7/31/2019 Trade Secrets Presentation
1/43
Patent ForumAugust 9, 2012
7/31/2019 Trade Secrets Presentation
2/43
Keith Davis, Jones Day([email protected])
August 9, 2012
Trade SecretsDallas Regional Chamber Patent Issues Forum
7/31/2019 Trade Secrets Presentation
3/43
Trade Secrets In The News
Paul Shin Devine, Apple global supply manager from 2005 to 2010, sentdrawings, pricing information, and projected sales figures on various Appledevices to suppliers in China, South Korea, Taiwan, and Singapore.Suppliers paid kickbacks, which Apple said totaled more than $1 million.
Xiang Dong Mike Yu, product engineer, copied 4,000 documents, including
design specs, before leaving Ford, where he worked from 1997 to 2007. Later
worked for Beijing Automotive. Specs turned up on his Beijing Automotivelaptop when confiscated at OHare International at his 2009 arrest .
http://www.businessweek.com/articles/2012-03-14/the-great-brain-robbery
Clark Alan Roberts and Sean Edward Howley, both U.S. citizens andengineers at a Goodyear supplier, convicted of entering Goodyear plant
in Kansas under false pretenses, photographing device used to wrap cablefor tires inner thread, and transmitting photos for eventual use by Wyko
contractor in China to build tiremaking equipment.
Yuan Li, research scientist at company 2006-2011, charged with stealingtrade secrets and making them available to rival in which she was partner,Abby PharmaTech, a U.S. subsidiary of Chinese chemical company, andmaking compounds available for sale on Abbys website.
http://www.ncmsfoundation.org/wp-content/uploads/2011/03/sanofi-aventis_logo_clr-300dpi.jpghttp://www.google.com/imgres?imgurl=http://logocompany.info/wp-content/uploads/2012/05/Goodyear-Logo.jpg&imgrefurl=http://logocompany.info/goodyear-logo/&h=378&w=1679&sz=62&tbnid=tYu2CdhcV82NEM:&tbnh=26&tbnw=116&prev=/search?q=goodyear+logo&tbm=isch&tbo=u&zoom=1&q=goodyear+logo&usg=__QJU3PaWgufOX2rqQpSTcaH_zUMA=&hl=en&sa=X&ei=XoMhULvPCY7sqAGp1IGwAQ&ved=0CCcQ9QEwAghttp://www.google.com/imgres?imgurl=http://images2.wikia.nocookie.net/__cb20100507060357/automobile/images/e/ea/Ford_logo.jpg&imgrefurl=http://automobile.wikia.com/wiki/File:Ford_logo.jpg&h=750&w=1500&sz=70&tbnid=Bi3asbI-HIBzIM:&tbnh=65&tbnw=129&prev=/search?q=ford+logo&tbm=isch&tbo=u&zoom=1&q=ford+logo&usg=__CrnJYBt6kjJE1x7pwb0WRqLzNks=&hl=en&sa=X&ei=c4IhUN6vKZL0rAGkjYGYDg&ved=0CBoQ9QEwAAhttp://www.google.com/imgres?imgurl=http://edibleapple.com/wp-content/uploads/2009/04/silver-apple-logo.png&imgrefurl=http://www.edibleapple.com/2009/04/20/the-evolution-and-history-of-the-apple-logo/&h=217&w=174&sz=39&tbnid=Axl9ZK1SeVmrdM:&tbnh=84&tbnw=67&prev=/search?q=apple+logo&tbm=isch&tbo=u&zoom=1&q=apple+logo&usg=__KaxG_1CSqlgOqVwEptn0WTRf50g=&hl=en&sa=X&ei=WYEhUNqfKYr6rAGktoAo&ved=0CBoQ9QEwAA7/31/2019 Trade Secrets Presentation
4/43
Trade Secrets In The News
Lessons From the $1 Billion Intel Trade-Secret Theft, IEEESpectrum, Nov. 24, 2008
What if the FBI came knocking on your door saying that your employer hadaccused you of stealing US $1 billion from the company? Thats exactly whathappened to Biswamohan Pani, a former Intel engineer who was indicted earlierthis month for stealing trade secrets from the chip maker. Pani allegedlydownloaded more than 100 pages of data containing details about futureIntel chip designs and 19 drawings detailing the chips layouts.
