
Third Circuit Requires Clear Showing of Performance for Non-Compete

Wal-Mart Moves to Hold Whistleblower in Contempt

Several months later, Wal-Mart secured a temporary restraining order against Gabbard that prevented him from further disclosing trade secrets and confidential company information. Gabbard also was ordered to turn over two computer hard drives that Wal-Mart believed contained its documents to a local prosecutor. Wal-Mart ultimately secured a permanent injunction that required Gabbard to return any other trade-secrets or confidential information.
This dispute resurfaced recently when Gabbard apparently posted what Wal-Mart believed to be confidential documents on a website in violation of the permanent injunction. Gabbard has denied that he violated any order and that the documents were provided to him after the orders were entered. His lawsuit contends that Wal-Mart is trying to compel him to sign a non-disclosure agreement and chill his First Amendment rights.
Contempt proceedings are pretty serious matters and one can only presume that Wal-Mart is pretty confident that the order was violated. I will see if I can track down the pleadings and the website that is alleged to have contained the confidential documents to evaluate whether the costs of this litigation outweigh the substantial national publicity it seems to be generating. In the meantime, this case could turn out to be a good example of what has come to be known as the “Barbara Striesand effect” — a phrase that was coined after the famous diva loudly protested Google Earth’s efforts to photograph her home, leading of course to even more unwanted internet traffic and interest.
Trade Secrets and Patent Applications: They Can Coexist

An increasingly common defense in trade secret cases concerning an invention or technology is that the plaintiff’s previously publicly available patent or patent application discloses and thus waives any related trade secrets. A recent case from the United States Court of Appeals for the Fifth Circuit, Tewari De-Ox Systems, Inc. v. Mountain States/Rosen, L.L.C., Case No. 10-50137, (5th Cir., April 5, 2011), joins a number of other cases refusing to adopt a broad rule in this situation and requires a district court to examine the fact of each trade secret case. (A fine post commenting upon this case can be found in the pre-emenint blog, Patently-O).
The plantiff in Tewari had designed a “zero ppm oxygen meat-packaging method” for packing fresh meat for shipment and display in retail stores. Essentially, the system removed air from packets used to preserve that meat. Tewari had shared this process with the defendant, MTSR, pursuant to a non-disclosure agreement and later concluded that MTSR misappropriated its trade secrets.
Applying Texas law, the district court found that trade secrets in question had been destroyed by publication in a patent application or had already been disclosed and known in the industry, and the court granted summary judgment. On appeal, the Fifth Circuit reversed, holding that a genuine issue of material fact existed on the issue of whether a trade secret existed. The Fifth Circuit cited previous authority that “the question of whether certain information constitutes a trade secret ordinarily is best ‘resolved by a fact finder after full presentation of evidence from each side'” (Tewari at p. 12). The Fifth Circuit recognized that to the extent that the information was fully disclosed in an earlier patent application, it would not be entitled to trade secret protection, a holding reflecting settled law that a trade secret that is publicly disclosed can no longer be considered a secret.
However, to the extent that the trade secret in question was a combination of information found not only within the patent application but from other sources, the Fifth Circuit applied the doctrine that a trade secret can be composed of many different elements, each of which may be found within a public source, so long as the combination is not publicly disclosed. For this reason, the Fifth Circuit found that a genuine issue of material fact remained and remanded the case to the district court.
The takeaway from Tewari? If you are filing a trade secret case that might involve an invention that is the subject of a publicly available patent application, be certain that the trade secrets that you are seeking to protect have not been fully disclosed within that patent or patent application. This will obviously require a careful examination of the patent application or patent prior to filing the complaint. To the extent tha the trade secrets do include some of the information found in a patent application, be prepared, as the plaintiff did successfully on appeal, to argue that the information (if any) found in a patent application is part of a larger combination of other information giving rise to the trade secret.
Sears and Limited Brands Race to Courthouse over New Exec

