
Pro-Tec Data Services
At Pro-TecData, we offered services designed to safeguard trade secrets, protect confidential business information, ensure data privacy compliance, and provide expert litigation support.
Our proven methodologies helped companies mitigate risks, prevent information loss, and strengthen their intellectual property protection strategies.
Highly Credible Trade Secrets Expert Witness and
Effective Trade Secret Litigation Consultant

Are you looking for a litigation consultant and a highly credible expert witness with the best credentials for determining whether your client’s or your opponent’s company has taken reasonable measures or reasonable efforts to protect information as trade secret? Naomi Fine, Esq. delivers thorough and thoughtful analysis and articulate testimony based on 25+ years of experience working with hundreds of companies from a wide range of industries. Expert witness for several high-profile Economic Espionage Act cases (US v. Zhang, US v. Shiah, US v. Lee & Ge). Litigation consultant for many high-profile civil and criminal trade secret misappropriation cases.
Engaging Motivational Keynote Speaker: Information Protection, Private Data Protection, and Trade Secret Protection in 10 Proven Steps

Naomi Fine, Esq., industry leading expert on trade secrets and information protection, is an authoritative and enthusiastic speaker, recognized expert and leader, and catalyst to help change the way your organization thinks about confidential business information, data security, trade secret protection, and intellectual property protection. Naomi Fine: Delivers insight and intelligence with enthusiasm and an easy-to-listen-to and learn speaking style. Brings experience from conducting thousands of executive briefings, management training sessions, employee education programs, and internal company workshops that change the way people think about valuable information and intellectual property. Is a featured speaker for many industry associations, including the American Electronics Association, the American Society for Industrial Security, the Society of Competitive Intelligence Professionals, the Information Systems Security Association, the Practicing Law Institute, the Computer Security Institute, the EDP Auditors Association, the Association of Records Managers and Administrators, the High Technology Crime Investigators Association, the Trade Secret Law Institute, and the Risk and Insurance Managers Conference. Is a Continuing Legal Education (CLE) accredited speaker for the American Corporate Counsel Association and has served as a guest lecturer for Golden Gate University's Information Security Certificate Program yellow rule We welcome your invitation to have Naomi Fine present to your company or professional group. Naomi Fine has delivered presentations on the most pressing issues related to information and intellectual property protection. Some of her more recent presentations, which have been delivered in-house as well as to the conferences listed, include: Information Classifications: Legal, IT and Practical Considerations RSA Motivating, Enabling and Enforcing Information Protection IP Summit Information Protection in the Innovation Economy Organizational Development Network. Changing Corporate Culture, One Mind at a Time Chief Executive Forum Information Protection Compliance in the Supply Chain. Computer Security Institute’s NetSec Conference Intellectual Asset Management: From Information to Intellectual Property to Profits Society of Competitive Intelligence Professionals (SCIP) Supply Chain Information Protection. Product Security and IP Protection Summit Sponsored by Intel and Cisco Optimizing Information Assets American Petroleum Institute Conference for Executive Auditors. Capturing and Safeguarding Information and Intellectual Property: Bottom Line Savings and Top Line Revenue Generation. The Conference Board Council on Competitiveness Web-Based Information and Intellectual Property Protection Solutions American Society for Industrial Security (ASIS) Technology to Protect Your Competitive Advantage and Intellectual Property. Women in Technology International (WITI): Silicon Valley Technology Summit Internet- and Intranet-Based Multimedia Information Protection Solutions Computer Security Institute (CSI) NetSec Conference Protecting Information in the Age of Hyper-Competition High Technology Crime Investigation Association (HTCIA). Securing Competitive Advantage with Intellectual Property Rights Society of Competitive Intelligence Professionals (SCIP). The Core of IP Protection: Ideal and Real Reusable Application-Specific Intellectual Property Developers (RAPID) Protecting Information in the Real Virtual Organization: Your Extended Enterprise. Computer Security Institute (CSI): Annual Computer Security Conference and Exhibition Information Ownership and Classification: Legal and Practical Considerations American Society for Industrial Security (ASIS). Confidential