Cozen O`Connor

advertisement
!
COZEN
O’CONNOR
ATTORNEYS
I
!
I
I
I
i
I
I
I
I
I
2005 Labor and Employment Seminar
Restrictive Covenants and Trade Secrets:
Unlocking and Protecting
the Secrets of Your Computer
A PROGRAM DESIGNED FOR IN HOUSE COUNSEL, HUMAN RESOURCE
PROFESSIONALS, OPERATIONS MANAGERS, RISK MANAGERS AND FINANCIAL
PROFESSIONALS WITH HUMAN RESOURCE RESPONSIBILITIES
TUESDAY, MARCH 8, 2005
THE RITrENHOUSE HOTEL
210 WEST RITrENHOUSE SQUARE
PHILADELPHIA, PENNSYLVANIA
© Copyright 2005 by Cozen O’Connor. All Rights Reserved.
COZEN
O’CONNOR ~
ATTORNEYS
2005 LABOR AND EMPLOYMENT SEMINAR
UNLOCKING AND PROTECTING THE SECRETS OF YOUR COMPUTER
TABLE OF CONTENTS
Speaker Profiles
II.
Restrictive Covenants - written and presented by Anita B. Weinstein, Esq.
III.
Trade Secrets- written and presented by David J. Walton, Esq.
IV.
Intellectual Properly Services - prestented by John F. Ashley
E-Discovery Process Matrix - presented by John F. Ashley
VI.
Uniform Trade Secrets Act (12 Pa.C.S. § 5301 (2004))
VII. Theft of Trade Secrets (18 Pa.C.S. § 3930 (2004))
I
|~
I
I
I
I
COZEN
O’CONNOR®
ATTORNEYS
SPEAKER PROFILES
Atlanta
Charlotte
Cherry Hill
Chicago
Dallas
Denver
Houston
Las Vegas*
London
Los Angeles
New York
Newark
Philadelphia
San Diego
San Francisco
Seattle
Trenton
Washington, DC
West Conshohocken
Wichita
Wilmington
*Affiliated with the Law Offices of J. Goldberg & D. Grossman.
These materials are intended to generally educate the participants on current legal issues. They are not intended to provide
legal advice. Accordingly, these materials should not be relied upon without seeking specific legal advice on matters discussed
herein.
Copyright © 2005 Cozen O’Connor. ALL RIGHTS RESERVED.
I
!
I
!
i
COZEN
O’CONNOR.
ATTORNEYS
Carrie B. Rosen
Associate
Philadelphia Office
(215)665-6919
crosen@cozen.com
I
i
!
AREAS OF EXPERIENCE
- Labor & Employment
EDUCATION
- J.D. Vanderbilt University
Law School, 2000
- B.A. University of Rochester,
magna cure laude, 1997
MEMBERSHIPS
i
!
I
!
|
I
!
!
-
American Bar Association
Pennsylvania Bar Association
Philadelphia Bar Association
University of Rochester
Alumni Association
- Central High School of
Philadelphia Alumni
Association
- Vanderbilt Law School
Alumni Association
Came B. Rosen is an associate of the Firm who practices in the Labor and
Employment Department. She concentrates her practice in the representation of
management in responding to complaints of employment discrimination, providing
advice on workplace policies, and helping employers reach effective settlement
agreements. Ms. Rosen has experience in the areas of Title VII, ADA, ADEA,
FLSA, WARN, the Pennsylvania Human Relations Act, and the New Jersey Law
Against Discrimination.
A native of Philadelphia, Ms. Rosen earned her law degree in 2000 from
Vanderbilt University Law School, where she served on the Moot Court Board and
participated in the Vanderbilt Legal Clinic. She received her Bachelor of Arts
degree in 1997 from the University of Rochester, where she graduated <i>magna
cum laude</i>, with honors and highest distinction.
Ms. Rosen was admitted to practice in Pennsylvania and New Jersey in 2000, and
was admitted to the bars of the United States District Court for the District of New
Jersey in 2000, and the United States District Court for the Eastern District of
Pennsylvania in 2001.
She is a member of the American, Pennsylvania, and Philadelphia Bar
Associations.
!
I
!
i
I
COZEN
O’CONNOR~
ATTORNEYS
David Walton
Member
Philadelphia Office
(215) 665-5547
I
I
dwalton@cozen.com
AREAS OF EXPERIENCE
I
I
- Labor & Employment
!
- American Bar Association,
Labor & Employment Section
- City of Richmond Bar
Association
- Defense Research Institute
- Virginia Bar Association,
Labor & Employment Section
- Virginia Association of
Defense Attorneys
I
!
I
!
I
I
!
I
!
EDUCATION
- J.D. University of Richmond
School of Law, 1995
- B.S. Ithaca College, 1991
MEMBERSHIPS
Dave Walton, a member in the Philadelphia office’s Labor and Employment
Department, concentrates his practice in all aspects of employment discrimination
law. He has extensive experience both cotmseling employers in avoiding
discrimination claims and defending employers targeted by discrimination and
sexual harassment lawsuits. Mr. Walton also has substantial experience litigating
various issues relating to non-competition agreements, the protection of trade
secrets, and fiduciary duties under ERISA.
Mr. Walton uses his experience in representing a broad range of clients from large,
multi-national corporations to small companies to defend employers in all types of
employment discrimination claims. His experience in the emerging area of trade
secrets adds to Cozen O’Connor’s ability to help employers face the challenges
posed by the information-age economy. In addition, his substantial experience
lecturing to human resources professionals on wide-ranging issues in employment
law contributes to the firm’s ongoing efforts to provide clients with the tools
necessary to effectively manage their workforce.
Dave received his law degree with honors from the University of Richmond
School of Law in 1995. While at law school, he served as the Senior Notes &
Comments Editor of the University of Richmond Law Review and Vice-President
of the Negotiations Board. He was awarded the Sheppard Scholarship and the
American Jurisprudence and Corpus Juris Secundum Book Awards for Civil
Procedure. Dave also chaired the Robert H. Mehrige Environmental Law
Negotiations Competition and served on the Honor Court. He is a 1991 graduate
of Ithaca College where he received a Bachelor of Science degree in
Communications.
He is admitted to practice in the Commonwealth of Virginia, and before the Fourth
Circuit Court of Appeals, and the Eastern and Western Districts of the Federal
Courts in Virginia. Dave is a member of the American, Commonwealth of
Virginia and City of Richmond Bar Associations, and the Committee on Labor and
Employment Law for both the American and Virginia Bar Associations. He also is
a member of the Defense Research Institute and Virginia Association of Defense
Attorneys.
I
I
I
i
I
I
!
I
COZEN
O’CONNOR°
ATTORNEYS
Anita B. Weinstein
Member
Philadelphia Office
(2 l 5) 665-2059
aweinstein@cozen.com
AREAS OF EXPERIENCE
- Labor & Employment
- Employment Practices
- Professional Liability
EDUCATION
!
I
!
I
I
I
!
- J.D. Temple University School
of Law, 1977; Member,
Temple Law Quarterly; Am
Jur Award for Best Paper,
Conflicts of Law
- B.A. Syracuse University, cum
laude, 1969
MEMBERSHIPS
-
American Bar Association
Pennsylvania Bar Association
Philadelphia Bar Association
Pennsylvania Defense Institute
Defense Research Institute
Anita B. Weinstein joined the Firm in July, 1980 and practices in the Labor and
Employment Department of the Philadelphia office. She has represented employers
in litigation involving workplace torts; sexual harassment; discrimination; the
Americans with Disability Act; the Age Discrimination in Employment Act; joint
enterprise liability; defamation; trade secrets; non-compete agreements; and
employment contracts. She has tried more than 25 cases to verdict, winning 24 of
them.
Besides her active courtroom practice, Anita also counsels employers in a wide
variety of workplace matters. She appears frequently before the Equal
Employment Opportunity Commission and various state agencies.
Anita is a frequent speaker on employment law issues before both industry and
professional groups. She is sought out by broadcasters, such as National Public
Radio’s Radio Times, and by the print media, such as Working Women Magazine
and Entrepreneur Magazine, to provide commentary on recent developments in the
law.
Anita is a member of the American, Philadelphia and Pennsylvania Bar
Associations. She is a member of the Pennsylvania Defense Institute and the
Defense Research Institute, as well.
Anita earned her Bachelor of Arts degree, cum laude, at Syracuse University in
1969 and her law degree at Temple University in 1977, where she was a member
of the Temple Law Quarterly. Also while at Temple, Anita earned a Best Paper
Award for her work in Conflicts of Law. She was admitted to practice in
Pennsylvania in 1977. She is also admitted to practice before the U.S. Court of
Appeals, Third Circuit, Sixth Circuit and the U.S. District Court Eastern, Middle
and Western Districts of Pennsylvania.