The Importance of Trade Secret Audits

WikiLeaks and Trade Secrets: The First Amendment Challenge

Let’s Meet at the AIPLA Spring Meeting in San Francisco

WikiLeaks and Trade Secrets: The Perfect Storm

The WikiLeaks scandal has generated widespread concern about how to manage a crisis where a disgruntled employee seeks to post confidential information or trade secrets on the Internet. This scandal arose when PFC Bradley Manning allegedly stole hundreds of thousands of classified diplomatic files and documents and delivered them to the Internet organization, WikiLeaks. WikiLeaks holds itself out as a tool for helping individuals “safely get out the truth” about government and other institutions, and it posted those classified documents on its website for the world to see.
WikiLeaks has not confined its efforts to government information and has also posted confidential information taken from large banks and other private companies that it deemed newsworthy. For example, WikiLeaks has published internal information from Bank of America documenting its internal dialogue on confronting the unique threats posed by WikiLeaks.
An unsuccessful attempt by the Swiss bank, Julius Baer, to restrain WikiLeaks from posting information on its website in 2008 has now received renewed attention because of the recent scandal [See Bank Julius Baer & Co. Ltd., et al. v. WikiLeaks, et al., Case No. 3:08-cv-0824-JSW, U.S.D.C., N.D. Calif]. Side Note: For those who are interested, I will be speaking on this issue at the American Intellectual Property Law Association’s Spring Meeting on Friday, May 13, 2011.
The Julius Baer case is worth re-examining in several respects because of the renewed interest in the harm that WikiLeaks or a similar self-styled whistleblower can cause by attempting to post information on the Internet. According to Julius Baer’s complaint, a disgruntled former employee, Rudolf Elmer, took client records and data in violation of a confidentiality agreement he signed with Julius Baer. After Elmer’s termination, Julius Baer discovered that Elmer had begun posting hundreds of those records on WikiLeaks’ website. The district court was initially receptive to Julius Baer’s claims and granted Julius Baer’s request for a TRO, enjoining WikiLeaks from further posting or displaying that information and directing WikiLeaks to remove all copies or images from the websites under its control.
While Julius Baer did not join Elmer as a defendant, it did join the WikiLeaks domain administrator, Dynadot, LLC, to ensure that the party responsible for the WikiLeaks’ domain name and/or website would comply with any potential order. Julius Baer and Dynadot reached a stipulated permanent injunction order that Dynadot would, among other things, immediately “lock the wikileaks.org domain name to prevent transfer of the domain name” and “disable the wikileaks.org domain name and account to prevent access to and any changes from being made to the domain name and account information.”
In the meantime, the district court’s entry of the TRO did not prevent WikiLeaks’ posting of the customer information. While it appears Julius Baer was successful in locking down and disabling the WikiLeaks’ domain name registered through Dynadot, the order did not prevent the posting of that customer information on other “mirror” websites.
In addition, media and public interest groups immediately moved to intervene in the case, arguing that the stipulated permanent injunction improperly interfered with their news-gathering efforts and amounted to a violation of the First Amendment. The district court, in the face of these concerns and the frustration of the order due to the mirror websites, subsequently dissolved that permanent injunction.
The trade secret implications of this case could fill a law review article and warrant further posts on the First Amendment issues, the use of “mirror” websites, among other important points. However, an increasingly common issue is to what degree a trade secret loses protection if it is posted on a website.
Milgrim, the key commentator in trade secret law, has noted that at least one court has “cautioned under the basic principles of equity, recognized in the trade secret context, a wrongdoer cannot rely on his own postings to avoid the imposition of an injunction by arguing the works posted have lost their secrecy” [4 Milgrim on Trade Secrets, §17.03 at 17-12 (citing Religious Tech. Ctr. V. Netcom On-Line Commun. Servs., 923 F. Supp. 1231, 1256 (N.D. Cal. 1995), trade secret holding revised (N.D. Cal. Jan. 6, 1997)]. Another court has found that the information is now effectively in the “public domain” and refused to issue an injunction [See American Hearing Aid Assocs., Inc. v. GN ReSound N. Am., 309 F. Supp. 2d 694, 705-706 (E.D. Pa. 2004) (conversion claim rejected because customer lists posted on plaintiff’s website could not qualify as trade secrets)].
The law is far from settled and the facts of each case may prove critical. As Milgrim notes, publication on the Internet may not necessarily terminate trade secret status, as the facts and circumstances surrounding each disclosure may differ; for example, if prompt and effective action resulted in the postings being taken down, it can be argued that any disclosure was fleeting in nature and did not become known to the relevant audience, i.e., competitors [4 Milgrim, §17.03 at 17-16]. In addition, to the extent that the wrongdoer participated in the posting, he or she should be equitably estopped from making that argument [Id.; see also id, §15.01[1][a][ii] and authorities cited therein; see Silicon Image, Inc. v. Analogix Semiconductor, Inc., 2007 U.S. Dist. LEXIS 96073 at ** 44-46 (N.D. Calif., Dec. 20, 2007) (finding that source code published on Internet did not destroy the secrecy of information at issue)]. However, in the case of third parties (such as media who intervene and rely upon or cite to the postings), that equitable basis may not apply. Finally, it should be noted that the factual circumstances may vary from case to case and the kind of remedy sought in the case (injunction or damages) may further shape the impact of a defense rooted in this issue.
