Bitcoin, Blockchain & Trade Secrets: An Introduction

I’m willing to bet that most readers of this blog have heard of Bitcoin. But I’m not sure how many know about the technology it’s based on, called blockchain. If you haven’t heard of blockchain, now’s the time to learn, since it has the potential to be the most transformative technology since the internet.

I’m going to be writing more about blockchain and the unique trade-secrets issues facing the many companies rushing to develop applications and other technology based on blockchain. But first, I want to give a primer for those who haven’t heard of it.

Blockchain is essentially a database that is distributed among a large number of computers on a network. Each computer with access to the blockchain has an identical copy of the database. Here’s a simple example to explain how it works, from this explanatory post that compares blockchain to a “record book”:

To be clear, this isn’t just one record book stored in a central location that is shared by many. There are thousands of copies of this record book, stored on computers all around the world, both home computers and business servers – hence the term “decentralised”. This record book can be used to record many kinds of things, however I’ll use sending and receiving money as the primary example, as it’s the most common one right now.

When John wants to send money to Sue, a new line item is created detailing that transaction. This line item then gets sent off to hundreds of other computers who have a copy of the record. Those computers confirm that this transaction is authorised, and ultimately they agree (or disagree) that everything about the transaction is legitimate before giving that line item a tick of approval. It has to match up perfectly on every copy of the record.

Each transaction, here John sending money to Sue, is a “block,” which when added to all the prior blocks forms a kind of “chain.” Hence, blockchain.

Since each computer with access to the blockchain has an identical copy of the database, fraudulent transactions are nearly impossible. If any one computer has a blockchain entry that all of the others don’t recognize, that entry is rejected. Entries are only added if all of the computers with access to the database agree.

The first “app” based on blockchain is Bitcoin, a cryptocurrancy. You can watch a short video that explains Bitcoin here. Bitcoin was the first truly digital currency, which allowed the transfer of money without the need for any centralized institution like a bank. Now there are a number of cryptocurrancies with names like Ether and litecoin.

But blockchain’s potential goes far beyond currencies. It can be used to streamline, simplify, and secure a wide variety of transactions, such as supply-chain management, digitial voting, collecting taxes, and recording real estate transfers and ownership. Essentially, any transaction involving value could be conducted—and improved—on the blockchain. Some think that the entire worldwide financial system will eventually move to blockchain — and I agree. Additionally, developers are using a blockchain platform called Etherium (which also underpins the Ether cryptocurrancy) to create “smart contracts” — essentially programming code that is capable of executing or enforcing contractual terms. This is a powerful, but complicated, concept that I will discuss in more detail in a future post.

Companies large and small are racing to develop new “apps” based on blockchain technologies.  This entire industry is essentially in the research-and-development phase, which means that trade-secrets issues abound. These companies can benefit from tech-savvy lawyers who understand how to protect this rapidly developing information.

This post is a very basic introduction to blockchain. I’m fascinated by the technology and see virtually limitless potential. If you want to learn more, I’d recommend The Internet of Money, an excellent book by Andreas M. Antonopoulos. And stay tuned — I intend to explore the intersection of blockchain and trade secrets here at Protecting Trade Secrets.

Florida Loves Non-Compete Agreements

Florida’s restrictive-covenant statute, Section 542.335, is one of the most employer-friendly in the country. A recent case from Florida’s Fourth District Court of Appeal, Transunion Risk and Alternative Data Solutions, Inc. v. Reilly, shows how this statute favors an employer trying to enforce a restrictive covenant against a former employee. A copy of the opinion can be downloaded below.

This opinion is short on facts, but the plaintiff sued the defendant for violating a non-compete agreement and sought a temporary injunction. At the injunction hearing, the trial court ruled in the defendant’s favor after the plaintiff finished its case in chief, before the defendant put on any evidence.

The appellate court reversed. First, it looked at the likelihood of irreparable injury, citing the statute’s presumption of irreparable injury that arises when the plaintiff shows a violation of an enforceable restrictive covenant. Here, the appellate court reversed because the defendant did not present evidence:

As the trial court’s ruling was issued before Reilly presented any evidence, Reilly could not have met his burden of presenting evidence overcoming the presumption.