[B]y the time Pani resigned his position at Intel near the end of May, he hadalready been hired by Intel rival Advanced Micro Devices (AMD) to work atone of its R&D labs. For nine days after he reported for duty at AMD on 2June, he was technically still a full-fledged Intel employee, with all the rightsand privileges thereof. One of those privileges was access to an encryptedserver containing a cache of Intels trade secrets. Intel says it has proof thathe raided the server. His supposed intent: to advance his career bystrategically using the information to make himself indispensable to hisnew employer.
7/31/2019 Trade Secrets Presentation
5/43
Trade Secrets In The News
Lessons From the $1 Billion Intel Trade-Secret Theft, IEEESpectrum, Nov. 24, 2008
Although there are no pending criminal or civil actions against AMD, there aresome steps Intel needs to take to ensure that its rival is not sandbagginginother words, biding its time before coming out with chip designs based on theinformation. Among them is aggressively demanding that AMD cooperate inan internal investigation in which witnesses would be interviewed andcomputers would be reviewed forensically to see if any of the information
allegedly taken was transferred to or copied on any of AMDs systems.
A big open question is why Intel didnt cut off Panis systems access themoment he tendered his resignation. Pani lied about where he was goingafter leaving Intel, concocting a suspicion-diverting story about going to work for ahedge fund. One of two things was going on There either wasnt a
procedure in place, or the procedure wasnt followed to deal with thatresignation in terms of data security. In other words, did somebody have achecklist? Did HR get notified? Did IT get notified? Did someone say, Thisperson has given notice. What do we do now?
7/31/2019 Trade Secrets Presentation
6/43
Lock the Barn Door ...
Vigilance in the area of trade secrets is required,particularly because once a trade secret is madepublic all ownership is lost.
- Computer Assocs. Intl, Inc. v. Altai, Inc.,918 S.W.2d 453, 457 (Tex. 1996) (emphasis added)
7/31/2019 Trade Secrets Presentation
7/43
Before the Horse Gets Out
It is self-evident that the subject matter of a trade secret mustbe kept secret.
- Luccous v. J.C. Kinley Co., 376 S.W.2d 336, 338 (Tex. 1964)
Before information can be termed a trade secret, there mustbe a substantial element of secrecy.
- Astoria Indus. of Iowa, Inc. v. SNF, Inc., 223 S.W.3d 616, 634(Tex. App.Fort Worth 2007, pet. denied)
A trade secret must be a secret.- Ineos Group Ltd. v. Chevron Phillips Chem. Co., LP,
312 S.W.3d 843, 852 (Tex. App.Houston [1st Dist.] 2009,no pet.) (emphasis in original).
7/31/2019 Trade Secrets Presentation
8/43
Statistics and Surveys
Scott Adams
7/31/2019 Trade Secrets Presentation
9/43
Statistics and Surveys
InfoBrief, NCSES, National Science Foundation (NSF 12-307, Feb. 2012)
7/31/2019 Trade Secrets Presentation
10/43
Statistics and Surveys
InfoBrief, NCSES, National Science Foundation (NSF 12-307, Feb. 2012)
7/31/2019 Trade Secrets Presentation
11/43
Statistics and Surveys
InfoBrief, NCSES, National Science Foundation (NSF 12-307, Feb. 2012)
7/31/2019 Trade Secrets Presentation
12/43
Ponemon Institute LLC. (2009). Data Loss Risks During Downsizing: As Employees Exit so Does Data.
Statistics and Surveys
7/31/2019 Trade Secrets Presentation
13/43
Ponemon Institute LLC. (2009). Data Loss Risks During Downsizing: As Employees Exit so Does Data.
Statistics and Surveys
7/31/2019 Trade Secrets Presentation
14/43
Ponemon Institute LLC. (2009). Data Loss Risks During Downsizing: As Employees Exit so Does Data.
Statistics and Surveys
7/31/2019 Trade Secrets Presentation
15/43
Some other statistics: Top 5 states with trade secret case filings: California, Illinois,
Michigan, New York, Texas
7-9 years: How often trade secret litigation has doubled in the UnitedStates
85%: How often the alleged misappropriator was known to the TSowner Employee, former employee, or business partner
Halfof information misappropriated is business information; the otherhalf is technical information and know-how
42%: How often the TS owner prevailed on all TS claims in litigation 5%: How often TS owner prevailed on some TSs but not others
Statistics and Surveys
Almeling et al., A Statistical Analysis of Trade Secret Litigation in FederalCourt, 45 Gonzaga L.R. 291 (2009)
See also Almeling et al., A Statistical Analysis of Trade Secret Litigation in
State Courts, 46 Gonzaga L.R. 291 (2010)
7/31/2019 Trade Secrets Presentation
16/43
The Law
If at first you don't succeed [at protecting your trade
secrets], you're not Chuck Norris.
