What’s Worse Than Having Trade Secrets Stolen? Waiting Too Long to Do Something About It.

If you discover that your trade secrets have been stolen, you must act immediately. That’s the lesson from a recent case in the Middle District of Florida, Dyncorp International LLC v. AAR Airlift Group, Inc. A copy of the order can be downloaded below.

The Plaintiff, Dyncorp, has been providing aviation services to the State Department under a contract going back more than 20 years. Apparently, the State Department is now re-bidding that contract. The Defendant, AAR, is one of the bidders. Dyncorp alleges that AAR hired former Dyncorp employees and “coerced” those employees into disclosing Dyncorp’s trade secrets, which AAR used in its bid.

Dyncorp filed suit for, among other things, violating the Florida Uniform Trade Secrets Act. About three weeks later, Dyncorp filed a motion for preliminary injunction that sought to enjoin AAR from using Dyncorp’s trade secrets.

The district court denied the motion, finding that Dyncorp did not satisfy any of the injunction prerequisites. Of particular note, the court found that Dyncorp’s delay in filing suit showed that it had not suffered irreparable injury:

Dyncorp admits that it was notified of AAR’s alleged misappropriation of trade secrets in April 2015 but let more than four months pass without filing suit. Dyncorp attempts to explain the delay away by arguing that it complained to the State Department and AAR and conducted its own investigation during this time, but offers no explanation as to why those undertakings and this suit could not proceed simultaneously – particularly if, as Dyncorp asserts, it was facing the prospect of irreparable injury.

This case shows that once you discover—or even suspect—that your trade secrets are being improperly used, you must act fast. Any delay can be cited by a defendant as a reason for denying injunctive relief, just as AAR did here. While not every case will demand the immediate filing of a lawsuit, you need to at least consult with an attorney right away. Then, your attorney can advise you of your various legal options, and the risks and benefits of each.

Dyncorp v. AAR — Order Denying Preliminary Injunction

Professors Invent Threat of “Trade Secret Trolls”

I’ve written several times in the past about the proposed legislation to create a federal cause of action for trade-secrets misappropriation (see herehere, and here). I also wrote a response to a letter signed by a number of professors who opposed this legislation. Now, Professors David S. Levine and Sharon K. Sandeen have written a law review article titled “Here Come the Trade Secret Trolls.” This article misses the mark by a mile.

Here is the article’s core argument:

The [proposed federal] Acts are most likely to spawn a new intellectual property predator: the heretofore unknown “trade secret troll,” an alleged trade secret owning entity that uses broad trade secret law to exact rents via dubious threats of litigation directed at unsuspecting defendants.

The use of the term “troll” is meant to evoke patent trolls, who have been the subject of much scorn. But the so-called “trade secret troll” is far different than a patent troll. The latter actually own patent rights, which they wield to seek licensing fees. The article’s mythical trade-secret troll is simply someone willing to bring a frivolous lawsuit to extort an undeserved settlement. I suspect the authors chose this term to piggyback on the negative attention heaped on patent trolls, thereby arming the legislation’s opponents with a pejorative term that may scare legislators or their constituents.

Putting titles aside, the article can’t reconcile its core argument with the fact that, as the authors acknowledge, “trade secrecy has been generally free of similar trolling behavior.” In other words, there is no epidemic of frivolous trade-secret lawsuits under the current state-law framework. (Certainly, there are weak misappropriation cases, just like with any cause of action. But I haven’t seen any evidence to suggest that such cases are disproportionately filed.)

The authors try to make the point that the proposed federal acts would transform trade-secrets law such that threatening and filing frivolous lawsuits would become commonplace. Yet the article does not really explain why this is so. It gets closest when discussing the proposed ex parte seizure provisions. But as I mentioned in my response to the professors’ letter, this risk is highly overblown. Convincing a federal judge to enter ex parte relief is no simple matter. And the defendant will have the right to challenge any seizure order very soon after its entry. Federal judges will not be amused if they have been manipulated into entering unnecessary ex parte orders.

The article fears that “trolls” will be able to threaten an ex parte seizure, which will be sufficient to scare a defendant into paying up before the suit is filed. Yet any innocent defendant will know that the likelihood of such an order being entered is slim. Further, simply sending the letter would undermine an attempt to get an ex parte seizure order. If the plaintiff was able to send a demand letter, thereby putting the defendant on notice of the possible claim, then a judge would be highly skeptical of a claimed need for an ex parte order.

