Among the big stories in legal circles last week was the kerfuffle over a memo circulated by Yahoo’s General Counsel Ron Bell reminding Yahoo employees that they are not to leak or disclose confidential information. The story should serve as an important lesson of the challenges a company faces in building, or in this case, rebuilding, a culture of confidentiality so important to preserving trade secrets.

The story first appeared on September 24, when All Things Digital’s Kara Swisher wrote about the memo. The “Leaks Uncool” memo is generally believed to have been triggered by a recent leak concerning internal communications about Yahoo’s sale of a portion of its stake in the Alibaba Group before it was final. Swisher quoted the following parts: 
 
“It’s never OK to share information in an internal memo EVEN if the company issues public communications about the same subject . . . We will fire employees who leak company confidential information and we will avail ourselves of all other legal remedies to protect those confidences.”

Bell’s memo also added the following line, which has caused the most controversy: “If you do it, you can go to jail and face a very large fine.” 

As Swisher’s article notes, Yahoo has had significant problems in the past containing leaks (indeed, in 2009, Yahoo’s then-CEO Carol Bartz went so far as to offer a $1,000 bounty for information on leakers), and she even suggests that past management may have encouraged some of those leaks. Not surprisingly, therefore, as Marissa Mayer and other members of the new management team attempt to steady and rebuild Yahoo, one of the critical tasks they face is rebuilding a culture of security and incrementally moving their employees to fully appreciating and respecting its importance. 

Did Bell over overreact? According to Swisher and some commentators quoted in Corporate Counsel, he did. But not in the Trade Secret Litigator’s view.  Executives and lawyers will always face a no-win battle with the media, who in this age of shrinking budgets are increasingly dependent on disgruntled employees or rivals looking to settle a score for their sources. (Witness the recent article “How EA’s legal team keeps one eye on former employees” criticizing EA for (gasp) reminding departing employees that they should remember they signed NDAs and should abide by them in their new job).
 
While you cannot (and should not) completely tune out media criticism, the fact remains that Yahoo, as a technology company, has to reinforce a culture of confidentiality or it will inevitably atrophy. As I have written before, creating a culture of confidentiality and security is the first and most important step in protecting sensitive information. (If you don’t think a culture of confidentiality is important, then you should look at Apple). Unfortunately, to change a company that has been complacent about security some times requires a big stick, or the threat of a big stick, to get people’s attention.

Leave aside all the potential issues relating to regulatory and securities laws that can result from a lax culture of confidentiality. Also set aside, for the moment, all of the issues relating to protection of trade secrets or other intellectual property. A culture of confidentiality remains critical today because of the ever-growing threat posed by hacking and cybertheft. 

Friday’s edition of The Washington Post ran a front-page article entitled “In cyberattacks, hacking humans is highly effective way to access systems.” In other words, perhaps the best target for cyberthieves and other malevolent cyber forces may be employees who are careless or uninformed about the risks to which they can subject their employer online. 

Reinforcing a culture of confidence therefore serves to protect a company on multiple fronts and if the carrot doesn’t work, then you should not hesitate to use the stick.  

What do you do after your federal conviction for stealing trade secrets from your former employer is thrown out on a technicality but another prosecutor charges you for theft under state law? Why you sue the employer from whom you allegedly stole the trade secrets in the first place to cover your legal expenses, of course. Welcome to America, Sergey Aleynikov.

This is the latest salvo in the never-ending saga involving ex-Goldman Sachs programmer Sergey Aleynikov, who filed a lawsuit in New Jersey this week against his former employer Goldman Sachs demanding that the federal court order Goldman Sachs to pay his $2.4 million in attorneys fees and indemnify him for his future attorneys fees for the latest criminal proceedings. (A hat tip to Kenneth Vanko for his post on this case yesterday aptly entitled, “This Move Takes . . . Guts;” a PDF copy of Aleynikov’s complaint can be found below).

Background: For those not following the case, Aleynikov was responsible for developing Goldman’s high frequency trading (HFT) computer programs for various commodities and equities markets. In April 2009, Aleynikov resigned from Goldman and accepted a job at Teza Technologies to help develop that firm’s own version of a computer platform that would allow Teza to engage in HFT. On his last day, Aleynikov transferred thousands of computer files, including source code to the HFT trading system, to a server in Germany that was not blocked by Goldman’s firewall. That evening, at his home, Aleynikov downloaded the material from the German server to his personal computer and then to his laptop and a thumb drive so that he could make it available to Teza.

In December 2010, a federal jury in New York convicted Aleynikov of stealing that source code under the Economic Espionage Act (EEA), but on appeal, the U.S. Court of Appeals for the Second Circuit reversed the conviction in February 2012. In my view and the view of other commentators, the Second Circuit erroneously applied a strained view of the types of trade secrets covered by that provision of the EEA. In August, Manhattan District Attorney Cyrus Vance, Jr. brought a criminal action against Aleynikov for the unlawful use of secret scientific material and duplication of computer-related material, both felonies under New York State law, for essentially the same conduct that was the subject of the reversed federal conviction.

Aleynikov’s Lawsuit for His Defense and Attorneys Fees: The lawsuit brought by Aleynikov cites certain bylaws of Goldman that require the defense and indemnification of officers charged with a crime, a bylaw which is not uncommon in the corporate world. According to The New York Times, Goldman Sachs has paid a large portion of the legal fees for former director, Rajat K. Gupta, who was convicted of leaking boardroom talks to hedge fund magnate Raj Rajaratnam, as well as for Fabrice Tourre, who faces a securities fraud law lawsuit by the SEC. Of course, neither of those Goldman Sachs officers were alleged to have stolen from Goldman Sachs. 

