{"version":"1.0","provider_name":"Baker &amp; Associates Blog","provider_url":"https:\/\/www.bakerslaw.com\/blogs\/8183","author_name":"doadmin","author_url":"https:\/\/www.bakerslaw.com\/blogs\/8183\/author\/doadmin\/","title":"Remember: Reverse engineering is not misappropriation","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kSkG9CQEmZ\"><a href=\"https:\/\/www.bakerslaw.com\/blogs\/8183\/remember-reverse-engineering-is-not-misappropriation\/\">REMEMBER: REVERSE ENGINEERING IS NOT MISAPPROPRIATION<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.bakerslaw.com\/blogs\/8183\/remember-reverse-engineering-is-not-misappropriation\/embed\/#?secret=kSkG9CQEmZ\" width=\"600\" height=\"338\" title=\"&#8220;REMEMBER: REVERSE ENGINEERING IS NOT MISAPPROPRIATION&#8221; &#8212; Baker &amp; Associates Blog\" data-secret=\"kSkG9CQEmZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.bakerslaw.com\/blogs\/8183\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"As a business owner, you take great pains to protect your trade secrets. After all, they are essential to your endeavors and competitive success. There are many strategies you can utilize to secure trade secrets and prevent the risk of theft or misappropriation. However, even after making a reasonable effort to keep these secrets, there"}