Corporate Compliance Economic Espionage Act of Kurt Stakeman Womble Carlyle Sandridge & Rice

Similar documents
The Economic Espionage Act of 1996

Stealing Trade Secrets and Economic Espionage: An Overview of 18 U.S.C and 1832

Gottschlich & Portune, LLP

IMPORTANT - PROVIDE THIS INFORMATION TO PERSON SIGNING SD 572. Title 18 Crimes and Criminal Procedures

Content downloaded/printed from HeinOnline ( Sun Apr 21 22:15:

THE LAW ON PROTECTION OF UNDISCLOSED INFORMATION

Trade Secrets Acts Compared to the UTSA

Trade Secrets. Alternative to Patent Protection. Paul F. Neils Jean C. Edwards. Copyright 2010, Paul F. Neils, Esq. All rights reserved

18 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030

Corporate Administration Detection and Prevention of Fraud and Abuse CP3030

:nue.&..crimes and Criminal Procedure Sections 2_314 and 2315

Protecting Your Trade Secrets Under the DTSA

Defend Trade Secrets Act: What You Need to Know. May 31, 2016

When Trade Secrets Cases Go Criminal: Part 1

Appendix H Title 18 Crimes and Criminal Procedure, U. S. Code

CASE 0:17-cv DSD-TNL Document 17 Filed 06/30/17 Page 1 of 7. UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Civil No.

Espionage Act of 1917

FEDERAL STATUTES. 10 USC 921 Article Larceny and wrongful appropriation

One Hundred Seventh Congress of the United States of America

Georgia Computer System Protection Act

One Hundred Twelfth Congress of the United States of America

POLICY STATEMENT. Topic: False Claims Act Date Effective: 10/13/08. X Revised New Section: Corporate Compliance Number: 10.05

Follow this and additional works at: Part of the Intellectual Property Law Commons, and the Legislation Commons

RELIBIT LABS MUTUAL NON DISCLOSURE AGREEMENT

POLICY TITLE: ACCESS TO PUBLIC RECORDS POLICY NO. 309 Page 1 of 10

Chapter I Preliminary Provisions Title and commencement. Application. Interpretation

Mail and Wire Fraud: An Abridged Overview of Federal Criminal Law

H 5304 S T A T E O F R H O D E I S L A N D

UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY. v. Crim. No. I N D I C T M E N T. The Grand Jury in and for the District of New Jersey,

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA ) ) ) ) ) ) ) ) ) ) ) ) ) ) )

or attempts to do so, shall be fined under this title, imprisoned for any term of years or life, or both.

The 1984 Federal Computer Crime Statute: A Partial Answer to a Pervasive Problem, 6 Computer L.J. 459 (1986)

NC General Statutes - Chapter 14 Article 60 1

Families Against Mandatory Minimums 1612 K Street, N.W., Suite 700 Washington, D.C

18 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT

GENERAL ASSEMBLY OF NORTH CAROLINA EXTRA SESSION 1994 H 1 HOUSE BILL 144. February 14, 1994

IC Chapter 5. Search and Seizure

DATE ESTABLISHED: June 26, 2007 POLICY NAME: False Claims Act DATE REVISED: 6/10/10, 4/16/12. RESPONSIBLE PARTY: Nancy Kowal DATE: 11/18/2016

Title 10: COMMERCE AND TRADE

MUST BE PRINTED IN COLOR

Gordon Warren Epperly P.O. Box Juneau, Alaska 99803

Chapter 4-1 Criminal Law

INFORMATION TECHNOLOGY (AMENDMENT) BILL. THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move :

District of Columbia False Claims Act

Intellectual Property. EMBL Summer Institute 2010 Dusty Gwinn WVURC

50.1 Mail Fraud 18 U.S.C something by private or commercial interstate carrier] in carrying out a

FREEDOM OF INFORMATION: Federal and New York State Laws

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

Case 1:09-cv EJL Document 5 Filed 02/26/2009 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO

Rhode Island False Claims Act

RELEVANT NEW ZEALAND LEGISLATION

PUBLIC RECORDS POLICY OF COVENTRY TOWNSHIP, SUMMIT COUNTY

CHAPTER 119 WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS

Strike all that follows after the enacting clause and insert the following:

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

AWAREITY, INC. AWAREITY TERMS OF SERVICE & END-USER AGREEMENT

ROCHESTER INTERNATIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

The Hawaii False Claims Act

RPPL No. 6-4 (Introduced as Senate Bill No , SD2. Contents

FREEDOM OF INFORMATION ACT

Case 3:18-cv M Document 62 Filed 03/09/18 Page 1 of 10 PageID 1084

Ethical Hacking. Countermeasures Version 6. Hacking Laws

Case 4:11-cv GAF Document 1 Filed 06/02/11 Page 1 of 13

As used in this chapter

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

Framework Contract for the provision of Reference Mapping Products

ROSE-HULMAN INSTITUTE OF TECHNOLOGY POLICY REGARDING INTELLECTUAL PROPERTY

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION

DATA COLLECTION AGREEMENT MASTER TERMS RECITALS

MEMORANDUM OVERVIEW OF THE UNIFORM TRADE SECRETS ACT

TERMS OF SERVICE AND END USER LICENSE AGREEMENT

Selected Federal Data Security Breach Legislation

A Basic Overview of The Privacy Act of 1974

Illinois. Civil and Criminal Penalties for False Claims or Statements

CRIMINAL LAW AMENDMENT ACT

DEMAND TO SHOW CAUSE And. Affidavit of Fact

Terrorist Material Support: A Sketch of 18 U.S.C. 2339A and 2339B

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

Showing How Title 8 of the USA PATRIOT Act (P.L ) Amends Existing Law (Additions Underscored; Deletions Stricken)