The bylaws in question cover officers who were “made party to a criminal action by reason of the fact that such person was an officer of the company.”   However, it doesn’t seem that Aleynikov was prosecuted by virtue of the fact that he was an officer, or for anything he did in connection with his duties and responsibilities as an officer. To the contrary, he was prosecuted because he was to alleged to have stolen from the company for his position at his new company Teza; the fact that he was a Goldman officer really does not appear to have had any thing to do with his prosecution, other than it provided him with access to the trade secrets in question. Moreover, the alleged misconduct took place after his resignation from Goldman.

Because Goldman Sachs remains a lightning rod for many and is perceived as pulling the strings behind the prosecutions, Aleynikov has achieved almost folk hero status.  In addition, some in the media seem increasingly troubled by the fact that he is being charged again for the same crime, even though double jeopardy apparently does not bar the state court proceedings. As a result, The Wall Street Journal ran a somewhat sympathetic piece on Friday entitled “Programmer’s Case Is Matter of (Legal) Code” (The New York Times article cited above was equally uncritical as was another article on Friday). 

The Trade Secret Litigator will continue to monitor this unusual proceeding and keep you posted on future developments.

Aleynikov v. Goldman Sachs.pdf (2.10 mb)

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well as perhaps one or two that I missed over the past few weeks: Noteworthy Trade Secret and Non-Compete Posts and Cases:
  • Fuhu, Inc., a child-focused software developer has sued Toys “R” Us Inc. in federal court in San Diego, claiming the retailer stole its strategy for selling an Android-powered computer tablet for kids, reports The Wall Street Journal.  Toys “R” Us has announced plans to sell a proprietary tablet for children called the Tabeo, a product Fuhu alleges closely resembles its own device, the Nabi.  Each product features a Wi-Fi-enabled tablet with a soft protective frame.  It is unclear exactly what trade secrets were stolen, however, and it appears that Fuhu is peeved that it had a marketing agreement with Toys “R” Us that was ignored for a year while it decided to launch its own competitive product.  Both Todd Sullivan and Poyner Spruill’s new Under Lock & Key Blog have posts about the recent filing.
  • The malicious trade secret prosecution case brought against Latham & Watkins earlier this year has been dismissed as untimely, Law360 is reporting.  In June 2008, a Santa Barbara judge ruled that a trade secrets case filed by Latham on behalf of Flir Systems Inc. against former employees William Parrish and Timothy Fitzgibbons was brought in bad faith for an anti-competitive motive.  The court in the second case against Latham concluded that the statute for malicious prosecution was one year and that the time to bring the claim expired in August 2010.
  • Georgia’s Supreme Court has issued an important preemption decision under the Georgia Uniform Trade Secrets Act, advises Neil Wienrich in Berman Fink Van Horn’s Georgia Non-Compete & Trade Secret News Blog.  In Robbins v. Supermarket Equipment Sales, LLC, 290 Ga. 462, 722 S.E.2d 55 (2012), the court found that a general injunction arising out of the same facts as a dismised claim under Georgia’s UTSA was preempted by that statute, and that in the absence of a trade secret claim, the injunction was improper.
  • Todd Sullivan is reporting that a split panel for the U.S. Court of Appeals for the Fourth Circuit has stayed Judge Payne’s twenty-year injunction forbidding Kolon from manufacturing Heracron.  In its motion seeking a stay of the injunction, Kolon argued, among other things, that the injunction would effectively kill Kolon’s Heracron business, forcing it to shut down production lines and cease sales across the globe.  Law360 quotes Kolon as having argued that “The district court took nearly a year to decide whether to issue a permanent injunction. A comparable stay to allow for this court’s orderly consideration of the appeal is clearly warranted.  The alternative would be the death knell for Kolon’s Heracron business, even if Kolon ultimately prevails on appeal.”
  • A new sheriff is in town, reports Corporate Counsel, as Yahoo’s General Counsel Ron Bell is making clear to employees that leaking confidential information is not only “uncool” but a violation that can get an employee fired and even prosecuted. 
  • Morgan Stanley must pay Fidelity in a solicitation dispute, reports Reuters.  In a recent FINRA arbitration, Morgan Stanley and two brokers it hired from Fidelity were ordered to pay over $500,000 in damages and attorneys fees, including nearly $82,000 in punitive damages.
  • “Access to Courts: Federal Circuit Issues Preliminary Rejection of Judge Koh’s Stance on Open Access to Trial Documents” notes a post in the Patently-O Blog.
  • “Hiring an Employee Who Has a Non-Compete: Proceed With Caution!” warns Neal Buethe for Minnesota Employer.com.
  • Poyner Spruill’s has launched its new trade secrets blog, Under Lock & Key.  The new blog has plenty of new posts that range from practical advice concerning NDAs to breaking news (as detailed above) about new trade secret filings.  I would encourage readers to bookmark it.
Computer Fraud and Abuse Act Posts and Articles:
  • Shawn Tuma’s Computer Data Privacy and Social Media Law Blog reports on a case out of the U.S. District Court for the Southern District of Ohio, Freedom Banc Mortgage Services, Inc. v. O’Harra, 2:11-cv-01073 (S.D. Ohio Sept. 5, 2012), applying some straightforward rules under the CFAA.  Most notably, U.S. District Court Judge Gregory Frost held that observing data constitutes “obtaining data” under the statute.  Brian Hall, writing for Porter Wright Morris & Arthur’s Employer Law Report Blog, also has a post on the decision.
Cybersecurity Posts and Articles:
  • The Steptoe Cyberblog has a thought-provoking post on cybersecurity, positing that the best defense is a good offense.  In “Rethinking Cybersecurity, Retribution and the Role of the Private Sector,” Stewart Baker persuasively argues that a defense-based strategy is doomed to fail and that the best approach is one focused on identifying and punishing the culprits.
  • “Chinese-made laptops’ latest feature: Pre-installed viruses” warns RT.
  • “Insider threat behavior not just actions” writes Dan Velez, director of defense programs for Raytheon Oakley Systems, for SC Magazine. Dan advises that improved security technology provides an illusory sense of accomplishment, and that until companies fully understand the human component (motivation, behavior, etc.), their approach to security will remain flawed and incomplete.
  • “10 Recommended Steps for Reducing Cyber Risk” from Reed Smith’s Global Regulatory Enforcement Blog.
News You Can Use:
  • “For the Absent-Minded, a Few Forget-Me-Nots” from The New York Times Personal Tech Blog.

