Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well as perhaps one or two that I missed over the past few weeks: Noteworthy Trade Secret and Non-Compete Posts and Cases:
  • Fuhu, Inc., a child-focused software developer has sued Toys “R” Us Inc. in federal court in San Diego, claiming the retailer stole its strategy for selling an Android-powered computer tablet for kids, reports The Wall Street Journal.  Toys “R” Us has announced plans to sell a proprietary tablet for children called the Tabeo, a product Fuhu alleges closely resembles its own device, the Nabi.  Each product features a Wi-Fi-enabled tablet with a soft protective frame.  It is unclear exactly what trade secrets were stolen, however, and it appears that Fuhu is peeved that it had a marketing agreement with Toys “R” Us that was ignored for a year while it decided to launch its own competitive product.  Both Todd Sullivan and Poyner Spruill’s new Under Lock & Key Blog have posts about the recent filing.
  • The malicious trade secret prosecution case brought against Latham & Watkins earlier this year has been dismissed as untimely, Law360 is reporting.  In June 2008, a Santa Barbara judge ruled that a trade secrets case filed by Latham on behalf of Flir Systems Inc. against former employees William Parrish and Timothy Fitzgibbons was brought in bad faith for an anti-competitive motive.  The court in the second case against Latham concluded that the statute for malicious prosecution was one year and that the time to bring the claim expired in August 2010.
  • Georgia’s Supreme Court has issued an important preemption decision under the Georgia Uniform Trade Secrets Act, advises Neil Wienrich in Berman Fink Van Horn’s Georgia Non-Compete & Trade Secret News Blog.  In Robbins v. Supermarket Equipment Sales, LLC, 290 Ga. 462, 722 S.E.2d 55 (2012), the court found that a general injunction arising out of the same facts as a dismised claim under Georgia’s UTSA was preempted by that statute, and that in the absence of a trade secret claim, the injunction was improper.
  • Todd Sullivan is reporting that a split panel for the U.S. Court of Appeals for the Fourth Circuit has stayed Judge Payne’s twenty-year injunction forbidding Kolon from manufacturing Heracron.  In its motion seeking a stay of the injunction, Kolon argued, among other things, that the injunction would effectively kill Kolon’s Heracron business, forcing it to shut down production lines and cease sales across the globe.  Law360 quotes Kolon as having argued that “The district court took nearly a year to decide whether to issue a permanent injunction. A comparable stay to allow for this court’s orderly consideration of the appeal is clearly warranted.  The alternative would be the death knell for Kolon’s Heracron business, even if Kolon ultimately prevails on appeal.”
  • A new sheriff is in town, reports Corporate Counsel, as Yahoo’s General Counsel Ron Bell is making clear to employees that leaking confidential information is not only “uncool” but a violation that can get an employee fired and even prosecuted. 
  • Morgan Stanley must pay Fidelity in a solicitation dispute, reports Reuters.  In a recent FINRA arbitration, Morgan Stanley and two brokers it hired from Fidelity were ordered to pay over $500,000 in damages and attorneys fees, including nearly $82,000 in punitive damages.
  • “Access to Courts: Federal Circuit Issues Preliminary Rejection of Judge Koh’s Stance on Open Access to Trial Documents” notes a post in the Patently-O Blog.
  • “Hiring an Employee Who Has a Non-Compete: Proceed With Caution!” warns Neal Buethe for Minnesota Employer.com.
  • Poyner Spruill’s has launched its new trade secrets blog, Under Lock & Key.  The new blog has plenty of new posts that range from practical advice concerning NDAs to breaking news (as detailed above) about new trade secret filings.  I would encourage readers to bookmark it.
Computer Fraud and Abuse Act Posts and Articles:
  • Shawn Tuma’s Computer Data Privacy and Social Media Law Blog reports on a case out of the U.S. District Court for the Southern District of Ohio, Freedom Banc Mortgage Services, Inc. v. O’Harra, 2:11-cv-01073 (S.D. Ohio Sept. 5, 2012), applying some straightforward rules under the CFAA.  Most notably, U.S. District Court Judge Gregory Frost held that observing data constitutes “obtaining data” under the statute.  Brian Hall, writing for Porter Wright Morris & Arthur’s Employer Law Report Blog, also has a post on the decision.
Cybersecurity Posts and Articles:
  • The Steptoe Cyberblog has a thought-provoking post on cybersecurity, positing that the best defense is a good offense.  In “Rethinking Cybersecurity, Retribution and the Role of the Private Sector,” Stewart Baker persuasively argues that a defense-based strategy is doomed to fail and that the best approach is one focused on identifying and punishing the culprits.
  • “Chinese-made laptops’ latest feature: Pre-installed viruses” warns RT.
  • “Insider threat behavior not just actions” writes Dan Velez, director of defense programs for Raytheon Oakley Systems, for SC Magazine. Dan advises that improved security technology provides an illusory sense of accomplishment, and that until companies fully understand the human component (motivation, behavior, etc.), their approach to security will remain flawed and incomplete.
  • “10 Recommended Steps for Reducing Cyber Risk” from Reed Smith’s Global Regulatory Enforcement Blog.
News You Can Use:
  • “For the Absent-Minded, a Few Forget-Me-Nots” from The New York Times Personal Tech Blog.