Melbourne International Airport Police Department Security Badge Application SIDA SECURE Area

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

Case 3:17-cv MHL Document 1 Filed 09/15/17 Page 1 of 26 PageID# 58

Policy Name: False Claims Act and Reporting Publication (Effective) 10/4/2017 Version Number: 1.0

Terms of Use for the REDCap Non-Profit End-User License Agreement

THIS SECTION SHOULD BE FILLED OUT BY LAFAYETTE AIRPORT BADGING OFFICE (FILL OUT IN INK) LFT ID Badge No. Expiration Date: Vehicle Tag/s:

2016 ANALYSIS AND RECOMMENDATIONS KENTUCKY

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA

Chapter I. Title, Jurisdiction and Definition

ID ACCESS BADGE APPLICATION FOR SECURED AREA/SECURITY IDENTIFICATION DISPLAY AREA (SIDA) / STERILE AREA

END-USER SOFTWARE LICENSE AGREEMENT

A BILL IN THE COUNCIL OF THE DISTRICT OF COLUMBIA. To criminalize the unauthorized disclosure of a sexual image of another person.

Case 1:14-cv CRC Document 222 Filed 10/03/18 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA.

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

JW PLASTIC SURGERY. Terms of Service

THE CENSUS ACT, 1948 ACT NO. 37 OF [3rd September, 1948.] An Act to provide for certain matters in connection with the taking of census.

Sec. 9 SECURITIES EXCHANGE ACT OF 1934

Transcription:

Corporate Compliance Economic Espionage Act of 1996 Kurt Stakeman Womble Carlyle Sandridge & Rice kstakeman@wcsr.com

18 U.S.C. 1832 1832. The@ of trade secrets (a) Whoever, with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret, knowingly- (1) steals, or without authorizaion appropriates, takes, carries away, or conceals, or by fraud, arifice, or decepion obtains such informaion; (2) without authorizaion copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such informaion; (3) receives, buys, or possesses such informaion, knowing the same to have been stolen or appropriated, obtained, or converted without authorizaion; (4) anempts to commit any offense described in paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsecion (b), be fined under this Itle or imprisoned not more than 10 years, or both. (b) Any organizaion that commits any offense described in subsecion (a) shall be fined not more than $5,000,000. (Added Pub. L. 104-294, Itle I, 101(a), Oct. 11, 1996, 110 Stat 3489)

18 U.S.C. 1835 1835. Orders to preserve confidenfality In any prosecuion or other proceeding under this chapter, the court shall enter such orders and take such other acion as may be necessary and appropriate to preserve the confideniality of trade secrets, consistent with the requirements of the Federal Rules of Criminal and Civil Procedure, the Federal Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing or direcing the disclosure of any trade secret. (Added Pub. L. 104-294, Itle I, 101(a), Oct. 11, 1996, 110 Stat. 3490.) REFERENCES IN TEXT The Federal Rules of Criminal Procedure, referred to in text, are set out in the Appendix to this Itle. The Federal Rules of Civil Procedure, referred to in text, are set out in the Appendix to Title 28, Judiciary and Judicial Procedure. The Federal Rules of Evidence, referred to in text, are set out in the Appendix to Title 9.8

18 U.S.C. 1839 1839. DefiniFons As used in this chapter- (1) the term "foreign instrumentality" means any agency, bureau, ministry, component, insituion, associaion, or any legal, commercial, or business organizaion, corporaion, firm, or enity that is substanially owned, controlled, sponsored, commanded, managed, or dominated by a foreign government; (2) the term "foreign agent" means any officer, employee, proxy, servant, delegate, or representaive of a foreign government; (3) the term "trade secret" means all forms and types of financial, business, scienific, technical, economic, or engineering informaion, including panerns, plans, compilaions, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in wriing if- (A)the owner thereof has taken reasonable measures to keep such informaion secret; and (B)the informaion derives independent economic value, actual or potenial, from not being generally known to, and not being readily ascertainable through proper means by, the public; and (4) the term "owner", with respect to a trade secret, means the person or enity in whom or in which righgul legal or equitable Itle to, or license in, the trade secret is reposed. (Added Pub. L. 104-294, Itle I, 101(a), Oct. 11, 1996, 110 Stat. 3490.)

Reasonable Measures 1. Designate trade secret data, make confidenial 2. Comprehensive confideniality agreement for employees, vendors, consultants, contractors and academics 3. Limit access to need to know, use locks, passwords 4. Company policy, procedures and rules regarding trade secret data 5. EducaIon of employees 6. Visitor oversight 7. Door, computer, data monitoring

PracFcal PrecauFons 1. Employee educaion 2. Hotline 3. Comprehensive document management 4. Computer security 5. Don t erase the hard drive of deparing employees 6. Background checks 7. Escort employee out of sensiive areas when noice of leaving employment 8. Document confidentality obligaions to deparing employees

In Hiring 1. Clear documentaion that not waning trade secrets 2. Management reporing of trade secret revelaion 3. EvaluaIon of consultants who are former employees of a compeitor 4. Document jusificaion for hiring compeitor s employee

QuesFons Kurt Stakeman KStakeman@wcsr.com