In July, Senators Herb Kohl (WI), Chris Coons (DE) and Sheldon Whitehouse (RI) introduced the Protecting American Trade Secrets and Innovation Act of 2012 (PATSIA), to the applause of many in the trade secret community, including yours truly. One of PATSIA’s notable provisions proposed is an ex parte seizure order that would enable a trade secret claimant to seize evidence or product relating to misappropriated trade secrets that might otherwise be destroyed or improperly used. Does this seizure provision, however, go too far?

Recap of the Proposed Seizure Order:  PATSIA provides for an ex parte proceeding that authorizes the seizure of materials (1) used in connection with the alleged misappropriation (including computers) or (2) for the preservation of evidence. A federal court can approve the seizure order if the claimant presents clear and convincing evidence of irreparable harm (not a terribly high standard, since that is the standard required for any injunction) without notice to the other side. While short in duration (the seizure can last no longer than 72 hours), the categories of information subject to seizure are very broad. 

Once the products or computers are seized, however, there is no provision addressing how the information should be stored or protected, who will actually gather it, and who will have access to it. Instead, the proposed statute simply says an “appropriate” protective order should be included to protect disclosure or misuse of the information seized. (A link to the proposed statute and seizure order can be found here).

“I was for it before I was against it”: After some reflection and gentle chiding from a colleague concerned about the potential for the seizure order’s abuse, I now think this provision has to be modified. As presently proposed, what would prevent a judge who was not on top of his game that morning from granting an ex parte seizure allowing a competitor to misuse the order to seize and review high level trade secrets for its own benefit?  Before you harrumph and say “impossible!”, think about the number of bad faith trade secret actions in the news over the past six months (ACS v. Leadscope, SASCO v. Rosendin Elec., etc.). One would hope there would be severe consequences if a court improvidently granted such an ex parte request, but the damage from the disclosure would be done.

How best to narrow the provision but still keep it effective? I think there are three changes that would significantly reduce, if not eliminate, this potential problem with the seizure provision. 

First, the ex parte seizure provision should be aligned to the primary goal of PATSIA — namely, the protection of U.S. trade secrets from foreign misappropriation. A review of of a press release by Senator Kohl for a previous amendment to the Economic Espionage Act virtually identical to this bill made clear foreign misappropriation was the primary concern, so why not confine this powerful tool to that perceived problem?   

Second, the material or evidence that was seized would have to be kept in a secure escrow or location where the party bringing the claim could not inadvertently or intentionally access that information during the pendency of the seizure order and any challenge to the seizure order.  This would serve the purpose of preservation and segregation but remove the danger of misappropriation. Make the statute clear that the claimant cannot access the information or evidence until a court has the opportunity to hear from the other side.

Third, there should be mandatory and severe penalties for any abuse of the seizure order. While the provision authorizes claims for compensatory damages, punitive damages and attorneys fees for a bad faith seizure order, that is not enough. Penalties should be directed at the lawyer as well as the client. Have the lead lawyer certify why this order needs to be done in an ex parte fashion.  This would ensure that a claimant and his counsel would be on the hook if they were not careful in considering their request or acted improperly during the seizure process. 

Another Necessary Fix: And while this amendment is being made, Congress should take the opportunity to undo the damage caused by the U.S. Court of Appeals for the Second Circuit in U.S. v. Aleynikov. Readers of this blog will remember that the Second Circuit bobbled the ball when it imposed an unduly narrow construction of the categories of trade secrets covered under section 1832 of the Economic Espionage Act to only those trade secrets that are included in products that are ultimately sold within the stream of commerce. This too needs to be fixed as a broad category of trade secrets would be left unprotected under the statute’s present language, which tracks the language of section 1832.