This doesn’t sound right. A defendant should have the right to rebut this presumption simply by cross-examining the plaintiff’s witnesses. That’s what the trial court apparently thought happened here. But the presumption so strongly favors the plaintiff that this appellate court was unwilling to allow the defendant to rebut it without putting on affirmative evidence.

The trial court also concluded that the plaintiff had an adequate remedy at law. But the appellate court reversed this finding, noting that even when a plaintiff has suffered actual money damages,

the continued breach of a non-compete agreement threatens a former employer’s goodwill and relationships with its customers, and nothing short of an injunction would prevent this loss.

This finding essentially eliminates the adequate-remedy-at-law prong of the injunction analysis in restrictive-covenant cases.

Finally, the appellate court reversed the trial court’s finding that the plaintiff had not demonstrated a substantial likelihood of success on the merits. On this point, the appellate court relied on the trial court’s “implied finding” that the defendant violated a restrictive covenant. So once a court finds that the defendant breached, the plaintiff has automatically shown a substantial likelihood of success.

This case shows how Florida’s restrictive-covenant statute provides employers with the upper hand in litigation. As a result, these agreements are a very effective tool for protecting proprietary information and trade secrets. All Florida companies should consult with an attorney to determine whether to implement these types of agreements.

Transunion Risk and Alternative Data Solutions, Inc. v. Reilly

“Just Doin Blow and Erasing Evidence”

As the Defend Trade Secrets Act—which would create a federal cause of action for trade-secrets theft—makes its way through Congress, critics have focused on the proposed statute’s ex parte seizure provision. In a nutshell, the statute would allow for the entry of ex parte orders to seize specifically identified repositories of evidence that are at risk of destruction.

I’ve responded to these criticisms multiple times before (see here, here, and here). The statutory protections (e.g., the party subject to the order is entitled to a hearing within 7 days) combined with federal judges’ reluctance to issue ex parte orders are, in my view, sufficient to prevent abuse.

Meanwhile, the threat of evidence destruction is real. A recent case shows how far defendants can go to allegedly destroy evidence of trade-secrets theft.

As described in Law360, a radio-controlled-vehicle company sued several former employees for violating restrictive covenants and misappropriating trade secrets, among other claims. The plaintiff filed a motion seeking sanctions against the defendants for destroying evidence.

According to the plaintiff, the defendants destroyed “scores of emails, texts, and documents that described their scheme to start at least one rival toy car and boat business.”

One of the defendants—who sounds like a real winner—apparently sent a text message talking about how he expected to get served with the complaint, saying “That’s what I’m trying to deal with now so I can’t go out, just doin blow and erasing evidence.”

In misappropriation cases, the evidence is almost always in electronic form. And it’s way too easy for defendants to destroy this evidence. While a plaintiff could seek sanctions (as the plaintiff here is seeking against the guy “doin blow”), a plaintiff would almost always rather have the actual smoking gun proving misappropriation.

The ex parte seizure provision is a powerful tool that may allow companies to preserve critical evidence.

What’s Worse Than Having Trade Secrets Stolen? Waiting Too Long to Do Something About It.

If you discover that your trade secrets have been stolen, you must act immediately. That’s the lesson from a recent case in the Middle District of Florida, Dyncorp International LLC v. AAR Airlift Group, Inc. A copy of the order can be downloaded below.

The Plaintiff, Dyncorp, has been providing aviation services to the State Department under a contract going back more than 20 years. Apparently, the State Department is now re-bidding that contract. The Defendant, AAR, is one of the bidders. Dyncorp alleges that AAR hired former Dyncorp employees and “coerced” those employees into disclosing Dyncorp’s trade secrets, which AAR used in its bid.

Dyncorp filed suit for, among other things, violating the Florida Uniform Trade Secrets Act. About three weeks later, Dyncorp filed a motion for preliminary injunction that sought to enjoin AAR from using Dyncorp’s trade secrets.

The district court denied the motion, finding that Dyncorp did not satisfy any of the injunction prerequisites. Of particular note, the court found that Dyncorp’s delay in filing suit showed that it had not suffered irreparable injury:

Dyncorp admits that it was notified of AAR’s alleged misappropriation of trade secrets in April 2015 but let more than four months pass without filing suit. Dyncorp attempts to explain the delay away by arguing that it complained to the State Department and AAR and conducted its own investigation during this time, but offers no explanation as to why those undertakings and this suit could not proceed simultaneously – particularly if, as Dyncorp asserts, it was facing the prospect of irreparable injury.