The article also argues that unsettled interpretative questions relating to the acts will fuel frivolous lawsuits. But the article forgets that creating a federal cause of action will quickly lead to a much more robust body of published caselaw interpreting the statute. While there are very few published trial-court-level decisions in state courts, U.S. district court orders are widely available.

Frankly, state courts are much more susceptible to frivolous trade-secrets suits than federal courts. Take Florida, for example. Here, state court judges have to deal with remarkably bloated dockets. In fact, I’ve had multiple cases where it took months to get an emergency injunction hearing. State-court judges generally don’t have law clerks. And in Florida, judges often rotate between civil, criminal, family, and dependency divisions. This latter point is critical: judges often don’t spend enough time in the civil division to develop a familiarity with trade-secrets law. All of these issues lead to uncertainty, which would seemingly aid the unscrupulous litigant looking to extort a settlement. Yet, as the authors themselves acknowledge, we simply have not seen this so-called trolling.

There’s no question that frivolous lawsuits would be filed under the proposed federal legislation, just as like every other cause of action. But there is absolutely no credible reason to believe that such suits can’t be remedied with the typical mechanisms deigned to ferret out meritless claims, like Rule 11 motions.

As I’ve argued in the past, the proposed legislation has tangible benefits that aid trade-secrets owners in protecting their critical proprietary information. The arguments lobbed up in opposition—including the manufactured risk of “trolling”—don’t hold up to careful scrutiny.

AZ Supreme Court: Trade Secrets Act Does Not Preempt Claims for Misappropriation of Confidential Info

I’ve previously written about the Uniform Trade Secrets Act’s (UTSA) preemption provision, which preempts tort and other claims providing civil remedies for trade-secret misappropriation. Yesterday, the Arizona Supreme Court held that the Arizona Trade Secrets Act (ATSA), which is based on the UTSA, does not preempt common-law claims for misappropriation of information that is not a trade secret.

In this case, the former president of a public relations firm was sued by that firm when she left to start a competing PR firm. The plaintiff PR firm brought a claim for unfair competition, which was based on the use of confidential information the defendant learned while working for the plaintiff. The trial court dismissed the claim, finding that the ATSA preempts claims arising from the misuse of confidential information, even where the information does not rise to the level of a trade secret.

The Arizona Supreme Court disagreed, relying primarily on the plain language of the ATSA. The court did acknowledge the fact that other states have held that these types of claims are preempted. In states where misappropriation claims based on non-trade-secret confidential information are viable, it is often advisable to bring both a trade-secrets misappropriation claim and an alternative (or independent) claim for misappropriation or conversion of confidential information.

This case contains one other point of note. The defendant argued that allowing claims for misappropriation of confidential information would result in an “absurd” result. She noted that a plaintiff could obtain more in punitive damages on the misappropriation claim than it could on an ATSA claim, which allows for exemplary damages of twice actual damages where the misappropriation is willful and malicious.

In response, the court offered very helpful language to a plaintiff seeking to prove exemplary damages under the ATSA:

That AUTSA authorizes a trial court, rather than a jury, to award exemplary damages of no more than twice the amount of actual damages . . . is not necessarily anomalous. In cases of willful and malicious misappropriation, punitive damages might be easier to obtain under AUTSA than under our common law, which requires clear and convincing evidence of a defendant’s “evil mind” for a punitive damages.

Since many misappropriation of trade secrets are based on willful conduct, this case may be worth citing when seeking exemplary damages.

 

Best Practices for Protecting Trade Secrets: Categories of Employee Contracts

This is the first in a series of posts addressing best practices for protecting trade secrets. I’m starting with employee/independent contractor contracts, which are one of the most important and effective ways to protect proprietary information.

Contracts are critical for multiple reasons. First, they inform your employees of their legal responsibilities. Second, it’s generally easier to prosecute a breach-of-contract claim instead of relying solely on a trade-secrets misappropriation claim. Third, a competitor that hires your former employee may be more likely to cut ties with that employee when presented with a cease-and-desist letter attaching a contract. Finally, requiring these types of agreements can help you win a misappropriation case, since their existence bolsters the argument that you reasonably protected your trade secrets (a prerequisite to establishing a trade secret under the Uniform Trade Secrets Act).

