United States: Frequently Asked Questions Regarding Trade Secret Disputes And Employment Risks Answered

In today's post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks.

  1.   Could you provide a brief snapshot of current trends in trade secret disputes? Do companies need to be more aware of the potential risks in this area?

Milligan: Data theft of valuable company trade secrets through the use of portable electronic storage devices is occurring more and more, as is theft through cloud storage. We are also seeing an increase in more sophisticated hacking of company networks to obtain proprietary data by organized crime and foreign companies or states. Technological tools and employee use of personal mobile devices such as smartphones and tablets have given rise to a parallel trend of employers allowing — or requiring — their employees to use their own personal mobile devices at work. This "Bring Your Own Device" (BYOD) movement can provide benefits to employees and employers, such as convenience, greater flexibility and productivity, as well as cost savings. However, BYOD programs can also create risks for employers. Companies need to be aware of potential data security issues, BYOD policies in a unionized workforce, employee privacy concerns and intellectual property issues. Moreover, the recovery of stolen information and workplace investigations can be hampered by employee-owned devices, not to mention challenges in litigation when trying to gain access to such devices where privacy considerations are often leveraged. Additionally, attacks on reasonable secrecy measures — part of the definition of a trade secret — is also on the rise: One court recently ruled that password protection alone was not enough to demonstrate reasonable secrecy measures.

Wexler: Further, like the EU, the United States is considering enhancing trade secret protections through additions to its laws. There are two bills pending in the United States Congress to create a civil cause of action for trade secret misappropriation in federal court. If passed, the legislation would provide companies with an additional forum and remedy to combat trade secret theft. With the increasing accessibility of data from a variety of electronic devices and threats by insiders and outsiders, companies also need to be more aware of potential risks to their data and ensure that they have appropriate policies and agreements in place with employees, vendors, and business partners, as well as top of the class data security protections.

  1. How severe is the threat of losing trade secrets to a departing employee or departing executive? What are some of the common scenarios in which trade secrets can be compromised in this manner? Does the threat level change depending on the size of the company – small cap, mid cap, Fortune 50?

Wexler: The threat of losing trade secrets to a departing employee is real and not a matter of if, but when. Prudent companies will make sure that they have appropriate processes in place to address the threat when it occurs. As today's businesses meet the challenges of intensifying global competition, a more volatile workforce and information being transmitted at an unprecedented speed, they also face a greater risk of losing their valuable proprietary information to theft, inadvertent disclosure, or coordinated employee departures. At a minimum, failure to take both proactive and immediate reactive measures could result in significant loss of profitability and erosion of an established employee and customer base. The threat of losing trade secrets to a departing employee or executive is enhanced if you don't have appropriate policies and agreements in place to prevent such theft or hold employees accountable for their unlawful conduct. And it can happen so easily and rapidly: One thumb drive can carry millions of pages of proprietary information and company information transferred to a personal email account or in a personal cloud all pose means for theft.

Milligan: Just look at recent headlines involving some of the world's largest companies who have seen their proprietary information compromised by insiders and outsiders. The crown jewels of many companies are at risk, and millions of dollars are in play. Lack of market secrecy measures, sloppy practices including poor supply side protections, lack of employee education and stale agreements and policies, poor security and different standards for executives who say one thing and do another are all common scenarios that put a company at risk. Common scenarios in which trade secrets can be compromised include letting an employee take company data when he or she leaves. Another red flag scenario is not utilizing non-compete or non-disclosure agreements. There can also be scenarios where the particular industry is highly competitive and competitors are willing to take the enhanced risks to acquire the business or technology. In such scenarios, companies need to make sure they have in place appropriate onboarding and off-boarding practices and procedures, and use the appropriate agreements so they are not exposed. In our experience, the threat level does not necessarily change depending on the size of the company, but the magnitude of harm may increase. The larger the company, the more information to protect and employees/third parties to regulate and police. But small and mid-cap companies have similar concerns because they oftentimes have innovative technology that competitors or other third parties want, so these companies can also be vulnerable.