This case shows that once you discover—or even suspect—that your trade secrets are being improperly used, you must act fast. Any delay can be cited by a defendant as a reason for denying injunctive relief, just as AAR did here. While not every case will demand the immediate filing of a lawsuit, you need to at least consult with an attorney right away. Then, your attorney can advise you of your various legal options, and the risks and benefits of each.

Dyncorp v. AAR — Order Denying Preliminary Injunction

Can Periscope Broadcast Your Trade Secrets to the World?

Periscope is an app that allows users to broadcast live video using their smart phone. This technology has the power to transform the delivery of media and information. Essentially, every person can now effortlessly create live video content, whether it’s sharing a family event with those who can’t attend or witnessing a newsworthy event.

I keep hearing more and more about Periscope. For example, I’ve seen media members use it to share press conferences or behind-the-scenes info. At first blush, this may seem irrelevant to your company’s trade secrets. But that may not be the case.

Right now, through Periscope and similar apps, every one of your employees can instantaneously broadcast live video to the world. It’s much easier to share exactly what’s going on, in real time, at your company.

This raises multiple levels of concern. To start, employees may inadvertently transmit proprietary information. For example, an employee could be sharing a broadcast from work intended for his friends and family, while other employees discuss proprietary information within earshot. Even though there was no intent, this information was still shared outside the company.

Even worse, Periscope is a powerful tool in the hands of someone with malicious intent. There has long been a risk that malicious actors can easily capture video. But now, that video can be shared live. For example, an employee could surreptitiously broadcast a company meeting. Or live video of a proprietary process or system.

Periscope is another example of how rapidly evolving technology is constantly creating new risks to your trade secrets. Your trade-secrets policy needs periodic review to make sure it addresses new technology. Depending on the nature of your business, it may make sense to ban live broadcasts completely. Most importantly, you should discuss these issues with an attorney who can help you decide what protections are appropriate for your business.

 

 

The DOJ Announced Another Trade-Secrets Prosecution. What Does That Mean For Your Company?

There has been a lot of news coverage of the DOJ’s charges against Chinese professors for trade-secrets theft and violations of the Economic Espionage Act. Stories like this have become more common, as the DOJ has increased its focus on prosecuting trade-secrets theft. Often, these cases involve defendants with connections to foreign governments, and China in particular. As these cases have become more prevalent, the federal government has dedicated more resources to combating them.

Unfortunately, this will have little effect on most companies that fall victim to trade-secrets theft. The DOJ appears to have little interest in prosecuting run-of-the-mill trade-secrets theft, even though there may have been violations of a federal statute like the Economic Espionage Act. The DOJ simply does not have the resources to deal with the huge number of these cases. Thus, the vast majority of trade-secret misappropriation cases will be handled through civil lawsuits.

So what should you do if you believe your company has been the victim of trade-secrets theft? The answer is simple: you need to consult with an attorney specializing in this area of the law as soon as possible. Time is of the essence, and even a delay of a day or two could cause serious problems. Your attorney can advise you of your options. If your case is a good candidate for federal prosecution, your attorney should let you know. More likely, your options will involve civil remedies. Either way, you will need to make important decisions very quickly.

When It Comes to Trade Secrets, Ignorance Is Not Bliss

Trade-secret misappropriation cases often involve bad actors who deliberately steal trade secrets. But perhaps just as frequently, trade-secrets are misappropriated by people who simply don’t know better. Many don’t even understand what a trade secret is, let alone that there are laws or other obligations prohibiting inappropriate use or disclosure of trade secrets.

I’ve personally seen this happen over and over. An employee leaves one company to join another in the same industry. He takes many of the documents he created at his old job. These documents contain trade secrets. In his mind, they are his documents. He created them, after all! And at his new job, he uses those documents on behalf of his new employer.

Now both companies have a problem. The former employer’s trade secrets are in a competitor’s hands. And the new employer has unwittingly exposed itself to significant liability.

