Nice People DO Finish Last: Protecting Your Assets Bernie Fuhs 313.225.7044 fuhs@butzel.com Presentation Highlights • Critical steps to protect your assets and relationships • Types of restrictive covenants (non-compete, nonsolicit, confidentiality) and Trade Secret law • Issues with Social Media • Practical issues with increasingly competitive job market • Action plan to keep the genie in the bottle Image courtesy of Walt Disney© Your Assets Are At Risk Three Critical Steps to Protect Them 1. Know what assets you have to protect 2. Available preventive measures to protect your assets 3. Immediate action/remedies when your assets are threatened What You Are Up Against Economic Times Good or Bad – Same Concern • Job hopping or looking for a better opportunity while preparing to leave when an opportunity arises • Increased movement in 2012 • All about the Benjamin’s “It has become appallingly obvious that our technology has exceeded our humanity.” ~Albert Einstein • 8 GB thumb drive = 10 CD-roms or 160,000 Word documents • Only $12.99 • $45-300 billion in annual losses due to trade secret misappropriation Why Do They Feel Justified Stealing Your Assets and Relationships? • The “justifier” (I built it, it’s mine) • The “thief” (no one will know if I take some information and contact these customers) • The “lawyer-wanna be” (can’t prevent me from doing this; those agreements I signed are not enforceable) • The “blissfully ignorant” (I didn’t know or think it was a big deal) STEP ONE Know What Assets and Relationships You Have to Protect Examples • • • • • Customer lists and information Engineering designs, processes, techniques Prices, costs, margins, mark-ups, “metrics” Internal weaknesses Marketing and strategic plans The Relationships = The Key to Success • • • • • • Customer Client Vendor Supplier Employee Consultant/contractor STEP TWO Preventive Measures to Protect Your Assets Restrictive Covenants • Non-Competition – Most effective protection – Subject to most scrutiny • Non-Solicitation – Typically easier to enforce than non-compete – More geared towards protecting relationships • Confidentiality/Non-Disclosure – Generally easily enforceable – Less effective with trade-secret protection Practical Issues in Today’s Job Market • Increased movement in 2012 • More competition for top talent • Increased leverage for potential employees • Less willing to sign non-compete agreements Strategies to Deal with Practical Issues • “Team” approach – “We all sign them” – Protects all involved • Narrowly tailor the agreements – Duration – Geography (limited to customers and/or areas that person is responsible for and/or exposed) – Scope of activity (limited to types of projects, areas of responsibility, etc.) • Communication • Additional consideration Enforceability of Restrictive Covenants • Be aware of Employee location - certain states look unfavorably upon non-competition covenants (i.e. California, Oklahoma, North Dakota, ) • Some states will “blue pencil”; some will not • Movement towards making non-competition agreements easier to enforce (i.e. Texas, Georgia) Trade Secret Law (works with non-compete/non-solicit agreements) • UTSA – The Uniform Trade Secrets Act (UTSA) (in place in 46 states except MA, NJ, NY, and TX) defines a trade secret as: – information, including a formula, pattern, compilation, program, device, method, technique, or process, that is both of the following: • Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use. • Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. The Growth of Social Media • Facebook – Over 1 billion users • LinkedIn – Over 175 million users • Twitter – Over 500 million users • Google+ - Over 400 million users Image courtesy of Vabulous Media© Who Owns the Social Media Accounts? • Social media accounts MAY be considered protectable trade secrets • Outline ownership and access at the outset of employment if at all possible • Beware of demanding or even asking for usernames and passwords to social media accounts (Social Media Privacy Bills – including Michigan) Solicitation - Practical Advice • Scarcity of case law on emerging technology • Predict outcomes based on existing case law – – Solicit via FB message = soliciting by email DiFonzo (Mass) – FB announcement by new employer = no solicitation • It’s the substance of the message (same look), not the medium (different name) • Who initiated the contact and what was the substance of the contact “It’s the same look!” Planning/Preparation – Be Proactive • Worry about misappropriation of your assets the day that you hire – not the day that you terminate or he resigns • Consult with the experts – legal and business • Engage your experts (legal and business) to conduct an audit Planning/Preparation – Be Proactive • Take inventory of the assets & relationships to protect • Take inventory of what protections in place • Understand the weapons available to you – agreements, statutes, business solutions Available Weapons – Reasonable Steps for Protection • Appropriate agreements (one size does not fit all) • Information storage – locked or passwordprotected • Limited, need-to-know access • Clear marking of confidential information • Visitor restrictions • Third-party confidentiality agreements • Employee policy on confidential information Available Weapons – Reasonable Steps for Protection • Routine verification of confidentiality procedures • Prohibiting removal of confidential information from company premises and limiting copying • Conducting exit interviews • Pursuit of departing employees with access to confidential information - consistent enforcement • Avoidance of industry wars – review of candidate’s restrictive covenants – Reps and warranties that candidate did not take and will not use previous employer’s information – Indemnification provisions Deploying Your Weapons – Implementation of Asset Security Plan • Require employees to sign your agreements • Obtain employee buy-in and be prepared to deal with resistance • Include appropriate language in your contracts (don’t forget vendor contracts, i.e., data security laws) • Take the steps necessary to guard the confidentiality of your information Avoid Unnecessary Disclosures & Inconsistency • Company brochures/product guides and websites • Customers/clients (and information conveyed to them) • Severance agreements superseding employment agreements void • Prior departures by similarly-situated employees • Resolution of prior non-compete/non-disclosure litigation • How many employees sign/do not sign similar agreements Exit Interview • New employment (where, what position) • Return of materials • Acknowledgment form • Social media accounts Beware of Disciplining Employees for Social Media Posts • NLRA Section 7 concerted activity • NLRB’s involvement and scrutiny of social media policies • Fine balance between disciplining employees and protecting trade secrets or enforcing agreements (use a disclaimer or savings clause)! Beware of Horizontal Non-Hire & NonSolicitation Agreements • Agreement with competitors not to hire or solicit each others employees is horizontal – Different concerns than typical employee (vertical) non-compete – Must be reasonably necessary to facilitate a pro-competitive agreement (ancillary) • May violate anti-trust laws • 2010 Silicon Valley Cases (DOJ v. Google, Apple Pixar, Adobe and Intel) – Alleges bilateral agreements to not “cold call” each other’s skilled (technical) employees; – Employers immediately settle with consent decree • Consent decree allows non-solicitations reasonably necessary for “a legitimate collaboration agreement” – Follow on class action lawsuits filed STEP THREE Immediate Actions/Remedies When Your Assets Are Threatened Action Plan • Critical to have experienced attorneys and business advisors prepare an action plan • Protocol for departing employee • Step-by-step actions identified for potential breach Your Assets Have Been Taken or Are at Risk – Now What? • Move quickly and aggressively (where appropriate) • Get your experts involved immediately • Preserve the evidence (electronic evidence is crucial – do not attempt to play Sherlock Holmes) Don’t Diddly Do! Image courtesy of Matt Groening and Fox© Final Pointers • • • • • • • • • • Police confidentiality measures Draft enforceable non-competes Beware of horizontal agreements with competitors Beware of social media issues Have a strategy in place for practical hiring issues Be cautious with subsequent agreements Make good termination/discipline decisions Consistently enforce Act swiftly Preserve all documents and computer evidence Questions? Bernie Fuhs 313.225.7044 fuhs@butzel.com