Trade Secrets Law 201 - Association of Corporate Counsel

advertisement
Association of Corporate Counsel
August 19, 2015
Trade Secrets Law 201:
Developing Issues in Protecting Company Proprietary
Information
Wayne Gross, Esq.
Michael Katz, Esq.
Partner
Greenberg Gross LLP
Partner
Greenberg Gross LLP
Data Points on Trade Secret Theft Issues
• US companies: $5 trillion in trade secret
assets
• Theft of trade secrets cost U.S. businesses
$160-500 billion/yr.
• Will increase exponentially over next decade
Greenberg Gross LLP | GGTrialLaw.com
2
Profile of IP Thieves
• Technical positions
• male employee, 37 yrs.
• Has IP agreements
• At time of theft
• 65% of employees already accepted positions with a
competitor or started their own company
Greenberg Gross LLP | GGTrialLaw.com
3
Profile of IP Theft
Trade Secrets Make Up 52% Of All IP stolen
• Billing info, price lists, administrative data (30%)
• Source code (20%)
• Proprietary software (14%)
• Customer information (12% )
• Business plans (6% )
Greenberg Gross LLP | GGTrialLaw.com
4
Profile of IP Theft
Insiders use technical means to steal IP
• 54% of subjects used a network (email, a remote
network access channel, or network file transfer) to
remove stolen data.
• Steal what they have authorized access to
Greenberg Gross LLP | GGTrialLaw.com
5
What can you do to protect your company’s trade secrets?
1.
Update/communicate policies
2.
Maintain enforceable agreements
3.
Build a culture of confidentiality
4.
Protect use of smartphones
5.
Preserve Evidence
6.
Conduct Exit interviews
7.
Be Aware of Social Media Pitfalls
8.
Enforce your rights
9.
Manage Inbound Risks
10.
Conduct audits
Greenberg Gross LLP | GGTrialLaw.com
6
1 - Update and Enforce Policies
• Update electronic monitoring policies.
• Publish and enforce IT acceptable use policies
– email
– Internet
– social media
– mobile devices (“BYOD”)
Greenberg Gross LLP | GGTrialLaw.com
7
2 – Ensure Enforceable Agreements
• Employee confidentiality, nondisclosure,
noncompetition, and non-solicitation agreements.
• Avoid everything but the kitchen sink; if everything is
“confidential” then nothing is.
Greenberg Gross LLP | GGTrialLaw.com
8
2 – Ensure Enforceable Agreements - SEC
• SEC recently found Confidentiality Agreements used in
internal audits violated whistleblower protections
• Required a “whistleblower carveout”
• Nothing in agreement interferes with right under any
whistleblower provision of any federal law or reg.
Greenberg Gross LLP | GGTrialLaw.com
9
3 - Build a Culture of Confidentiality
– Establishing “dos and don’ts”
– Explain consequences of disclosures
– Treat confidential information consistently
 Secure confidential files
 Need to know basis
 Use security or encryption features
 label information as “CONFIDENTIAL” or “TRADE SECRET”
– Periodically have employees acknowledge obligations in
writing.
Greenberg Gross LLP | GGTrialLaw.com
10
4 - Be Smart About Smartphones
Company-Issued Device
Bring Your Own Device (BYOD)
Pros:
Pros:
•
Stronger data protection.
•
Reduces employer expenses
•
Helps fight alleged claims of offthe-clock work when companyissued devices are only given to
those employees required to use
them.
•
Increase employee satisfaction
Cons:
•
Increase cost of devices and
administration
Greenberg Gross LLP | GGTrialLaw.com
Cons:
•
Risk losing control over confidential
information and data if a welldrafted BYOD policy is not in place.
• Greater risk of
misappropriation.
11
Measures to Prevent Employee Disclosure of
Company Data Via Smartphone
• Remote wiping
• Limit downloading apps
• return of company devices and content.
• Electronic monitoring and privacy policies
• require encryption for travel or mandate use of a
“clean” device.