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well one or two that I missed over the past few weeks: Noteworthy Trade Secret and Non-Compete Posts and Cases:
  • A former programmer for futures exchange operator CME Group has pleaded guilty to stealing trade secrets in connection with plans to improve a trading platform in China, according to a report by The Wall Street Journal this morning.  Chunlai Yang, a senior software engineer who worked at CME for 11 years, admitted to downloading more than 10,000 files from CME computers, and planned to offer improved technology to the Zhangjiagang Exchange.
  • Executives of Chinese telecom companies Huawei and ZTE were grilled by the U.S. House Intelligence Committee over allegations that Huawei stole Cisco and Motorola’s trade secrets, reports Todd Sullivan in his Sullivan’s Trade Secrets & Employee Defections Blog. Mike Rogers, the House Intelligence Committee Chairman expressed concern that “Huawei and ZTE provide a wealth of opportunities for Chinese intelligence agencies to insert malicious hardware or software implants into critical telecommunications components and systems.” Congressman Rogers further noted that “under Chinese law, ZTE and Huawei would likely be required to co-operate with any request by the Chinese government to use their systems or access for malicious purposes.” For more on the hearings, The New York Times and The Wall Street Journal’s articles can be found here and here. 
  • For those in Kentucky, Kenneth Vanko, Robert W. Milligan and Russell Beck all have posts on an important opinion laying out the six factors that a court should apply when deciding whether to enforce, not enforce or narrow a covenant not to compete. In Charles T. Creech, Inc. v. Brown, 2012 Ky. App. LEXIS 142 (Ky. Ct. App. Aug. 17, 2012), the court of appeals provided various “guiding principles” for the considerations underlying each of those six factors.
  • The U.S. International Trade Commission will review a finding that a former Twin-Star International Inc. employee violated the Tariff Act when he used stolen proprietary information to start a rival fireplace manufacturer in China, reports Law360. In July, an administrative law judge had found that former Twin-Star employee Yue Qiu Sheng violated a confidentiality agreement by stealing plans for an electric fireplace prototype as well as customer and supplier lists to launch his own company, Shenzhen Reliap Industrial Co. Ltd.
  • Have a trade secret case that is going to trial in Florida? Then you should read a recent post by Peter Vilmos in Burr & Forman’s Non-Compete & Trade Secrets Blog about the importance of jury instructions under Florida’s version of the Uniform Trade Secrets Act.
  • Want “A Look At 16 Years Of EEA Prosecutions”? Check out Peter Toren’s fine summary for Law360.
  • Mark Terman provides “A Litigator’s perspective on trade secret protection plans” for Inside Counsel.
  • “Do Maids Have to Sign Non-Compete Clauses?” wonders John Kelly of The Washington Post.
  • The big trade secrets news this week was the Ohio Supreme Court’s decision in American Chemical Society v. Leadscope, a decision that at least one Ohio commentator described as the most eagerly awaited case of the year. The ACS case held that a claim of unfair competition could be based on a theory of malicious litigation by a competitor and it announced the legal standard for that claim. However, the ACS case also provides a cautionary tale for litigators in high profile trade secret cases — namely, the potential of a defamation claim against lawyers for statements about the litigation to the media. In ACS, Leadscope alleged that one of ACS’s lawyers defamed it by stating “Our motivation in filing suit is to acquire back the protected information that they took from us” to a local business paper, Business First. The Supreme Court ultimately dismissed the defamation claim, reasoning that the article as a whole simply provided an accurate summary of the legal proceedings (both sides were quoted about the litigation and made substantive statements about their positions). For a very thorough analysis of the opinion and its key components, check out former Appellate Court Judge Marianna Brown Bettman’s post in her Legally Speaking Ohio Blog
Computer Fraud and Abuse Act Posts and Articles: 
  • Seyfarth Shaw’s Trading Secrets Blog has two posts about two recent federal decisions out of California. Daniel Joshua Salinas details a ruling denying reconsideration of an important ruling that allowed CFAA case to proceed despite the recent decision in U.S. v. Nosal as well as a case out of the Northern District of California dismissing a CFAA claim for “click fraud” because the plaintiff failed to provide adequate factual basis for that claim.
Cybersecurity Posts and Articles: 
  • In need of a comprehensive summary of the various pieces of cybersecurity legislation and executive orders? Check out “An Analysis of Proposed Federal Cybersecurity Legislation” by Todd Taylor for Corporate Counsel.
  • “Senator Presses On Cybersecurity” reports The Wall Street Journal
  • “Never trust a stranger: Secure social networking” warns Rob Rachwald for SC Magazine.
  • “Your smartphone will (eventually) be hacked” predicts David Goldman for CNNMoney
News You Can Use: 
  • “Extra Security for Gmail” from The New York Times Personal Tech Blog.

The Ohio Supreme Court issued a significant opinion this morning affirming in large part a Columbus, Ohio jury’s award of $26.5 million to a small company and its founders who claimed that a trade secret case brought against them by their former employer was brought to disrupt or destroy their business. In American Chemical Society v. Leadscope, Inc., the Ohio Supreme Court found that Leadscope and its founders had properly asserted a claim for unfair competition arising out of malicious litigation. A link to the opinion, which is lengthy, can be found here.
 
Factual Background:  In 2002, American Chemical Society (ACS) sued several former employees and their company, Leadscope, for allegedly stealing technology from ACS. Two of the former employees, Paul E. Blower Jr., Ph.D. and Glen J. Myatt, Ph.D., had worked to develop a software tool named Pathfinder that was intended to improve the ability of researchers to access and organize the voluminous information available in ACS’s databases. ACS suspended the Pathfinder project in 1997 to the disappointment of Blower and Myatt, who later left to form Leadscope and to develop a software product to aid in exploring and displaying chemical compounds.
 
ACS came to learn of Leadscope’s development of its software, carefully monitored its progress from afar, and ultimately claimed in the lawsuit that it was concerned that Leadscope had misappropriated its Pathfinder technology. In the spring of 2002, ACS demanded that Leadscope turn over its patent for its new software and pay ACS $1 million. When those negotiations broke down, ACS brought suit, made it known that the technology was in dispute, and made statements to others that Leadscope had improperly taken that technology from ACS. All of these actions substantially impacted Leadscope’s ability to get financing and run its business.
 
