THE IMPORTANCE OF TRADE SECRET PROTECTION

Similar documents
Title 10: COMMERCE AND TRADE

SUBTITLE 12. MARYLAND UNIFORM TRADE SECRETS ACT

Trade Secrets Acts Compared to the UTSA

Trade Secrets Overview, Protection, and Litigation January 30, 2015 Mark C. Zebrowski

Gottschlich & Portune, LLP

MEMORANDUM OVERVIEW OF THE UNIFORM TRADE SECRETS ACT

Changing Landscape, US and Abroad 2017 In House Counsel Conference

Trade Secrets. Alternative to Patent Protection. Paul F. Neils Jean C. Edwards. Copyright 2010, Paul F. Neils, Esq. All rights reserved

Patents. What is a Patent? 11/16/2017. The Decision Between Patent and Trade Secret Protection

Defend Trade Secrets Act: What You Need to Know. May 31, 2016

Protecting Your Trade Secrets Under the DTSA

Trade Secret Misappropriation and Remedies. (including a look at the new federal Defend Trade Secrets Act of 2016)

1. If you have not already done so, please join the conference call.

BARTKO ZANKEL BUNZEL ALERT!

Intellectual Property Enforcement Ali S. Razai. OCPA Annual Educational Conference September 15, 2018

Remedies: Injunction and Damages. 1. General

THE LAW ON PROTECTION OF UNDISCLOSED INFORMATION

Intellectual Property. EMBL Summer Institute 2010 Dusty Gwinn WVURC

The Defend Trade Secrets Act: New Rights and Obligations for U.S. Employers

patents grant only the right to stop others from making, using and selling the invention

How patents work An introduction for law students

IP Panel: Protection for Nanotechnology Innovations

TRADE SECRETS ACT B.E (2002) BHUMIBOL ADULYADEJ, REX

E. I. dupont de Nemours & Co. v. Christopher: Toward a Higher Standard of Commercial Morality

Protection of trade secrets through IPR and unfair competition law

Trade Secrets Act B.E (2002)*

Utility Patent Or Trade Secret? Klaus Hamm November 1, 2017

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA SACRAMENTO DIVISION ) ) ) ) ) ) ) ) ) ) ) ) ) E.D. Case No.

Intellectual Property Issue-Spotting for the General Practitioner

Litigation Webinar Series. Trade Secret Protection and the Defend Trade Secrets Act: What s New, What s Different? Olga May Principal San Diego, CA

Framework Contract for the provision of Reference Mapping Products

LYCOMING LAW ASSOCIATION LUNCH AND LEARN MARCH 15, 2006

WHAT IS A PATENT AND WHAT DOES IT PROTECT?

DRAFT. PJC xxx.aa Question on Existence of Trade Secret

IxANVL Binary License Agreement

Chapter 13 Enforcement and Infringement of Intellectual Property Rights

Information and Guidelines Concerning the Patent and Copyright Process at East Tennessee State University

Municipal Code Online Inc. Software as a Service Agreement

Damages and Remedies in Civil IP Cases An U.S. Perspective

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF CALIFORNIA. This is an action in diversity by plaintiff Agency Solutions.Com.

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT January Term 2009

Mitel Networks(tm) SX-200 Integrated Communications Platform (ICP) Software License Agreement

Purchase Agreement TERMS AND CONDITIONS PRICES PAYMENT AND PAYMENT TERMS. Bright Ideas. Better Solutions. Benchmark is Branch Automation.

Software License Agreement

THE SUPREME COURT OF NEW HAMPSHIRE NEW HAMPSHIRE DEPARTMENT OF ADMINISTRATIVE SERVICES. Argued: October 15, 2014 Opinion Issued: April 30, 2015

Fox&Co Design General Terms & Conditions

PURCHASE ORDER ATTACHMENT IP-006 ADDENDUM TO SOFTWARE LICENSES WITH RAYTHEON

SOFTWARE LICENSE TERMS AND CONDITIONS

WAVE END USER LICENSE AGREEMENT

Case 2:16-cv RSL Document 1 Filed 05/25/16 Page 1 of 10 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE NO.

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

NETDUMA LIMITED NETDUMA ROUTER AND SOFTWARE END USER LICENCE AGREEMENT

MAPR END USER LICENSE AGREEMENT Last updated: April 20, 2016

END USER LICENSE AGREEMENT. KnowledgePanel - PC

TRADE SECRETS ACT, B.E (2002) 1. BHUMIBOL ADULYADEJ, REX; Given on the 12 th Day of April B.E. 2545; Being the 57 th Year of the Present Reign

Privacy and Information Security Law

Preliminary Injunctive Relief to Protect Trade Secrets and Enforce Non-Competes:

ENERCALC Software License Agreement

Duh! Finding the Obvious in a Patent Application

(a) Unless otherwise expressly stated to the contrary, terms used herein shall bear the following meanings:

Service Level Agreement

CYBONET Security Technologies. End User License Agreement

Remedies for patent infringement: Damages or injunctions?

