TRADE SECRETS An Introduction to Trade Secret Law

advertisement
TRADE SECRETS
An Introduction to Trade Secret Law
and the Legal and Security Risks to Such Property
in the E-Commerce Environment
A.
Trade Secret Protection in the United States.
In most jurisdictions in the United States, trade secret interests are protected by statute.
In the remaining jurisdictions trade secrets are protected primarily under the common law tort of
misappropriation of trade secrets, which is an aspect of the tort of unfair competition. There also
exist numerous criminal laws addressing the misappropriation of trade secrets, the most notable
of which is the federal Economic Espionage Act of 1996, 18 U.S.C. § 1831, et seq.
Forty-two states, including Oregon and Washington, plus the District of Columbia have
adopted the Uniform Trade Secrets Act (“UTSA”). The UTSA is based on the common law tort
of misappropriation of trade secrets, though there are several differences which provide
additional protection to trade secrets. Where the UTSA has been adopted, the common law tort
is preempted. Contractual remedies, however, are unaffected by the statute and remain an
important resource for providing additional protection as will be discussed below. While some
minor differences exist among the states, the general practice in the jurisdictions adopting the
UTSA has been to apply and interpret the provisions of this law in a uniform manner in light of
the court decisions from all jurisdictions which have implemented the UTSA. The UTSA,
therefore is a representative introduction to the law applicable to trade secrets in the United
States.
1.
Trade Secret Definition.
“‘Trade secret’ means information, including a formula, pattern,
compilation, program, device, method, technique, or process, that:
“(i) derives independent economic value, actual or
potential, from not being generally known to, and not being readily
ascertainable by proper means by, other persons who can obtain
economic value from its disclosure or use, and
“(ii) is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy.” UTSA § 1(4).
The definition of trade secret under the UTSA is somewhat broader than under the
common law. For example, there is no requirement that the trade secret be used continuously in
one’s business, or even that it be used at all. As long as there is potential economic value from
the fact that certain information is not generally known, the information is eligible for trade
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
1
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
secret protection. The information may be in either a tangible or intangible form; it may be
written, or stored on a computer disc or in electronic memory, or in any other tangible form, or it
may exist only in the memory of one or more human beings.
Central to any information being a trade secret is the not surprising concept of
“secrecy”. Less obvious, the secrecy requirement is two fold. First, the information must have
value because it is secret. Absolute secrecy is not required, but the information must not be
generally known to those who might benefit from the information. Second, there must be
reasonable efforts made to keep the information secret. The importance of this second element
cannot be over emphasized, particularly in the context of e-commerce, where what is “reasonable
under the circumstances” is a moving target.
Both secrecy elements are required. Thus, trade secret protection is lost under the
UTSA if the information is not kept secret, or if there is not a reasonable effort to keep the
information secret. There is no trade secret protection because the information is no longer a
“trade secret”.
2.
Misappropriation of Trade Secrets.
The protection provided by the UTSA against the misappropriation of trade
secrets includes damages and injunctive relief. Penalty damages and attorneys’ fees are also
available for willful and malicious misappropriation. UTSA §§ 2, 3 and 4.
Under the UTSA “Misappropriation” means:
“(i) acquisition of a trade secret of another by a person who
knows or has reason to know that the trade secret was acquired by
improper means; or
“(ii) disclosure or use of a trade secret of another without
express or implied consent by a person who
“(A) used improper means to acquire knowledge of
the trade secret; or
“(B) at the time of disclosure or use, knew or had
reason to know that his knowledge of the trade secret was:
“(I) acquired under circumstances giving
rise to a duty to maintain its secrecy or limit its use; or
“(II) acquired under circumstances giving
rise to a duty to maintain its secrecy or limit its use; or
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
2
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
“(III) derived from or through a person who
owed a duty to the person seeking relief to maintain its
secrecy or limit its use; or
“(C) before a material change of his [or her]
position, knew or had reason to know that it was a trade secret and
that knowledge of it had been acquired by accident or mistake.”
UTSA § 1(2).
“Improper means” is defined as:
“* * * theft, bribery, misrepresentation, breach or inducement of a
breach of duty to maintain secrecy or espionage through electronic
or other means.” UTSA § 1(1).
B.
Trade Secrets on the Internet.
E-commerce over the Internet poses significant risks to the protection of trade secrets.