Greenberg Gross LLP | GGTrialLaw.com
12
BYOD: Reasonable Efforts to Preserve Secrecy
Wayman Fire Protection, Inc. v. Premium Fire & Security, LLC, (Del.
Ch. Mar. 5, 2014)
• “merely password protecting” information not “reasonable
efforts to protect the confidentiality of that information”
PatientPoint Network Solutions, LLC v. Contextmedia, Inc., (S.D. Oh.,
Mar. 21, 2014)
• No written demand upon termination for return of
confidential information or devices
• separation agreement lacked nondisclosure provision
Greenberg Gross LLP | GGTrialLaw.com
13
BYOD: Reasonable Efforts to Preserve Secrecy
Art of Living Foundation v. Does (N.D. Cal. 5/1/12)
• Advising employees that info is a trade secret
• Limiting access on a “need to know” basis
• Requiring confidentiality agreements
• Keeping secret documents under lock
Greenberg Gross LLP | GGTrialLaw.com
14
BYOD & Reasonable Efforts
• Detailed Agreement providing employer control of
devices, and consistent application. City of Ontario v.
Quon, 560 U.S. 746, 760 (2010)(“employer policies
concerning communications will of course shape the
reasonable expectations of their employees, especially
to the extent that such policies are clearly
communicated.”)
•
•
•
•
Orientation/Training
Audits/Reminders
Device Security
Exit Procedures
Greenberg Gross LLP | GGTrialLaw.com
15
BYOD – Device Security
•
•
•
•
•
mobile device management software
sandbox technology
Require password protection
mandate encryption of corporate data stored on the device
permit company monitoring of the device, including any
data stored on or transmitted from it
• clarify no right to privacy if used for work purposes
• permit remote wiping in event device is lost or stolen
• permit the company to access the device to copy data to
meet litigation/discovery obligations
Greenberg Gross LLP | GGTrialLaw.com
16
BYOD – Device Security
• Require reporting of lost devices
• Prohibit sharing with friends/family
• No use as wi-fi hotspot
• No synching with servers/devices co. does not control
• Restrict software/applications
• Changing/disposal of devices by employees
Greenberg Gross LLP | GGTrialLaw.com
17
BYOD – Consequences
• Cost of Discovery
• Sanctions
• Credibility of Company Witnesses
• Finding of Failure to Preserve Secrecy
• Terminating Sanctions?
• Bad Faith Prosecution?
• Malpractice?
Greenberg Gross LLP | GGTrialLaw.com
18
EID: Employer Issued Devices
• EID allows employer to control use for business
purposes and limit expectation of privacy.
• Is Cost Truly Greater?
– Direct cost savings of BYOD has been reduced because
cell phone reimbursement is now expressly required.
Cochran v. Schwan’s Home Service, Inc., 228 Cal.App.4th
1137 (2014)(“An employee need only show that he or she
was required to use a personal cell phone to make workrelated calls”).
– Externalities: Hidden costs of BYOD
Greenberg Gross LLP | GGTrialLaw.com
19
5 - Devices & the Duty to Preserve
Williams v. Russ, 167 Cal. App. 4th 1215 (2008)
• Failure to preserve is intentional destruction and raises inference that
after cherry-picking favorable information, the party charged with
spoliation chose to allow rest of the information be destroyed.
Jones v. Bremen High School Dist. 228 2010 U.S. Dist. LEXIS 51312 (N.D. Il.
2010)
• On a motion for sanctions for failure to preserve, the failure to issue a
litigation hold establishes harm to the moving party because distinct
possibility that evidence relevant to moving party’s case was
destroyed.
Small v. Univ. Medical Center of Southern Nevada, 2014 U.S. Dist. LEXIS
114406 (D. Nev. 2014)
• case-ending discovery sanctions for failure to institute timely and
effective litigation hold, which resulted in spoliation of several classes
of electronically stored information.