The inpidual defendants and Leadscope counterclaimed, arguing that ACS had brought the litigation in bad faith as part of a larger plan to disrupt, if not destroy, their new business. A jury awarded over $26.5 million in compensatory and punitive damages to Leadscope and the former employees, as well as attorneys fees, which has now swelled to over $40 million due to additional attorneys fees and prejudment interest. The Tenth District Court of Appeals affirmed the jury’s verdict and agreed the trial court had properly applied a subjective “bad faith” standard, as opposed an objectively baseless standard, in finding that a claim for malicious prosecution existed. The Tenth District also found that the award of attorneys fees was proper under Ohio’s Uniform Trade Secret Act because of the jury’s finding that the trade secret claims were in bad faith.
 
The Ohio Supreme Court’s Holding: The Supreme Court grappled with the issue of whether a claim for unfair competition could include a theory of malicious litigation, a contention that had sufficiently troubled the State of Ohio enough that the Ohio Attorney General’s Office had filed an amicus brief and appeared and argued in support of ACS’s position. 
 
As an initial matter, the Supreme Court disagreed with the application of the “bad faith” standard by the trial court and Tenth District, reasoning that a party had to show that the legal action is objectively baseless and that the opposing party had the subjective intent to injure the party’s ability to be competitive. In applying that “objectively baseless” standard, the Supreme Court found that the claims against ACS remained viable and that there was no evidence in the record to support ACS’s supposed trade secret claims. For example, the Supreme Court noted that ACS had failed to provide any support for its claims of misappropriation and emphasized the gaps in the testimony of the witnesses that ACS had called. On this point, the Supreme Court summarized that “ACS presented a theory, but offered no concrete evidence that Leadscope stole its product.”
 
As for the issue of ACS’s subjective intent, the Supreme Court found ample support for the jury’s finding that ACS had the  intent to injure Leadscope and its founders. It noted that ACS’s president had closely monitored Leadscope and had even sent out an email to then-Ohio-Governor Robert Taft to abort a visit by the governor to Leadscope’s offices. ACS’s former information technology director also provided damaging testimony documenting ACS’s president’s hostility towards Leadscope. In addition, ACS took actions or made statements that interfered with Leadscope’s ability to get funding (for example, by dissuading an venture capitalist interested in investing in Leadscope by telling him that there were legal issues with Leadscope’s technology) and took actions in the litigation to disrupt Leadscope’s ability to get insurance coverage for the dispute.
 
The Takeaway? As numerous other high profile cases have been brought recently against law firms and former employers for allegedly bringing trade secret actions in bad faith, this case may prove to be a bellwether opinion. The ACS case provides a lesson in the dangers of potentially overreaching in a weak trade secrets case, as well as on the power of the “David v. Goliath” theme for juries. Seemingly innocent or unrelated actions were woven together very effectively to show malice and an intent to destroy or disrupt a promising business, but those facts would have been of no value if ACS had been able to objectively demonstrate that it had a trade secret claim in the first place.
 
Further Thoughts (Sept. 19, 2012):  One of the challenges in blogging is the importance of posting timely and concisely.  In my zeal to get this post up about a very important case here in Ohio, there were two other points that in retrospect that I should have made: 

(1) There was a defamation claim premised on some of the statements made to the local press and in a company-wide email that the Supreme Court dismissed; this too was an important issue and claim and I will cover it in a future post. The dismissal of the defamation claim will probably lead to a substantial reduction in the award, although it is unclear how much from the face of the majority opinion; and

(2) There are a number of interesting procedural issues presented by this 4-3 ruling (especially for Ohio lawyers).  In particular, the Supreme Court’s decision to affirm after reviewing the “voluminous” record rather than to remand it back for another trial, despite its imposition of a new legal standard on the unfair competition claim, appears to be highly unusual and will be talked about by lawyers here in Ohio for some time to come.

A number of commentators (including the Trade Secret Litigator) have opined about the potential impact that the new America Invents Act (AIA) may have on the increased use of trade secrets, primarily focusing on the newly-expanded “prior commercial use” defense under the AIA. However, my colleague Robert T. S. Latta recently brought another potential benefit that may arise under the AIA for trade secret owners to my attention, and he was kind enough to commit his thoughts to this post. According to Rob, the legislative history of another recent amendment of the AIA suggests that a trade secret owner may essentially be provided with a potential mulligan in the form of a subsequent patent should he or she lose his or her trade secret protection. 

Under current patent law, if an inventor maintains his invention as a trade secret and commercially profits from that invention for more than one year, the inventor forfeits the right to patent that invention. As Justice Learned Hand wrote long ago, “it is a condition upon an inventor’s right to a patent that he shall not exploit his discovery competitively after it is ready for patenting; he must content himself with either secrecy, or legal monopoly.” Metallizing Engineering Co. v. Kenyon Bearing and Auto Parts Co., 153 F.2d 516 (2d Cir. 1946).

However, new language in the AIA may change that settled precedent. The revised § 102(a)(1), which comes into effect on March 16, 2013, permits a patent unless “the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention.” (Emphasis added). If it was not available to the public (as any trade secret would not be), it would be patentable under the new §102(a)(1).

The legislative history supports this view. Senator Jon Kyl, on the day the AIA was enacted, explained “public uses and sales are prior art only if they make the invention available to the public.” Congressional Record, Senate, Sept. 8, 2011 at S5431. Furthermore, the day after the enactment of the AIA, Senator Patrick Leahy advised that §102(a)(1) “was drafted in part to do away with precedent under current law that private offers for sale or private uses or secret processes practiced in the United States that result in a product or service that is then made public may be deemed patent-defeating prior art.” He stated that prior art must meet the “the public accessibility standard that is well-settled in current law, especially case law of the Federal Circuit.” Congressional Record Volume 157, Number 35 (Wednesday, March 9, 2011), Senate, S1496-S1497.