!
!
I
I
I
I
I
I
I
I
!
I
I
!
I
I
"::Z COREFACTS
Curriculum Vitae
John F. Ashley
Name:
Address:
Telephone:
E-mail
D/O~
Nationality:
Marital Status:
John F. Ashley
CoreFacts, LLC
14030 Thunderbolt Place, Suite 700
Chantilly, Virginia 20151
703.375.4345
i ashl ey@core facts .net
December 18, 1951
British
Married
Professional Experience
July 2000 to December 2000 - CoreFacts Resources, Director of Electronic Evidence Group
January 2001 to present - CoreFacts LLC, Chief Technology Officer
Responsible for designing, equipping and supervising one of the largest corporate
computer forensics laboratories on the East Coast. Forensic computer hardware
configured to optimize leading forensic software.
Case Studies
¯
¯
Representation of plaintiff corporation in a contractual dispute with federal
government requiring the restoration of 40 back-up tapes held on three different types
of magnetic media, containing the Emails and user created data of a staff of 160
persons. The data had been created over a 30-month period and total data size was
183 gigabytes. Three Email packages, MS Outlook, Netscape and ccMail were
successfully investigated.
Defense representation in a software trade secrets dispute requiring the capture of 14
terabytes of data within a 45-day period, without interrupting client’s workflow. Data
from 320 NT workstations, 90 NT laptops and 15 servers was forensically captured.
In excess of 300 search terms were run across the encapsulated data, all relevant
Email folders and electronic documents were hosted on secure web servers and
reviewed by more than 50 attorneys throughout the US.
l
I
!
l
I
l
!
i
I
!
i
I
!
i
!
I
i
¯
Plaintiff representation in a breach of fiduciary duty, contract, trade secret and
misappropriation of confidential information case requiring the capture of data from
five NT laptops and the restoration of six months backup of Email data for five
former employees.
¯ Plaintiff representation in a financial mismanagement case requiring the imaging and
investigation of 71 laptop drives.
1998 to July 2000 - Greater Manchester Police, Computer Examination Unit, Unit Head
¯ Responsible for forensic data retrieval from all computers used in crime, covering a
population of 3.5 million people.
¯ Managed workload increase from 153 cases in 1997 to 263 cases in 1999.
¯ Designed and installed Microsoft NT4 networks of investigation machines.
¯ Given additional responsibility for the forensic examination of all computers seized in
North Wales and the Isle of Man.
¯ Wide experience of covert intrusion investigations involving imaging, monitoring and
surveillance techniques.
¯ Employed on a consultative basis to manage the establishment of a number of
computer forensics units for a variety of UK police forces.
¯ Provided vulnerability advice to various public bodies.
¯ Considerable fraud investigation experience involving the majority of accountancy
software packages.
¯ Advised and assisted in technical interviews of computer skilled offenders on many
occasions.
1996 to 1998 - GMP Computer Examination Unit, Senior Forensic Investigator
¯ Managed the accreditation of the Unit to the intemationally accepted ISO 9002 standard.
¯ Designed and Installed a Novell network of investigation machines.
¯ Interviewed, appointed and trained forensic investigation detectives.
1989-1996 - GMP Obscene Publications Unit, Supervisor / Investigator
¯ The first police officer in the UK to investigate computer pornography.
¯ Responsible for data retrieval from pornographers’ and pedophiles’ computer systems.
¯ Investigated all forms of technical crime involving computers: hacking, cracking, virus
writing, phreaking, mobile phone cloning and credit card duplication.
¯ Lead investigator in a number of international obscenity and pedophile cases.
I
!
!
i
!
i
!
I
i
I
i
I
I
i
i
i
i
Expert Witness Testimony
¯ Expert witness in the investigation and prosecution of Dr. Harold Shipman for the
murder of 15 patients. Testified in relation to 12 of the 15 victims regarding the
forensic investigation of a complex computer network that revealed back dated and
falsely inserted records leading to the identification of victims who were subsequently
exhumed. Provided 500 exhibits and 120 witness statements relating to the suspicious
deaths of patients. Shipman found guilty on all counts.
Filmed and interviewed in the UK, by Ed Bradley, for CBS’s 60 Minutes regarding
the computer forensics skills deployed in this case. The program was screened in
January and June 2001.
Filmed and interviewed in the UK, by The Learning Channel regarding the computer
forensics skills deployed in this case. The program was screened in the US in March
2001.
¯ Expert witness for the prosecution in a trial involving the large-scale theft of hard
drives from Quantum. Performed a forensic financial analysis of the suspect’s
corporate server accounting packages. Investigation revealed a wide distribution
network throughout Europe. Testified in Wolverhampton Crown Court over a fiveday period. All five defendants found guilty.
¯ Expert witness for the prosecution in a trial involving the theft of corporate computers
throughout the north of England. Conducted forensic analysis of residual data found
on a large number of re-formatted stolen hard disk drives assisted in identifying the
original owners of recovered computer equipment. Testified in Manchester Crown
Court over a five-day period. Defendant found guilty.
¯ Expert witness for the prosecution in a trial involving the running of an electronic
bulletin board system that was the UK gateway to an international network involved
in the worldwide electronic distribution of obscene material. Testified in Maidstone
Crown Court. Two defendants found guilty.
¯ Expert witness for the prosecution in a trial involving the blackmail of 17 individuals.
Forensic examination of a word processing system revealed systematic threat letters
held in hidden and limbo files. Testified at Manchester Crown Court. Two defendants
found guilty.
¯ Expert witness for the prosecution in a trial involving international disk based
distribution of obscene material. Testified at Swindon Crown Court. Defendant found
guilty.
¯ Expert witness for the prosecution in a North Wales case involving distribution of
pedophilic material via the Internet. Forensic examination of a computer hard drive
refuted defense testimony that an unknown person had used Back Orifice 2000 and
Netbus to gain control of the defendant’s machine.
I
!
I
I
I
I
!
I
i
I
I
I
i
I
I
I
i
I
I
Notable Cases
¯
On behalf of the Securities and Futures Authority, assisted Guernsey Police and a
team of forensic accountants, in the forensic on-site imaging and investigation of two
computer networks comprising a total of 22 machines in relation to the Sumitomo
Corporation $2.6 billion copper fraud.
¯ On behalf of the FBI, carried out UK Home Office authorized house searches relating
to the recovery of computer related data from laptops and other storage media in the
possession of two Libyan males suspected of involvement in the bombing of US
Embassies in Africa.
¯ On behalf of the Isle of Man Police, investigated a laptop computer that had been
surrendered by the user who had found that he was being anonymously blackmailed
via Email. Forensic examination uncovered evidence that the user had gained
employment within the IT section of a major offshore bank and had accessed
customer’s private identification information, which was then provided to a criminal
group in Belgium. This group had subsequently blackmailed him via an Email service
provider in Texas when he had refused to assist them further with their criminal
activity.
¯ In conjunction with the US Customs and Postal Service, forensically investigated the
electronic contents of 18 hard drives used in Denmark to run two pedophile electronic
bulletin board systems. Recovered evidence led to the identification of individuals
who had downloaded pedophilia in the US and the UK.
¯ Forensic examination of two encrypted hard drives found evidence that led to the
simultaneous worldwide arrest of 120 pedophiles. Many of the individuals involved
were exchanging digital images of their actual abuse of children via secure web
servers, one of which was known as Wonderland and was located in Boston,
Massachusetts.
¯ Forensic examination of a suspect’s computer revealed 35 live viruses and plans to
infect viruses in a number of UK corporations. Further analysis revealed the breach of
a US based grocery company’s customer credit card database, where customer credit
card details had been posted on bulletin boards and used by group members for
international communication. This led to the simultaneous arrest of five individuals
who were collectively known as ArcV, a high profile virus-writing group.
¯ Forensic examination of a re-formatted hard drive revealed more than 100 fraudulent
Internet credit card purchase transactions and the distribution network for the illegally
purchased goods.
¯ On behalf of New Scotland Yard gained access to a number of electronic bulletin
boards that were distributing pedophilia. Subsequently provided evidence and
assistance to their technical experts and the Metropolitan Police Computer Crime
Unit.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Speaking Engagements
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
Appeared on a number of television and radio programs in the UK in relation to
computer forensics and communications investigation work.
Profiled on British weekly prime time show "The Cook Report" regarding techniques
used in identifying English users of a Danish pedophile Internet bulletin board.
Lectured on Computer Forensics at Merseyside Police Training College.
Lectured on Computer Crime at Bramshill Police Staff College.
Guest speaker at the British Computer Society.
