Professional Documents
Culture Documents
http://www.businessweek.com/articles/2012-03-14/the-great-brain-robbery
Vigilance in the area of trade secrets is required, particularly because once a trade secret is made public all ownership is lost.
- Computer Assocs. Intl, Inc. v. Altai, Inc., 918 S.W.2d 453, 457 (Tex. 1996) (emphasis added)
Before information can be termed a trade secret, there must be a substantial element of secrecy.
- Astoria Indus. of Iowa, Inc. v. SNF, Inc., 223 S.W.3d 616, 634 (Tex. App.Fort Worth 2007, pet. denied)
Scott Adams
Ponemon Institute LLC. (2009). Data Loss Risks During Downsizing: As Employees Exit so Does Data.
Ponemon Institute LLC. (2009). Data Loss Risks During Downsizing: As Employees Exit so Does Data.
Ponemon Institute LLC. (2009). Data Loss Risks During Downsizing: As Employees Exit so Does Data.
Top 5 states with trade secret case filings: California, Illinois, Michigan, New York, Texas 7-9 years: How often trade secret litigation has doubled in the United States 85%: How often the alleged misappropriator was known to the TS owner Employee, former employee, or business partner Half of information misappropriated is business information; the other half is technical information and know-how 42%: How often the TS owner prevailed on all TS claims in litigation 5%: How often TS owner prevailed on some TSs but not others
Almeling et al., A Statistical Analysis of Trade Secret Litigation in Federal Court, 45 Gonzaga L.R. 291 (2009) See also Almeling et al., A Statistical Analysis of Trade Secret Litigation in State Courts, 46 Gonzaga L.R. 291 (2010)
The Law
If at first you don't succeed [at protecting your trade secrets], you're not Chuck Norris.
Texas
Trade secret: A trade secret consists of a formula, process, device, or compilation which one uses in his business and which gives him an opportunity to obtain an advantage over competitors who do not know or use it.
Computer Assoc. Intl, Inc. v. Altai, Inc., 918 S.W.2d
453, 455 (Tex. 1996); Hyde Corp. v. Huffines, 158 Tex. 566, 314 S.W.2d 763, 777 (Tex.), cert. denied, 358 U.S. 898 (1958).
Texas
Trade secret: Factors to be considered include: (a) the extent to which the information is known outside of the business of the party claiming the information is a trade secret (b) the extent to which the information is known by employees and others involved in the partys business (c) the extent of the measures taken by the party to guard the secrecy of the information (d) the value of the information to the party and to his or her competitors (e) the amount of effort or money expended by the party in developing the information (f) the ease or difficulty with which the information could be properly acquired or duplicated by others
- In re Bass, 113 S.W.3d 735 (Tex. 2003).
Texas
Misappropriation: Use or disclosure of a trade secret that was acquired through a relationship of trust or through fraud or other improper means, including breach of: Fiduciary relationship Employment relationship Express or implied contract Other confidential relationship Hyde Corp. v. Huffines, 158 Tex. 566, 314 S.W.2d
763,770 (Tex.), cert. denied, 358 U.S. 898 (1958)
Texas
The mere fact that knowledge of a product might be acquired through lawful means such as inspection, experimentation, and analysis does not preclude protection from those who would secure that knowledge by unfair means. Although information generally known and readily ascertainable is not protectable, the fact that information is discoverable by lawful means does not deprive its owner of protection from one acquiring it by unfair means.
California
Trade secret: Information, including a formula, pattern, compilation, program, device, method, technique, or process, that: (1) Derives independent economic value, actual or potential, from not being generally known to the public or to other persons who can obtain economic value from its disclosure or use; and (2) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. Cal. Civ. Code 3426.1(d) (adopting UTSA)
California
Misappropriation: (1) Acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (2) Disclosure or use of a trade secret of another without express or implied consent by a person who: (A) Used improper means to acquire knowledge of the trade secret; or (B) At the time of disclosure or use, knew or had reason to know that his or her knowledge of the trade secret was: (i) Derived from or through a person who had utilized improper means to acquire it; (ii) Acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or (iii) Derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or (C) Before a material change of his or her position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake. Cal. Civ. Code 3426.1(b) (adopting UTSA)
Advertising & marketing strategies Contract and payment terms Cost information Customer lists Engineering drawings and software Formulas for product designs Manufacturing processes
Marketing & competitor research Pricing, revenue, and sales information Profit margins Software Strategic plans
http://www.fbi.gov/about-us/investigate/counterintelligence/economic-espionage/
Identity of confidential information Access to confidential information Investigation & screening of persons prior to access Maintaining confidentiality of information Including disclosure process, public and otherwise Use of technology to limit access & preserve confidentiality Legal obligations related to confidential information Access, maintenance, copies & storage Nondisclosure & noncompete agreements Audit & reporting requirements Misappropriation plan Document trade secret development & use Document trade secret value (sales, royalties, licenses) Educating employees
Mark confidential information as such Police access to information Limit & track access, copies & downloads; password protect Be aware of access by and storage on mobile devices Including ability to remotely wipe or block access Non-disclosure agreements & audit rights Employment agreements & non-competes Jurisdictional limitations (especially outside the United States) Ownership rights & joint confidential information (joint ventures)
Technology:
Legal:
Background checks of new employees Investigate vendors, OEMs & partners Conflicts & competition E.g., joint venture or M&A due diligence
Other Considerations
Noncompete Agreements
Texas Covenants Not to Compete Act (Tex. Bus. Com. Code 15.50-15.52) An enforceable non-compete must: Be ancillary to or part of otherwise enforceable agreement at the time the agreement is made; Protect a legitimate business interest; Contain reasonable limitations as to the scope of activity to be restrained; Contain reasonable geographical limitations; and Contain reasonable durational limitations
- Marsh USA Inc. v. Cook, 354 S.W.3d 764 (Tex. 2011)
See Robert Kantner, Protecting Trade Secrets Internationally Through a Comprehensive Trade Secret Policy (available through Jones Day) See also http://tradesecretshomepage.com/indict.html#_Toc9924962 (describing convictions under the Economic Espionage Act)
The point: You need to have a policy for receiving confidential information too!
If you disagree that information is confidential, say so Need to know still applies
Use public information if possible (no thank you) Take only what needed (not a buffet) Take only when needed (due diligence)
- Use hand soap - Get a flu shot - Get regular checkups - Watch for flu symptoms - Get a prescription - Take your medicine
CREATE.org, Trade Secret Theft: Managing the Growing Threat in Supply Chains (available at http://www.create.org/views/trade-secret-theft-managinggrowing-threat-supply-chains ) Nicola Searle, The Criminalization of the Theft of Trade Secrets: An Analysis of the Economic Espionage Act, IP Theory: Vol. 2: Iss 2, Article 2 (2012) (available at http://www.repository.law.indiana.edu/ipt/vol2/iss2/2) J. Benjamin Bai and Guoping Da, Strategies for Trade Secrets Protection in China, 9 Nw. J. Tech. & Intell. Prop. 351 (2011) (available at http://scholarlycommons.law.northwestern.edu/njtip/vol9/iss7/1) State Bar of Texas Unfair Competition and Trade Secrets Committee website: http://texasbariplaw.org/committees/committee/trade-secrets/