If §102(a)(1) is indeed interpreted, as suggested by this legislative history, to overturn current precedent, then an inventor will no longer forfeit his or her U.S. patent rights for maintaining his or her invention as trade secrets for a period longer than one year. The inventor will be free to practice that invention for commercial gain as a trade secret until such time as the inventor finds it necessary to patent it (providing another has not already patented the invention). Further, if someone has patented the invention, the prior secret user would still have the prior commercial use defense to patent infringement under §273.

Is the new language in §102(a)(1) simply a “catch-all” phrase?  Some (most notably, Sughrue Mion LLP, in an article  attached as a PDF below) interpret “or otherwise available to the public” as nothing more than a catch-all language, capturing unspecified types of disclosure. Under this interpretation, the current case law regarding secret uses and/or sales would remain unaltered. These commentators have argued that this interpretation of §102(a)(1) maintains harmony of this section of U.S. patent law with that of the patent laws of other countries, a stated purpose of the AIA. (See comments of Senator Hatch, Congressional Record (January 25, 2011), Senate, S142 (“If enacted the Patent Reform Act of 2011 would move the United States to a first-inventor-to-file system, which will bring greater harmony and improve our competitiveness.”)). 

This “catch-all” interpretation of § 102(a)(1) might also fall in line with the statutory rule of construction that when Congress intends such a dramatic shift in the law, it does so explicitly. Bd. of Trustees of Leland Stanford Jr. Univ. v. Roche Molecular Sys., Inc., __ U.S. __, 09-1159 (June 6, 2011) (“Congress has in the past divested inventors of their rights in inventions by providing unambiguously that inventions created pursuant to specified federal contracts become the property of the United States … Such language is notably absent from the Bayh-Dole Act”).

That being said, however, as Robert Maier of Baker & Botts argues in his article “The Big Secret of the America Invents Act” for IP Today, the legislative history of the AIA suggests that a “catch-all” in §102(a)(1) was not the intent of at least some lawmakers. In the humble view of the Trade Secret Litigator, this certainly does not look like “catch all” language, and on its face, this relatively straightforward language would seem to include trade secrets which are by definition not publicly available.

Until a court considers this issue under §102(a)(1) of the AIA, this will remain a subject of debate. However, it may be worthwhile for a trade secret owner whose trade secret has lost one or more of its trade secret elements to test this proposition before a court.

Sughrue AIA Article.pdf (175.08 kb)

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well one or two that I missed over the past few weeks: 
 
Noteworthy Trade Secret and Non-Compete Posts and Cases: 
  • A former American Airlines employee has agreed not to publish trade secrets and confidential information on his websites that he learned while he worked at American. According to Law360, American sued Gailen David, who runs several websites including The Sky Steward and AAGossip.com, in April after David published flight information about American’s board members and former executives, including their itineraries and seat assignments, and alleged that American bumps paying passengers from flights to accommodate those executives. Epstein Becker’s Trade Secrets & Noncompete Blog has a write-up on the case as well.
  • The University of Iowa has sued a former professor to enforce a non-compete prohibiting him from practicing medicine within a 50-mile radius of the university. Bogdan Cherascu, a clinical assistant professor in UI’s Internal Medicine department. Cherascu is now working for the Physician’s Clinic of Iowa, which is located in Cedar Rapids. Given the high profile of non-competes in the healthcare community, this one should be interesting to watch.
  • LG is expected to issue an apology to Samsung soon in connection with allegations that LG’s employees stole Samsung’s organic light-emitting diode (OLED) screens. In Sullivan’s Trade Secrets & Employee Defections Blog, Todd Sullivan reports that Samsung recently submitted  documents to the Seoul Central District Court for 18 confidential technologies for its OLED screens and 21 other relevant details, demanding 1 billion won (US$880,514) from LG Display in compensation for each case of LG’s usage of the cited technologies or making public the information to a third party. OLED panels, which feature slimmer and more vivid screens than common liquid crystal display screens, are much sought after by tech companies around the world. In July, 11 people, including former or current researchers at Samsung Mobile, were indicted in South Korea on charges of leaking core display technology from Samsung to LG.
  • Seyfarth Shaw’s Trading Secrets Blog has an interesting post, “When Everything Becomes Software, How Does That Affect IP Strategy?” by Joren De Wachter.
  • “Don’t Sound The Death Knell Just Yet: Trade Secrets Are Still Alive in North Carolina” advises Poyner Spruill’s Josh Durham. 
  • Have a trade secret dispute in Taiwan? The International Techology Law Blog has a primer on “Trade Secret Litigation in Taiwan.” 
  • Former DuPont security chief Ray Mislock Jr. offers “8 keys to starting a trade secret protection plan” for the Security InfoWatch Blog.
  • The International Trade Association’s tradeology blog has a post “The Secret Is Out! Learn More About the Value of Trade Secrets to the U.S. Economy.”
  • “Dealing With IP and Trade Secret Theft by Employees” counsels Kris Haworth and Mindy Morton for Corporate Counsel.
Procedural Issues (for the litigators): 
  • Concerned about whether you can assert personal jurisdiction over a foreign party? See Alison Frankel’s report in her On The Case Blog about recent rulings against Chinese drywall manufacturer Taishan Gypsum Co. holding it could be haled into a U.S. court. 
Cybersecurity Posts and Articles: 
  • “Businesses Beware: Heavy-Handed Tactics Planned for Cybersecurity” warns Jody Westby in an article about the Obama administration’s possible executive action for Forbes.
  • Looking for sample BYOD policies?  Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog has several. 
  • “Federal CIO Council Releases BYOD Toolkit” announces the InformationLawGroup Blog. 
  • “Cloud Computing: Some Practical Suggestions for Resolving Issues” in two installments by Osler Insights Blog
News You Can Use: 
  • “Three Tips for Better Google Searching” from The New York Times’ Gadgetwise Blog.