There are three general categories of contractual protections: confidentiality/nondisclosure, nonsolicitation, and noncompete. Remember that the law applicable to these contracts varies widely from state-to-state, so you need to consult with an attorney who can make sure your agreements comply with and will be enforced under the applicable law.

Confidentiality/NDA

This is the lowest level of contractual protection. It’s also the easiest to implement, since employees are less likely to push back when asked to sign a NDA. From a best-practices perspective, it’s worth at least considering whether to require that all employees sign a NDA. Even low-level employees may have access to some proprietary information. The trick is drafting the language in a way that best defines what precisely needs to be kept confidential. In particular, you need to decide whether to define “confidential information” broadly vs. specifically. Each comes with benefits and risks. Speak with a lawyer who can learn about your unique situation to determine what language best suits your business.

Nonsolicitation Agreements

A nonsolicitation agreement prohibits your employee from soliciting some or all of your current or prospective customers and/or employees once she leaves your company, for a certain period of time. These contracts offer an intermediate level protection, more than a NDA but not as much as a noncompete. It’s best to have all employees with access to proprietary customer information, or who have relationships with prospective/actual customers, sign a nonsolicitation agreement. Again, consult with an attorney who can help craft the scope of the restrictions to your company, based on the applicable law.

Noncompete Agreements

These agreements offer the highest level of protection, since they prohibit your employee from working for your competitors or in your industry, within a certain area and for a certain amount of time. Recently, there has been media coverage of corporate overuse of noncompete agreements. For example, Jimmy Johns took a lot of heat for having its sandwich makers sign noncompete agreements. This type of practice can turn off a judge.

There’s no question that noncompete agreements can be a powerful tool for protecting your proprietary information. But you should consider only requiring that key employees sign a noncompete agreement. The other contracts above may be sufficient to protect against misappropriation by lower-level employees.

You also need to think about the noncompete’s temporal and geographic scope. Depending on the law in your state, an overbroad agreement may not be enforceable. In Florida, where judges are required to narrow an overbroad agreement, I’ve seen judges soured towards employers that overreached when drafting the agreement. Generally, it’s best to limit the agreement the area in which you can prove you compete. An attorney can work with you to determine the proper scope.

Procedure

Deciding to require some or all of the above agreements, and having an attorney draft the agreements, is only the first step. Next, you need to make sure the agreements are actually signed and dated. Then, you need to make sure the signed agreements are properly maintained. You would not believe how often companies forget to have an employee sign or date the agreement. Or how often I’ve seen a company struggle to find the signed agreement when it became necessary to enforce it.

The key is to develop a protocol that can be repeated for each new employee. When the decision is made to hire a new employee, a designated person should be responsible for creating a checklist of all documents that she needs to sign. Of course, the checklist may be different for each employee. Either the person who creates the checklist or another designated person needs to be responsible for making sure all items on the list are actually completed. I recommend including on the checklist the signing, dating, and filing of all required contracts. The responsible person should sign the checklist once everything has been completed, and the checklist should be filed along with the signed documents.

If the contracts are to be signed electronically, your IT people need to set up the software so it will not allow a signature unless all mandatory clickwrap “boxes” are checked. If you are old school and the contracts are manually signed, I recommend keeping an electronic copy along with the original.

In future posts, I’ll discuss specific contractual provisions that should be included in these agreements, as well as best practices for contractual protections when dealing with third parties, like vendors, consultants, and joint-venture partners.

 

Law Professors Oppose Federal Trade Secrets Acts, Ignore Their Benefits

I’ve written about the Defend Trade Secrets Act and the Trade Secrets Protection Act previously. I’ve expressed enthusiastic support for these laws, which have bipartisan and widespread corporate backing. Today, 31 law professors issued a letter opposing these proposed statutes. Their harsh critique ignores clear benefits and overstates the statutes’ risks.

These professors’ thesis is explained at the end of the letter: “[T]he Acts are dangerous because the many downsides explained above have no—not one—corresponding upside.”