General Contractual Terms and Conditions for the Sale of Standard Software of the company Engelmann Sensor GmbH

IMPORTANT READ CAREFULLY BEFORE INSTALLING OR USING THIS PRODUCT

Basic Patent Information from the USPTO (Redacted) November 15, 2007

National Cooperative Research and Production Act of ~ as amended on June 22, 2004 by the ~

Marsh USA, Inc. v Alliant Ins. Servs., Inc NY Slip Op 51555(U) Supreme Court, New York County. Ramos, J.

LATVIA Patent Law adopted on 15 February 2007, with the changes of December 15, 2011

PUBLIC LICENSE. 1. Definitions VERSION 2.0

DOLPHIN SOFTWARE LICENSE AGREEMENT

OTTO Archive, LLC CONTENT LICENSE AGREEMENT

Stop Thief! Go Recruiter! How To Stop Competitors From Stealing Your Trade Secrets And Employees, And What You Can Lawfully Poach In California

NITRO READER END USER LICENSE AGREEMENT

SDL Web Click Wrap DEVELOPER SOFTWARE AND DISTRIBUTION AGREEMENT RESTRICTED TO USE BY DEVELOPERS. Terms and Conditions

RELIBIT LABS MUTUAL NON DISCLOSURE AGREEMENT

LICENSE AGREEMENT for Online Use of Alpaca Registry, Inc. s Database

ZEN PROTOCOL SOFTWARE LICENSE

PATENT LAW OF THE RUSSIAN FEDERATION NO OF SEPTEMBER 23, 1992 (with the Amendments and Additions of December 27, 2000)

Pedestal Search Terms and Conditions of Service:

FEDERAL AND STATE PROGRAM COMPLIANCE VERIFICATION

The Government Offices April 2015 Ministry of Justice. Trademark Regulation (Swedish Statute Book, SFS, No 2011:594, as last amended by SFS 2012:621).

USTOCKTRAIN TRADING SIMULATOR TERMS AND CONDITIONS

About The Beta Participant Agreement

Second medical use or indication claims. Winnie Tham, Edmund Kok, Nicholas Ong

INTELLECTUAL PROPERTY BILL

Case 3:17-cv MHL Document 1 Filed 09/15/17 Page 1 of 26 PageID# 58

IMPORTANT - READ CAREFULLY.

LICENSE AND SUPPORT AGREEMENT

SANGOMA TECHNOLOGIES FreePBX Commercial Modules End User License Agreement

PATENT LAW. Randy Canis. Patent Searching

The Patentability Search

NEXT GEAR SOLUTIONS, INC MASTER SUBSCRIPTION AGREEMENT

5. PRACTICAL PROBLEMS. 5.1 Being in court. 5.2 The Evidence - is it admissible in court? 5.3 Taking samples - evidential problems

COMPARATIVE STUDY REPORT TRILATERAL PROJECT 12.4 INVENTIVE STEP - 1 -

2 Trade Secret A Subject Ma er 1 Secrecy 2 Economic Value B Ownership 1 Collaborations 2 Priority C Procedures D Infringement: Similarity

TERMS OF USE Last Modified: May/23/2018

The Where, When And What Of DTSA Appeals: Part 2

Whether a Manufacturing Process is a Trade Secret Must Be Considered in the Aggregate

Review of Elements of Fraud

Transcription:

THE IMPORTANCE OF TRADE SECRET PROTECTION By: Robert H. Thornburg In the field of Intellectual Property, the law of trade secrets often takes a back seat to patent law. However, trade secret protection affords various advantages that patent protection fails to encompass including potentially infinite protection, yet it requires less of an initial capital investment to secure protectable rights. Often, it is a claim of trade secret misappropriation that yields the higher monetary damage award, rather than a patent infringement cause of action. Despite this, practitioners often look upon trade secret protection as a secondary consideration in counseling clients. In the digital age, trade secret misappropriation has become rampant. With flash drives and CD burners, the ease of disseminating large amounts of electronic information in a small package has created new complexities and pitfalls in protecting trade secret rights. A customer or pricing list can walk out the door on someone s key chain, without anyone ever knowing until it is simply too late. Once a trade secret is lost, it is lost forever. In today s digital world, loosing one s trade secrets can happen at anytime, with little warning, and sometimes with no redress unless proactive steps are taken. In patent protection, the U.S. Patent & Trademark Office evaluates a technology and then bestows a limited monopoly right, which can be later enforced. Once a patent is issued, it constitutes a public document that competitors can use to ascertain if they infringe. On the contrary, the trade secret right is the reverse. The information is maintained as a secret, and its bounds are defined only through litigation. In addition,