Information Ownership and Classification: Legal and Practical Considerations Computer Security Institute (CSI): NetSec Protecting Information in the Real Virtual Organization:Your Extended Enterprise. Marsh, Inc: Network/Internet Security Conference. The Virtual Organization: Opportunities for Competitive Intelligence, Challenges to Information Protection Society of Competitive Intelligence Professionals (SCIP). Protecting Information in the Age of Competition High Technology Crime Investigation Association (HTCIA) Keynote Speaker: Yours, Mine and Ours: Owning and Maintaining Confidentiality of Information Shared in the Virtual Organization Computer Security Institute (CSI): Annual Conference and Exhibition. Moving Beyond the Confidentiality Clause: Implementing and Enforcing Effective Information Protection Strategies Council on Management in Education: Workshop in Trade Secrets Forum Protecting Information in the Virtual Organization American Society for Industrial Security (ASIS): Annual Seminar and Exhibits The Business Ethics of Competitive Intelligence: Navigating the Gray Zone Pharmaceutical Business Intelligence Research Group (PBIRG). Information Protection Models: Key Issues and Trends Drug Information Association (DIA). The Economic Espionage Act of 1996: New Stakes in the Gray Zone Pharmaceutical Market Research Group (PMRG) The Economic Espionage Act of 1996: A Wake-Up Call and The Economic Espionage Act of 1996: Building a Compliance Program. Society of Competitive Intelligence Professionals (SCIP) Is Your Information Protection Program Outdated? Computer Security Institute (CSI): Annual Computer Security Conference. The Economic Espionage Act of 1996: How Will You Comply? American Corporate Counsel Association (ACCA) Protecting Your Information in the Age of Competition. Golden Gate Chapter CPCU: Intellectual Property Seminar, All Industry Day Protecting Intellectual Property The Haas School of Business: Raising, Making and Keeping Money: Strategies for Successful Entrepreneurs "Treading Lightly." How to maximize your competitive intelligence effectiveness while remaining ethical and complying with such legal constraints as the Economic Espionage Act. Cambridge Institute: Competitive Intelligence Seminar Protecting Trade Secret Information: Key Issues and Trends. Cambridge Institute: Trade Secrets Seminar Faculty Chair; Counterintelligence; Valuing and Protecting Business Information: Key Issues and Trends; The Economic Espionage Act: Turning Fear into Compliance Cambridge Institute: Valuing and Protecting Business Information. Keynote Speaker: The Economic Espionage Act of 1996: How Will You Comply? Computer Security Institute (CSI): NetSec The Virtual Organization: Opportunities for CI, Challenges to Information Protection Society of Competitive Intelligence Professionals (SCIP). Will Counterintelligence Kill Competitive Intelligence? American Society for Industrial Security (ASIS): Annual Seminar and Exhibits
Pro-Tec Data’s Training creates a Positively Confidential corporate culture

Our training motivates and enables employees to contribute to trade secret protection, private data security, and confidential business information protection. We demonstrate how protecting information is essential to achieving your company’s strategic objectives, and we help employees understand why protecting information is good for them and your company. Our key training messages: Protecting information is important. We explain the risks of information loss. We describe the rewards of protecting information and its competitive advantage. We summarize the laws and legal obligations that require employees to protect your company’s information. Ten things each employee must do. We cover employee responsibilities for protecting information, bringing each of ten topic areas to life with examples, case studies, and engaging true/false questions. Where to go for more information. We review the people, policies, and other internal resources that assist employees with understanding how to protect information even when they need to make tough judgment calls. yellow rule Pro-Tec Data makes information protection training easy. Pro-Tec Data combines expertise in confidential business information and intellectual property protection with proficiency in training development and adult learning to bring you a turnkey solution: Engage all your employees Comply with regulatory training requirements. Avoid lawsuits and bad publicity. Enhance your intellectual property edge yellow rule. Choose from a menu of live, in-person training offerings: Fully facilitated training Train-the-trainer Organization-specific (e.g., R&D, sales, engineering) training yellow rule Use Positively Confidential Training to create a corporate culture that respects and protects information: Lively, interactive, instructor-led training. Best-practices training content customized to your company, easy for you and easy for your employees.
Expert Witness Services