7/31/2019 Trade Secrets Presentation
17/43
Texas
Trade secret: A trade secret consists of aformula, process, device, or compilation whichone uses in his business and which gives him
an opportunity to obtain an advantage overcompetitors who do not know or use it.
Computer Assoc. Intl, Inc. v. Altai, Inc., 918 S.W.2d453, 455 (Tex. 1996); Hyde Corp. v. Huffines, 158 Tex.
566, 314 S.W.2d 763, 777 (Tex.), cert. denied, 358 U.S.898 (1958).
7/31/2019 Trade Secrets Presentation
18/43
Texas
Trade secret: Factors to be considered include:
(a) the extent to which the information is known outside of thebusiness of the party claiming the information is a trade secret
(b) the extent to which the information is known by employeesand others involved in the partys business
(c) the extent of the measures taken by the party to guard thesecrecy of the information
(d) the value of the information to the party and to his or hercompetitors
(e) the amount of effort or money expended by the party indeveloping the information
(f) the ease or difficulty with which the information could beproperly acquired or duplicated by others
- In re Bass, 113 S.W.3d 735 (Tex. 2003).
7/31/2019 Trade Secrets Presentation
19/43
Texas
Misappropriation: Use or disclosure of a trade secretthat was acquired through a relationship of trust orthrough fraud or other improper means, including
breach of: Fiduciary relationship Employment relationship Express or implied contract
Other confidential relationship Hyde Corp. v. Huffines, 158 Tex. 566, 314 S.W.2d
763,770 (Tex.), cert. denied, 358 U.S. 898 (1958)
7/31/2019 Trade Secrets Presentation
20/43
Texas
The mere fact that knowledge of a product might beacquired through lawful means such as inspection,experimentation, and analysis does not preclude
protection from those who would secure thatknowledge by unfair means. Although informationgenerally known and readily ascertainable is notprotectable, the fact that information is discoverable bylawful means does not deprive its owner of protectionfrom one acquiring it by unfair means.
IAC, Ltd. v. Bell Helicopter Textron, Inc., 160 S.W.3d191, 198-99 (Tex. Ct. App.Fort Worth 2005) (citing In
re Bass, 113 S.W.3d 735, 739 (Tex. 2003))
7/31/2019 Trade Secrets Presentation
21/43
California
Trade secret: Information, including a formula, pattern,compilation, program, device, method, technique, orprocess, that:
(1) Derives independent economic value, actual orpotential, from not being generally known to the publicor to other persons who can obtain economic valuefrom its disclosure or use; and
(2) Is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy. Cal. Civ. Code 3426.1(d) (adopting UTSA)
7/31/2019 Trade Secrets Presentation
22/43
California
Misappropriation:(1) Acquisition of a trade secret of another by a person who knows or has
reason to know that the trade secret was acquired by improper means; or
(2) Disclosure or use of a trade secret of another without express or impliedconsent by a person who:
(A) Used improper means to acquire knowledge of the trade secret; or
(B) At the time of disclosure or use, knew or had reason to know that hisor her knowledge of the trade secret was:
(i) Derived from or through a person who had utilized improper meansto acquire it;
(ii) Acquired under circumstances giving rise to a duty to maintain its
secrecy or limit its use; or
(iii) Derived from or through a person who owed a duty to the personseeking relief to maintain its secrecy or limit its use; or
(C) Before a material change of his or her position, knew or had reasonto know that it was a trade secret and that knowledge of it had been
acquired by accident or mistake. Cal. Civ. Code 3426.1(b) (adopting UTSA)
7/31/2019 Trade Secrets Presentation
23/43
Advertising & marketing strategies
Contract and payment terms
Cost information
Customer lists
Engineering drawings and software
Formulas for product designs
Manufacturing processes
Marketing & competitor research
Pricing, revenue, and salesinformation
Profit margins
Software
Strategic plans
Examples of Trade Secret Information
7/31/2019 Trade Secrets Presentation
24/43
How to Protect Your Trade Secrets
7/31/2019 Trade Secrets Presentation
25/43
How to Protect Your Business from Espionage: Six Steps
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets.