A curious decision out of Connecticut highlights the Hobson’s choice that some employers in that state might face if they do not secure covenants not to compete from all of their employees.   In Creative Dimensions, Inc. v. LaBerge, the Connecticut Superior Court rejected enforcement of an 18 month non-compete and non-solicitation agreement against two former owners of the company, reasoning that the absence of non-competes with other employees rendered the agreement unfair under Connecticut law.  Daniel Schwartz’s Connecticut Employment Law Blog has a fine write up on this case as well.

Creative Dimensions, Inc. (CDI) purchased the business from Daniel LaBerge and William Miller in 2005 and secured 18 month covenants not to compete and non-solicitation agreements from each of them as part of that transaction. As part of the deal, LaBerge and Miller relocated to Connecticut. In 2009, they left to join a competitor and CDI moved to enforce their non-competes. It is unclear why CDI waited until 2012 to commence the action.

The Superior Court declined to enforce the non-competes after applying a five-factor test under Connecticut law that focuses on the (1) length of time of the covenant; (2) geographic scope of the covenant; (3) fairness of the protection accorded to the employer; (4) extent of the restraint on the employee’s opportunity to pursue an occupation; and (5) extent of interference with the public interest.  The court rejected the covenants under the third prong, essentially reasoning that the absence of any non-competes with other current and former sales employees was persuasive evidence that there was no protectible interest justifying the non-competes.

The Superior Court rejected any notion that the two former owners should be treated any differently from any other employee. In the court’s view, in the context of the sale of the business, the non-compete may have been reasonable during the first three years of their relationship since LaBerge and Miller were critical to the transition of the new business to its new owners.  However, after three years, the court found that LaBerge and Miller were now like any other at-will employee and, therefore, the absence of any non-compete with other employees became more relevant.

The court also emphasized the absence of any proof of any trade secrets or confidential information that would justify the non-competes and rejected efforts to justify customer lists, since the identity of CDI’s customers was readily available.  When CDI tried to counter by arguing that LaBerge and Miller were “very entrepreneurial,” the court said that argument was undermined by the fact that CDI also outsourced some of its work from to time to established competitors without any restrictions.

How should an employer respond?  This argument is made frequently in non-compete litigation but is rarely embraced, which makes this decision unusual.  Courts generally confine themselves to the agreement at issue and make the decision on the circumstances before them.  From a litigation standpoint, it should serve as reminder to employers of the importance of being prepared to justify the legitimate need for the non-compete by presenting evidence of trade secrets or relationships with important customers.

This decision is also curious because it involved a non-compete that accompanied a sale of a business.  Courts are generally more deferential to non-competes in this setting because (1) the non-compete has been negotiated at arms’ length between sophisticated parties with the assistance of counsel; (2) courts recognize that the transfer of goodwill critical to the business naturally accompanies and supports the non-compete; and (3) the former owners are generally paid a tidy sum in exchange for the sale of the business.  The Superior Court seems to have rather cavalierly dismissed these considerations (or perhaps CDI did not emphasize them forcefully enough) when it found that these interests were no longer present after three years.

For Connecticut employers, and particularly those acquiring a business, this decision could prove to be problematic because it could force those employers to secure non-competes with other employees from whom they might not otherwise seek non-competes.  For employers outside Connecticut, the decision should be of less concern, since its reasoning was highly fact-specific and was rooted in Connecticut’s law governing non-competes.