Both companies are to blame for their problems. The first company did not educate its employees about their responsibilities and legal obligations regarding trade secrets and proprietary information, both while working for the company and after they leave. The second company failed to make sure that the new employee did not bring his prior employer’s trade secrets with him.

There are three primary tools for preventing this situation: contracts, training, and exit/intake interviews. Employees with access to proprietary information should sign a non-disclosure agreement that requires them to keep the information confidential. The agreement should provide that all information belongs to the company even if created by the employee, and must be returned upon termination of employment. And the contract should acknowledge that the employee is not bringing any proprietary info or trade secrets from her prior job.

But employees too often don’t read contracts before signing them. That’s where training comes in. During the on-boarding process, and periodically thereafter, use training sessions to reiterate your trade-secret policy.

Finally, use exit interviews to again instruct the departing employee about his post-employment obligations. Consider having him sign an acknowledgement that he has returned all info and is aware of these obligations. When hiring a new employee, talk with them up front about what info they have from their prior employer. Be sure to consult with an attorney if that discussion raises concerns.

I really believe that many misappropriation cases can be avoided by simply making sure that employees understand these issues. Too often, they do not.

 

Professors Invent Threat of “Trade Secret Trolls”

I’ve written several times in the past about the proposed legislation to create a federal cause of action for trade-secrets misappropriation (see herehere, and here). I also wrote a response to a letter signed by a number of professors who opposed this legislation. Now, Professors David S. Levine and Sharon K. Sandeen have written a law review article titled “Here Come the Trade Secret Trolls.” This article misses the mark by a mile.

Here is the article’s core argument:

The [proposed federal] Acts are most likely to spawn a new intellectual property predator: the heretofore unknown “trade secret troll,” an alleged trade secret owning entity that uses broad trade secret law to exact rents via dubious threats of litigation directed at unsuspecting defendants.

The use of the term “troll” is meant to evoke patent trolls, who have been the subject of much scorn. But the so-called “trade secret troll” is far different than a patent troll. The latter actually own patent rights, which they wield to seek licensing fees. The article’s mythical trade-secret troll is simply someone willing to bring a frivolous lawsuit to extort an undeserved settlement. I suspect the authors chose this term to piggyback on the negative attention heaped on patent trolls, thereby arming the legislation’s opponents with a pejorative term that may scare legislators or their constituents.

Putting titles aside, the article can’t reconcile its core argument with the fact that, as the authors acknowledge, “trade secrecy has been generally free of similar trolling behavior.” In other words, there is no epidemic of frivolous trade-secret lawsuits under the current state-law framework. (Certainly, there are weak misappropriation cases, just like with any cause of action. But I haven’t seen any evidence to suggest that such cases are disproportionately filed.)

The authors try to make the point that the proposed federal acts would transform trade-secrets law such that threatening and filing frivolous lawsuits would become commonplace. Yet the article does not really explain why this is so. It gets closest when discussing the proposed ex parte seizure provisions. But as I mentioned in my response to the professors’ letter, this risk is highly overblown. Convincing a federal judge to enter ex parte relief is no simple matter. And the defendant will have the right to challenge any seizure order very soon after its entry. Federal judges will not be amused if they have been manipulated into entering unnecessary ex parte orders.

The article fears that “trolls” will be able to threaten an ex parte seizure, which will be sufficient to scare a defendant into paying up before the suit is filed. Yet any innocent defendant will know that the likelihood of such an order being entered is slim. Further, simply sending the letter would undermine an attempt to get an ex parte seizure order. If the plaintiff was able to send a demand letter, thereby putting the defendant on notice of the possible claim, then a judge would be highly skeptical of a claimed need for an ex parte order.

The article also argues that unsettled interpretative questions relating to the acts will fuel frivolous lawsuits. But the article forgets that creating a federal cause of action will quickly lead to a much more robust body of published caselaw interpreting the statute. While there are very few published trial-court-level decisions in state courts, U.S. district court orders are widely available.