This statement and attitude ruins the letter’s credibility. These statutes have real, concrete benefits. They provide for federal jurisdiction, allowing for federal magistrates—experts in e-discovery—to oversee the complicated e-discovery issues often attendant to trade-secrets-misappropriation cases. They would allow for a uniform national trade-secret-misappropriation standard, thereby providing companies with greater certainty regarding enforcement. And the provision creating the most controversy, the ex parte seizure provision, will reduce the real risk of deliberate evidence destruction.

If these professors are not able to acknowledge that these proposed statutes offer benefits to companies facing the threat of misappropriation, I find it hard to take their critique seriously. But let’s look at their five reasons to reject these statutes:

1. Effective and uniform state law already exists. True, most states have adopted the Uniform Trade Secrets Act, with slight variations. But the state-by-state patchwork of statutory interpretation is not uniform. For example, different states apply different standards to determine whether a customer list is a trade secret. And state courts are often overburdened. I have personally experienced difficulty getting expedited hearing dates for emergency temporary injunction motions in state courts. Federal courts are better equipped to hear these types of motions expeditiously.

2. The Acts will damage trade secret law and jurisprudence by weakening uniformity while simultaneously creating parallel, redundant and/or damaging law. Despite this heading, the professors do not explain how applying a uniform federal standard will weaken uniformity. Instead, the professors argue that the Acts do not preempt state law, but only apply to trade secrets used in interstate or foreign commerce. Apparently, they believe that giving companies a choice between filing a misappropriation action in federal or state court is a bad thing. If companies want to litigate in state court, based on state law, these Acts permit them to do so. But these statutes would provide a second option. Given the tremendous corporate support for these statutes, companies themselves seem to want this new option.

The professors also criticize the interstate commerce provision, calling it “unclear and unsettled.” But like all statutes, this provision will become settled once tested in the courts. And the concept of interstate commerce is certainly not a new one, since federal courts routinely apply this standard to many federal statutes.

The professors also criticize the ex parte seizure provisions. Of all their critiques, this one has the most merit. I responded to this issue here. Keep in mind that evidence destruction is a real threat. I believe that it occurs routinely, particularly in misappropriation cases. In the end, I have faith that the federal judiciary will limit these orders to those cases where they are justified.

3. The Acts are imbalanced and could be used for anti-competitive purposes. The professors next argue that the Acts do not explicitly limit the length of injunctive relief. But the proper length of an injunction can vary widely based on the circumstances of a case. The judge hearing the supporting evidence is in a much better position than Congress to determine its length.

The professors are also concerned that parties will misuse the ex parte seizure provisions for anticompetitive purposes. This ignores the fact that (1) the moving party will have to convince a federal judge that the ex parte seizure order is necessary, and (2) the defendant will have the opportunity to challenge the order very soon after its entry. Again, I believe that the benefits of this provision outweigh its risks, given the built-in protections.

4. The Acts increase the risk of accidental disclosure of trade secrets.  Here, the professors argue that because of possible jurisdictional challenges based on the interstate commerce provision, plaintiffs will face motions to dismiss for lack of subject-matter jurisdiction that will “require the plaintiff to identify and disclose its trade secrets early in the litigation.” It’s hard to reconcile the professors’ concern for anticompetitive uses of the Act (number 3 above) with their concern that plaintiffs will have to identify the trade secrets at issue. Regardless, in reality, defendants already seek more detailed information about the trade secrets at issue at the case’s outset as a matter of routine, either through a motion to dismiss/for more definite statement, or through discovery requests. This new statute will have a marginal effect, if any at all, on the timing for identifying the trade secrets at issue.

5. The Acts have potential ancillary negative impacts on access to information, collaboration among businesses and mobility of labor. The letter discusses how companies are able to label information as a trade secret to prevent public and regulatory access to important information. (Again, this is inconsistent with point 4, where the professors wanted to enable companies to delay disclosure of the trade secrets at issue.) But the professors don’t explain how the Acts would increase this practice, other than to mention the ex parte seizure provision. Yet any company (and its attorneys) that obtains an ex parte seizure order in bad faith will have to face the ire of a federal judge who they manipulated into entering the order. I think the risk is overblown.

Look, neither of the Acts are perfect. But the threat of misappropriation is real. Companies need stronger weapons in their arsenal to protect their proprietary information. These Acts accomplish that, with limited real—as opposed to academic—downside.

