Appendices for Trade Secret Records
Appendices are additional documents you can add to an existing trade secret record to strengthen its protection, demonstrate security measures, and document the evolution of the secret itself.
Each appendix is sealed with its own blockchain timestamp, providing verifiable proof of its existence, date, and authenticity without exposing the file’s contents.
What Are Appendices Used For in Trade Secrets?
They allow you to document:
- The actual protective measures taken to safeguard the information.
- Evidence that access was restricted and controlled.
- Records of exchanges, deliveries, or authorized access.
- Improvements, updates, or technical variations of the secret.
- Legal documents related to the confidential handling of the material.
This is essential to demonstrate that the owner actively protected the secret, a fundamental requirement for asserting trade secret rights.
What Types of Files Can You Add?
Confidentiality Agreements
- NDAs with collaborators
- NDAs with suppliers or external agencies
- Agreements signed with investors
- Contracts with freelancers or third parties
Technical Documentation
- Blueprints
- Formulas
- Internal processes and manuals
- Chemical, mechanical, or industrial specifications
- Prototypes and laboratory documentation
Access Control and Traceability
- Records of information exchanges or deliveries
- Logs showing who accessed the information, when, and why
- Evidence of secure storage
- Internal information-handling audits
Secret Updates
- New versions of the process
- Technical improvements
- Documented adjustments or variations
Why and When Should You Add an Appendix?
Adding an appendix strengthens the evidence of your record, as each additional document receives its own blockchain timestamp, increasing probative value in audits, legal disputes, or confidentiality conflicts.
Appendices are especially useful when:
- Information is shared under an NDA and you need to register evidence.
- The secret evolves, improves, or changes over time.
- You must document access controls or security measures.
- New technical documentation relevant to the secret emerges.
- You want to reinforce an existing record without creating a new one.