In July, Senators Herb Kohl (WI), Chris Coons (DE) and Sheldon Whitehouse (RI) introduced the Protecting American Trade Secrets and Innovation Act of 2012 (PATSIA), to the applause of many in the trade secret community, including yours truly. One of PATSIA’s notable provisions proposed is an ex parte seizure order that would enable a trade secret claimant to seize evidence or product relating to misappropriated trade secrets that might otherwise be destroyed or improperly used. Does this seizure provision, however, go too far?

Recap of the Proposed Seizure Order:  PATSIA provides for an ex parte proceeding that authorizes the seizure of materials (1) used in connection with the alleged misappropriation (including computers) or (2) for the preservation of evidence. A federal court can approve the seizure order if the claimant presents clear and convincing evidence of irreparable harm (not a terribly high standard, since that is the standard required for any injunction) without notice to the other side. While short in duration (the seizure can last no longer than 72 hours), the categories of information subject to seizure are very broad. 

Once the products or computers are seized, however, there is no provision addressing how the information should be stored or protected, who will actually gather it, and who will have access to it. Instead, the proposed statute simply says an “appropriate” protective order should be included to protect disclosure or misuse of the information seized. (A link to the proposed statute and seizure order can be found here).

“I was for it before I was against it”: After some reflection and gentle chiding from a colleague concerned about the potential for the seizure order’s abuse, I now think this provision has to be modified. As presently proposed, what would prevent a judge who was not on top of his game that morning from granting an ex parte seizure allowing a competitor to misuse the order to seize and review high level trade secrets for its own benefit?  Before you harrumph and say “impossible!”, think about the number of bad faith trade secret actions in the news over the past six months (ACS v. Leadscope, SASCO v. Rosendin Elec., etc.). One would hope there would be severe consequences if a court improvidently granted such an ex parte request, but the damage from the disclosure would be done.

How best to narrow the provision but still keep it effective? I think there are three changes that would significantly reduce, if not eliminate, this potential problem with the seizure provision. 

First, the ex parte seizure provision should be aligned to the primary goal of PATSIA — namely, the protection of U.S. trade secrets from foreign misappropriation. A review of of a press release by Senator Kohl for a previous amendment to the Economic Espionage Act virtually identical to this bill made clear foreign misappropriation was the primary concern, so why not confine this powerful tool to that perceived problem?   

Second, the material or evidence that was seized would have to be kept in a secure escrow or location where the party bringing the claim could not inadvertently or intentionally access that information during the pendency of the seizure order and any challenge to the seizure order.  This would serve the purpose of preservation and segregation but remove the danger of misappropriation. Make the statute clear that the claimant cannot access the information or evidence until a court has the opportunity to hear from the other side.

Third, there should be mandatory and severe penalties for any abuse of the seizure order. While the provision authorizes claims for compensatory damages, punitive damages and attorneys fees for a bad faith seizure order, that is not enough. Penalties should be directed at the lawyer as well as the client. Have the lead lawyer certify why this order needs to be done in an ex parte fashion.  This would ensure that a claimant and his counsel would be on the hook if they were not careful in considering their request or acted improperly during the seizure process. 

Another Necessary Fix: And while this amendment is being made, Congress should take the opportunity to undo the damage caused by the U.S. Court of Appeals for the Second Circuit in U.S. v. Aleynikov. Readers of this blog will remember that the Second Circuit bobbled the ball when it imposed an unduly narrow construction of the categories of trade secrets covered under section 1832 of the Economic Espionage Act to only those trade secrets that are included in products that are ultimately sold within the stream of commerce. This too needs to be fixed as a broad category of trade secrets would be left unprotected under the statute’s present language, which tracks the language of section 1832.