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a "need-to-know" basis.
6. Provide training to employees about your company's intellectual
property plan and security.
http://www.fbi.gov/about-us/investigate/counterintelligence/economic-espionage/
Pretty Good Advice From the FBI
http://www.google.com/imgres?imgurl=http://images1.wikia.nocookie.net/__cb20070824222855/uncyclopedia/images/9/93/Fbi_logo.gif&imgrefurl=http://uncyclopedia.wikia.com/wiki/File:Fbi_logo.gif&h=446&w=432&sz=54&tbnid=RYUWOZ0XTImDIM:&tbnh=86&tbnw=83&prev=/search?q=FBI+logo&tbm=isch&tbo=u&zoom=1&q=FBI+logo&usg=__vf0HiSO0fOy8Tn_GIW8g-Oow6oY=&hl=en&sa=X&ei=cLghULq0JuOEygHS94GQAQ&ved=0CCkQ9QEwAg7/31/2019 Trade Secrets Presentation
26/43
7/31/2019 Trade Secrets Presentation
27/43
Prioritize & identify confidential information
What type of information (strategy, sales, technical, etc.)? How is the information generated ? How critical is the information to the business?
Where is it located (within United States/outside United States)? How is it stored (server, database, locally, hard copy, cloud)? How is it accessed (network, Internet, laptop, tablet, PDA)? Who has access (within company and outside of company)?
How am I able to track access and copies? Understand technology related to all of the above!
Step 2: Identify Trade Secret Information
7/31/2019 Trade Secrets Presentation
28/43
Create a written, definitive, enforceable protection policy covering: Identity of confidential information Access to confidential information
Investigation & screening of persons prior to access
Maintaining confidentiality of information
Including disclosure process, public and otherwise Use of technology to limit access & preserve confidentiality Legal obligations related to confidential information
Access, maintenance, copies & storage
Nondisclosure & noncompete agreements
Audit & reporting requirements Misappropriation plan
Document trade secret development & use
Document trade secret value (sales, royalties, licenses)
Educating employees
Step 3: Implement a Protection Plan
7/31/2019 Trade Secrets Presentation
29/43
Generally Mark confidential information as such Police access to information
Technology:
Limit & track access, copies & downloads; password protect
Be aware of access by and storage on mobile devices Including ability to remotely wipe or block access
Legal:
Non-disclosure agreements & audit rights Employment agreements & non-competes
Jurisdictional limitations (especially outside the United States) Ownership rights & joint confidential information (joint ventures)
Step 4: Secure Trade Secrets
7/31/2019 Trade Secrets Presentation
30/43
Investigate recipients of confidential information Background checks of new employees Investigate vendors, OEMs & partners Conflicts & competition
Provide public information if possible
E.g., joint venture or M&A due diligenceTechnology
Legal
Contractual provisions limiting access to information Audit provisions Reporting provisions
Step 5: Need-to-Know Access
7/31/2019 Trade Secrets Presentation
31/43
Step 6: Training (and ENFORCEMENT)
7/31/2019 Trade Secrets Presentation
32/43
Back to the Factors
(a) the extent to which the information is known outside of the businessof the party claiming the information is a trade secret
- Cannot be public information; think prior art
(b) the extent to which the information is known by employees andothers involved in the partys business
- Limited disclosure and distribution
(c) the extent of the measures taken by the party to guard the secrecy ofthe information
- Technology; NDAs & contractual terms; audit rights; backgroundinvestigations; monitoring copying and distribution
(d) the value of the information to the party and to his or her competitors
- Nexus to success & sales; efforts taken to preserve secrecy
(e) the amount of effort or money expended by the party in developingthe information
- Document development costs and relative importance
(f) the ease or difficulty with which the information could be properly
acquired or duplicated by others
7/31/2019 Trade Secrets Presentation
33/43
Other Considerations
Occupy Wall Street effect Big companies dealing with small inventors
Small inventors dealing with big companies Statute of limitations: 3 years in Texas
Discovery rule may toll statute but dont count on it
Equitable defenses laches
Inevitable disclosure (Un)enforceability of noncompete agreements Noncompete restrictions must be reasonable