  1. What steps can companies take during the hiring process to reduce the threat that it may later be sued for trade secret misappropriation – particularly executives or those employees with higher level access to sensitive IP assets?

Milligan: Companies need to have a thoughtful, pro-active process in place when hiring employees from competitors that is calculated to ensure that new employees do not violate their lawful agreements with their former employees, including using or disclosing their former employers' trade secrets, and retaining any of their former employers' property. It's important to regulate who interviews the job candidate and evaluate the candidate's non-compete or confidentiality agreement. Advise company personnel who are interviewing the candidate not to ask about a competitor's confidential information during the hiring process. Focus the interview on the recruit's general skills and experience in the industry. It's also important not to disclose company trade secrets to the candidate — be careful of the access permitted to the candidate. Candidates for employment should sign certifications that they will not disclose any trade secrets of their current employer. Additionally, make sure you analyze a recruit's agreements in advance of an offer being made. Should the candidate accept an offer, provide clear instructions to the employee that you don't want the former employer's trade secrets or property and use agreements with the employee documenting the same. There are unique issues surrounding the retention and departure of high-level executives, particularly related to non-compete and trade secret issues. Since businesses can become targets of trade secret-related lawsuits if they hire executives and senior management who have worked at a competitor and misappropriate trade secrets or otherwise violate their restrictive covenants, it's important for companies to conduct due diligence on prospective employees and make sure that they have thoughtful plan in place before bringing on any high risk hires.

Wexler: Simple steps such as retaining hard drives when an employee leaves and inspecting computers, devices, cloud storage, and email accounts can alert an employer to theft of information. More sophisticated methods such a forensic exam and monitoring software can also detect theft. Most of all, create a culture in which recruits and new employees are told "we do not want anything from your prior employer." Some additional best practice considerations follow below. Do not allow a recruit to do any work for your company until he or she has left his or her prior employer. Assist the employee in announcing the change in employment upon commencement of employment as appropriate. Focus on making the transition as smooth as possible for the current employer and encourage the departing employee to give proper notice and work out a mutually agreeable transition schedule with his or her current employer. With respect to the employee's new position, don't put the employee in a position in the company where he or she will necessarily need to reveal trade secrets. Finally, HR personnel needs to follow up with the employee to make sure that she is following her agreements and not pushing the envelope, and also follow up with managers to make sure the employee is doing the same.

  1. In what ways is the technology now available to employees changing the playing field in terms of loss or theft of trade secrets?

Milligan: The constant evolution of technology, particularly in mobile devices, data storage and security, and social media, has created legal challenges for companies and the playing field has changed tremendously. Portable electronic storage devices, online data storage, and personal email are available to employees for nominal to no expense and can provide the means to trade secret theft. Additionally, business leaders often want data and information immediately and often want to make it accessible to various constituents, but companies don't necessarily keep up with the latest in security in protecting such data. Companies need to stay on top of technology, including the latest in data storage and security and storage devices. Hacking of computers and mobile devices is more of a concern these days, and more mobility for employees also means more potential security issues for companies. Companies also need to stay on top of social media. Given its rapid and somewhat haphazard growth, social media carries with it a set of issues that traditional avenues of trade secret disclosure do not. For instance, unlike the departing employee who knowingly takes with him a box of documents, the relaxed and non-professional environment of social media sites could lead to employees disclosing confidential information without even realizing they are doing so. Exposure of confidential company information and employee privacy rights are all issues that companies are now struggling with.

Wexler: Social media privacy legislation has become increasingly common in the United States and often impacts trade secret investigations. Issues related to social media privacy in the workplace are not going away and we expect to see more disputes to define acceptable practices in this area. In light of this uncertainty, employers should determine whether their company has employees in any of the states that have adopted or are planning to adopt social media privacy laws in order to ensure compliance with such laws. Employers should also be aware that state laws may restrict requests for information about such activity. Counsel should review the applicable state social media access law before asking an employee for any account-related information. Additionally, employers should not overlook social media evidence in conducting employee investigations, and trade secrets and restrictive covenant lawsuits, but make sure that your company's review and access of such information does not violate applicable law.