Frankly, state courts are much more susceptible to frivolous trade-secrets suits than federal courts. Take Florida, for example. Here, state court judges have to deal with remarkably bloated dockets. In fact, I’ve had multiple cases where it took months to get an emergency injunction hearing. State-court judges generally don’t have law clerks. And in Florida, judges often rotate between civil, criminal, family, and dependency divisions. This latter point is critical: judges often don’t spend enough time in the civil division to develop a familiarity with trade-secrets law. All of these issues lead to uncertainty, which would seemingly aid the unscrupulous litigant looking to extort a settlement. Yet, as the authors themselves acknowledge, we simply have not seen this so-called trolling.

There’s no question that frivolous lawsuits would be filed under the proposed federal legislation, just as like every other cause of action. But there is absolutely no credible reason to believe that such suits can’t be remedied with the typical mechanisms deigned to ferret out meritless claims, like Rule 11 motions.

As I’ve argued in the past, the proposed legislation has tangible benefits that aid trade-secrets owners in protecting their critical proprietary information. The arguments lobbed up in opposition—including the manufactured risk of “trolling”—don’t hold up to careful scrutiny.

2-Minute Jimmy Kimmel Clip Shows Our Cybersecurity Culture Crisis

This video speaks volumes about our country’s attitudes towards cybersecurity:

Last week, I wrote about the importance of creating a culture that makes protection of trade secrets a top-line priority. This video shows why this culture is so important. Your employees need to be constantly aware of surreptitious attempts to get passwords. Spear phishing attacks are becoming more and more sophisticated; your employees need to be immediately suspicious of any attempt to get personal information, particularly passwords.

In the real world, bad actors are far more subtle than a Jimmy Kimmel reporter with a microphone and a video camera. The fact that people are willing to turn over their passwords on TV shows—particularly now, when cybersecurity issues have never been more visible—is depressing. Make sure your employees know better.

Trade Secrets Best Practices: Exit Interviews

This is the next in a series of posts addressing best practices for protecting trade secrets and proprietary information. Today’s topic: exit interviews, which can be a powerful tool to avoid, or at least anticipate, unwanted disclosure.

An exit interview is exactly what it sounds like. When an employee is leaving your company, you have someone meet with him to discuss various aspects of his departure. There are several goals: remind the employee of his legal obligations; make sure he has returned all company information, documents, and devices; and gather intelligence about his next job to determine the risk of unwanted disclosure.

The key is to have a set process that is automatically followed each time an employee leaves. Depending on the size and structure of your company, a single person or department should be responsible for conducting the interviews. That person should work from a checklist that includes all topics that must be discussed. To develop this process, consult with an attorney who specializes in trade-secrets issues who can help customize it to fit your company’s needs.

The checklist should include, at a minimum, the following:

Review of restrictive covenants and related agreements: Give the employee copies of any agreements he signed and remind him of specific noncompete, nonsolicitation, nondisclosure, and related obligations.

Review of non-contractual legal obligations: Remind the employee of his ongoing legal obligations to, for example, keep certain information confidential. The applicable laws vary state-by-state, so make sure to consult with an attorney familiar with your state’s laws.

Review inventory of all company devices: Hopefully, you are keeping an inventory of all company devices issued to the employee. Go through this inventory and make sure he has returned all of these devices.

Company information and documents: Ask whether the employee has any hard-copy documents or electronically stored information on his personal computer, devices, and storage medium. If he does, give a set date for him to return or destroy the documents/information.

Sign acknowledgment: Have the employee sign an acknowledgment form that confirms he is aware of his legal obligations, has returned all company devices, and returned or destroyed all company documents/information.

Gather information: Ask the employee where he will be working next, and in what capacity. Also make sure you have the employee’s updated contact information.

Additionally, prior to the interview, you should work with your IT department to see if the departing employee recently accessed or used trade-secret information, particularly in an out-of-the-ordinary manner. If so, consult with an attorney, since it may be advisable to address this issue with the employee during the exit interview.

Often, this process will allow you to handicap the risk that the departing employee will illegally use your trade secrets and proprietary information. For example, be wary of an employee who refuses to tell you where he will be working next. Or an employee who refuses to attend the exit interview. In cases where you suspect something is amiss, consult with an attorney right away, since time is of the essence in these cases.

Again, there is no one-size-fits-all approach to exit interviews. Speak with with an attorney to develop the process that best fits your company’s needs.

%d