The Internet is a universal and open network. Anyone, anywhere in the world can connect to the
Internet at any time. Information transmitted through the Internet is not secure and subject to
interception. An especially significant threat to trade secrets is that information can be
disseminated through the Internet nearly instantaneously to literally millions of computers
around the world. Such dissemination, even if unlawful and a misappropriation of such
information, operates to destroy the secrecy element necessary for trade secret protection. While
the owner of the information may have a claim against those who misappropriated the
information, once the information becomes public there will be no protection against anyone else
using the information. In many ways this is a unique risk presented by electronic
communications. Where dissemination is not instantaneous and universal, it might be possible to
put humpty dumpty back together again, and preserve the trade secret by recovering
misappropriated copies. As previously noted, absolute secrecy is not required. The Internet,
however, creates a significant risk that recovering misappropriated copies would not be possible,
and that trade secret protection would be lost altogether.
1.
Risks to Trade Secrets.
The source of the threat to a company is both internal to its own operation as well
as external. While companies may expend great effort and expense in protecting their systems
against outside attacks, losses are often the result of internal risk factors. Similarly, while
companies may focus on thwarting sophisticated schemes of industrial espionage and theft, they
should not overlook guarding against the loss of trade secret information more commonly caused
by inadvertence, negligence and vandalism.
(a)
Internal Threats.
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
3
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
(i)
Employees. A company’s own employees pose a serious potential
threat to a company’s secrets. While some employees do engage in deliberate economic
espionage to sell trade secrets to the highest bidder, the loss of trade secrets though employee
action is most likely to involve carelessness, employee lack of awareness of the importance of
the information, inadvertence (misdirected e-mails or by introducing viruses through e-mail, the
Internet or installing programs), or malicious destruction of information out of perceived
mistreatment by the company. In addition, there may exist a mindset among colleagues, even
from different companies, of sharing their accomplishments without regard as to whether
company trade secrets are involved. This is especially true in the area of computer
programming, on which a business’ e-commerce activities may be heavily dependent. Which
threat is most likely to occur depends on the nature of the particular trade secret and the
individuals who have access to such secret. A comprehensive risk analysis, therefore, must take
into account both the nature of the information, and the individuals who deal with it.
(ii)
Third Party Contractors. Most companies conducting e-commerce
rely heavily on third party contractors: computer programmers, web developers, web hosting
companies, technology consultants, etc. Often these contractors work closely with company
systems and employees so that it is not obvious who is a contractor and who is an employee.
Contractors, therefore, present many of the same risks associated with employees discussed
above. In addition, however, there exist risks unique to third party contractors with respect to the
trade secrets created by such contractors either independently or jointly with company
employees. Such risks arise by operation of law and by contract. Without proper safeguards,
both contractual and operational, the company’s ownership of such trade secrets, and its right to
use and disclose such trade secrets may be at risk. For example, the copyright in computer
software is likely to belong to the outside contractor absent a written agreement assigning
ownership to the company. Absent such a written agreement, a company may have only a
limited license to use the Software in its own business, and no trade secret rights. Therefore, a
risk assessment must include an analysis of third party contractor agreements to establish the
company’s ownership rights with respect to trade secrets arising out of such agreements and to
prevent the loss or dilution of the company’s rights in trade secrets and other intellectual
property which may be incorporated into the contractor’s work.
(iii) Inadequate Policies and Procedures. Inadequate policies protecting
trade secrets and ineffective enforcement of existing policies and procedures constitute a twofold threat to trade secrets. First, if company policies do not adequately protect trade secrets they
are more likely to be stolen, lost or inadvertently disclosed to third parties. Second, the lack of
effective policies and procedures may result in the denial of trade secret protection altogether,
since a necessary element to such protection is that the information be the “subject of efforts that
are reasonable under the circumstances to maintain its secrecy.” Just as important documents
should be kept in a locked safe accessible only by those entrusted with the combination,
information on computers and on the Internet must be protected by both physical security and
electronic means appropriate to the importance of the trade secret. Internet access particularly
must be addressed on an on-going basis. What is reasonable under the circumstances is a
moving target as both the technology of protection and the technology of attacking computer
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
4
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
systems evolve. This means not only having in place a policy to ensure periodic updating of the
company’s virus protection software, but also being prepared to address the risks posed by new
technologies such as, for example, the explosive growth of wireless technology.