  1. How can companies avoid trade secret misappropriation and what should they do if they suspect misappropriation has occurred? What forensic investigation options might be available?

Wexler: Apart from civil liability, the Economic Espionage Act makes it a federal crime to steal trade secrets, and companies can be liable if they hire employees who misappropriate trade secrets for their new employers' benefit. Make sure your executives know the importance of playing by the rules. Employers can best avoid trade secret misappropriation with solid hiring practices and strong off-boarding procedures which are calculated to protect trade secrets and honor lawful agreements, coupled with effective ongoing employee training on trade secret protection and fair competition. Protecting your company information is critical to avoid trade secret misappropriation, and companies should work with their outside counsel to create solid policies and agreements, and solutions for onboarding to avoid exposure on restrictive covenants and trade secrets. It's also crucial to know your business partners, and have them vetted, so that they don't expose your valuable trade secrets. Critical to any trade secret matter is the thorough investigation of what, if any, wrongdoing occurred. Companies should work with legal counsel who is experienced in conducting such investigations. Comprehensive interviews and a review of relevant files, emails and workspaces are often the starting points of a competent investigation.

Milligan: We also regularly collaborate with forensic experts and computer specialists to find out how secrets were taken, and by whom, and to preserve any evidence necessary to future litigation. It's important to preserve data, review emails, and talk to relevant witnesses to interpret the forensic data. A digital forensics examination often includes collecting and analyzing artifacts from the operating system, internet history, and unallocated space. Routine eDiscovery does not typically delve into questions about the source computer or storage device and ESI, although eDiscovery may uncover the need to ask questions related to internet history, webmail, cloud storage, mobile devices and phone back-ups, and removable devices.

  1. How should companies interact with criminal prosecutors and federal/state law enforcement to complement civil claims for trade secret misappropriation?

Milligan: Private companies can investigate misappropriation claims and provide information to authorities for purposes of prosecuting Economic Espionage Act and/or Computer Fraud & Abuse Act claims as well as similar state criminal laws, but businesses need to be aware of two important points: 1) allowing law enforcement access to the business can be a double edged sword creating interference with operations and disclosure of more information than the business may want, and 2) when conducting an investigation be certain to follow accepted forensic practices and chains of custody in collecting information. In sum, ensure that you have your house in order so you don't become the target of an investigation. When considering criminal prosecutions, always be cognizant of the ethical rule required of attorneys that generally prohibits threatening or initiating criminal proceedings to gain an advantage in a civil proceeding. Consultation with criminal authorities should be done in secrecy and ideally by non-attorneys so as not to run afoul of ethical rules. However, note an attorney can have contact with authorities, it is not prohibited in and of itself.

Wexler: It should also be noted that criminal prosecutors may make a request regarding the secrecy of the investigation or to hold off taking certain actions in the civil matter (or pursing the case altogether while the criminal case is ongoing) as they are focused on the criminal matter whereas a company and its counsel may be focused on the civil matter and damages. These differing interests can collide at times, so coordination is key. No private right of action exists yet under the Economic Espionage Act. The U.S. Senate and House are currently considering legislation on this issue.

  1. What kinds of challenges do US companies face in pursuing trade secrets and non-compete claims against foreign companies, particularly from China?