With 30+ years of experience, Pro-TecData has provided expert analysis and testimony in both civil and criminal trade secret litigation cases. ✅ Expert Testimony in Trade Secret Misappropriation Cases – Naomi Fine has testified in high-profile cases, including Economic Espionage Act violations (US v. Zhang, US v. Shiah, US v. Lee & Ge). ✅ Trade Secret Litigation Consulting – Analyzing corporate protection measures to determine whether a company exercised reasonable efforts to safeguard trade secrets. ✅ Forensic Review & Evidence Analysis – Examining trade secret claims, security measures, and internal policies to support litigation teams. ✅ Regulatory & Compliance Support – Assisting businesses in meeting industry standards and legal obligations to protect proprietary information. Our expert witness services provide unbiased, research-backed testimony and legal analysis to help businesses defend their intellectual property rights in court.
Information Protection Consulting

Pro-Tec Data applies in-depth experience working with hundreds of Fortune 2000 companies to provide proven solutions that work in today's complex business environment. Our information protection, data security, personal data security, trade secret protection, and intellectual property protection consulting includes: Tailored information protection strategy. Pro-Tec Data assists you in developing the right confidential company information protection, data security, personal data security, trade secret protection, and intellectual property protection strategy for your company. Information protection risk assessment: We assess your company's information loss risks and security gaps to help you pinpoint the most effective strategy to improve company information security, trade secret protection, private data security, and intellectual property protection. We evaluate business operations and corporate culture. We help you leverage your company’s current information protection resources and recommend improvements that enhance your return on investment. We use a cost-effective risk assessment approach that ensures executive support for the results. Trade secret audit: We compare your existing information protections to those required to establish reasonable efforts in trade secret litigation. We tailor our recommendations to prepare your company to win trade secret lawsuits and to help your company meet regulatory information security requirements, policy mandates, and contractual obligations. We provide an action plan for your company to achieve both baseline standards and industry best practices for protecting trade secrets, confidential information, and private data. Information classification schema and information taxonomy. Pro-Tec Data helps you determine the best information classification schema and information taxonomy for your company based on your company's needs and industry best practices. We help implement change management business processes that ensure a smooth and seamless transition to new data classifications. Confidential information identification and classification. We help you identify and classify your company’s sensitive information, trade secrets, and private information. Pro-Tec Data helps you develop categorical lists of information, by classification, as a reference for your employees and system (e.g., DLP). We make this process easy by using Pro-Tec Data’s proprietary industry-specific templates. Information protection policies and procedures. Pro-Tec Data helps you keep current and comprehensive your information protection, trade secret protection, personal data security, and data security policies, guidelines, standards, and procedures. We develop tailored information protection, trade secret protection, private data protection, and data security policies that are effective in your business environment and meet legal standards, such as privacy and information security requirements from state, national, and global privacy laws. yellow rule Measurable success. Pro-Tec Data helps you develop metrics to gauge information security, trade secret protection, classification system, and intellectual property protection success. We help implement business processes that hold stakeholders, including non-employee contingent workforce members, such as contractors, consultants, suppliers and business partners, accountable to protect the information your company entrusts to them. Pro-Tec Data helps you to build positively confidential business environments where information security, trade secret protection, and intellectual property growth are imbued corporate values. Our change management approach helps employees respect the value of information and intellectual property and understand the importance of safeguarding it.