Lectured on Computer Pornography at the University of Central Lancashire.
Lectured on Computer Crime at the University of Manchester Institute of Science and
Technology.
Consultant to the Association of Chief Police Officer’s Working Group into
Computer Pornography.
Presentations given at the Houses of Parliament and in Manchester to the Home
Affairs Select Committee that led to amendments to UK law in relation to the
sentencing of child offenders and the creation of a new offence in relation to
electronic pseudo photographs.
Lectured on Computer Forensics to the F3 Forum, a group comprising the majority of
UK law enforcement and corporate computer forensic experts.
Lectured on Computer Forensics at the American University, Washington D.C.
Lectured on Computer Fraud to the Virginia Society of Certified Public Accountants.
Education
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
¯
Educated at Sir John Deane’s Grammar School, Northwich, Cheshire graduating in
1969 with Certificates in Mathematics, English Language, Geography and French.
July 1969 Cheshire Constabulary Police Cadet graduate.
January to April 1971 Police Training Center Constable graduate.
October 1977 examination qualification to the rank of Sergeant.
October 1980 examination qualification to the rank of Inspector.
November 1989 to December 1993 in force computer investigation training with
ongoing IS specialist support.
1990 to 1994 various UK based data retrieval and network training seminars.
1995 Computer Forensics software and hardware training provided by Computer
Forensics Ltd.
1996 Advanced Computer Forensics software and hardware training provided by
Computer Forensics Ltd.
1996 Computer Forensics software and hardware training provided by Authentec
Data Recovery specialists.
1997 Advanced Computer Forensics techniques software and hardware training
provided by Vogon International Ltd.
1998 Data Networks and Communications training seminars provided by CLC.
Computer Forensics experiential learning throughout the period 1989 to 2003.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
US Expert Deposition and Testimony
December 2000, selected as an independent computer forensics expert by the Court of
Alexandria, Virginia, to assist in an intellectual property dispute that centered on
verifying the electronic time and date stamp information of the plaintiff’s software
prototypes and supporting electronic presentations. Subsequently deposed at length by
the plaintiff’s attorney. Four days into trial, the case settled at the plaintiff’s request, a
day prior to my scheduled testimony.
Dr. Bradley S. Fordham v. OneSoft Corporation, et al.,
Civil Action No. 00-1078-A (Eastern District of Virginia)
June 2001, testified and cross-examined as the defendant’s computer forensics expert,
before the judicial court of Harris County, Texas, in support of a defendant corporation’s
motion to mirror image and investigate the plaintiff’s electronic storage devices.
Motion granted.
Gyrodata Inc. v. Baker Hughes Inc. and Baker Hughes Inteq.,
th
Cause No. 2000-40391 (Harris County, Texas 127
Judicial District)
August 2001, United States District Court for the Eastern District of Virginia, deposed as
the plaintiff’s computer forensics expert in a multi defendant unsolicited bulk email
litigation. I provided expert opinion based on my analysis of more than 125,000 member
complaints.
AOL v. Net-vision Audiotext, dba Cyber Entertainment Network, et al.,
Civil Action No. 99-1186-A (Eastern District of Virginia)
September 2001, testified and cross-examined as the defendant’s computer forensics
expert, before the judicial court of Harris County, Texas, in support of a defendant
corporation’s rebuttal of a motion alleging spoliation of electronic evidence.
Gyrodata Inc. v. Baker Hughes Inc. and Baker Hughes Inteq.,
thJudicial District)
Cause No. 2000-40391 (Harris County, Texas 127
October 2001, United States District Court for the Eastern District of Virginia, deposed
as the defendants’ and counter-plaintiffs’ computer forensics expert in a breach of
contract, breach of fiduciary duty, theft of trade secrets and violation of the Electronic
Communications Privacy Act litigation.
Beyond Technology Corp. v. WebMethods, Inc., and K. Alyssa Berg,
Civil Action No. 01-655-A (Eastern District of Virginia)
October 2001, 53rd District Court of Travis County, Texas, deposed as the plaintiff’s
computer forensics expert in an employee solicitation and theft of trade secrets case.
Advanced Fibre Communications v. Calix Networks, Inc. and Tony Roach
Cause No.GN 102712 (53rd District Court of Travis County, Texas)
I
I
I
I
I
I
I
I
I
I
I
I
l
I
I
I
I
June 2002, United States District Court for the Middle District of Florida, Fort Myers
Division, deposed as the defendants’ and counter-plaintiffs’ computer forensics expert in
a defamation and tortious interference with business relationships litigation.
Gary Van Meer, and Palm Harbor Medical, Inc. v. Stryker Sales Corp.,
Civil Action No. 2:00-CV-454-FTM-29D (Middle District of Florida)
June 2002, testified and cross-examined as a computer forensics expert, before the United
States District Court for the Middle District of Florida, Fort Myers Division, in support of
defendants’ and counter-plaintiffs’ motion alleging spoliation of electronic evidence.
Gary Van Meer, and Palm Harbor Medical, Inc. v. Stryker Sales Corp.,
Civil Action No. 2:00-CV-454-FTM-29D (Middle District of Florida)
September 2002, testified and cross-examined as the plaintiff’s computer forensics
expert, before the United States District Court for the Southern District of Florida, Miami
Division, in support of plaintiff’ s motion for contempt alleging spoliation of electronic
evidence and support of plaintiff’s rebuttal of defendant’s motion to dismiss preliminary
injunction and temporary restraining order.
Plaintiff’ s motion for contempt upheld, with the defendant being ordered to pay all of the
plaintiff’s attorney’s and expert’s fees which were incurred during the investigation and
presentation of the contempt motion.
Four Seasons Hotels and Resorts B.V., Four Seasons Hotels (Barbados) Limited,
Four Seasons Hotels Limited, and Four Seasons Caracas, C.A.v. Consorcio Barr, S.A.,
and Carlos L. Barrera,
Case No. 01-4572 CIV-MOORE
October 2002, United States District Court for the Eastern District of Virginia, deposed
as the plaintiff’ s computer forensics expert in a litigation concerning unsolicited bulk
email. I provided expert opinion concerning the persons responsible for the transmission
of tens of millions of unsolicited bulk commercial emails.
Verizon Internet Services, Inc. v. Alan Ralsky, et al.,
Civil Action No. 01-0432-A (Eastern District of Virginia)
October 2002, testified as the defendant’s computer forensics expert, before the United
States District Court for the Middle District of Florida, Fort Myers Division, in response
to plaintiffs" motion alleging spoliation of electronic evidence.
Gary Van Meer, and Palm Harbor Medical, Inc. v. Stryker Sales Corp.,
Civil Action No. 2:00-CV-454-FTM-29D (Middle District of Florida)
November 2002, testified and cross-examined as the defendant’s computer forensics
expert, before the United States District Court for the Middle District of Florida, Fort
Myers Division, in rebuttal of plaintiffs’ computer forensics expert’s evidence supporting
a motion alleging spoliation of electronic evidence.
Gary Van Meer, and Palm Harbor Medical, Inc. v. Stryker Sales Corp.,
Civil Action No. 2:00-CV-454-FTM-29D (Middle District of Florida)
i
l
I
I
I
I
I
I
I
I
i
I
I
I
I
I
I
I
I
January 2003, testified and cross-examined, at trial, as plaintiff’s computer forensics
expert, before the United States District Court for the Southern District of Florida, Miami
Division. Testimony encompassed Computer Fraud and Abuse, Electronic
Communication Interception, and Trade Secret Theft.
Four Seasons Hotels and Resorts B.V., Four Seasons Hotels (Barbados) Limited,
Four Seasons Hotels Limited, and Four Seasons Caracas, C.A.v. Consorcio Barr, S.A.,
and Carlos L. Barrera,
Case No. 01-4572 CIV-MOORE
January 2003, rebuttal testimony and cross-examination, at trial, as plaintiff’ s computer
forensics expert, before the United States District Court for the Southern District of
Florida, Miami Division. Testimony encompassed Computer Fraud and Abuse,
Electronic Communication Interception, and Trade Secret Theft.
Rebuttal testimony proved that one of the defendant’s key electronic exhibits was not
original, but had been fabricated in an attempt to deceive the court.
Final Judgement issued May 9, 2003 awarded plaintiffs $4,877,600.00 in damages.
Four Seasons Hotels and Resorts B.V., Four Seasons Hotels (Barbados) Limited,
Four Seasons Hotels Limited, and Four Seasons Caracas, C.A.v. Consorcio Barr, S.A.,
and Carlos L. Barrera,
Case No. 01-4572 CIV-MOORE
May 2003, United States District Court for the District of Columbia, deposed as the
defendant’s computer forensic expert in a litigation alleging racial bias and
discrimination.