Milligan: U.S. companies may face the challenge of not being able to enforce injunctive relief orders and judgments, as well as jurisdictional challenges posed by foreign companies. Additionally, in some cases, Chinese companies doing business in the U.S. have quite limited assets in the U.S. and individual defendants may be judgment proof. Even if a U.S. company obtains a favorable judgment from the U.S. court, the judgment may not be recognized or enforceable in China, and thus, the company may not obtain sufficient monetary or equitable remedy. Therefore, the U.S. company must carefully select its business partners and the jurisdiction in a confidentiality or non-compete agreement to attempt to enhance its ability to obtain an injunction and judgment. If forced to sue abroad, remember the court systems are different and there are different views on IP. Your company may not be able to get complete relief in a foreign jurisdiction. The EU Commission has proposed a directive to harmonize trade secrets law in Europe that may assist in this regard in the future if approved.

  1. What are some practical considerations for US companies or multinational companies doing business in Asia and Europe to protect their trade secrets and confidential information?

Wexler: Know your business partners. Have them fully vetted so they don't steal your IP. Try to protect your supply side with appropriate agreements. You should also be careful about what you share with your business partners. If it is bet-the-company information, consider keeping that internal. In addition to getting employees and business partners to execute well-prepared agreements, training — both on-board and on-the-job — can be a powerful measure. Employers should make sure that access to trade secrets and confidential information is granted only to those with necessity to know and make sure your local workforce abroad is trained on company policies and signs appropriate agreements to protect IP. Realize that you are not in the U.S., and the legal systems and respect for IP may be different. For example, in China, different locales may have different views on trade secret protections and non-compete agreements. For instance, the statutory minimum non-compete compensation in Shenzhen is higher than the one in Shanghai. U.S. companies or multinational companies doing business in China should be aware of such local variations and may need to take different measures in different places to ensure protection.

Milligan: Within a foreign forum the selection of the right venue, meaning a locale where the court is more willing to implement the rule of law is essential. In China, for example, the enforcement varies by locale. For instance, recent decisions indicate that Shanghai courts are more willing to give protection to the employer in trade secret and non-compete cases, including issuing injunctive relief. Try to use contractual choice of law, consent to jurisdiction, and forum clauses for the most favorable forum for you. Also consider international arbitration. Assess your security vulnerabilities, particularly in light of the foreign locale, and put in place appropriate safeguards. Carefully access your IT security in foreign countries and be alert for unauthorized monitoring and surveillance. Provide training to executives on traveling abroad and conducting business abroad to ensure that trade secrets are not carelessly compromised.

  1. In your experience, what should a company do if a trade secret dispute arises between it and a former employee?

Milligan: If a company suspects that valuable information has been improperly taken or compromised, you need to first assess the potential competitive threat to the company. It's important to take fast, effective action and consider whether to pursue civil remedies or criminal intervention against the former employee. If litigation is anticipated with the departure of an employee, you should take precautionary steps immediately:

  • Secure and establish a chain of custody for all items returned by the departing employee, including laptop computer, desktop computer, USB devices, tablets, and physical property.
  • Secure and maintain a chain of custody of the employee's office and the items in that office until it is searched.
  • Retain outside counsel to investigate the departure and have outside counsel secure the services of a digital forensic investigation firm with a good reputation.
  • If the employee is computer savvy, do an immediate search of the internet for relevant materials posted to social media sites, including LinkedIn, Facebook, and Twitter.

Wexler: When our clients are faced with possible trade secret misappropriation by former employees, we immediately investigate and develop the facts through interviews, document review, and collaborate with a qualified digital forensic expert. Forensic investigation of computing devices to identify the possible theft of confidential information is a must. We assess the company's business objectives as well as the chance of success, and assuming that there is sufficient evidence to pursue, we demand compliance and appropriate remedies via cease and desist demands prior to the initiation of litigation. Should written requests for compliance not be successful, we seek injunctive relief and damages to protect company assets and further our client's objectives.

  1. In the battle against trade secret theft and related disputes, do companies place enough importance on the language and provisions contained in employment contracts? How can employment contracts be strengthened to either reduce trade secret theft or improve the company's chances of reaching a successful outcome in a trade secret dispute?

