TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012 Overview of Trade Secret Protection Applicable Law • Statutory Basis —Uniform Trade Secrets Act (“UTSA”) Enacted by most of the 50 states. • Common Law (still the law in New York, for example) 2 © AIPLA 2012 Overview of Trade Secret Protection What is a trade secret? • Any information that: — (1) is secret; — (2) has commercial value derived from the fact that it is secret; and — (3) is the subject of reasonable efforts to be kept secret. UTSA 3 © AIPLA 2012 Overview of Trade Secret Protection • Definition of Misappropriation (UTSA) – Misappropriation means: • Improper acquisition -orImproper use -or• Improper disclosure 4 © AIPLA 2012 of a trade secret Overview of Trade Secret Protection Inevitable Disclosure Doctrine • Inevitable Disclosure Doctrine generally requires a showing that: — Departing employee knows former employer’s trade secrets; — Departing employee’s new job duties at competitor are so similar to those in former job that it would be extremely difficult for him to avoid relying on or using former employer’s trade secrets; and — Departing employee and new employer cannot be depended upon to avoid using former employer’s trade secrets. 5 © AIPLA 2012 Overview of Trade Secret Protection Why use trade secrets? • Most non-technical information not patentable • More than a year beyond patenting window — Note the absolute bar outside U.S. • Extended protection 6 © AIPLA 2012 Overview of Trade Secret Protection Jurisdictional Differences in Enforcement UTSA vs. non-UTSA States • Available remedies — UTSA (CA): Injunction and damages (actual loss, reasonable royalty, or punitive) provided by statute — Non-UTSA (NY): Variety of remedies including constructive trust • Criminal law protection — UTSA (CA): Available — Non-UTSA (NY): Not trade secrets, but larceny law protects “secret scientific material” 7 © AIPLA 2012 Overview of Trade Secret Protection When are your trade secrets at greatest risk? • Departing employees • Failed business dealings • Corporate espionage 70-80% of breaches are caused by insiders, often lower level employees, through carelessness, lack of training, or greed. 8 © AIPLA 2012 Internal Trade Secret Program Internal Trade Secret Procedures • Employment Practices • Confidentiality Program and Records Management • Monitoring and Auditing • Response procedures 9 © AIPLA 2012 Internal Trade Secret Program Employment Practices • Require all employees to sign confidentiality agreements — Acknowledging ownership of confidential information — Obligations during and after employment — Address IP assignment issues 10 © AIPLA 2012 Internal Trade Secret Program Confidentiality Program and Records Management • Identify and update secrets to be protected • Train employees and consultants on record-keeping • Limit Access — Meaningful difference between confidential and nonconfidential information • Physical Security — Restrict access to information and certain physical areas — Need to know basis — Security measures including locks, keys, shredding, dumpsters 11 © AIPLA 2012 Internal Trade Secret Program Monitoring and Auditing • Monitoring compliance (privacy issues) • Exit interview and related procedures — Return/seizure of all company property at termination, including electronic copies of materials 12 © AIPLA 2012 Internal Trade Secret Program • Monitoring and Auditing — Examples of questions to ask 13 • Is the information copied with a photocopier that is openly accessible? • Are the employees instructed not to discuss secret company projects in front of visitors, especially suppliers and vendors? • When employees violate such instructions, are they reprimanded? © AIPLA 2012 Internal Trade Secret Program Response Procedures • Response procedures when suspecting a departing employee taking confidential with him? – What to do immediately? • e.g., secure computer and other storage devices, access to email/network • e.g., suspend record destruction • Response procedures when a security breach caused by potential espionage is discovered? — Should one get law enforcement involved? 14 © AIPLA 2012 External Business Relationships: Collaboration Agreements Key Considerations • Any disclosure of proprietary information must be protected by written agreements • Must clearly define the scope of what is confidential • Must clearly define the purpose of the disclosure to the collaboration partner • Must clearly define the use that can be made with that information (including further disclosure) 15 © AIPLA 2012 External Business Relationships: Collaboration Agreements Exploratory Discussions: NDAs and Feasibility Studies • Narrow Disclosure – disclose only what is needed to achieve purpose — Disclosure may not lead to deal and potential partner is likely also considering competitors — NDA is critical not only for protecting trade secrets, but preserving patent rights — Keep most valuable (and enabling) information to yourself 16 — Example: results, but no methods, no formulas, compositions, etc. © AIPLA 2012 External Business Relationships: Collaboration Agreements Exploratory Discussions: NDAs and Feasibility Studies • Limit Right to Use and Disclose — To evaluate technology for purpose of business of business relationship — Limit sharing of information within each company • Limit Right for the NDA — Require return of any documents/presentation handouts • Don’t progress to the next stage without a new agreement 17 © AIPLA 2012 External Business Relationships: Collaboration Agreements Joint Work • Clearly define scope of disclosures — Limit disclosures to “need to know”; use point persons for party interface — Train your project team in what you consider proprietary and in what can and cannot be shared — Require written consent before any third party disclosures • Clearly define scope of use of confidential information — Define purpose of agreement — Define each party’s rights and responsibilities 18 © AIPLA 2012 External Business Relationships: Collaboration Agreements Joint Work • Build a record — Clearly identify and document all exchanges of Confidential Information — Keep written records of all internal work under the JDA. — Keep written records of all oral exchanges of information (including informal calls) and of all documents exchanged • Clearly define IP rights (including trade secrets and know-how) — Background IP rights — Joint discoveries and collaboration IP — Separate discoveries during collaboration term 19 — Require cooperation in patenting to avoid harm to respective patent portfolios © AIPLA 2012 External Business Relationships: Collaboration Agreements Joint Work • Be Vigilant — Monitor publications and presentations made by collaborator — Monitor patent filings — Periodically exercise audit or inspection rights — Track inventory and use of confidential information • Be wary of waiver 20 © AIPLA 2012 TRADE SECRETS Thank You Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 51 West 52nd Street New York, NY 10019 jcalvaruso@orrick.com 1-212-506-5140 www.orrick.com/ip 21 © AIPLA 2012