Provided testimony in relation to the alteration, fabrication and authentication of email.
The plaintiff withdrew his allegations a short time later and the case settled.
Timothy Dean and Michelle Dean v. Starwood Hotels & Resorts Worldwide Inc., d/b/a
The St. Regis Washington by Starwood Hotels and Resorts
Civil Action No. 1:02CV00867
July 2003, testified and cross-examined, at trial, as plaintiff’s computer forensic expert,
before the United States District Court for the Eastern District of Virginia, Alexandria
Division. Testimony encompassed tortious interference with business relationships,
breach of contract, civil conspiracy and spoliation of data.
Plaintiff’s awarded in excess of $565,000 in damages.
CACI Dynamic Systems, Inc. v. Delphinus Engineering, Inc., and James R. Everitt, Jr.,
Civil Action No. 02-1454-A
January 2004, testified and cross-examined, in arbitration, as claimant’s computer
forensic expert, before an Arbitration Tribunal of the American Arbitration Association
in Charleston, South Carolina. Testimony encompassed tortious interference with
business relationships, breach of contract and spoliation of data. Arbitrator subsequently
awarded claimant $10,567,478 and reimbursement of claimant’s arbitration costs.
CACI Dynamic Systems, Inc. v. V. Allen Spicer
AAA Case No. 16 160 00725 02
I
I
I
I
I
I
I
I
I
I
I
I
I
I
March 2004, United States District Court for the Southern District of New York, deposed
as the defendant’s computer forensic expert in a litigation alleging unfair dismissal.
Provided testimony in relation to the creation and authentication of a document produced
in paper form by the plaintiff
Michelle Bell v. Davis & Partners, LLC and Wolf Management & Leasing, LLC,
Civil Action No. 03CV4175
November 2004, testified and cross-examined as plaintiff’s computer forensic expert, at a
Preliminary Injunction Hearing, before the United States District Court for the District of
Maryland, Northern Division. Testimony encompassed the defendants’ co-ordinated use
of data destruction utilities to prevent the discovery of the plaintiff’s stolen source code
and proprietary information.
Bowe Bell + Howell Company v. Document Services Inc., and Albert M. Harris et al,
Civil Action No. 043418
November 2004, testified and cross-examined as plaintiff’s computer forensic expert, in
rebuttal to counter defendants’ testimony and provide pattern analysis to show the extent
of defendants’ data destruction efforts, at a Preliminary Injunction Hearing, before the
United States District Court for the District of Maryland, Northern Division.
The Judge granted the plaintiff broad injunctive relief and found that the defendants had
intentionally destroyed relevant documents and indicated that an adverse inference
instruction will likely be given to the jury as a sanction.
Bowe Bell + Howell Company v. Document Services Inc., and Albert M. Harris et al,
Civil Action No. 043418
I
I
I
I
I
I
i
I
!
I
I
I
I
I
I
I
I
COZEN
O’CONNOR
ATTORNEYS
RESTRICTIVE COVENANTS
wrillen and presented /~,y
ANITA B. WEINSTEIN, ESQ.
COZEN O’CONNOR
1900 Market Street
Philadelphia, PA 19103
(215) 665-2059 or (800) 523-2900
aweinstein@cozen.com
www.cozen.com
Atlanta
Charlotte
Cherry Hill
Chicago
Dallas
Denver
Houston
Las Vegas*
London
Los Angeles
New York
Newark
Philadelphia
San Diego
San Francisco
Seattle
Trenton
Washington, DC
West Conshohocken
Wichita
Wilmington
*Affiliated with the Law Offices of J. Goldberg & D. Grossman.
These materials are intended to generally educate the participants on current legal issues. They are not intended to provide
legal advice. Accordingly, these materials should not be relied upon without seeking specific legal advice on matters discussed
herein.
Copyright © 2005 Cozen O’Connor. ALL R~GHTS RES~.~,VED.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
RESTRICTIVE COVENANTS
Written and Presented By
Anita B. Weinstein, Esquire
Cozen O’Connor
Labor and Employment Seminar
March 8, 2005
Restrictive Covenants
A.
Noncompete - Prohibits former employee from competing with former employer
in the same industry.
B.
Nondisclosure - Limits the dissemination of proprietary information.
C.
Non-solicitation - Prohibits former employee from soliciting present employees
of former employer and/or customers of former employer.
II.
Pennsylvania Courts Disfavor Restrictive Covenants Except When Certain
Couditions Are Met
lII.
Courts Will Enforce A Restrictive Covenant If It Is:
IV.
V.
A.
Ancillary to the acceptance of employment;
B.
Supported by adequate consideration ;
C.
Reasonably limited in time and geographic scope; and
D.
Reasonably designed to safeguard a legitimate interest of the former employer.
Ancillary, To The Acceptance Of Employment
A.
Beginning of employment; and
B.
Courts have held that restrictive covenants are enforceable ten (10) days after
employment.
Supported By Adequate Consideration
A.
Deemed to be adequate as a matter of law if it is part of the formation of the
employee relationship.
B.
VI.
i
I
i
I
I
I
I
i
I
I
I
I
I
I
I
I
VII.
Additional consideration necessary if restrictive covenant entered into during the
course of employment.
Reasonably Limited In Time And Geographic Scope
A.
Employee has the burden of proof to show that covenant is unreasonable.
B.
One (1) year is generally considered to be reasonable.
C.
Where job involves intemet usage, a national limitation may be reasonable.
Reasonably Designed To Safeguard Legitimate Interests Of The Former Employer
A.
Goodwill and business information are legitimate business interests.
B.
Specialized training and skills are legitimate business interests.
C.
The protection of proprietary information is a legitimate business interest.
VIII. Damages
A.
TRO
B.
Preliminary injunction
C.
Permanent injunction
D.
Employee must prove irreparable harm
1.
IX.
Xa
Irreparable harm is that harm which cannot be adequately compensated in
damages due to
a)
nature of the right which was injured
b)
no pecuniary standards exist for the measurement of damages
Former Employees Have No Right To The Ideal Job But Do Have The Right To Be
Able To Earn A Livelihood
Relief Will Be Granted When Employer Proves
Ao
It will succeed on the merits;
B.
Irreparable harm will occur;
C.
There is no greater harm to the employee than to the employer; and
D.
It is in the public interest
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
XI.
To Insert A Noncompete Clause Into An Existing Employment Contract Or To
Have Employees Sign A Noneompete Clause During The Course Of Employment,
Employer Must Give The Employee A Corresponding Benefit - i.e. Adequate
Consideration For the Change In Status
XIL
Without Restrictions As To Time Or Geography, The Restrictive Covenant Is Not
Enforceable
XIII. Employers Cannot Restrict Employees From Working For A Competitor In Any
Capaci ,ty, But Only In Capacities In Which There Is Direct Competition
mo
Note: Inevitable Disclosure Doctrine - Employees in certain capacities acquire
proprietary information which they would not be able to keep confidential due to
the nature of their job. In other words, employee could not work for a competitor
without inevitably disclosing the proprietary information of his/her former
employer.
XIV. Covenants Not To Compete Are Not Assignable To An Asset Purchaser Absent A
Specific Assignability Provision In The Covenant If It Is Included In The Sale Of
The Assets
XV.
Courts Have Held That In Certain Professions, i.e. Mental Health Therapists,
Patients Have A Right To Select Their Own Treating Therapists. Therefore
Employers Can Not Limit A Former Employee From Treating Patients Of His/Her
Former Employer
I
!
I
|
I
I
I
i
I
I
I
I
I
I
I
I
I
COZEN
O’CONNOR
ATTORNEYS ®
TRADE SECRETS
wrilten and presented
DAVID J. WALTON, ESQ.
COZEN O’CONNOR
1900 Market Street
Philadelphia, PA 19103
(215) 665-5547 or (800) 523-2900
dwalton@cozen.com
www.cozen.com
Atlanta
Charlotte
Cherry Hill
Chicago
Dallas
Denver
Houston
Las Vegas*
London
Los Angeles
New York
Newark
Philadelphia
San Diego
San Francisco
Seattle
Trenton
Washington, DC
West Conshohocken
Wichita
Wilmington
*Affiliated with the Law Offices of./. Goldberg & D. Grossman.
These materials are intended to generally educate the participants on current legal issues. They are not intended to provide
legal advice. Accordingly, these materials should not be relied upon without seeking specific legal advice on matters discussed
herein.
Copyright © 2005 Cozen O’Connor. ALL RIGHTS RESERVED.
I
I
!
TRADE SECRETS
Written and Presented By
David J. Walton, Esquire
Cozen O’Connor
Labor and Employment Seminar
!