(b)
External Threats. Trade secrets are also at risk from external forces.
There is no denying the threat of deliberate industrial espionage by highly sophisticated
multinational corporations and by foreign governments. The Economic Espionage Act of 1996
was enacted in acknowledgement of the reality of this threat. For most companies, however, the
more significant and ever present threat is electronic vandalism that either destroys the trade
secret information, or prevents its use by interfering with the only systems, the company’s
computer network or internal site, capable of taking economic advantage of such trade secrets.
Recent world-wide attacks by viruses and worms demonstrate that no one, from the US Military
to Microsoft, is immune.
2.
Protecting Against Threats to Trade Secrets.
(a)
Addressing Employee Risks. The most critical times to address the risk to
trade secrets posed by employees is at the time of hiring and firing. Company policies should
not overlook these sensitive periods. At the very least, companies should have a system for
reference checks, especially for employees who will have access to trade secrets. At the time of
hire the employees should be informed that they will have access to trade secrets, and their
obligations to maintain the secrecy of such information should be discussed explicitly.
Employees should be specifically informed of the trade secrets to which they may be exposed.
Some employees may legitimately not be aware that certain information is considered secret and
valuable by the company. Drawing attention to the information has a further benefit of
impressing on the employee the employee’s personal responsibility for the protection of this
valuable property. Employees with access to sensitive secret information should be asked to sign
confidentiality and nondisclosure agreements. Training employees in appropriate confidentiality
policies and the company’s policies and procedures for protecting trade secrets should be ongoing. Policies should set forth clearly what kind of information may be transmitted by e-mail,
over the Internet, facsimile, or by wireless transmission. Employees’ access to trade secrets
should be limited to a need-to-know basis, which should be reevaluated on an on-going basis.
As part of the standard termination procedure, employees should be required to go
through an exit interview. At the interview, arrangements should be made for the return of all
company information and materials and all copies. Employees should be asked to sign a form
certifying that everything has been returned.
The company should also consider having employees in especially sensitive
positions sign non-competition agreements prohibiting them from working for competitors.
Such agreements make it much easier for a company to protect its trade secrets since there is no
need to prove that any trade secrets are in fact being misappropriated. A former employee is
simply prohibited from even working for a competitor for a specified period of time. Noncompetition agreements are carefully scrutinized by the courts to make sure restrictions on an
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
5
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
individual’s ability to find employment are not unreasonably limited geographically or
temporally. The enforceability of such agreements are, therefore, highly sensitive to the
particular circumstances, and to the case law of the jurisdiction of employment. In Oregon, for
example, a non-competition agreement with an employee is enforceable only if entered into
before the employee begins work, or upon a bona-fide promotion.
(b)
Addressing Third Party Contractor Risks. The steps taken with respect to
employees apply equally to third party contractors. Third party contractors should sign broad
confidentiality agreements which address the limitations on both the disclosure and use of trade
secret information. Such agreements are especially important in dealing with web developers
and web hosting contractors who may have access to the personal information of the company’s
customers, thereby introducing risks associated with privacy as well as trade secrets. In addition
to confidentiality agreements, the company should have a clear policy enforced by password and
physical access restrictions regarding the information to which third party contractors have
access.
Contractors also should be required to sign agreements which specifically
set forth the ownership interest and the use rights with respect to any intellectual property,
including trade secrets, which may be created during the course of the contractual relationship.
As discussed above, absent written agreement, a company may discover it does not own its trade
secrets.
(c)
Addressing External Threats - Policies and Procedures Generally.
Effective policy and procedures, consistently enforced, regularly updated, and periodically
subject to outside audit, are the best defense against external threats. They are also effective in
limiting exposure from internal risks. Policies and procedures should be tailored to address the
value of the particular information, the ease with which it may be misappropriated, and the
legitimate need for access to such information. Not only is this good business practice, it
satisfies the legal requirement that “reasonable” effort be taken to protect the secrecy of
confidential information.
Policies and procedures should be designed with the primary objective of
limiting access. This may be done in a variety of ways, as the following examples illustrate:
(i)
Limiting Physical Access.
- Sensitive information may be kept on separate computers
with no physical connection, or protected connections to
other more widely distributed computer networks.