 

Congressmen Explain Why You Need to Be Proactive About Trade-Secret Theft

In today’s partisan political climate, it’s rare to see an issue that unites members of both parties. But trade-secrets theft has become such a significant threat to our economy that there is now a bipartisan effort to pass federal trade-secret legislation.

Last week, Congressmen Hakeem Jeffries (D-NY), Howard Coble (R-NC), John Conyers Jr. (D-MI), Steve Chabot (R-OH), Jerrold Nadler (D-NY), and George Holding (R-NC), all members of the House Judiciary Committee, published an article explaining why they introduced the “Trade Secrets Protection Act of 2014.”

The Congressmen’s article does a great job detailing the threat that companies face.

They start off with a sobering statistic: “The devastating reality is that theft of trade secrets costs the American economy billions of dollars per year.” They cite to a 2013 study by the Executive Office of the President that found that “the pace of economic espionage and trade secret theft against U.S. corporations is accelerating.” That study gave examples of large-scale trade-secret theft, including stolen trade secrets from Dupont and Goldman Sachs valued at $400 million and $500 million, respectively.

They close by making the point that the current scheme, under which each state has its own trade-secret-misappropriation laws, is inadequate to confront the threat:

The current patchwork is simply not enough to combat organized trade secret theft. All other forms of intellectual property – patents, copyrights, and trademarks – are afforded a civil cause of action in federal law. It is time we confer trade secrets with a similar level of protection to substantially mitigate the billions of dollars lost annually through theft of our intellectual property.

Hopefully, either this or the similar Defend Trade Secrets Act (discussed here and here) will pass. But regardless, companies must be proactive about protecting their trade secrets. State and federal laws creating causes of action for trade-secret theft are great, but litigation is never ideal. You should consult with an attorney with expertise in this area to make sure you are taking all reasonable steps to protect your proprietary information. Doing so will help you avoid the need for expensive and time-consuming litigation.

Trade Secrets and Public Records

Companies performing municipal or government work face unique challenges when they need to share their confidential or proprietary information with public agencies. These companies must be wary of state public records laws and the Freedom of Information Act. A recent case, All Aboard Florida — Operations, LLC v. State of Florida, et al., filed in Leon County, Florida, illustrates this.

All Aboard Florida is attempting to develop passenger rail service between Miami and Orlando. It is doing so in partnership with various governmental entities. Recently, Orlando developer Matthew Falconer served various Florida agencies with requests under Florida’s Public Records Act for various documents relating to All Aboard Florida’s efforts.

According to the complaint, these agencies told All Aboard Florida that they intended to provide Falconer with All Aboard Florida’s Florida Ridership and Revenue Study. In response, All Aboard Florida filed this complaint for declaratory and injunctive relief, seeking protection under Florida’s Trade Secrets Act. According to All Aboard Florida, this study is a trade secret:

The Ridership Study analyzes expected market share for AAF’s service, including the effects of various pricing and travel time scenarios on AAF ridership. As such, the Ridership Study is an extremely sensitive and commercially valuable document, the disclosure of which to the public could place AAF at an unfair competitive disadvantage vis-à-vis airlines and other transportation alternatives.

Under Florida’s Public Records Act, trade secrets are exempt from disclosure.

When All Aboard Florida provided this study to the government, it marked each page as proprietary and confidential. For companies facing this situation who have no choice but to provide proprietary information to a government agency, I would recommend going one step further: Label each page of any proprietary document as “Trade Secret Information Protected From Disclosure By Section 815.045, Florida Statutes” (or the relevant statute in the state at issue).

The goal is to make it as simple as possible for the government employees responding to a public-records request to recognize that the document at issue should not be disclosed.

 

Thoughts About the Defend Trade Secrets Act

Last week, Senators Hatch and Coons introduced bipartisan legislation, called the Defend Trade Secrets Act, that would create a federal private right of action for trade-secrets theft. This act adds to the Economic Espionage Act, which was passed in 1996 and made trade-secret theft a crime. Copies of the Defend Trade Secrets Act and the Economic Espionage Act are linked below.

While I’m still thinking through some of these issues, my first reaction to this law is a strongly positive one. Companies would benefit from having a national standard for trade-secret misappropriation. Today, while most states have adopted the Uniform Trade Secret Act (UTSA), there are state-by-state variations in the statutory text and interpretation. Also, this law would allow companies to litigate in federal court, where cases often proceed more quickly than in state court.