I
March 8, 2005
What is the Law that Governs Trade Secrets in Pennsylvania?
i
A.
Pennsylvania Uniform Trade Secrets Act
B.
Common Law - Section 757 of the Restatement (First) of Torts
II. What is a Trade Secret under PUTSA?
I
!
I
!
I
I
I
I
!
mo
PUTSA Definition
B.
Common Law Factors (pre-PUTSA)
C,
Key issue: Clients Lists
IlL What Can You Do If an Employee Takes Your Trade Secrets?
A.
PUTSA
1.
Proving Misappropriation under PUTSA
2.
Remedies Under PUTSA
a)
Injunction
b)
Actual Damages
c)
Disgorgement for Unjust Enrichment
d)
Exemplary Damages
e)
Punitive Damages
I
I
i
I
I
I
I
f)
Bo
Co
Attorney’s Fees, Costs and Expenses
Defenses to Trade Secret Claims
1.
Independent Discovery
2.
Reverse Engineering
3.
Failure to Safeguard
Limitations Period Under PUTSA
a)
3-year limitations
b)
Continuing wrong
PUTSA Preemption
Related Common Law Claims
o
I
I
I
!
I
I
I
I
I
Tortious Interference with Contract/Business Relationship or Expectancy
2.
Breach of Fiduciary Duty/Duty of Loyalty
3.
Breach of Restrictive Covenant/Breach of Contract
4.
Inevitable Disclosure
5.
Civil Conspiracy
6.
Fraud
IV. Is There Criminal Liability for Stealing Trade Secrets?
Ao
The Computer Fraud and Abuse Act
B.
The Electronic Communications Privacy Act
C.
The Economic Espionage Act of 1996
D.
The National Stolen Property Act
E.
Pennsylvania criminal statute relating to trade secrets
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
V. How Can You Protect Your Trade Secrets?
ao
Confidentiality Agreements
B.
Non-Disclosure Agreements
C.
Employee Handbooks/Notices
D.
Restrictive Covenants
E.
Passwords and Other Security Measures for Electronic Information
F.
Designate/Label Material as Confidential
G.
Limit Employee Access to Trade Secrets and Confidential Information
H.
Internet and Intranet Issues
I.
Physical Security Measures
PHILAlk2229498\I 099994.000
COZEN
O’CONNOR
ATTORNEYS
INTELLECTUAL PROPERTY SERVICES
presented
JOHN F. ASHLEY
COREFACTS
14030 Thunderbolt Place, Suite 700
Chantilly, Virginia 20151
(703) 375-4340
jashley@corefacts.net
www.corefacts.net
!
I
I
I
!
!
I
I
!
I
i
I
!
!
I
!
!
i
!
I
I
i
I
!
INTELLECTUAL PROPERTY SERVICES
Originally founded to service the investigative needs of the IP litigation community,
CoreFacts leads the field of IP investigators by using traditional and innovative
techniques to prove or disprove infringements, covenant and trade secret claims and to
protect intellectual property here and abroad.
Theft of Trade Secrets by Former Employees:
CoreFacts provides evidence for temporary restraining orders, preliminary injunctions or
damage awards at trial. This information may include:
¯ Whether officers are violating fiduciary duties
¯ Whether employees are violating employment and post-employment covenants
¯ Whether trade secrets or other intellectual property has been stolen or leaked
Web-Based Investigations:
We seek to determine:
¯ Who is sending threatening emails or creating corporate rumors
¯ Who is writing slandering messages on Internet bulletin boards
¯ Who is using the Internet to steal proprietary information
¯ Who is sending spam in violation of state and federal law
Software Infringements:
Our professionals use a variety of techniques to show our clients’ software has been
stolen, including:
¯ Comparing source codes and providing expert reports
¯ Writing software that isolates changes to our clients’ source code or shows that
the errors imbedded in our clients’ code exists in the competitors’ software
¯ Using sting operations to identify stolen software patches
¯ Reviewing public records, attending trade shows and conducting interviews
Patent, Copyright, and Trademark Infringements:
These actions are driven by the facts. While we do not attempt to replace subject-matter
experts, we use our techniques and professional skills to gather facts of infringements and
vet and identify expert witnesses.
Diversions and Counterfeits:
We use a variety of techniques to:
¯ Identify the weaknesses in the supply chain
¯ Track the movement of diverted goods
¯ Vet distributors for gray market and financial problems
¯ Monitor manufacturing and distributor agreements
¯ Create intelligence gathering networks to identify counterfeiters
¯ Manage criminal and civil seizures
¯ Gather evidence for civil suits against diverters and counterfeiters
-° COREFACTS
I
I
INTELLECTUAL PROPERTY CASE STUDIES
I
i
I
!
I
i
i
i
An international chemical company became suspicious when the President of a
division left the company, and shortly thereafter, the lead chemist and three
salesmen quit, claiming that they had no new employment. CoreFacts’
investigators quickly established that the President had leased offices with space
for a chemical lab and many employees. The lease was in the name of a
competitor. Investigators also determined that the competitor’s chief chemist
developed our client’s most closely-held chemical compounds. Finally, our
investigators gathered evidence that the former President solicited employees and
customers. The client’s legal team used this evidence to obtain a temporary
restraining order and a subsequent preliminary injunction.
A former employee/shareholder succeeded in a lawsuit against his former
employer seeking compensation that far exceeded his ownership interest. The
former employer retained CoreFacts to obtain negotiating leverage against the
former shareholder. Instead of merely investigating the target, we studied the
former employee’s employment contract and determined that he had continuing
obligations to his former company not to compete against it and not to solicit
employees and customers. Investigators quickly determined the name and location
of the target’s new employer and found that it changed its product and service
offerings to compete against our client soon after the target joined the company.
By performing a forensic analysis of the target’s laptop and collecting his
abandoned property, CoreFacts learned that the former employee was now using
our client’s proprietary business methods and contacts to obtain additional
financing for his new venture.
In fewer than three weeks, CoreFacts provided our client with evidence that the
former employee had misappropriated proprietary information regarding the
company’s clients, pricing information, and business methods. We also provided
physical proof that he was operating a competing business and soliciting our
client’s customers. Finally, we obtained a copy of the new company’s
government procurement schedule and showed that it mimicked our client’s.
Ultimately, we provided our client with all of the information that it needed to
negotiate a more favorable settlement.
:’=" COREFACTS
I
I
!
I
I
I
I
I
!
!
I
I
!
I
I
!
I
i
i
COMPUTER FORENSICS SERVICES
Computer forensics experts are the ultimate digital archeologists who uncover hidden
data artifacts often comprised of tiny fragments of files. They are linguists who interpret
the meaning of the data, and they are trial certified experts who authenticate and explain
the digital evidence to a judge and jury.
Computer forensics investigators render a wide range of diverse and vital services that
fall within the general categories of data collection, preservation, and investigation. Our
assignments include determining:
The authenticity of an electronic file or e-mail
Whether data has been migrated to portable media or alternative servers or
transmitted over the Internet
Whether an electronic document’s metadata contains evidence that will tend
to support or refute a claim
Whether evidence is "buried" within temporary files, replicant files, swap
files, other systemically-created files, or within the computer’s unallocated
space
Whether storage media contains previously deleted or erased documents, parts
of documents or drafts of documents
The extent and nature of purposeful or negligent deletions, electronic
"shredding," use of defragmentation programs, the installation software or
other activities used to destroy, alter or corrupt electronic data
Whether electronic evidence has been password-protected or encrypted and
how to access the information contained within
CoreFacts’ team is led by John F. Ashley, the storied founder and former director of the
largest law enforcement computer forensics unit in Europe. John’s experience includes
numerous and diverse assignments and expert testimony roles -- more than virtually any
other specialist working in the United States. John’s team is hand-picked and wellcredentialed, creating one of the deepest "benches" of forensics experts in the industry.
CoreFacts’ experts reside on both coasts, have done work on four continents, and they
have testified in local, state and federal courts in the United States and Western Europe,
and before the British Houses of Parliament. John Ashley has been featured on television
shows such as 60 Minutes and The Cook Report and on networks such as The Learning
Channel
Client assignments involve CoreFacts in high-profile and complex matters such as
restrictive covenant and trade secret theft litigation, investigations of frauds and
international corporate espionage, cases of evidence destruction, subsequent cover-ups,
false claims based on "doctored" evidence, asset diversions, Internet-based criminal
activity, actionable spoliation matters, and a broad assortment of data authentication
issues. CoreFacts is also expert in establishing, auditing and validating evidence
preservation protocols for data relevant to litigation and regulatory compliance matters.
i
!
COMPUTER FORENSICS CASE STUDIES
!