- Physical access to computer or premises may be restricted
by individuals using ID badges, sign-in procedures, locks,
escorts, security personnel, etc.
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
6
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
- Searches of person and property including computer files,
e-mail, and voicemail and use of video surveillance. Note,
under federal and state privacy laws, specific employee
policy language and notices are required to authorize such
searches and surveillance.
- Document control, such as numbering confidential
documents, and implementing procedures for the
destruction of confidential documents.
(ii)
Limiting Access Electronically.
- Access to all important information should be by
password. An effective password policy requires on-going
training in the selection, protection and use of passwords.
- Firewalls and other electronic security measures should be
placed between sensitive information and other networks,
including the Internet, with greater public access. A
firewall is only as good as the computer equipment and
software of which it consists and those monitoring it, all of
which must be subject to on-going evaluation and
upgrading.
- Encryption of especially sensitive information may be
used both to protect stored information and to protect the
transmission of trade secret information from one computer
or Internet site to another.
- An effective virus prevention program to intercept
destructive code is such a basic requirement that it is very
likely negligence not to have such a program in place.
With virus attacks evolving daily, however, it is probably
also negligence not to have a periodic program of updates.
The most effective policies and procedures start with identifying the
company personnel who are charged with the responsibility of developing and enforcing the
policies and procedures that will ensure that company secrets are not compromised.
Accountability is an essential element to the vigilant protection of trade secrets in an e-commerce
environment.
Finally, several factors suggest that a company should not rely solely on
its own resources, but provide for periodic outside audits of the effectiveness of its policies and
procedures. The e-commerce environment by its nature is subject to numerous internal and
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
7
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
external risks on very large scales. The technology is complicated, usually involving systems
from many vendors. Further, the technology is constantly evolving. Most telling perhaps is that
third party evaluations are becoming automated, thereby reducing their cost so that it may be
harder to justify not undertaking such precautions.
C.
Risks of Misappropriating the Trade Secrets of Another.
Even assuming that a company will not engage in intentional misappropriation of
another’s trade secrets, a risk of such misappropriation exists whenever a company hires an
employee who has knowledge of the trade secrets of another company. This is of particular
concern in the e-commerce area. The Internet is a common denominator for all businesses
engaged in e-commerce. Companies which normally would not consider themselves competitors
may profit greatly from one another’s trade secrets with respect to doing business on the Internet.
There is, therefore, great incentive to protect such secrets by challenging the hiring of former
employees by another e-commerce business. See e.g., trade secret dispute between Wal-Mart
and Amazon.com where Wal-Mart alleged that its trade secrets associated with its strategies and
processes for information technology management and use in a retail sales environment had been
misappropriated by Amazon.com through the hiring of some of Wal-Mart’s key information
technology personnel.
The risks of such a claim is not a insignificant risk considering the high rate of turnover
of personnel performing Internet and e-commerce related functions, and the increasingly
common requirement that such personnel sign non-competition agreements and confidentiality
agreements. Even in the absence of a non-competition agreement there is developing in the
United States a legal principal referred to as the “inevitable disclosure doctrine” which provides
trade secret protection even where there is no misappropriation or a threat of misappropriation on
the theory that the circumstances make it ‘inevitable’ that the defendant would have to disclosure
the plaintiff’s trade secrets. This doctrine has been applied to enjoin a high level former
employee from working as the chief executive officer for a competitor on the grounds that his
new employment would “inevitably lead him to rely on the plaintiff’s trade secrets.” Pepsi Co.,
Inc. v Redman, 54 F3d 1262, 1269 (7th Cir 1994).
Certain precautions should be taken in light of the risk that the employment of former
employees of company’s not obviously competitors could lead to liability for theft of trade
secrets or at least subject a company and its new employee to litigation. Reference checks must
be thorough and they should include requests for all confidentiality and non-competition
agreements. All such agreements should be reviewed carefully. Some additional protection may
be afforded by having pollicies and even agreements with new employees which specifically
prohibit employees from using the trade secrets or other intellectual property rights of others.
2001 Lane Powell Spears Lubersky LLP
999999.2001/311146.1
8
John C. Stevason
Lane Powell Spears Lubersky LLP
601 SW 2nd Avenue, Suite 2100
Portland, OR 97204-3158
Phone: (503) 778-2144
stevasonj@lanepowell.com
Download