Wexler: In our experience, companies should place more importance on their agreements with employees, vendors, and business partners to protect trade secrets. Companies need to strengthen the language and provisions contained in such agreements, including clearer definitions of protectable trade secrets, return of company property provisions, appropriate restrictive covenants, and appropriate forum and choice of law provisions. Well-drafted agreements can reduce the risk of information being misappropriated. Such agreements should be updated annually, as needed, based on changes in the law, and companies should routinely audit their practices to make sure each employee has an appropriate agreement. Companies should also make it an agreed requirement for employees to sit for an exit interview and return any company confidential information stored on any personal devices. Finally, agreements should include an attorneys' fee provision for breach.

Milligan: Additionally, a thorough exit interview should be conducted at the time any employee separates, and as part of that exit interview process, each exiting employee should be given a written reminder of their ongoing trade secret, confidentiality and social networking obligations, and should be asked to sign the reminder acknowledging receipt and their agreement to comply with such obligations. The exit interview is also the time to get company property returned by the departing employee and make any arrangements for the return and remediation of company property on any personal devices.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Authors
 
In association with
Related Video
Up-coming Events Search
Tools
Print
Font Size:
Translation
Channels
Mondaq on Twitter
 
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
 
Email Address
Company Name
Password
Confirm Password
Position
Mondaq Topics -- Select your Interests
 Accounting
 Anti-trust
 Commercial
 Compliance
 Consumer
 Criminal
 Employment
 Energy
 Environment
 Family
 Finance
 Government
 Healthcare
 Immigration
 Insolvency
 Insurance
 International
 IP
 Law Performance
 Law Practice
 Litigation
 Media & IT
 Privacy
 Real Estate
 Strategy
 Tax
 Technology
 Transport
 Wealth Mgt
Regions
Africa
Asia
Asia Pacific
Australasia
Canada
Caribbean
Europe
European Union
Latin America
Middle East
U.K.
United States
Worldwide Updates
Check to state you have read and
agree to our Terms and Conditions

Terms & Conditions and Privacy Statement

Mondaq.com (the Website) is owned and managed by Mondaq Ltd and as a user you are granted a non-exclusive, revocable license to access the Website under its terms and conditions of use. Your use of the Website constitutes your agreement to the following terms and conditions of use. Mondaq Ltd may terminate your use of the Website if you are in breach of these terms and conditions or if Mondaq Ltd decides to terminate your license of use for whatever reason.

Use of www.mondaq.com

You may use the Website but are required to register as a user if you wish to read the full text of the content and articles available (the Content). You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these terms & conditions or with the prior written consent of Mondaq Ltd. You may not use electronic or other means to extract details or information about Mondaq.com’s content, users or contributors in order to offer them any services or products which compete directly or indirectly with Mondaq Ltd’s services and products.

Disclaimer

Mondaq Ltd and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published on this server for any purpose. All such documents and related graphics are provided "as is" without warranty of any kind. Mondaq Ltd and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Mondaq Ltd and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from this server.

The documents and related graphics published on this server could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Mondaq Ltd and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time.

Registration

Mondaq Ltd requires you to register and provide information that personally identifies you, including what sort of information you are interested in, for three primary purposes:

  • To allow you to personalize the Mondaq websites you are visiting.
  • To enable features such as password reminder, newsletter alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our information providers who provide information free for your use.

Mondaq (and its affiliate sites) do not sell or provide your details to third parties other than information providers. The reason we provide our information providers with this information is so that they can measure the response their articles are receiving and provide you with information about their products and services.

If you do not want us to provide your name and email address you may opt out by clicking here .

If you do not wish to receive any future announcements of products and services offered by Mondaq by clicking here .

Information Collection and Use

We require site users to register with Mondaq (and its affiliate sites) to view the free information on the site. We also collect information from our users at several different points on the websites: this is so that we can customise the sites according to individual usage, provide 'session-aware' functionality, and ensure that content is acquired and developed appropriately. This gives us an overall picture of our user profiles, which in turn shows to our Editorial Contributors the type of person they are reaching by posting articles on Mondaq (and its affiliate sites) – meaning more free content for registered users.