I
i
I
I
I
!
!
!
I
I
I
I
I
I
A United States corporation suspected that key executives in its Asia office were
deleting e-mails relevant to an on-going Securities and Exchange Commission
(SEC) investigation. Just four hours after we were engaged, our experts were on
airplanes to the client site in Beijing. To avoid an international incident, we left
our specialized equipment in Hong Kong and tackled the job with cables and
disk-based software. Eighteen hours later, we shipped forensic images of 26
laptops to the United States. Investigation of those images led to recovery of
critical e-mail demanded by the SEC that would otherwise have been lost forever.
A dry goods vendor claimed to have a binding contract with our client, a national
retail company, based on an e-mail from our client. When the alleged e-mail
contract became the focus of a bitter litigation between the parties, CoreFacts was
engaged to consult with outside counsel and provide evidence that the e-mail had
been altered or fabricated. After obtaining an order to inspect the opponent’s
relevant computer media including two laptop computers, CoreFacts provided
evidence to the court showing that the opponent’s Chief Executive Officer had
altered the document repeatedly and that he had testified falsely to cover-up his
misdeeds. The court referred the Chief Executive Officer for prosecution by the
local District Attorney’s office. Faced with the evidence, the Chief Executive
Officer entered a guilty plea and was sentenced to a fine and five months in
prison.
After a group of consultants left a sports agency with a variety of proprietary
documents, CoreFacts found evidence that formed the basis of a successful
preliminary injunction action and a RICO case against the renegades. A
document, titled "Game Plan," contained step-by-step directions to betray the
company, steal its clients and trade secrets, and to blackmail the principals if they
were caught. The targets had been careful not to use their office computers to
create incriminating documents. However, Game Plan had been printed on an
office computer, and our experts were able to locate it in the swap file. The
ringleader and several other participants in the conspiracy were later forced into
bankruptcy.
In a well-publicized case involving corporate espionage, CoreFacts’ experts
proved that the litigation opponent, a Venezuelan company, hacked into our
client’s servers, stole confidential client information, and then attempted to delete
the evidence. CoreFacts used a proprietary protocol to recover 92 double deleted
emails with 38 attached encrypted spreadsheets. We then cracked the encryption
and proved that these files contained our client’s valuable and proprietary
information. The opponent defended its possession, claiming that our client
provided it on floppy disks in February 2002. However, CoreFacts proved that
the disks produced as originals from February 2002 were not manufactured until
four months later. Our evidence was the basis of the court’s finding for our client
on the merits and in its contempt ruling against our opponent.
I
I
I
I
I
E-DISCOVERY SERVICES
CoreFacts is a vertically integrated e-discovery firm that offers cradle to grave service in
the field of e-discovery.
Initial Consulting:
CoreFacts provides consulting advice to assure that relevant and potentially relevant
evidence is preserved. Our experts review the requests, identify the likely sources of
responsive data, and advise our clients about possible methods to be employed. We meet
with our clients’ IT group to determine its systems’ architecture and to devise a plan for
efficiently preserving the data. In designing a strategy, CoreFacts’ forensic experts
develop methods for tracking and authenticating the data as it is captured, processed,
prioritized, posted, and produced.
Data Collection and Preservation:
CoreFacts provides protocols designed to satisfy courts and opposing parties while
reducing the scope and cost of e-discovery. We also act as liaison between counsel and
the client’s IT staff, and we manage the IT staff to assure compliance with agreed upon
methods of collection and proper record keeping so that data can be authenticated in
court. CoreFacts’ experts testify regarding the collection process to counter spoliation
claims and to assure the court that our clients have adhered to any court orders and
agreements between the parties.
Data Reduction:
CoreFacts works with clients to ensure that only responsive and non-privileged data is
produced. Once the potentially responsive data has been identified, CoreFacts uses its
proprietary methods to reduce the universe of the electronic files. In most cases,
CoreFacts reduces the mass by as much as 60%.
i
i
i
i
!
!
I
I
Data Conversion:
Once the data has been reduced, CoreFacts converts the data into a format that can be
used by the chosen document management system.
Data Delivery, Review and Production:
CoreFacts helps clients choose the appropriate vehicle for storing and managing the data.
We can create customized systems to reduce costs and provide efficiencies. Or, we will
contract with a system vendor, supervise its work, act as a liaison throughout the project,
and testify about the handling of the data when needed. We will also provide and
configure computers for our clients.
I
I
I
I
I
I
I
I
COZEN
O’CONNOR
ATTORNEYS
E-DIsCOVERY PROCESSES MATRIX
presented/~v
JOHN F. ASHLEY
COREFACTS
14030 Thunderbolt Place, Suite 700
Chantilly, Virginia 20151
(703) 375-4340
jashley@corefacts.net
www.corefacts.net
!
!
m
!
N
~
I
I
I
I
I
I
I
I
!
i
I
I
I
I
I
I
I
i
o~e ~
i
I
I
I
I
I
I
I
I
!
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
i
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
l
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
COZEN
O’CONNOR
ATTORNEYS
UNIFORM TRADE SECRETS ACT
(12 PA.C.S. § 5301 (2004))
COZEN O’CONNOR
1900 Market Street
Philadelphia, PA 19103
(215) 665-2000 or (800) 523-2900
www.cozen.com
Atlanta
Charlotte
Cherry Hill
Chicago
Dallas
Denver
Houston
Las Vegas*
London
Los Angeles
New York
Newark
Philadelphia
San Diego
San Francisco
Seattle
Trenton
Washington, DC
West Conshohocken
Wichita
Wilmington
*Affiliated with the Law Offices of J. Goldberg & D. Grossman.
These materials are intended to generally educate the participants on current legal issues. They are not intended to provide
legal advice. Accordingly, these materials should not be relied upon without seeking specific legal advice on matters discussed
herein.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
LEXSTAT 12 PS 5301
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5301 (2004)
§ 5301. Short title of chapter
This chapter shall be known and may be cited as the Uniform Trade Secrets Act.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eff. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
1. 1 P.L.E. CRIMINAL LAW § 1591, Pennsylvania Law Encyclopedia, CRIMINAL LAW, § 1591 General
Considerations, Copyright 2004, Matthew Bender & Company, Inc., a member of the LexisNexis Group..
2. 1 P.L.E. TORTS § 7, Pennsylvania Law Encyclopedia, TORTS, § 7 Interference with Legal Right, Copyright 2004,
Matthew Bender & Company, Inc., a member of the LexisNexis Group..
3.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.02, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, State Statutes, Pennsylvania Transaction Guide--Legal Forms.
4.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.41, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Covenants to Protect Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
5.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.273, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Provision Specifying Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
6. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.04, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, State Statutes, Pennsylvania Transaction Guide--Legal Forms.
I
I
I
!
!
I
I
I
I
!
I
I
I
I
Page 2
12 Pa.C.S. § 5301
7. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.20, UNIT 3 COMMERCIAL TRANSACTIONS,
Divis ion 3 Business and Consumer Relations, Common Law Claims, Pennsylvania Transaction Guide--Legal Forms.
8. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
LEXSTAT 12 PS 5302
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5302 (2004)
§ 5302. Definitions
The following words and phrases when used in this chapter shall have the meanings given to them in this section
unless the context clearly indicates otherwise:
"Improper means." Includes, but is not limited to, theft, bribery, misrepresentation, breach or inducement of a breach
of a duty to maintain secrecy or espionage through electronic or other means.
"Misappropriation." Includes:
(1) acquisition of a trade secret of another by a person who knows or
has reason to know that the trade secret was acquired by improper
means; or
(2) disclosure or use of a trade secret of another without express or
implied consent by a person who:
(i) used improper means to acquire knowledge of the trade secret;
(ii) at the time of disclosure or use, knew or had reason to know
that his knowledge of the trade secret was:
(A) derived from or through a person who had utilized improper
means to acquire it;
(B) acquired under circumstances giving rise to a duty to maintain
its secrecy or limit its use; or
(C) derived from or through a person who owed a duty to the person
seeking relief to maintain its secrecy or limit its use; or
(iii) before a material change of his position, knew or had reason to
know that it was a trade secret and that knowledge of it had been
I
I
I
I
I
I
I
I
I
I
!
I
I
I
i
Page 2
12 Pa.C.S. § 5302
acquired by accident or mistake.
"Person." A natural person, corporation, business trust, estate, trust, partnership, association, joint venture,
government, governmental subdivision or agency or any other legal or commercial entity.
"Trade secret." Information, including a formula, drawing, pattern, compilation including a customer list, program,
device, method, technique or process that:
(1) Derives independent economic value, actual or potential, from not
being generally known to, and not being readily ascertainable by proper
means by, other persons who can obtain economic value from its
disclosure or use.