Before posting links to the noteworthy trade secret, non-compete and cybersecurity stories from the past week, I wanted to remind everyone that the ABA Blawg 100 is still accepting nominations until tomorrow, Sept. 7th, which means there is one more day for you to nominate your favorite legal blogs for inclusion on this prestigious list.  Of course, I mention this with the hope that this blog might be among your favorites, and, if so, that you would take a moment to submit it to the ABA for consideration.  However, whether you do so or not, my genuine and sincere thanks for simply reading The Trade Secret Litigator.  You, my readers, are what have made this blog what it is today, and I wouldn’t be here without your feedback and support.  For those interested in nominating this or any other blog, simply go to http://www.abajournal.com/blawgs/blawg100_submit and enter your name, employer, city, email address, nominated blog URL, and a description in 500 characters or fewer of why you are a fan of that blog. Now, on to the news of the week! Noteworthy Trade Secret and Non-Compete Posts and Cases: 
  • Can you prevent a newspaper from publishing your trade secrets? Not in federal court, according to a fine post by Paul Freehling for Seyfarth’s Trading Secrets Blog.  Paul details a recent decision by the U.S. District Court for Louisiana in Rain CII Carbon, LLC v. Kurz, finding that an effort to prevent media dissemination of financial trade secrets amounted to a forbidden prior restraint under the First Amendment (a TRO had been granted by a state court before removal to federal court). Longtime readers may recall that this issue gained prominence last year when WikiLeaks was flexing its muscles. In my view, federal courts are unduly sensitive to claims of prior restraint while states like California and Ohio have been more inclined to balance the various interests in these disputes.
  • Florida employers may breathe a little bit easier after a merger or acquisition, as Carlon Fields’ Thomas Dye reports that the First District Court of Appeal of has held that an assignment of a non-compete may be permissible even if the non-compete fails to provide successor and assign language. In DePuy Orthopaedics, Inc. v. Waxman, 2012 WL 3138681 (Fla. 1st DCA August 3, 2012), the First District reversed the denial of a preliminary injunction and found that a covenant not to compete could be assigned despite the absence of the customary “successor and assign” language. Whether this language is required has been the subject of a high profile case before the Ohio Supreme Court, Acordia of Ohio v. Fishel — the court initially found the absence of that language doomed any transfer to a successor in a merger, but has since accepted a request for reconsideration.
  • Mattel claims that it is not responsible for $140 million of MGA’s attorneys fees sought by insurer Evanston Insurance Co., arguing that this type of subrogation has already been rejected in another case, reports Law360.  For a short history of the the Mattel/MGA trade secret feud over the Bratz dolls, see here. 
  • Two Chinese nationals have been charged with the theft of trade secrets of Pittsburgh Corning, Bloomburg is reporting.  Ji Li Huang, 45, and Xiao Guang Qi, 31, attempted to buy what they were told were documents revealing Pittsburgh Corning’s processes for making cellular-glass insulation, U.S. prosecutors in Kansas City said earlier this week. 
  • The U.S. District Court for the Southern District of New York has refused to enforce a non-compete against a fired employee. In Arakelian v. Omnicare, Inc., the court applied New York’s rule that an employee terminated without cause is not bound by non-competition and non-solicitation provisions. For those looking for competing perspectives, an article by Cullen and Dankamp LLC presents a pro-employer slant while Pollard LLC’s the non-compete blog presents the perspective from the employee’s side. 
  • For those in Alabama, Burr & Forman’s Non-Compete & Trade Secrets Law Blog describes a recent decision from the Alabama Supreme Court scaling back what it found to be an overly-broad non-compete. 
  • Employers, thinking of waiving your non-competes to ease the pain of a lay-off? Strasburger’s Noncompete Blog says you should document it properly or run the risk of a claim of selective enforcement. 
  • Dan Harris’ China Law Blog has a typically thorough post on protecting trade secrets in China, “China NDAs/NNN.  What You/We Need to Know.” One interesting nugget: don’t expect a forum selection clause choosing the U.S. to have to much value since Chinese courts will not enforce U.S. judgments. 
  • For those practicing before the Northern District of Illinois, R. David Donoghue’s Chicago IP Litigation Blog reports on a recent decision rejecting a claim for a breach of a non-disclosure agreement because it was premised on inference upon inference upon inference. 
  • Russell Beck’s Fair Competition Law Blog’s monthly update is out and as always, it details a number of interesting posts and cases from around the U.S. (and Europe too). 
Procedural Issues (for the Litigators): 
  • Want to get a photograph on a social media site into evidence?  Eric Goldman’s Sept. 1, 2012 post in his Technology & Marketing Blog says you better make sure you can authenticate it and show that the party against whom you are seeking to admit it had some role in posting it. In In re A.D.W., A.L.W., and X.M.M., No 2-648 / 12-1060 (Iowa Ct. App.; Aug. 8, 2012), an Iowa appellate court reversed because there was no proof that a mother had placed a photograph of a marijuana grower’s operation on her Facebook page.
Computer Fraud and Abuse Act Posts:
  • Todd Sullivan’s Trade Secrets & Employee Defections Blog reports that Toyota has sued a former employee, Ibrahimshah Shahulhameed, who allegedly hacked into Toyota’s toyotasupplier.com website, allegedly downloaded sensitive proprietary information from it, moved on to unauthorized accessing of the Toyota computer system, and then sabotaged the company’s internal software.  As many of you no doubt remember, Todd was a major contributor to Womble Carlyle’s Trade Secrets Blog, before forming his own firm, Graebe Hanna & Sullivan.
  • In an article entitled, “A Narrow View of ‘Authorized Access’ in the CFAA” for Law Technology News, Elkan Abramowicz and Barry Bohrer not only provide a nice summary of the recent decisions in U.S. v. Nosal and WEC Carolina Energy v. Miller but also provide an update on a recent proposal by Senator Patrick Leahy to codify the narrow interpretations of “exceeded authorized access” applied by those courts. 
Cybersecurity Posts and Articles: 
  • Foley & Lardner’s Privacy & Security Source Blog has an excellent post, “Appellate Court Decision Demonstrates that Security is Not Just About Technology — It’s About People.”  The post by Chanley T. Howell details the lessons to be taken from a recent case, Patco Construction Company v. People’s United Bank, 1st Cir., July 3, 2012, http://www.ca1.uscourts.gov/pdf.opinions/11-2031P-01A.pdf), in which the First Circuit found that a bank was potentially liable to a small business for cyberfraud resulting in the withdrawal of approximately $500,000 from the customer’s account.  Chanley describes the impressive array of security procedures and precautions offered by the bank, yet human breakdowns invariably contributed to the breach. It is a reminder of the importance of culture and reinforcing security practices time and time again. 
  • “Rise in Cyber Data Kidnapping: Tips on Protecting Your Data From Being Taken Hostage” advises Pullman & Comley LLP.
  • For a solid description of the recent hack of Apple by AntiSec, see The New York Times Bits Blog’s “Hackers Claim to Have 12 Million Apple Device Records.” 
News You Can Use: 
  • Do you have a digital will in place? If not, Kelly Greene advises what you should do in an article for The Wall Street Journal, “Passing Down Digital Assets.”