7/31/2019 Trade Secrets Presentation
34/43
Noncompete Agreements
Texas Covenants Not to Compete Act(Tex. Bus. Com. Code 15.50-15.52)
An enforceable non-compete must:
Be ancillary to or part of otherwise enforceable agreement atthe time the agreement is made;
Protect a legitimate business interest; Contain reasonable limitations as to the scope of activity to be
restrained;
Contain reasonable geographical limitations; and Contain reasonable durational limitations
- Marsh USA Inc. v. Cook, 354 S.W.3d 764 (Tex. 2011)
Extraterritorial Misappropriation and
7/31/2019 Trade Secrets Presentation
35/43
Extraterritorial Misappropriation and
Federal Statutes
Some problems with extraterritorial misappropriation Personal jurisdiction Choice of law Discovery Enforceability Remedies and injunction
Federal Statutes: Economic Espionage Act,
18 U.S.C. 1831 et seq. (1996)
- Includes criminal and civil actions by the Federal Government,including over extraterritorial misappropriations, but no privatecauses of action
- See Robert Kantner, Protecting Trade Secrets Internationally Through aComprehensive Trade Secret Policy(available through Jones Day)
- See alsohttp://tradesecretshomepage.com/indict.html#_Toc9924962 (describingconvictions under the Economic Espionage Act)
Receiving Confidential Information
7/31/2019 Trade Secrets Presentation
36/43
Receiving Confidential Information
(Beware Greeks Bearing Gifts)
7/31/2019 Trade Secrets Presentation
37/43
If you receive confidential information, you couldbe inviting a lawsuit!
Competitors? Same products? Same customers?
Former employee? Small businesses or sole inventors?
Recipients commercial success = his or her tradesecret!
Potential acquisitions & deals; due diligence Sales & marketing leads
Technical leads & information
Industry knowledge
Conflicts cause problems!
Receiving Confidential Information
7/31/2019 Trade Secrets Presentation
38/43
Before you receive confidential information, ask: Do you need the information?
Public information a sufficient substitute?
Is the information, in fact, confidential? Sales information? Technical information
Who is going to receive the information? How are you going to ensure its confidentiality?
The point: You need to have a policy for receivingconfidential information too!
Receiving Confidential Information
7/31/2019 Trade Secrets Presentation
39/43
When receiving confidential information
Be specificidentify the confidential information? Require information to be clearly identified marked
No generic NDAs (confidential information)
Memorialize what is public and what is not
Memorialize dealings and communications between parties
Beware oral communications (he said, she said)
If you disagree that information is confidential, say so Need to know still applies
Use public information if possible (no thank you)
Take only what needed (not a buffet)
Take only when needed (due diligence)
Receiving Confidential Information
7/31/2019 Trade Secrets Presentation
40/43
Preserve the confidentiality of any received information
Limit & enforce disclosure If competitors, or you have similar information
Maintain clean room environment
Be careful what you say especially internally! Consider disclosing conflicts of interests
Do not take confidential information at face value (e.g., financial or
marketing information) Return & destroy
Receiving Confidential Information
7/31/2019 Trade Secrets Presentation
41/43
Parting Thought: Avoid the Flu
7/31/2019 Trade Secrets Presentation
42/43
- Use hand soap
- Get a flu shot
- Get regular checkups
- Watch for flu symptoms
- Get a prescription
- Take your medicine
Dont end up in the
emergency room!
Dont Get Pneumonia!
7/31/2019 Trade Secrets Presentation
43/43
CREATE.org, Trade Secret Theft: Managing the Growing Threatin Supply Chains(available athttp://www.create.org/views/trade-secret-theft-managing-growing-threat-supply-chains )
Nicola Searle, The Criminalization of the Theft of Trade Secrets:An Analysis of the Economic Espionage Act, IP Theory: Vol. 2:
Iss 2, Article 2 (2012) (available athttp://www.repository.law.indiana.edu/ipt/vol2/iss2/2)
J. Benjamin Bai and Guoping Da, Strategies for Trade SecretsProtection in China, 9 Nw. J. Tech. & Intell. Prop. 351 (2011)(available at
http://scholarlycommons.law.northwestern.edu/njtip/vol9/iss7/1)
State Bar of Texas Unfair Competition and Trade SecretsCommittee website:http://texasbariplaw.org/committees/committee/trade-secrets/
Additional Articles & Resources