The act also acknowledges the e-discovery issues that frequently arise in trade-secret litigation by allowing for the ex parte entry of an order to preserve evidence, specifically allowing an order compelling “a copy of an electronic storage medium that contains the trade secret.” Today, it can be difficult to obtain such an order, with plaintiffs forced to resort to conventional injunction proceedings in front of state-court judges, who may not be as familiar with e-discovery issues.

The Defend Trade Secrets Act has a five-year statute of limitations, as opposed to the three years in the UTSA. Given that misappropriation is commonly done through surreptitious means, five years is more reasonable.

This proposed law is not perfect—for example, I would like to see a broader definition of “improper means” instead of just adopting the UTSA’s definition—but overall, this law would be a step forward for companies trying to protect their trade secrets. Hopefully, this bipartisan effort will have more success than other recent attempts to create a federal civil action for trade-secrets misappropriation.

Economic Espionage Act

Defend Trade Secrets Act

Novel Legal Strategy Deflates Employer’s Trade-Secrets Case

Recently, in Putters v. Rmax Operating, LLC, 2014 WL 1466902 (N.D. Ga. April 15, 2014) (opinion linked below), the court dismissed a counterclaim for trade-secrets misappropriation, brought in response to a declaratory judgment action filed by the defendant’s former employee. When I first read this opinion, I thought that the defendant did not move fast enough, thereby allowing the plaintiff to select the forum. When I dug further, however, I found out I was wrong.

In this case, the defendant is a Texas company that manufacturers insulation materials. The plaintiff worked for the defendant for 26 years in Georgia as a sales manager, and had access to the defendant’s confidential information. After the plaintiff left the defendant to work for a competitor, the defendant discovered that the plaintiff “had downloaded documents containing proprietary and confidential information to an external hard drive.”

While not clear from this opinion, the complaint gives the back story. A copy is linked below. The defendant originally filed suit in Texas state court and obtained an ex parte temporary restraining order prohibiting the plaintiff from working for his new employer.

After that, the plaintiff made an interesting legal maneuver. He filed this lawsuit in Georgia state court, seeking a declaration that he is permitted to continue working for his new employer, and an injunction prohibiting the defendant from prosecuting the Texas action, since Texas courts did not have personal jurisdiction over him.

This maneuver worked. The case (after being removed to federal court) is proceeding in Georgia federal court, where the court dismissed the defendant’s counterclaim and denied the defendant’s request for a TRO.

Normally, when a defendant believes that there is no personal jurisdiction over him, he will simply litigate that issue in front of the court where the plaintiff filed the lawsuit. Here, the employee took an entirely different course and successfully redirected the litigation to a different forum. And he was able to get the case in front of a judge with much more favorable views of his case.

Takeaway: Companies should be wary of personal-jurisdiction issues when filing trade-secrets lawsuits. The last thing you want is to be bogged down in a personal jurisdiction fight before the court will even hear a temporary injunction motion. Or, even worse, you could end up like the employer in this case, who spent time and money getting a TRO, only to be whisked away to a Georgia court with a very different view of the employer’s arguments.

Also, had this company simply had its employees sign restrictive covenants (including a venue and jurisdiction clause), they would be in a far better legal position.

Order

Complaint

“Trade Secret Perfume”

Recently, I was in New York. The dry winter air in the Northeast is always a shock to my system, since I’m used to the South Florida humidity. So I bought some lip balm. Upon reading the ingredients, I was intrigued to see this:

photo (6)

“Trade secret perfume.” Aside from creative marketing, does labeling an ingredient as a “trade secret” offer any legal benefits?

Formulas and recipes can be trade secrets. But of course, just labeling something as a trade secret does not make it so. Now if the lip balm company also takes other precautions—such as only disclosing the perfume formula to those employees who need the formula to do their jobs, and requiring that those employees sign confidentiality agreements—the “trade secret” label could be used to strengthen the argument that the formula is actually a trade secret.

This is similar to a document confidentiality policy. Labeling documents containing proprietary information as “confidential” can bolster a claim that the information is a trade secret, when the information is otherwise reasonably protected. But a label is never enough alone. As always, the key to protecting trade secrets starts with requiring that employees with access sign confidentiality agreements.

%d