In short, the answer is “it depends” on many facts, including the length of time that the information was posted on the Internet, when it was posted, and who may have viewed it while it was there. As a result, if a company moves promptly to take the information down, it should be in a strong position to protect any trade secrets that were improperly posted.
Social Media and Trade Secrets, Part I
The phenomena of social media and its near exponential growth has generated tremendous dialogue within the IP community about its impact. Facebook now has more than 640 million members, Twitter now has over 175 million users, and LinkedIn has more than 101 million users. Given these staggering numbers, and the inevitability that some users will eventually misuse or attempt to display confidential information or trade secrets of their employers, it makes sense to review the recent cases addressing trade secrets, as well as the steps a client can take to minimize that risk.
One of the first noteworthy cases comes from the Eastern District of New York and it illustrates the challenges that an employer may face when trying to protect a customer list in this new era. In Sasqua Group, Inc. v. Courtney, 2010 U.S. Dist. LEXIS 93442 (E.D.N.Y. Aug. 2, 2010), affirmed, Sept. 7, 2010, the plaintiff, Sasqua, was a recruiting and search firm that built its niche in the area of executives for the financial services industry. According to Sasqua, its founder, Christopher Tors, had worked for over 20 years as a precious metals and foreign currency trader for Goldman Sachs, AIG and UBS, and had used that experience to form Sasqua and compile a substantial client database. That client database included, among other things, client contact information, individual profiles, contact hiring preferences, employment backgrounds, descriptions of previous interactions with clients, and resumes. Tors claimed that he hired and trained his niece, Lori Courtney, as a recruiter for Sasqua. After Courtney left Sasqua to form a competing firm, Sasqua and Tors concluded that Courtney was using the contents of their client database, which they believed contained highly confidential information.
Because Sasqua did not have a written non-competition or non-solicitation agreement with Courtney, they commenced an injunctive action for misappropriation of trade secrets. However, in a withering opinion rejecting that effort, the U.S. District Court Magistrate who presided over the injunction proceeding found that their customer database and the information contained within that database were not trade secrets.
In particular, the Magistrate found it significant that Courtney was able to demonstrate in court how the information in Sasqua’s database could be found through internet searches of websites such as FX Week, Google, Bloomberg.com, and LinkedIn. The Magistrate was impressed with Courtney’s testimony about “how such a search could be conducted on Linkedin, which [Courtney] described as being ‘like Facebook but for business’ and as being more searchable than Bloomberg ‘because people put their whole profile on LinkedIn.'” (Sasqua Group, at p. 24).
The Magistrate was not troubled by the fact that Courtney admitted she did not use the internet to get the information at issue and all but conceded that she had taken it from Sasqua. In holding that the information was not confidential information or a trade secret, the Magistrate noted how the internet had changed the business landscape:
“The information in Sasqua’s database concerning the needs of its clients, their preferences, hiring practices, and business strategies, as well as Sasqua’s acquaintance with those decision-makers may well have been a protectable trade secret in the early years of Sasqua’s existence when greater time, energy and resources may have been necessary to acquire the level of detailed information to build and retain the business relationships at issue here. However, for good or bad, the exponential proliferation of information made available through full-blown use of the Internet and the powerful tools it provides to access such information in 2010 is a very different story” (Sasqua Group, at p. 39).
Three lessons can be drawn from the Sasqua Group decision. First, it is critical to have written non-competition, non-solicitation or confidentiality agreements with employees, contractors and vendors with whom confidential customer information may be shared. Second, an employer needs to have agreements and policies that make clear that sensitive customer information gathered while an employee is the property of the employer and is to be protected. Such an acknowledgement would have necessarily bolstered Sasqua’s claim of proprietary information at the TRO and preliminary injunction stage. Third, an employer has to ensure that its confidential customer information does not find its way into social media websites. This means that that the employer must monitor its employees’ social media profiles, descriptions and blogs to ensure that they are complying with the employer’s policies and agreements.