Sunday, April 22, 2018

Management & Values

In the trend of strong development and integration, one of KENFOX's top concerns is human resources. We always seek to recruit competent staff and after entering the company, they are trained to upgrade their professional skill through domestic and oversea IP training courses.

In addition, each staff enjoys training within company and chances to be involved in practice through specific cases so as both to learn theory and to experience practice, which does much to develop them comprehensively.

Moreover, KENFOX's staff are made aware of self-studying by means of internet network or distance studying.

Training programs vary from this section to another and from this individual to another. Particularly, some courses last several years, whereas some only several months etc. Generally speaking, KENFOX always regards training as a task of regular and great interest.


We aim our attention at recruiting excellent graduates and experts who ever worked in State's organs, universities, research institutes and in other IP law firms.

Ethical principles

  • Great honesty, high quality and optimal efficiency.
  • Clients' interest always comes high in our service aim.

Ethical management activities

  • Heads of the departments take in charge of:
    • checking the truthfulness of any information before this information is  provided to clients.
    • checking whether or not yet pieces of work are optimally performed and seeing whether there can be better ways to render the work more efficiently and to reduce costs for clients.
  • Always keeping the staff aware of the said ethical principles and regularly checking implementation thereof.

    Ethical policies

    We offer preferences (e.g. discount in service costs or the like) to clients of potentiality or long-term cooperation or having a considerable number of applications, even in case of no request from them.

    Client relationship

    Our current client base comprises:

    • Domestic as well as oversea individuals and organizations
    • Designers and inventors.
    • Research institutes and universities
    • Professional organizations in the IP field as other IP law firms etc.

    Types of our relationships with clients:

    • As a representative: under clients' authorization, we are on their behalf to carry out pieces of work in conformity with our company's functions such as:
      • proceeding with procedures on establishing IP rights before State's competent organs in Vietnam and foreign countries.
      • enforcing IP rights deal with disputes, proceed with litigation and institute legal proceedings at the Court.
    • As a consultant: we provide legal consultancy to our clients case by case or by signing long-term contracts.

    Information management & security

    In KENFOX, information is handled on a group base. Concretely, each group of attorneys is assigned to take in charge of a certain number of clients. Thus, attorneys in this group can have no information on clients under responsibility of other groups and vice versa.

    Especially, in order to separate information belonging to different clients who can be competitors, clients of the same fields are assigned to different groups of attorneys, each being responsible from A to Z for a client and getting no other client of the same field.

    The above method is applied in combination with the said information security methods:

    • All original documents are carefully and tidily stored in filing safes. Data in computers are arranged according to gradation, and computers are provided with access codes that are regularly changed.
    • The company's administration is decentralized, each level having its proper responsibility. Information is kept known within each section only and yet in each section, each individual knows his information only.
    • During the work process, important waste documents are set on fire, whereas normal waste documents are cut to pieces or thrown straight away to waste bins.
    • All the computers containing important and confidential data and information are not connected to Local Area Network (LAN) or Internet network.

    In case of any instruction or contract from clients, jobs will be assigned to the key persons in charge to investigate and carry out. These persons will then entrust the jobs to their relevant inferiors. Concretely, jobs will be orally entrusted if they are not important or complicated. If jobs are important or complicated, they will be entrusted in writing so as to avoid any omission. Tasks and methods of implementation thereof are included in the written entrustment.

    We set forth only in-company liability procedures, where each individual takes legal responsibility for his implemented work before the company. In case anyone causes legal consequences, he will be subject to discipline or a fine and even liability before the Vietnamese Law.

    Our company is divided into various managing levels, wherein management is conducted both lengthwise and breadthwise. In other words, inferiors know information concerning their pieces of work only, but no information on others' work. Thus, only seniors can be well aware of inferiors' work and thus, have an overview of the company's work. With our existing management pattern, superiors can always control any access of inferiors.

    So that our client confidential information does not flow out of the company, we have been applying strict methods of managing information. Accordingly, only the members of the highest level in our company are entitled to keep confidential and important information. Also, we always seek to recruit sufficiently reliable employees and during the work process, our company's staff are regularly made aware of information confidentiality. Any action taken against the company regulations is appropriately treated.

    All original documents are carefully and tidily stored in filing safes. Data in computers are arranged according to gradation, and computers are provided with access codes that are regularly changed.

    Also, the company's administration is decentralized, each level having its proper responsibility. Information is kept known within each section only and yet in each section, each individual knows his information only.

    Furthermore, during the work process, important waste documents are set on fire, whereas normal waste documents are cut to pieces or thrown straight away to waste bins.

    All the computers containing important and confidential data and information are not connected to Local Area Network (LAN) or Internet network.

    In case of any instruction or contract from clients, jobs will be assigned to the key persons in charge to investigate and carry out. These persons will then entrust the jobs to their relevant inferiors. Concretely:

    • Jobs will be orally entrusted if they are not important or complicated.
    • If jobs are important or complicated, they will be entrusted in writing so as to avoid any omission. Tasks and methods of implementation thereof are included in the written entrustment.

    Corrective actions and preventive measures

    Corrective actions are applied when:

    • A task is completed with its quality not being high and implementation time thereof not being ensured.
    • A task is not completed.
    • Confidential information is revealed, causing damage to the company's as well as clients' interest.

    Corrective actions include:

    • Warning.
    • Docking salaries or rewards.
    • Demotion.
    • Transferring staff committing mistakes to another section.
    • Dismissal (as a extreme penalty)

    Preventive measures:

    • On working, staff are required to regularly report work processes, difficulties and advantages.
    • Deadlines are set to remind clients.
    • Seniors regularly check pieces of work implemented by inferiors to evaluate their implementation ability and find out shortcomings to timely overcome.
    LET OUR KEN LEAD YOUR WAY!

    Login Form