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well one or two that I missed over the past few weeks: Noteworthy Trade Secret and Non-Compete Posts and Cases:
  • A former programmer for futures exchange operator CME Group has pleaded guilty to stealing trade secrets in connection with plans to improve a trading platform in China, according to a report by The Wall Street Journal this morning.  Chunlai Yang, a senior software engineer who worked at CME for 11 years, admitted to downloading more than 10,000 files from CME computers, and planned to offer improved technology to the Zhangjiagang Exchange.
  • Executives of Chinese telecom companies Huawei and ZTE were grilled by the U.S. House Intelligence Committee over allegations that Huawei stole Cisco and Motorola’s trade secrets, reports Todd Sullivan in his Sullivan’s Trade Secrets & Employee Defections Blog. Mike Rogers, the House Intelligence Committee Chairman expressed concern that “Huawei and ZTE provide a wealth of opportunities for Chinese intelligence agencies to insert malicious hardware or software implants into critical telecommunications components and systems.” Congressman Rogers further noted that “under Chinese law, ZTE and Huawei would likely be required to co-operate with any request by the Chinese government to use their systems or access for malicious purposes.” For more on the hearings, The New York Times and The Wall Street Journal’s articles can be found here and here. 
  • For those in Kentucky, Kenneth Vanko, Robert W. Milligan and Russell Beck all have posts on an important opinion laying out the six factors that a court should apply when deciding whether to enforce, not enforce or narrow a covenant not to compete. In Charles T. Creech, Inc. v. Brown, 2012 Ky. App. LEXIS 142 (Ky. Ct. App. Aug. 17, 2012), the court of appeals provided various “guiding principles” for the considerations underlying each of those six factors.
  • The U.S. International Trade Commission will review a finding that a former Twin-Star International Inc. employee violated the Tariff Act when he used stolen proprietary information to start a rival fireplace manufacturer in China, reports Law360. In July, an administrative law judge had found that former Twin-Star employee Yue Qiu Sheng violated a confidentiality agreement by stealing plans for an electric fireplace prototype as well as customer and supplier lists to launch his own company, Shenzhen Reliap Industrial Co. Ltd.
  • Have a trade secret case that is going to trial in Florida? Then you should read a recent post by Peter Vilmos in Burr & Forman’s Non-Compete & Trade Secrets Blog about the importance of jury instructions under Florida’s version of the Uniform Trade Secrets Act.
  • Want “A Look At 16 Years Of EEA Prosecutions”? Check out Peter Toren’s fine summary for Law360.
  • Mark Terman provides “A Litigator’s perspective on trade secret protection plans” for Inside Counsel.
  • “Do Maids Have to Sign Non-Compete Clauses?” wonders John Kelly of The Washington Post.
  • The big trade secrets news this week was the Ohio Supreme Court’s decision in American Chemical Society v. Leadscope, a decision that at least one Ohio commentator described as the most eagerly awaited case of the year. The ACS case held that a claim of unfair competition could be based on a theory of malicious litigation by a competitor and it announced the legal standard for that claim. However, the ACS case also provides a cautionary tale for litigators in high profile trade secret cases — namely, the potential of a defamation claim against lawyers for statements about the litigation to the media. In ACS, Leadscope alleged that one of ACS’s lawyers defamed it by stating “Our motivation in filing suit is to acquire back the protected information that they took from us” to a local business paper, Business First. The Supreme Court ultimately dismissed the defamation claim, reasoning that the article as a whole simply provided an accurate summary of the legal proceedings (both sides were quoted about the litigation and made substantive statements about their positions). For a very thorough analysis of the opinion and its key components, check out former Appellate Court Judge Marianna Brown Bettman’s post in her Legally Speaking Ohio Blog
Computer Fraud and Abuse Act Posts and Articles: 
  • Seyfarth Shaw’s Trading Secrets Blog has two posts about two recent federal decisions out of California. Daniel Joshua Salinas details a ruling denying reconsideration of an important ruling that allowed CFAA case to proceed despite the recent decision in U.S. v. Nosal as well as a case out of the Northern District of California dismissing a CFAA claim for “click fraud” because the plaintiff failed to provide adequate factual basis for that claim.
Cybersecurity Posts and Articles: 
  • In need of a comprehensive summary of the various pieces of cybersecurity legislation and executive orders? Check out “An Analysis of Proposed Federal Cybersecurity Legislation” by Todd Taylor for Corporate Counsel.
  • “Senator Presses On Cybersecurity” reports The Wall Street Journal
  • “Never trust a stranger: Secure social networking” warns Rob Rachwald for SC Magazine.
  • “Your smartphone will (eventually) be hacked” predicts David Goldman for CNNMoney
News You Can Use: 
  • “Extra Security for Gmail” from The New York Times Personal Tech Blog.

The Ohio Supreme Court issued a significant opinion this morning affirming in large part a Columbus, Ohio jury’s award of $26.5 million to a small company and its founders who claimed that a trade secret case brought against them by their former employer was brought to disrupt or destroy their business. In American Chemical Society v. Leadscope, Inc., the Ohio Supreme Court found that Leadscope and its founders had properly asserted a claim for unfair competition arising out of malicious litigation. A link to the opinion, which is lengthy, can be found here.
 
Factual Background:  In 2002, American Chemical Society (ACS) sued several former employees and their company, Leadscope, for allegedly stealing technology from ACS. Two of the former employees, Paul E. Blower Jr., Ph.D. and Glen J. Myatt, Ph.D., had worked to develop a software tool named Pathfinder that was intended to improve the ability of researchers to access and organize the voluminous information available in ACS’s databases. ACS suspended the Pathfinder project in 1997 to the disappointment of Blower and Myatt, who later left to form Leadscope and to develop a software product to aid in exploring and displaying chemical compounds.
 
ACS came to learn of Leadscope’s development of its software, carefully monitored its progress from afar, and ultimately claimed in the lawsuit that it was concerned that Leadscope had misappropriated its Pathfinder technology. In the spring of 2002, ACS demanded that Leadscope turn over its patent for its new software and pay ACS $1 million. When those negotiations broke down, ACS brought suit, made it known that the technology was in dispute, and made statements to others that Leadscope had improperly taken that technology from ACS. All of these actions substantially impacted Leadscope’s ability to get financing and run its business.
 
The inpidual defendants and Leadscope counterclaimed, arguing that ACS had brought the litigation in bad faith as part of a larger plan to disrupt, if not destroy, their new business. A jury awarded over $26.5 million in compensatory and punitive damages to Leadscope and the former employees, as well as attorneys fees, which has now swelled to over $40 million due to additional attorneys fees and prejudment interest. The Tenth District Court of Appeals affirmed the jury’s verdict and agreed the trial court had properly applied a subjective “bad faith” standard, as opposed an objectively baseless standard, in finding that a claim for malicious prosecution existed. The Tenth District also found that the award of attorneys fees was proper under Ohio’s Uniform Trade Secret Act because of the jury’s finding that the trade secret claims were in bad faith.
 
The Ohio Supreme Court’s Holding: The Supreme Court grappled with the issue of whether a claim for unfair competition could include a theory of malicious litigation, a contention that had sufficiently troubled the State of Ohio enough that the Ohio Attorney General’s Office had filed an amicus brief and appeared and argued in support of ACS’s position. 
 
