Thank you for sharing!

Your article was successfully shared with the contacts you provided.
The information age has made it even more important for businesses to protect their confidential data from misappropriation by competitors, former employees, or others who want to benefit from a company’s most valuable asset — its intellectual capital. Many companies do not realize that a wide array of business information may, in fact, be protected under trade secret law. Trade secret law provides broader legal protection of confidential business information than most might imagine. We all know that inventions, including machines, processes, and methods, may be protected under our federal system of patent law. But most vital information used in today’s businesses does not meet the criteria for patent protection. Owners of such information may choose not to patent some of it, since that involves disclosing the information in return for a limited monopoly. Trade secrets, however, can last forever if they are adequately protected. The Uniform Trade Secrets Act of 1990 is the primary source of legal protection afforded trade secret owners. Today, 42 states and the District of Columbia have adopted some version of the UTSA. What may be protected as a trade secret? A trade secret can be almost any information used in the operation of a business that is both sufficiently valuable and secret enough to allow a business a competitive advantage. Unlike in patent protection laws, there is no need for invention or novelty. The courts have considered a number of nonexclusive factors when determining whether trade secret protection is available. These include whether the trade secret: • is known only by its owner; • is adequately guarded from disclosure by its owner; • gives its owner a competitive advantage over others; • was expensive and difficult to develop; and • is difficult to recreate or be acquired by others. THE TRADE SHOW RULE A good rule of thumb is this: Is it the type of information you would not divulge at a trade show? Would your competitors actually pay to use such information? If so, it is likely a trade secret. Examples of things courts have held to be protected under trade secret law include bidding systems and data, business forms, clustering technology, computer programs, customer lists, design manuals and drawings, design specifications, financial information, food recipes, formulas, manufacturing plans, pricing information, product sketches, software development tools, and testing data. Misappropriation occurs when trade secret information is obtained through breach of a confidential relationship or by other improper means, and such information is used, causing the trade secret owner to sustain damages. When actual or threatened misappropriation occurs, a number of remedies may be available, including injunctions, court orders to return or destroy information, or damage awards. Some states and the federal government also provide criminal sanctions for trade secret misappropriation. Swift action through injunctive relief often minimizes any damages. Where damages can be proved, however, compensation is available for things such as lost profits, loss of value of the information in disclosure situations, lost research and development costs, and in some states, a reasonable royalty. The UTSA provides that damages may include both actual losses and the defendant’s unjust enrichment, as long as they do not overlap. Where intentional conduct can be proved, exemplary damages may be recoverable as well. Although attorney fees are generally not available in pure trade secret cases, the UTSA gives courts discretion to award attorney fees if the defendant’s misappropriation is willful and malicious. REASONABLE STEPS It isn’t necessary to take unreasonably expensive steps to maintain trade secrets. A trade secret owner must take only “reasonable” steps to ensure the secrecy of information. Courts have held the following measures “reasonable” under some circumstances: • Advising employees of the confidentiality of the trade secret information. • Limiting access to business information to a need-to-know basis. • Controlling access to physical facilities where trade secret information is located. • Obtaining non-disclosure agreements from third parties before allowing them access to such confidential information. COME UP WITH A PLAN Developing and implementing a plan to protect your confidential business information is essential. Here are a few steps you can take: 1. Conduct employee background checks. Implement procedures to thoroughly check prospective employees’ and third parties’ work background, references, and previous civil or criminal actions. 2. Execute written agreements. Require employees, third parties, and others who may have access to proprietary information to sign the appropriate confidentiality, non-disclosure, and non-compete agreements. 3. Educate your work force. Educate employees on the confidential nature of company information, their duties to guard against disclosure, and the consequences they face if they fail to do so. Give employees frequent written and verbal reminders regarding the importance of protecting confidential information. 4. Institute an information-control policy. Develop information-control policies to ensure that confidential information is restricted to a need-to-know basis. Prohibit the discussion of confidential information over non-secure devices such as cell phones, or in non-secure locations such as public places (elevators or restaurants, for example), and implement policies to notify employees that their Internet, e-mail, phone, and other communication device usage may be monitored. 5. Secure your virtual and physical facilities. Implement security measures to protect your physical and virtual facilities from breaches. 6. Audit your trade secret portfolio. Identify and inventory your intellectual capital by conducting systematic audits of your trade secret portfolio. Such audits should be part of your company’s broader intellectual property audit. 7. Conduct exit interviews. Interview all departing employees to ensure that all confidential information remains with the employer and to address any concerns that departing employees may have about compromises in security. The exit interview provides a good opportunity to reiterate the duty of confidentiality. Require those leaving the company to sign documents acknowledging their understanding of the company’s trade secret policies, the existence of the company’s trade secrets, their exposure to trade secrets, their return of any and all company information, their description of any items they are departing with, and an acknowledgment of their continuing duty — even after employment — to keep such information confidential. 8. Nominate someone to manage the procedures and policies that protect your trade secrets. Designate someone within your organization as the chief trade secret officer. Assigned to anticipate any attempted theft of valuable company information and to prepare for the initiation of aggressive trade secret protection measures, this individual serves as the go-to person for reporting suspicious activity or concerns relating to trade secrets. BLOGGER LEAKS An ongoing case in California, Apple Computer Inc. v. Doe 1, 2005 WL 578641, addresses the conflict between a journalist’s privilege not to reveal a source and a trade secret owner’s right to discover who may be leaking confidential information. Apple filed a complaint on Dec. 13, 2004, alleging that unnamed bloggers leaked confidential information about unreleased Apple products to several Web sites. The information contained an exact copy of a detailed drawing of a product taken from confidential internal slides clearly labeled “Apple Need-to-Know Confidential.” In addition, technical specifications were copied verbatim and posted on the sites. In its attempts to discover the source of these leaks, Apple subpoenaed an e-mail service provider to obtain messages identifying the individuals providing the bloggers with Apple’s information. The bloggers filed a motion for protection against Apple’s subpoenas, claiming they are “journalists” and so are entitled to keep their sources confidential. In considering the bloggers’ motion, the court accepted Apple’s allegations about its trade secrets and that the information divulged fell squarely under California’s version of the UTSA and the penal code, concluding that it constituted stolen property. The court did not make a determination, however, about whether the bloggers should be considered journalists. The court observed that Apple’s subpoena called into question issues and competing values of great significance — namely, a conflict between the bloggers’ claim to “free speech” (anonymous speech) under the First Amendment and Apple’s undisputed right to protect its intellectual property. The court, in denying the bloggers’ motion for a protective order, noted that the journalist’s privilege is not absolute and that the U.S. and California supreme courts have emphasized that trade secret laws apply to everyone — regardless of status, title, or chosen profession. The bloggers in the Apple case have appealed the court’s denial of the requested protective order. Although we await the California appeals court’s ruling, the Apple case demonstrates the need for vigilance in protecting trade secret information. Even though the proprietary information involved was marked “Apple Need-to-Know Confidential,” someone (not revealed by the court, but likely an Apple insider) chose to ignore its confidential nature and post it on the Internet. This recent case underscores the importance of an effective and proactive trade secret protection program. Scott D. Marrs is a partner and John W. Lynd is a senior associate with Beirne, Maynard & Parsons in Houston.

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at [email protected]


ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2020 ALM Media Properties, LLC. All Rights Reserved.