Get the Global IP Investigations and Enforcement Perspective

Industry content delivered straight to your inbox.
Email address
Secure and Spam free...

Blueprint for Screening Candidates / Organizations – Trade Secrets Protection

As a follow-up to my last post titled, “Know Your Researcher – Academic Espionage – Trade Secrets Theft,” I embedded an FBI Counterintelligence Strategic Partnership Intelligence Note (SPIN) dated September 2015.

If you haven’t had a chance to look it over, it warrants a closer look.

The last two pages of the document provide a blueprint—a list of things for organizations to consider when screening employee candidates and other organizations before collaboration starts. But, even if collaboration has begun, it is still a useful guide in determining if you should continue or end the relationship.

This blueprint is a particularly useful guide for general counsel, human resources and private investigators (retained on behalf of organizations) to conduct enhanced background screening of potential employees.

*All information in italics is extracted from the 2015 FBI handout.


The first step to protecting your business or university is to identify the threat.

By understanding the threat and your business or university’s critical technologies, it can help you identify methods in which they can be easily stolen.

Theft, bribery, espionage, blackmail, hacking, and electronic intercepts are just some of the different methods individuals may use to steal trade secrets.

  • Who would benefit from your information, processes, or strategies?
  • Who are your competitors?

IP Management:

  • The next step is to identify proprietary or trade secrets or IP.
  • This includes, but is not limited to the manufacturing process, financial information, list of suppliers and customers, chemical formulas, marketing strategies, and R&D data.
  • Have professors, students, and employees sign non-disclosure agreements.
  • Identify foreign personnel who are sponsored by professors/employees.
  • Understand agreements between international organizations and US businesses and universities.
  • Identify and label or mark IP or sensitive data that is most important to US businesses and universities.
  • Identify methods in which professors and employees are contacted (for example, e-mail, social media, conferences) and educate them on what solicitation looks like.

Questions to Ask Yourself:

If you wonder about the safety of your research or intellectual property, or the legality of your interactions with China, ask yourself the following questions:

  • Do you collaborate with anyone who is currently in China?
  • Do you have any publications? If so, in which journals and with whom?
  • Which institutions are they associated with?
  • What type of funding do you have to conduct your research
  • Where do you obtain your funding?
  • Do you belong to any professional societies? If so, which ones and where are they based?
  • Do you travel regularly to China?
  • Is it for business or pleasure or both?
  • How long do you stay in China during these trips?
  • Are you working with anyone in China on your research during this time?
  • How do you maintain contact with your laboratory in the United States while in China?
  • Do you contact it via computer (login to laboratory site)?
  • Do you plan to return to China permanently?
  • What will you do for employment?
  • Where did you attend school?
  • What type of degrees did you earn?
  • How did you apply for a fellowship, post-doctoral position, guest researcher or other employment with your current employer?
  • Did someone you know refer you to this lab, university, or principal investigator?
  • What type of research do you conduct?
  • What are the applications of this research?
  • Do you expect to get a patent from this research?
  • With whom are you working at your laboratory?
  • Do you collaborate with individuals from other research institutions in the United States or abroad?


The theme here is “due diligence.” As in any other sensitive business /project arrangement, take all reasonable steps to determine the true “spirit” of the person(s) or organization(s) that have or seek a collaborative relationship with you.

Disclaimer: is offered as a service to the professional IP community. While every effort has been made to check information in this blog, we provide no guarantees or warranties, express or implied, with regard to content provided in We disclaim any and all liability and responsibility for the qualification or accuracy of representations made by the contributors or for any disputes that may arise. It is the responsibility of the readers to independently investigate and verify the credentials of such person and the accuracy and validity of the information provided by them. This blog is provided for general information purposes only and is not intended to provide legal or other professional advice.

Did you find this post useful?
I agree to have my personal information transfered to MailChimp ( more information )
Join other IP protection professionals, i.e., investigators, attorneys, and brand protection specialists and receive updates straight to your inbox.
We hate spam. Your email address will not be sold or shared with anyone else.

Ron Alvarez is an IP investigations and protection consultant and writer in New York City. He is a former NYPD lieutenant where he investigated robbery, narcotics, internal affairs, and fine art theft cases. Ron has since coordinated the private investigation of international fraud and money laundering cases, as well as IP-related investigations and research involving the four pillars of IP: copyright, patents, trademarks, and trade secrets. Ron is a graduate of the FBI National Academy and earned a B.A. in Government and Public Administration from John Jay College of Criminal Justice in Manhattan. He has written a number of articles for various investigative publications, as well as published "The World of Intellectual Property (IP) Protection and Investigations" in November 2021.

3 comments on “Blueprint for Screening Candidates / Organizations – Trade Secrets Protection

  1. Tom Manley

    Thank You RJA
    The Conviction of the CIA case Officer (retired) is grim.
    One person and create a lot of jeopardy for important work.
    I am concerned for the appearance of apparent corruption in the FBI I worked
    for most of my adult life. Good Work

  2. Pingback: So…What is the China-Espionage “Thousand Grains of Sand” Theory? – IP PI BLOG

  3. Pingback: University Chancellor Announces Updated Background Screening Policy for Foreign Students / Lab Researchers – IP PROBE – Blog

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Get the Global IP Investigations and Enforcement Perspective

Industry content delivered straight to your inbox.
Email address
Secure and Spam free...