As an initial matter, the Supreme Court disagreed with the application of the “bad faith” standard by the trial court and Tenth District, reasoning that a party had to show that the legal action is objectively baseless and that the opposing party had the subjective intent to injure the party’s ability to be competitive. In applying that “objectively baseless” standard, the Supreme Court found that the claims against ACS remained viable and that there was no evidence in the record to support ACS’s supposed trade secret claims. For example, the Supreme Court noted that ACS had failed to provide any support for its claims of misappropriation and emphasized the gaps in the testimony of the witnesses that ACS had called. On this point, the Supreme Court summarized that “ACS presented a theory, but offered no concrete evidence that Leadscope stole its product.”
 
As for the issue of ACS’s subjective intent, the Supreme Court found ample support for the jury’s finding that ACS had the  intent to injure Leadscope and its founders. It noted that ACS’s president had closely monitored Leadscope and had even sent out an email to then-Ohio-Governor Robert Taft to abort a visit by the governor to Leadscope’s offices. ACS’s former information technology director also provided damaging testimony documenting ACS’s president’s hostility towards Leadscope. In addition, ACS took actions or made statements that interfered with Leadscope’s ability to get funding (for example, by dissuading an venture capitalist interested in investing in Leadscope by telling him that there were legal issues with Leadscope’s technology) and took actions in the litigation to disrupt Leadscope’s ability to get insurance coverage for the dispute.
 
The Takeaway? As numerous other high profile cases have been brought recently against law firms and former employers for allegedly bringing trade secret actions in bad faith, this case may prove to be a bellwether opinion. The ACS case provides a lesson in the dangers of potentially overreaching in a weak trade secrets case, as well as on the power of the “David v. Goliath” theme for juries. Seemingly innocent or unrelated actions were woven together very effectively to show malice and an intent to destroy or disrupt a promising business, but those facts would have been of no value if ACS had been able to objectively demonstrate that it had a trade secret claim in the first place.
 
Further Thoughts (Sept. 19, 2012):  One of the challenges in blogging is the importance of posting timely and concisely.  In my zeal to get this post up about a very important case here in Ohio, there were two other points that in retrospect that I should have made: 

(1) There was a defamation claim premised on some of the statements made to the local press and in a company-wide email that the Supreme Court dismissed; this too was an important issue and claim and I will cover it in a future post. The dismissal of the defamation claim will probably lead to a substantial reduction in the award, although it is unclear how much from the face of the majority opinion; and

(2) There are a number of interesting procedural issues presented by this 4-3 ruling (especially for Ohio lawyers).  In particular, the Supreme Court’s decision to affirm after reviewing the “voluminous” record rather than to remand it back for another trial, despite its imposition of a new legal standard on the unfair competition claim, appears to be highly unusual and will be talked about by lawyers here in Ohio for some time to come.

A number of commentators (including the Trade Secret Litigator) have opined about the potential impact that the new America Invents Act (AIA) may have on the increased use of trade secrets, primarily focusing on the newly-expanded “prior commercial use” defense under the AIA. However, my colleague Robert T. S. Latta recently brought another potential benefit that may arise under the AIA for trade secret owners to my attention, and he was kind enough to commit his thoughts to this post. According to Rob, the legislative history of another recent amendment of the AIA suggests that a trade secret owner may essentially be provided with a potential mulligan in the form of a subsequent patent should he or she lose his or her trade secret protection. 

Under current patent law, if an inventor maintains his invention as a trade secret and commercially profits from that invention for more than one year, the inventor forfeits the right to patent that invention. As Justice Learned Hand wrote long ago, “it is a condition upon an inventor’s right to a patent that he shall not exploit his discovery competitively after it is ready for patenting; he must content himself with either secrecy, or legal monopoly.” Metallizing Engineering Co. v. Kenyon Bearing and Auto Parts Co., 153 F.2d 516 (2d Cir. 1946).

However, new language in the AIA may change that settled precedent. The revised § 102(a)(1), which comes into effect on March 16, 2013, permits a patent unless “the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention.” (Emphasis added). If it was not available to the public (as any trade secret would not be), it would be patentable under the new §102(a)(1).

The legislative history supports this view. Senator Jon Kyl, on the day the AIA was enacted, explained “public uses and sales are prior art only if they make the invention available to the public.” Congressional Record, Senate, Sept. 8, 2011 at S5431. Furthermore, the day after the enactment of the AIA, Senator Patrick Leahy advised that §102(a)(1) “was drafted in part to do away with precedent under current law that private offers for sale or private uses or secret processes practiced in the United States that result in a product or service that is then made public may be deemed patent-defeating prior art.” He stated that prior art must meet the “the public accessibility standard that is well-settled in current law, especially case law of the Federal Circuit.” Congressional Record Volume 157, Number 35 (Wednesday, March 9, 2011), Senate, S1496-S1497.

If §102(a)(1) is indeed interpreted, as suggested by this legislative history, to overturn current precedent, then an inventor will no longer forfeit his or her U.S. patent rights for maintaining his or her invention as trade secrets for a period longer than one year. The inventor will be free to practice that invention for commercial gain as a trade secret until such time as the inventor finds it necessary to patent it (providing another has not already patented the invention). Further, if someone has patented the invention, the prior secret user would still have the prior commercial use defense to patent infringement under §273.