(2) Is the subject of efforts that are reasonable under the
circumstances to maintain its secrecy.
"Willful and malicious." Such intentional acts or gross neglect of duty as to evince a reckless indifference of the rights
of others on the part of the wrongdoer, and an entire want of care so as to raise the presumption that the person at fault
is conscious of the consequences of his carelessness.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eff. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
1.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.41, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Covenants to Protect Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
2.9-144 Pemasylvania Transaction Guide--Legal Forms § 144.272, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Provision Containing Covenant Not to Solicit Employer’s Customers,
Pennsylvania Transaction Guide--Legal Forms.
3.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.273, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Provision Specifying Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
4. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
I
I
i
I
LEXSTAT 12 PS 5303
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
I
I
!
I
I
I
I
I
I
I
I
I
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5303 (2004)
§ 5303. Injunctive relief
(a) INJUNCTIONS.-- Actual or tlueatened masappropriation may be enjoined. Upon application to the court, an
injunction shall be terminated when the trade secret has ceased to exist, but the injunction may be continued for an
additional reasonable period of time in order to eliminate commercial advantage that otherwise would be derived from
the misappropriation.
(b) EXCEPTIONAL CIRCUMSTANCES.-- In exceptional circumstances, an injunction may condition future use
upon payment of a reasonable royalty for no longer than the period of time for which use could have been prohibited.
Exceptional circumstances include, but are not limited to, a material and prejudicial change of position prior to
acquiring knowledge or reason to know of misappropriation that renders a prohibitive injunction inequitable.
(c) AFFIRMATIVE ACTS COMPELLED BY COURT ORDER.-- In appropriate circumstances, affirmative acts to
protect a trade secret may be compelled by court order.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eff. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
1.9-144 Pelmsylvania Transaction Guide--Legal Forms § 144.41, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Covenants to Protect Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
2. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
I
i
I
!
I
i
I
I
I
I
I
!
I
I
I
LEXSTAT 12 PS 5304
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5304 (2004)
§ 5304. Damages
(a) MONETARY DAMAGES.-- Except to the extent that a material and prejudicial change of position prior to
acquiring knowledge or reason to know of misappropriation renders a monetary recovery inequitable, a complainant is
entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropriation
and the unjust enrictunent caused by misappropriation that is not taken into account in computing actual loss. In lieu of
damages measured by any other methods, the damages caused by misappropriation may be measured by imposition of
liability for a reasonable royalty for a misappropriator’s unauthorized disclosure or use of a trade secret.
(b) EXEMPLARY DAMAGES.-- If willful and malicious misappropriation exists, the court may award exemplary
damages in an amount not exceeding twice any award made under subsection (a).
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eft’. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
t. 9-144 Pennsylvania Transaction Guide--Legal Forms § 144.41, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures; Covenants to Protect Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
2. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
I
I
I
I
I
l
I
I
I
I
I
LEXSTAT 12 PS 5305
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5305 (2004)
§ 5305. Attorney fees
A court may award reasonable attorney fees, expenses and costs to the prevailing party:
(1) ifa claim of misappropriation is made in bad faith;
(2) a motion to terminate an injunction is made or resisted in bad
faith; or
(3) willful and malicious rmsappropriation exists.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eff. in 60 days.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
LEXSTAT 12 PS 5306
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5306 (2004)
§ 5306. Preservation of secrecy
In any action under this chapter, a court shall preserve the secrecy of an alleged trade secret by reasonable means
which may include, but are not limited to, granting protective orders in connection with discovery proceedings, holding
in camera hearings, sealing the records of the action and ordering any person involved in the litigation not to disclose an
alleged trade secret without prior court approval.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eff. in 60 days.
I
I
I
I
I
I
l
I
I
I
I
I
I
LEXSTAT 12 PS 5307
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5307 (2004)
§ 5307. Statute of limitations
An action under this chapter for masappropriation must be brought within three years after the misappropriation was
discovered or by the exercise of reasonable diligence should have been discovered.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, elf. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
1. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
LEXSTAT 12 PS 5308
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 12. COMMERCE AND TRADE
PART V. [MISCELLANEOUS PROVISIONS]
CHAPTER 53. TRADE SECRETS
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
12 Pa.C.S. § 5308 (2004)
§ 5308. Effect on other law
(a) GENERAL RULE.-- Except as provided in subsection (b), this chapter displaces conflicting tort, restitutionary
and other law of this Comlnonwealth providing civil remedies for misappropriation of a trade secret.
(b) EXCEPTIONS.-- This chapter does not affect:
(1) contractual remedies, whether or not based upon misappropriation of
a trade secret;
(2) other civil remedies that are not based upon misappropriation of a
trade secret; or
(3) criminal remedies, whether or not based upon misappropriation of a
trade secret.
HISTORY: Act 2004-14 (S.B. 152), § 1, approved Feb. 19, 2004, eff. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
1. 1 P.L.E. CRIMINAL LAW § 1591, Pennsylvania Law Encyclopedia, CRIMINAL LAW, § 1591 General
Considerations, Copyright 2004, Matthew Bender & Company, Inc., a member of the LexisNexis Group..
2. 1 P.L.E. TORTS § 7, Pennsylvania Law Encyclopedia, TORTS, § 7 Interference with Legal Right, Copyright 2004,
Matthew Bender & Company, Inc., a member of the LexisNexis Group..
3.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.41, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Covenants to Protect Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Page 2
12 Pa.C.S.§ 5308
4. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.20, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Common Law Claims, Pennsylvania Transaction Guide--Legal Forms.
5. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
COZEN
O’CONNOR
ATTORNEYS
THEFT OF TRADE SECRETS
(18 PA.C.S. § 3930 (2004))
COZEN O’CONNOR
1900 Market Street
Philadelphia, PA 19103
(215) 665-2000 or (800) 523-2900
w~vw.cozen.com
Atlanta
Charlotte
Cherry Hill
Chicago
Dallas
Denver
Houston
Las Vegas*
London
Los Angeles
New York
Newark
Philadelphia
San Diego
San Francisco
Seattle
Trenton
Washington, DC
West Conshohocken
Wichita
Wilmington
*Affiliated with the Law Offices of J. Goldberg & D. Grossman.
These materials are intended to generally educate the participants on current legal issues. They are not intended to provide
legal advice. Accordingly, these materials should not be relied upon without seeking specific legal advice on malters discussed
herein.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
LEXSTAT 18 PS 3930
PENNSYLVANIA STATUTES, ANNOTATED BY LEXISNEXIS(R)
* THIS SECTION IS CURRENT THROUGH ACT 146 OF THE 2004 LEGISLATIVE SESSION *
*** With exceptions as detailed in the Online Product Guide ***
*** FEBRUARY 2005 ANNOTATION SERVICE ***
PENNSYLVANIA CONSOLIDATED STATUTES
TITLE 18. CRIMES AND OFFENSES
PART II. DEFINITION OF SPECIFIC OFFENSES
ARTICLE C. OFFENSES AGAINST PROPERTY
CHAPTER 39. THEFT AND RELATED OFFENSES
SUBCHAPTER B. DEFINITION OF OFFENSES
GO TO CODE ARCHIVE DIRECTORY FOR THIS JURISDICTION
18 Pa.C.S. § 3930 (2004)
§ 3930. Theft of trade secrets
(a) FELONY OF THE SECOND DEGREE.-- A person is guilty of a felony of the second degree if he:
(1) by force or violence or by putting him in fear takes from the
person of another any article representing a trade secret;
(2) willfully and maliciously enters any building or other structure
with intent to obtain unlawful possession of, or access to, an article
representing a trade secret; or
(3) willfully and maliciously accesses any computer, computer network
or computer system, whether in person or electronically, with the
intent to obtain unlawful possession of, or access to, an article
representing a trade secret.
(b) FELONY OF THE THIRD DEGREE.-- A person is guilty of a felony of the third degree if he, with intent to
wrongfully deprive of, or withhold from the owner, the control of a trade secret, or with intent to wrongfully appropriate
a trade secret for his use, or for the use of another:
(1) unlawfully obtains possession of, or access to, an article
representing a trade secret; or
(2) having lawfully obtained possession of an article representing a
trade secret, or access thereto, converts such article to his own use
or that of another person, while having possession thereof or access
thereto makes, or causes to be made, a copy of such article, or
exhibits such article to another.
i
I
I
I
I
I
I
I
I
I
I
i
I
I
I
I
I
I
Page 2
18 Pa.C.S. § 3930
(c) FURTHER DISPOSITION IRRELEVANT.-- The crime or crimes defined in subsections (a) and (b) of this
section shall be deemed complete without regard to the further disposition, return, or intent to return, of the article
representing a trade secret.