We are only able to provide the material on the Mondaq (and its affiliate sites) site free to site visitors because we can pass on information about the pages that users are viewing and the personal information users provide to us (e.g. email addresses) to reputable contributing firms such as law firms who author those pages. We do not sell or rent information to anyone else other than the authors of those pages, who may change from time to time. Should you wish us not to disclose your details to any of these parties, please tick the box above or tick the box marked "Opt out of Registration Information Disclosure" on the Your Profile page. We and our author organisations may only contact you via email or other means if you allow us to do so. Users can opt out of contact when they register on the site, or send an email to unsubscribe@mondaq.com with “no disclosure” in the subject heading

Mondaq News Alerts

In order to receive Mondaq News Alerts, users have to complete a separate registration form. This is a personalised service where users choose regions and topics of interest and we send it only to those users who have requested it. Users can stop receiving these Alerts by going to the Mondaq News Alerts page and deselecting all interest areas. In the same way users can amend their personal preferences to add or remove subject areas.

Cookies

A cookie is a small text file written to a user’s hard drive that contains an identifying user number. The cookies do not contain any personal information about users. We use the cookie so users do not have to log in every time they use the service and the cookie will automatically expire if you do not visit the Mondaq website (or its affiliate sites) for 12 months. We also use the cookie to personalise a user's experience of the site (for example to show information specific to a user's region). As the Mondaq sites are fully personalised and cookies are essential to its core technology the site will function unpredictably with browsers that do not support cookies - or where cookies are disabled (in these circumstances we advise you to attempt to locate the information you require elsewhere on the web). However if you are concerned about the presence of a Mondaq cookie on your machine you can also choose to expire the cookie immediately (remove it) by selecting the 'Log Off' menu option as the last thing you do when you use the site.

Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies and we are not aware of any at present that do so.

Log Files

We use IP addresses to analyse trends, administer the site, track movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information.

Links

This web site contains links to other sites. Please be aware that Mondaq (or its affiliate sites) are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of these third party sites. This privacy statement applies solely to information collected by this Web site.

Surveys & Contests

From time-to-time our site requests information from users via surveys or contests. Participation in these surveys or contests is completely voluntary and the user therefore has a choice whether or not to disclose any information requested. Information requested may include contact information (such as name and delivery address), and demographic information (such as postcode, age level). Contact information will be used to notify the winners and award prizes. Survey information will be used for purposes of monitoring or improving the functionality of the site.

Mail-A-Friend

If a user elects to use our referral service for informing a friend about our site, we ask them for the friend’s name and email address. Mondaq stores this information and may contact the friend to invite them to register with Mondaq, but they will not be contacted more than once. The friend may contact Mondaq to request the removal of this information from our database.

Security

This website takes every reasonable precaution to protect our users’ information. When users submit sensitive information via the website, your information is protected using firewalls and other security technology. If you have any questions about the security at our website, you can send an email to webmaster@mondaq.com.

Correcting/Updating Personal Information

If a user’s personally identifiable information changes (such as postcode), or if a user no longer desires our service, we will endeavour to provide a way to correct, update or remove that user’s personal data provided to us. This can usually be done at the “Your Profile” page or by sending an email to EditorialAdvisor@mondaq.com.

Notification of Changes

If we decide to change our Terms & Conditions or Privacy Policy, we will post those changes on our site so our users are always aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will notify users by way of an email. Users will have a choice as to whether or not we use their information in this different manner. We will use information in accordance with the privacy policy under which the information was collected.

How to contact Mondaq

You can contact us with comments or queries at enquiries@mondaq.com.

If for some reason you believe Mondaq Ltd. has not adhered to these principles, please notify us by e-mail at problems@mondaq.com and we will use commercially reasonable efforts to determine and correct the problem promptly.