Is the new language in §102(a)(1) simply a “catch-all” phrase?  Some (most notably, Sughrue Mion LLP, in an article  attached as a PDF below) interpret “or otherwise available to the public” as nothing more than a catch-all language, capturing unspecified types of disclosure. Under this interpretation, the current case law regarding secret uses and/or sales would remain unaltered. These commentators have argued that this interpretation of §102(a)(1) maintains harmony of this section of U.S. patent law with that of the patent laws of other countries, a stated purpose of the AIA. (See comments of Senator Hatch, Congressional Record (January 25, 2011), Senate, S142 (“If enacted the Patent Reform Act of 2011 would move the United States to a first-inventor-to-file system, which will bring greater harmony and improve our competitiveness.”)). 

This “catch-all” interpretation of § 102(a)(1) might also fall in line with the statutory rule of construction that when Congress intends such a dramatic shift in the law, it does so explicitly. Bd. of Trustees of Leland Stanford Jr. Univ. v. Roche Molecular Sys., Inc., __ U.S. __, 09-1159 (June 6, 2011) (“Congress has in the past divested inventors of their rights in inventions by providing unambiguously that inventions created pursuant to specified federal contracts become the property of the United States … Such language is notably absent from the Bayh-Dole Act”).

That being said, however, as Robert Maier of Baker & Botts argues in his article “The Big Secret of the America Invents Act” for IP Today, the legislative history of the AIA suggests that a “catch-all” in §102(a)(1) was not the intent of at least some lawmakers. In the humble view of the Trade Secret Litigator, this certainly does not look like “catch all” language, and on its face, this relatively straightforward language would seem to include trade secrets which are by definition not publicly available.

Until a court considers this issue under §102(a)(1) of the AIA, this will remain a subject of debate. However, it may be worthwhile for a trade secret owner whose trade secret has lost one or more of its trade secret elements to test this proposition before a court.

Sughrue AIA Article.pdf (175.08 kb)

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well one or two that I missed over the past few weeks: 
 
Noteworthy Trade Secret and Non-Compete Posts and Cases: 
  • A former American Airlines employee has agreed not to publish trade secrets and confidential information on his websites that he learned while he worked at American. According to Law360, American sued Gailen David, who runs several websites including The Sky Steward and AAGossip.com, in April after David published flight information about American’s board members and former executives, including their itineraries and seat assignments, and alleged that American bumps paying passengers from flights to accommodate those executives. Epstein Becker’s Trade Secrets & Noncompete Blog has a write-up on the case as well.
  • The University of Iowa has sued a former professor to enforce a non-compete prohibiting him from practicing medicine within a 50-mile radius of the university. Bogdan Cherascu, a clinical assistant professor in UI’s Internal Medicine department. Cherascu is now working for the Physician’s Clinic of Iowa, which is located in Cedar Rapids. Given the high profile of non-competes in the healthcare community, this one should be interesting to watch.
  • LG is expected to issue an apology to Samsung soon in connection with allegations that LG’s employees stole Samsung’s organic light-emitting diode (OLED) screens. In Sullivan’s Trade Secrets & Employee Defections Blog, Todd Sullivan reports that Samsung recently submitted  documents to the Seoul Central District Court for 18 confidential technologies for its OLED screens and 21 other relevant details, demanding 1 billion won (US$880,514) from LG Display in compensation for each case of LG’s usage of the cited technologies or making public the information to a third party. OLED panels, which feature slimmer and more vivid screens than common liquid crystal display screens, are much sought after by tech companies around the world. In July, 11 people, including former or current researchers at Samsung Mobile, were indicted in South Korea on charges of leaking core display technology from Samsung to LG.
  • Seyfarth Shaw’s Trading Secrets Blog has an interesting post, “When Everything Becomes Software, How Does That Affect IP Strategy?” by Joren De Wachter.
  • “Don’t Sound The Death Knell Just Yet: Trade Secrets Are Still Alive in North Carolina” advises Poyner Spruill’s Josh Durham. 
  • Have a trade secret dispute in Taiwan? The International Techology Law Blog has a primer on “Trade Secret Litigation in Taiwan.” 
  • Former DuPont security chief Ray Mislock Jr. offers “8 keys to starting a trade secret protection plan” for the Security InfoWatch Blog.
  • The International Trade Association’s tradeology blog has a post “The Secret Is Out! Learn More About the Value of Trade Secrets to the U.S. Economy.”
  • “Dealing With IP and Trade Secret Theft by Employees” counsels Kris Haworth and Mindy Morton for Corporate Counsel.
Procedural Issues (for the litigators): 
  • Concerned about whether you can assert personal jurisdiction over a foreign party? See Alison Frankel’s report in her On The Case Blog about recent rulings against Chinese drywall manufacturer Taishan Gypsum Co. holding it could be haled into a U.S. court. 
Cybersecurity Posts and Articles: 
  • “Businesses Beware: Heavy-Handed Tactics Planned for Cybersecurity” warns Jody Westby in an article about the Obama administration’s possible executive action for Forbes.
  • Looking for sample BYOD policies?  Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog has several. 
  • “Federal CIO Council Releases BYOD Toolkit” announces the InformationLawGroup Blog. 
  • “Cloud Computing: Some Practical Suggestions for Resolving Issues” in two installments by Osler Insights Blog
News You Can Use: 
  • “Three Tips for Better Google Searching” from The New York Times’ Gadgetwise Blog.

