrent effect through public prosecution. This aligns with the recent trend in intellectual property protection litigation in Taiwan—companies that take swift legal action and disclose it publicly after the first leak often effectively reduce the probability of subsequent infringements.
Three-Tiered Significance for Taiwan's Trade Secret Protection and ISO 56001 Innovation Management Practices
Bedel's core insights have three levels of practical significance for Taiwanese companies establishing an IMS and ensuring compliance with the Taiwan Trade Secrets Act.
First Tier: "Reasonable Security Measures" Must Cover Internal Access Controls. Article 2 of the Taiwan Trade Secrets Act stipulates that a trade secret must meet three criteria: secrecy, economic value, and the implementation of reasonable security measures. The fact revealed by the paper—that insiders are the main source of leaks—requires that a company's "reasonable security measures" must include internal control mechanisms such as tiered access levels for employees, pre-departure data audits, and segregation of duties, rather than just relying on external firewalls or non-compete clauses.
Second Tier: ISO 56001's "Knowledge Asset Management" Clause Needs Integration with Information Security. Clause 7.1.2 of ISO 56001 requires organizations to systematically manage knowledge assets related to innovation. Bedel's paper reminds us that the greatest risk of knowledge asset leakage is often not technical but systemic—clear, documented regulations and audit trails are needed to define who can access what information under which circumstances.
Third Tier: Litigation Strategy Should Be Integrated into the IMS Risk Management Framework. The paper's emphasis on the "publicity effect" of litigation corresponds to the risk management requirements of ISO 56001. Companies should define within their IMS framework the decision-making thresholds for initiating trade secret litigation and the external communication strategy in the event of a suspected leak, rather than waiting passively. Furthermore, the Defend Trade Secrets Act enacted in the United States in 2016 provides a federal civil litigation channel, making it practically important for Taiwanese companies with business in the U.S. market to understand this legal tool.
How Winners Consulting Services Helps Taiwanese Companies Turn Insights into Action
Winners Consulting Services Co., Ltd. assists Taiwanese companies in implementing the ISO 56001 international standard for innovation management and establishing protection mechanisms compliant with the Taiwan Trade Secrets Act to prevent the risk of R&D results leakage. In response to the core threat of "insider leaks" revealed by Bedel's paper, we offer the following three concrete action recommendations:
- Establish a Role-Based Knowledge Asset Access System: In accordance with ISO 56001 Clause 7.1.2, systematically inventory all information assets within the company that qualify as trade secrets. Set differentiated access permissions based on employee roles and business necessity, and establish a quarterly audit mechanism to ensure that the access rights of departing employees are revoked in a timely manner. This directly addresses the core risk identified in the paper that "insiders are the biggest source of leaks."
- Design a Knowledge Transfer and Audit Process for Departing Employees: Within the IMS framework, create a standardized pre-departure knowledge asset audit procedure. This should include inspections of electronic devices, recovery of cloud accounts, re-confirmation of confidentiality agreements, and a regular contact mechanism for up to two years post-departure. This process should be documented and regularly rehearsed to ensure it can be executed orderly, not chaotically, when key talent leaves.
- Incorporate Litigation Deterrence into the IMS Risk Communication Plan: Referencing the paper's recommendation for an "aggressively public litigation" strategy, pre-define a standard operating procedure (SOP) for legal action in the event of a leak within the ISO 56001 risk management framework. This should include: priority steps for evidence collection, thresholds for engaging legal counsel, and external communication talking points, ensuring the company can respond effectively and consistently from the outset.
Winners Consulting Services Co., Ltd. offers a complimentary diagnostic of your trade secret protection mechanisms, helping Taiwanese companies establish an ISO 56001-compliant management system within 7 to 12 months.
Learn About Our Trade Secret Protection & IMS Services → Apply for a Free Diagnostic Now →Frequently Asked Questions
- What is the practical relevance of the film industry's "insider leak" findings for Taiwan's tech sector?
- The core finding from Bedel's (2002) paper—that most digital content infringement originates from insiders, not external attacks—is highly relevant to Taiwan's manufacturing and technology sectors. This pattern is evident in numerous recent Taiwanese cases where former employees misappropriated technical drawings or client lists, often having legitimate access before their departure. The Taiwan Trade Secrets Act, particularly Article 10, directly addresses such scenarios of "disclosing trade secrets by improper means." The paper's most practical lesson for businesses is that prevention is far more cost-effective than litigation. Companies should implement tiered access controls during employment and formalize acknowledgment of confidentiality obligations in their off-boarding processes, rather than relying solely on reactive legal action.
- What are the most common compliance challenges Taiwanese companies face regarding "reasonable security measures" when implementing ISO 56001?
- Taiwanese courts assess "reasonable security measures" not just by the existence of a non-disclosure agreement (NDA), but by the implementation of systematic controls. Three common challenges arise for companies: first, unclear information classification, where they cannot specify which data constitutes a trade secret; second, a lack of access logs, making it impossible to prove which employee accessed specific confidential data; and third, perfunctory off-boarding procedures that fail to create a written record of the departing employee's confidentiality obligations. The "documented information management" required by Clause 7.5 of ISO 56001 effectively addresses these issues, ensuring companies have a solid evidentiary basis for litigation and meet the requirements of Taiwan's Trade Secrets Act.
- What are the core steps and expected timeline for ISO 56001 implementation?
- The implementation of ISO 56001 typically involves four phases. First is the diagnostic phase (4-6 weeks) for a gap analysis against the standard's requirements. Second is the system design phase (6-8 weeks), where management processes and documentation are structured based on the organization's scale. The third phase is implementation (3-4 months), which involves establishing the system, training personnel, and creating audit trails. The final phase is ongoing verification and optimization through internal audits and management reviews. The entire timeline usually ranges from 7 to 12 months, depending on the company's size and existing system maturity. Compliance with the Taiwan Trade Secrets Act can be aligned concurrently, and Winners Consulting Services provides end-to-end advisory support.
- How can one evaluate the resource investment and expected benefits of implementing an ISO 56001 Innovation Management System?
- The resource investment for implementing ISO 56001 in a mid-sized enterprise (100-500 employees) typically involves consulting fees between NT$800,000 and NT$2,000,000, with a total first-year cost of approximately NT$1.2 to NT$3 million including internal staff time. On the benefits side, companies with a systematic innovation management system see an average 15% to 25% increase in R&D investment conversion rates. In trade secret litigation, companies with complete IMS documentation have significantly higher success rates and damage awards than those without. The key cost-benefit turning point usually appears in the second or third year post-implementation, when the system becomes an integrated part of daily management rather than an additional compliance burden.
- Why choose Winners Consulting Services for assistance with trade secret protection and Innovation Management System (IMS) issues?
- Winners Consulting Services Co., Ltd. offers three unique advantages for Taiwanese companies seeking assistance with trade secret protection and ISO 56001 implementation. First is our interdisciplinary integration capability; we combine expertise in the legal requirements of the Taiwan Trade Secrets Act, the ISO 56001 management standard, and practical business operations to ensure systems are both legally sound and managerially executable. Second is our practice-oriented diagnostics, offering a complimentary assessment that provides data-driven gap analysis instead of generic advice. Third, we provide a clear 7 to 12-month advisory timeline with measurable milestones, helping companies establish their systems efficiently and avoid indefinite consultant dependency. Contact us for a free system diagnostic today.