(d) DEFENSE.-- It shall be a complete defense to any prosecution under subsection (b) of this section for the
defendant to show that information comprising the trade secret was rightfully known or available to him from a source
other than the owner of the trade secret.
(e) DEFINITIONS.-- As used in this section the following words and phrases shall have the meanings given to them
in this subsection:
"Article." Any object, material, device or substance or copy thereof, including any writing, record, recording,
drawing, description, sample, specimen, prototype, model, photograph, microorganism, blueprint or map.
"Computer." An electronic, magnetic, optical, hydraulic, organic or other high-speed data processing device or system
which performs logic, arithmetic or memory functions and includes all input, output, processing, storage, software or
communication facilities which are connected or related to the device in a system or network.
"Computer network." The interconnection of two or more computers through the usage of satellite, microwave, line or
other communication medium.
"Computer system." A set of related, connected or unconnected computer equipment, devices and software.
"Copy." Any facsimile, replica, photograph or reproduction of, an article, or any note, drawing, sketch, or description
made of, or from an article.
"Representing." Describing, depicting, containing, constituting, reflecting or recording.
"Trade secret." The whole or any portion or phase of any scientific or technical information, design, process,
procedure, formula or improvement which is of value and has been specifically identified by the owner as of a
confidential character, and which has not been published or otherwise become a matter of general public knowledge.
There shall be a rebuttable presumption that scientific or technical information has not been published or otherwise
become a matter of general public knowledge when the owner thereof takes measures to prevent it from becoming
available to persons other than those selected by him to have access thereto for limited purposes.
(f) CONSTRUCTION.-- Nothing in this section shall be construed to interfere with or prohibit terms or conditions in
a contract or license related to a computer, a computer network or computer software.
HISTORY: Act 2004-14 (S.B. 152), § 2, approved Feb. 19, 2004, elf. in 60 days.
LexisNexis (R) Notes:
TREATISES AND ANALYTICAL MATERIALS
1. 1 P.L.E. CRIMINAL LAW § 1591, Pennsylvania Law Encyclopedia, CRIMINAL LAW, § 1591 General
Considerations, Copyright 2004, Matthew Bender & Company, Inc., a member of the LexisNexis Group..
2. 1 P.L.E. LABOR § 22, Pennsylvania Law Encyclopedia, LABOR, § 22 Trade Secrets of Employer, Copyright 2004,
Matthew Bender & Company, Inc., a member of the LexisNexis Group..
3. 1 P.L.E. TORTS § 7, Pennsylvania Law Encyclopedia, TORTS, § 7 Interference with Legal Right, Copyright 2004,
Matthew Bender & Company, Inc, a member of the LexisNexis Group..
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Page 3
18 Pa.C.S. § 3930
4. 9-144 Pennsylvania Transaction Guide--Legal Forms § 144.41, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Covenants to Protect Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
5.9-144 Pennsylvania Transaction Guide--Legal Forms § 144.273, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 2 Business Contracts and Procedures, Provision Specifying Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
6. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.04, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, State Statutes, Pennsylvania Transaction Guide--Legal Forms.
7. 10-161 Pennsylvania Transaction Guide--Legal Forms § 161.24, UNIT 3 COMMERCIAL TRANSACTIONS,
Division 3 Business and Consumer Relations, Misappropriation of Trade Secrets, Pennsylvania Transaction Guide-Legal Forms.
PRINCIPAL OFFICE
PHILADELPHIA
1900 Market Street
Philadelphia, PA 19103-3508
Tel: 215.665.2000 or 800.523.2900
Fax: 215.665.2013
For general information please contact:
Joseph A. Gerber, Esq.
ATLANTA
Suite 2200, SunTrust Plaza
303 Peachtree Street, NE
Atlanta, GA 30308-3264
Tel: 404.572.2000 or 800.890.1393
Fax: 404.572.2199
Contact: Michael A. McKenzie, Esq.
CHARLOTI’E
Suite 2100, 301 South College Street
Charlotte, NC 28202-6037
Tel: 704.376.3400 or 800.762.3575
Fax: 704.334.3351
Contact: Jay M. Goldstein, Esq.
CHERRY HILL
Suite 300, LibertyView
457 Haddonfield Rood, P.O. Box 5459
Cherry Hill, NJ 08002-2220
Tel: 856.910.5000 or 800.989.0499
Fax: 856.910.5075
Contact: Thomas McKay, III, Esq.
CHICAGO
Suite 1500, 222 South Riverside Plaza
Chicago, IL 60606-6000
Tel: 312.382.3100 or 877.992.6036
Fax: 312.382.8910
Contact: James I. Tarman, Esq.
DALLAS
2300 BankOne Center, 1717 Main Street
Dallas, TX 75201-7335
Tel: 214.462.3000 or 800.448.1207
Fax: 214.462.3299
Contact: Lawrence T. Bowman, Esq.
DENVER
707 17th Street, Suite 3100
Denver, CO 80202
Tel: 720.479.3900 or 877.467.0305
Fax: 720.479.3890
Contact: Brad W. Breslau, Esq.
HOUSTON
1 Houston Center
1221 McKinney, Suite 2900
Houston, TX 77010
Tel.: 832.214.3900 or 800.448.8502
Fax: 832.214.3905
Contact: Susan Noe, Esq.
SEATI’LE
Suite 5200, Washington Mutual Tower
1201 Third Avenue
Seattle, WA 98101-3071
Tel: 206.340.1000 or 800.423.1950
Fax: 206.621.8783
Contact: Daniel Theveny, Esq.
LAS VEGAS*
601 South Rancho, Suite 20
Las Vegas, NV 89106
Tel: 800.782.3366
Contact: Joseph Goldberg, Esq.
*Affiliated with the law offices of J. Goldberg,
and D. Grossman.
TRENTON
144-B West State Street
Trenton, NJ 08608
Tel: 609.989.8620
Contact: Jeffrey L. Nash, Esq.
LOS ANGELES
Suite 2850, 777 South Figueroo Street
Los Angeles, CA 90017-5800
Tel: 213.892.7900 or 800.563.1027
Fax: 213.892.7999
Contact: Mark S. Roth, Esq.
LONDON
Tower 42 Level 27, 25 Old Brood Street
London, UK
EC2N 1HQ
Tel: 011.44.20.7864.2000
Fax: 011.44.20.7864.2013
Contact: Richard F. Allen, Esq.
NEW YORK
16th Floor, 45 Broodway
New York, NY 10006-3792
Tel: 212.509.9400 or 800.437.7040
Fax: 212.509.9492
Contact: Michael J. Sommi, Esq.
NEWARK
Suite 1900, One Newark Center
1085 Raymond Boulevard
Newark, NJ 07102-5211
Tel: 973.286.1200 or 888.200.9521
Fax: 973.242.2121
Contact: Brian J. Coyle, Esq.
SAN DIEGO
Suite 1610, 501 West Broodway
San Diego, CA 92101-3536
Tel: 619.234.1700 or 800.782.3366
Fax: 619.234.7831
Contact: Joonn Selleck, Esq.
SAN FRANCISCO
Suite 2400, 425 California Street
San Francisco, CA 94104-2203
Tel: 415.617.6100 or 800.818.0165
Fax: 415.617.6101
Contact: Norman J. Ronneberg, Esq.
TORONTO
COZEN O’COI’@,IOR SUBROGATION SERVICES
Canada Trust Tower, BCE Place, 27th Floor
161 Bay Street
Toronto, Ontario MSJ 2S1
Tel: 416.572.2127
Fax: 416.572.2201
Contact: Vincent McGuinness, Jr./Elaine M. Rinald
WASHINGTON, DC
Suite 500, 1667 K Street, NW
Washington, DC 20006-1605
Tel: 202.912.4800 or 800.540.1355
Fax: 202.912.4830
Contact: Matthew G. Ash, Esq.
WEST CONSHOHOCKEN
Suite 400, 200 Four Falls Corporate Center
P.O. BOx 800
West Conshohocken, PA 19428-0800
Tel: 610.941.5400 or 800.379.0695
Fax: 610.941.0711
Contact: Ross Weiss, Esq.
WICHITA
New England Financial Building
8415 E. 21 st Street North, Suite 220
Wichita, KS 67226
Tel: 316.609.3380
Fax: 316.634.3837
Contact: Kenneth R. Lang, Esq.
WILMINGTON
Suite 1400, Chase Manhattan Centre
1201 North Market Street
Wilmington, DE 19801-1147
Tel: 302.295.2000 or 888.207.2440
Fax: 302.295.2013
Contact: Mark E. Felger, Esq.
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Download