A curious decision out of Connecticut highlights the Hobson’s choice that some employers in that state might face if they do not secure covenants not to compete from all of their employees.   In Creative Dimensions, Inc. v. LaBerge, the Connecticut Superior Court rejected enforcement of an 18 month non-compete and non-solicitation agreement against two former owners of the company, reasoning that the absence of non-competes with other employees rendered the agreement unfair under Connecticut law.  Daniel Schwartz’s Connecticut Employment Law Blog has a fine write up on this case as well.

Creative Dimensions, Inc. (CDI) purchased the business from Daniel LaBerge and William Miller in 2005 and secured 18 month covenants not to compete and non-solicitation agreements from each of them as part of that transaction. As part of the deal, LaBerge and Miller relocated to Connecticut. In 2009, they left to join a competitor and CDI moved to enforce their non-competes. It is unclear why CDI waited until 2012 to commence the action.

The Superior Court declined to enforce the non-competes after applying a five-factor test under Connecticut law that focuses on the (1) length of time of the covenant; (2) geographic scope of the covenant; (3) fairness of the protection accorded to the employer; (4) extent of the restraint on the employee’s opportunity to pursue an occupation; and (5) extent of interference with the public interest.  The court rejected the covenants under the third prong, essentially reasoning that the absence of any non-competes with other current and former sales employees was persuasive evidence that there was no protectible interest justifying the non-competes.

The Superior Court rejected any notion that the two former owners should be treated any differently from any other employee. In the court’s view, in the context of the sale of the business, the non-compete may have been reasonable during the first three years of their relationship since LaBerge and Miller were critical to the transition of the new business to its new owners.  However, after three years, the court found that LaBerge and Miller were now like any other at-will employee and, therefore, the absence of any non-compete with other employees became more relevant.

The court also emphasized the absence of any proof of any trade secrets or confidential information that would justify the non-competes and rejected efforts to justify customer lists, since the identity of CDI’s customers was readily available.  When CDI tried to counter by arguing that LaBerge and Miller were “very entrepreneurial,” the court said that argument was undermined by the fact that CDI also outsourced some of its work from to time to established competitors without any restrictions.

How should an employer respond?  This argument is made frequently in non-compete litigation but is rarely embraced, which makes this decision unusual.  Courts generally confine themselves to the agreement at issue and make the decision on the circumstances before them.  From a litigation standpoint, it should serve as reminder to employers of the importance of being prepared to justify the legitimate need for the non-compete by presenting evidence of trade secrets or relationships with important customers.

This decision is also curious because it involved a non-compete that accompanied a sale of a business.  Courts are generally more deferential to non-competes in this setting because (1) the non-compete has been negotiated at arms’ length between sophisticated parties with the assistance of counsel; (2) courts recognize that the transfer of goodwill critical to the business naturally accompanies and supports the non-compete; and (3) the former owners are generally paid a tidy sum in exchange for the sale of the business.  The Superior Court seems to have rather cavalierly dismissed these considerations (or perhaps CDI did not emphasize them forcefully enough) when it found that these interests were no longer present after three years.

For Connecticut employers, and particularly those acquiring a business, this decision could prove to be problematic because it could force those employers to secure non-competes with other employees from whom they might not otherwise seek non-competes.  For employers outside Connecticut, the decision should be of less concern, since its reasoning was highly fact-specific and was rooted in Connecticut’s law governing non-competes.