whether information constitutes a trade secret is determined in the litigation stage, rather than by a prior government review process. Because of these unique characteristics, proactive measures must be maintained throughout the life of a trade secret. With the addition of automation and information technology, clients also need to adopt protocols that ensure that the rights are preserved and can be later enforced should misappropriation take place. In essence, client counseling in this digital age may be the difference in maintaining the value and enforceability of your client s most cherished information. This article seeks to outline the common law origins and statutory history of trade secret law. It also seeks to provide a general non-inclusive list of steps to suggest to clients which could help ward off misappropriation of electronic data. WHAT IS A TRADE SECRET? Trade secret law is largely a creature of the common law. Before 1979, only Chapter 757 of the Restatement (Second) of Torts provided guidance in defining what a trade secret is, and what constitutes a misappropriation. However, in 1979 the Uniform Trade Secret Act (USTA) was proposed by the National Conference of Commissions on Uniform Laws. As of the writing of this article, 42 of 50 states have enacted the USTA or a modified version. Variations pervade state enactments of the USTA, and these differences make trade secret law very state specific. The most on-point federal statute that is directed to a federal cause of action lies in the Economic Espionage Act of 1996. The following provides a general overview of both the Restatement and USTA. A. Restatement (Second) of Torts, Chapter 757 Page 2 of 9

Under Chapter 757, a party is liable for trade secret theft if that person discloses or uses, without privilege to do so, any of the following: (a) (b) (c) (d) the information is obtained by improper means; disclosure or use constitutes a breach of confidence; the secret is learned from a third party with notice that it was secret or discovered through improper means; or the secret was disclosed with notice of facts that it was a secret and disclosure was made by mistake. An inherent policy found in the Restatement (Second) is that there exists a privilege to compete with others by adopting their publicly known business methods, ideas, or processes. However, development of new ideas and information that bestow a competitive advantage can be protected, if kept reasonably secret. The Restatement centers on preventing acts of improper procurement and defining improper means, rather than identifying what is a trade secret. Unlike the federal patent grant, which is limited to a period of years, the Restatement asserts that trade secret protection can be both infinite and constitute a broader subject matter than what is defined under the Patent Act. For example, a trade secret need not possess novelty. Under Comment B of Chapter 757, a trade secret is defined as any formula, pattern, device, or compilation of information which is used in one s business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it. Examples given of trade secrets under the Restatement include: (1) Chemical compounds; (2) Customer lists; (3) Manufacturing processes; (4) formula for a material; and (5) Pattern for a device. Page 3 of 9

Unlike the later adopted UTSA, the Restatement requires a trade secret be used and already provides an advantage over competitors. Another nuance, required is continuous use of the information in the operation of the business. Apart from use, the underlying subject must be secret. Information generally known within the public or within a specific industry cannot give rise to a protectable trade secret right. Factors to be considered to ascertain if information is secret include: (1) extent to which the information is known outside of the business; (2) extent to which it is known by employees and others involved in the business; (3) extent of measures taken to guard the secrecy of the information; (4) amount of effort or money extended to developing the information; and (5) ease or difficulty with which the information could be properly acquired or duplicated. Put simply, any information that can be reverse engineered, by taking apart a publicly sold product, machine, or process is not sufficiently secret to afford trademark protection. B. Uniform Trade Secret Act (UTSA) Much broader in definition and effect compared to the Second Restatement, the USTA provides more comprehensive view of trade secret law. Under the USTA, misappropriation is defined as: (i) (ii) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or disclosure or use of a trade secret of another without express or implied consent by a person who: Page 4 of 9

(A) used improper means to acquire knowledge of the trade secret; (B) at the time of disclosure or use knew or had reason to know that his knowledge of the trade secret was (i) derived from or through a person who has utilized improper means to acquire it; (ii) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or (iii) derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or (C) before a material change of his position, knew or had reason to know that it was a trade secret ad that knowledge of it had been acquired by accident or mistake. While lengthy, the definition of what acts can constitute a misappropriation or actionable claim are much more expansive than found under Restatement. Similarly, the UTSA provides a much broader definition of a trade secret to include information that not only has value to competitors, but also potential value. The USTA definition states that a trade secret includes information including a formula, pattern, compilation, program, device, method, technique, or process that is (i) sufficiently secret to derive economic value, actual or potential, from not being generally known to others; and (ii) is the subject of reasonable efforts to maintain secrecy. The term reasonable efforts has been a subject of much debate and is often a central issue in trade secret disputes. One of the most valuable aspects of the UTSA is that it provides injunctive relief for both active or threatened misappropriation. Such an injunction can be not only to prevent the use of a trade secret, but may also be fashioned to require affirmative acts to protect a trade secret from disclosure or dissemination. However, the uniform act includes the caveat that these injunctions do not last forever. Upon application to the Page 5 of 9

court that issued such injunction, it can be terminated after a reasonable period of time upon a showing that the information is now known, or has been disclosed. In addition to the right of injunction, the UTSA also includes provisions directed to monetary damages and awards of attorney fees. Damages can include both the actual loss caused by misappropriation and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. If willful and malicious misappropriation exists, the court may award exemplary damages in the amount not exceeding twice any damages award. Finally, if (i) a claim of misappropriation is made in bad faith, (ii) a motion to terminate an injunction is made or resisted in bad faith, or (iii) willful and malicious misappropriation exists, the court may award reasonable attorney's fees to the prevailing party. Page 6 of 9