Before posting links to the noteworthy trade secret, non-compete and cybersecurity stories from the past week, I wanted to remind everyone that the ABA Blawg 100 is still accepting nominations until tomorrow, Sept. 7th, which means there is one more day for you to nominate your favorite legal blogs for inclusion on this prestigious list.  Of course, I mention this with the hope that this blog might be among your favorites, and, if so, that you would take a moment to submit it to the ABA for consideration.  However, whether you do so or not, my genuine and sincere thanks for simply reading The Trade Secret Litigator.  You, my readers, are what have made this blog what it is today, and I wouldn’t be here without your feedback and support.  For those interested in nominating this or any other blog, simply go to http://www.abajournal.com/blawgs/blawg100_submit and enter your name, employer, city, email address, nominated blog URL, and a description in 500 characters or fewer of why you are a fan of that blog. Now, on to the news of the week! Noteworthy Trade Secret and Non-Compete Posts and Cases: 
  • Can you prevent a newspaper from publishing your trade secrets? Not in federal court, according to a fine post by Paul Freehling for Seyfarth’s Trading Secrets Blog.  Paul details a recent decision by the U.S. District Court for Louisiana in Rain CII Carbon, LLC v. Kurz, finding that an effort to prevent media dissemination of financial trade secrets amounted to a forbidden prior restraint under the First Amendment (a TRO had been granted by a state court before removal to federal court). Longtime readers may recall that this issue gained prominence last year when WikiLeaks was flexing its muscles. In my view, federal courts are unduly sensitive to claims of prior restraint while states like California and Ohio have been more inclined to balance the various interests in these disputes.
  • Florida employers may breathe a little bit easier after a merger or acquisition, as Carlon Fields’ Thomas Dye reports that the First District Court of Appeal of has held that an assignment of a non-compete may be permissible even if the non-compete fails to provide successor and assign language. In DePuy Orthopaedics, Inc. v. Waxman, 2012 WL 3138681 (Fla. 1st DCA August 3, 2012), the First District reversed the denial of a preliminary injunction and found that a covenant not to compete could be assigned despite the absence of the customary “successor and assign” language. Whether this language is required has been the subject of a high profile case before the Ohio Supreme Court, Acordia of Ohio v. Fishel — the court initially found the absence of that language doomed any transfer to a successor in a merger, but has since accepted a request for reconsideration.
  • Mattel claims that it is not responsible for $140 million of MGA’s attorneys fees sought by insurer Evanston Insurance Co., arguing that this type of subrogation has already been rejected in another case, reports Law360.  For a short history of the the Mattel/MGA trade secret feud over the Bratz dolls, see here. 
  • Two Chinese nationals have been charged with the theft of trade secrets of Pittsburgh Corning, Bloomburg is reporting.  Ji Li Huang, 45, and Xiao Guang Qi, 31, attempted to buy what they were told were documents revealing Pittsburgh Corning’s processes for making cellular-glass insulation, U.S. prosecutors in Kansas City said earlier this week. 
  • The U.S. District Court for the Southern District of New York has refused to enforce a non-compete against a fired employee. In Arakelian v. Omnicare, Inc., the court applied New York’s rule that an employee terminated without cause is not bound by non-competition and non-solicitation provisions. For those looking for competing perspectives, an article by Cullen and Dankamp LLC presents a pro-employer slant while Pollard LLC’s the non-compete blog presents the perspective from the employee’s side. 
  • For those in Alabama, Burr & Forman’s Non-Compete & Trade Secrets Law Blog describes a recent decision from the Alabama Supreme Court scaling back what it found to be an overly-broad non-compete. 
  • Employers, thinking of waiving your non-competes to ease the pain of a lay-off? Strasburger’s Noncompete Blog says you should document it properly or run the risk of a claim of selective enforcement. 
  • Dan Harris’ China Law Blog has a typically thorough post on protecting trade secrets in China, “China NDAs/NNN.  What You/We Need to Know.” One interesting nugget: don’t expect a forum selection clause choosing the U.S. to have to much value since Chinese courts will not enforce U.S. judgments. 
  • For those practicing before the Northern District of Illinois, R. David Donoghue’s Chicago IP Litigation Blog reports on a recent decision rejecting a claim for a breach of a non-disclosure agreement because it was premised on inference upon inference upon inference. 
  • Russell Beck’s Fair Competition Law Blog’s monthly update is out and as always, it details a number of interesting posts and cases from around the U.S. (and Europe too). 
Procedural Issues (for the Litigators): 
  • Want to get a photograph on a social media site into evidence?  Eric Goldman’s Sept. 1, 2012 post in his Technology & Marketing Blog says you better make sure you can authenticate it and show that the party against whom you are seeking to admit it had some role in posting it. In In re A.D.W., A.L.W., and X.M.M., No 2-648 / 12-1060 (Iowa Ct. App.; Aug. 8, 2012), an Iowa appellate court reversed because there was no proof that a mother had placed a photograph of a marijuana grower’s operation on her Facebook page.
Computer Fraud and Abuse Act Posts:
  • Todd Sullivan’s Trade Secrets & Employee Defections Blog reports that Toyota has sued a former employee, Ibrahimshah Shahulhameed, who allegedly hacked into Toyota’s toyotasupplier.com website, allegedly downloaded sensitive proprietary information from it, moved on to unauthorized accessing of the Toyota computer system, and then sabotaged the company’s internal software.  As many of you no doubt remember, Todd was a major contributor to Womble Carlyle’s Trade Secrets Blog, before forming his own firm, Graebe Hanna & Sullivan.
  • In an article entitled, “A Narrow View of ‘Authorized Access’ in the CFAA” for Law Technology News, Elkan Abramowicz and Barry Bohrer not only provide a nice summary of the recent decisions in U.S. v. Nosal and WEC Carolina Energy v. Miller but also provide an update on a recent proposal by Senator Patrick Leahy to codify the narrow interpretations of “exceeded authorized access” applied by those courts. 
Cybersecurity Posts and Articles: 
  • Foley & Lardner’s Privacy & Security Source Blog has an excellent post, “Appellate Court Decision Demonstrates that Security is Not Just About Technology — It’s About People.”  The post by Chanley T. Howell details the lessons to be taken from a recent case, Patco Construction Company v. People’s United Bank, 1st Cir., July 3, 2012, http://www.ca1.uscourts.gov/pdf.opinions/11-2031P-01A.pdf), in which the First Circuit found that a bank was potentially liable to a small business for cyberfraud resulting in the withdrawal of approximately $500,000 from the customer’s account.  Chanley describes the impressive array of security procedures and precautions offered by the bank, yet human breakdowns invariably contributed to the breach. It is a reminder of the importance of culture and reinforcing security practices time and time again. 
  • “Rise in Cyber Data Kidnapping: Tips on Protecting Your Data From Being Taken Hostage” advises Pullman & Comley LLP.
  • For a solid description of the recent hack of Apple by AntiSec, see The New York Times Bits Blog’s “Hackers Claim to Have 12 Million Apple Device Records.” 
News You Can Use: 
  • Do you have a digital will in place? If not, Kelly Greene advises what you should do in an article for The Wall Street Journal, “Passing Down Digital Assets.”

I know there a number of you out there who are former English or liberal arts majors and who may fondly remember Chaucer’s The Canterbury Tales, the collection of bawdy and insightful stories told by various pilgrims as they travel to St. Thomas Becket’s shrine in 14th Century England. Where I am going with this, you ask? Well, if you are looking for a collection of enthralling stories to better understand the intricacies of trade secret law, you won’t do any better than David Almeling and Darin Snyder’s Trading Secrets: A Practical Introduction to Trade Secret Law and Strategy.

It is a considerably easier read than Chaucer’s Middle English verse, and in the style of the classic work, it draws from many fascinating trade secret cases — some well known, some not so well known — to make its points. David and Darin use literally dozens of short stories to explain and to illustrate. Like Chaucer’s ribald Miller’s Tale about the cuckolding of the carpenter John, there is the story of the betrayal of the founder of Alpha Mining Systems, who said his trusted lieutenant’s theft of Alpha’s trade secrets left him feeling “like the husband whose wife was getting it on the side.” 

And there is the story of the epic rivalry between Oracle and Informix in the 1990’s, a rivalry so bitter that each company took to posting billboards taunting the other at the entry of their headquarters (Oracle’s famously read “Informix: Hiring lawyers experienced in suing programmers. Oracle: Hiring experienced programmers”). That story is effectively used to emphasize the dangers of over-reaching, as Informix was forced to issue a public mea culpa to its hated rival when it couldn’t back up its claims. 

Trade secret disputes are modern day morality tales of theft and betrayal, fueled by fear and greed. Keeping Secrets’ appeal lies in the fact that it captures the essence of trade secret law through those stories. Keeping Secrets is short and an easy read, and I would especially recommend it for the in-house lawyer or HR administrator who has to juggle many potential areas of the law, as well as to members of the trade secret community looking for an entertaining refresher.

More information on Keeping Secrets can be found here. 

(Full disclosure: I have known David through the years as we have traded notes and thoughts on our respective articles and posts. As some of you may remember, he and Darin contributed a wonderful post taking me to the woodshed for my comments on the impact of the America Invents Act upon trade secrets (specifically, the newly-expanded “prior use defense”)).

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well one or two that I missed over the past few weeks: Noteworthy Trade Secret and Non-Compete Posts and Cases: 
  • After the DuPont v. Kolon injunction decision, the other big news this week was the 4 year sentence imposed on former Motorola engineer Hanjuan Jin by U.S. District Court Judge Rubben Castillo, who said it was important to send a message that would deter others with access to trade secrets from stealing confidential information. The Wall Street Journal quoted Judge Castillo as stating “In today’s world, the most valuable thing that anyone has is technology…The most important thing this country can do is protect its trade secrets.” Jin’s arrest garnered headlines when she was detained just before she could board a one-way flight to Beijing. Prosecutors asserted that she had stolen Motorola’s trade secrets for a Chinese company, Sun Kaisens, and the Chinese military (for a copy of the opinion finding her guilty, look here). Epstein Becker’s Trade Secrets & Noncompete Blog has a post on the sentencing, as does Kenneth Vanko’s blog as well. 
  • A decision from California’s Fourth Appellate District refusing to enforce an employment non-compete that accompanied the sale of a business has generated a lot of commentary this week. The GPH Employment Law Blog has a post about that case, Fillpoint, LLC v. Maas, 2012 Cal. App. LEXIS 914 (Aug. 24, 2012).  Seyfarth Shaw’s Robert Milligan also has a very comprehensive post about the case as well as some practical takeaways.
  • Document retention of trade secrets may become increasingly important, as the newly-expanded “prior commercial use” exception under the America Invents Act may result in the greater use of trade secret protection. A recent post by Janet Reed and Jeffrey Safran entitled “If the Shoe Fits—Keep It: Document Retention Polices to Maximize Prior User Rights as a Patent Infringement Defense at Home and Abroad” provides some sound tips. 
  • “Protecting the crown jewels: How to deal with international trade secrets theft” counsels Kent Gardner and William Sauer for Inside Counsel. 
  • Interested in the latest trade secret filing before the International Trade Commission? See Seyfarth Shaw’s Trading Secrets Blog with another fine post, this one addressing the recent filing by SI Group against the Chinese company, Sino Legend.
  • Another trade secret plaintiff gets nailed for attorneys fees, this time in Pennsylvania, reports the Georgia Non-compete & Trade Secrets News Blog
  • “Protecting Social Media Information When an Employee Leaves” advises the Schwabe:Blog Employment Update.
  • Looking at “Avoiding antitrust concerns in employee restrictive covenants”?  See Todd Seelman’s article for Inside Counsel
  • “How Much Does IP Theft Cost the U.S. Economy?” asks the EyeonIP Blog. The numbers are, well, eye-opening. 
  • The Smooth Transitions Blog has a fine post reiterating the importance of forum selection clauses for employers. 
  • “Twitter’s Legal Battle: Who Owns Your Tweets?” wonders Julia Boorstin of CNBC. 
Computer Fraud and Abuse Act Posts: 
  • The Virginia ip Law Blog has a recent post about a CFAA case out of the U.S. District Court of the Eastern District of Virginia arising out of a breach of fiduciary claim. 
  • Would hacking the human brain violate the CFAA?  Shawn E. Tuma says it just might. 
Cybersecurity Posts and Articles: 
  • “Should you trust your network to a Chinese company?” asks Foley & Hoag’s Security, Privacy and the Law Blog
  • “Dropbox Adds Two-Factor Authentication for Extra Security” writes Rob Dean for WorkingOffice.
  • Shockingly, “Most employers unlikely to have a mobile device usage policy” according to EmployerBrief.com.
  • “6 steps to strengthen company smartphone security” notes Elizabeth Melick and Ethan Wall for Inside Counsel
News You Can Use: 
  • “10 Incredibly Simple Things You Should Be Doing To Protect Your Privacy” recommends Kashmir Hill of Forbes.