Greenberg Gross LLP | GGTrialLaw.com
20
5 - Devices & the Duty to Preserve
Christou v. Beatport, LLC, 2013 U.S. Dist. LEXIS 9034 (D. Colo. Jan. 23,
2013)
• Sanction: jury instruction that adverse inference for failing to preserve
text messages lost while under litigation hold.
• Defendant stated they “found no responsive text messages,” but failed
to state whether counsel had reviewed the phone.
In Re Pradaxa (Dabigatran Etexilate) Products Liability Litigation, MDL
No. 2385 (S.D. Ill. Dec. 9, 2013)
• Court ordered production of business-related text messages on
employee-owned phones
• rejected argument that the failure to preserve text messages should
not be sanctioned because burdensome
• rejected argument that employees were reluctant to turn over their
personal phones, finding that the litigation hold and production
obligations apply
Greenberg Gross LLP | GGTrialLaw.com
21
5 - Devices & the Duty to Preserve
Barrette Outdoor Living, Inc. v. Michigan Resin Representatives, No.
11-13335 (E.D. Mich. April 26, 2013)
• Court sanctioned plaintiff’s former employee because he disposed
of his cell phone after his duty to preserve arose.
• PTSI, Inc. v. Haley, No. 684 WDA 2012 (Pa. Super. Ct. May 24, 2013)
• Court declined to impose spoliation sanctions against two
defendants who deleted text messages from their smart phones.
• defendants routinely deleted text messages from their phones to
free up storage space and there was “no showing that the innocent
cleanup of personal electronic devices to allow them to function
was unusual, unreasonable or improper under the circumstances.”
Greenberg Gross LLP | GGTrialLaw.com
22
6- Maximize the exit interview
• Identify and obtain return of property
• Exit interview checklist addressing trade secrets:
– Where employee is going to work and do duties relate to
his/her job with your company
– Confirm employee has returned all company equipment and
property
– any company information on any external media/pcs etc..
– Provide copy of agreements/ policies re: confidential
information
– Remind of legal duty not to use or disclose any trade secrets
– Record time and place of interview.
• Have the employee sign an exit interview acknowledgement
form.
Greenberg Gross LLP | GGTrialLaw.com
23
7- Watch Out for Social Media Pitfalls
• Employees may disclose confidential information on
social media
• Under most circumstances, an employer can fire an
employee
• But National Labor Relations Act, e.g. leaking trade
secrets on FB page in a group discussion about working
conditions
• Advise that disclosure could result in termination
Greenberg Gross LLP | GGTrialLaw.com
24
8 – Enforce Your Rights
• Prompt action is critical
• Analyze risk to determine course of action
– involve IT/forensic vendor early to preserve
evidence and investigate
– Initiate a litigation hold
– Involve outside counsel
– Involve business decision makers
Greenberg Gross LLP | GGTrialLaw.com
25
8 - Enforce Your Rights
• Cease-and-desist letter
• Notice to new employer
• Preservation letter
• Lawsuit
• TRO/Injunctive Relief
• Criminal prosecution
Greenberg Gross LLP | GGTrialLaw.com
26
8 - Enforce Your Rights: Criminal Prosecution
• Federal Bureau of Investigation (FBI)
• Homeland Security: US Imm. and Customs Enforcement (ICE)
• Dept. of Comm.: Bureau of Industry and Security (BIS)
• Pentagon’s Defense Criminal Investigative Service (DCIS)
Greenberg Gross LLP | GGTrialLaw.com
27
8 – Enforce Your Rights - Criminal Prosecution
ADVANTAGES
• Evidence gathering: e.g., search warrants; wiretapping
• Defendant risks perjury or obstruction charges if fails
to cooperate;
• Seizure of property early
• Victim restitution includes cost of investigations
Greenberg Gross LLP | GGTrialLaw.com
28
8. Enforce Your Rights: Criminal Prosecution
DISADVANTAGES
• Long time frame
• No control over process
• Government may investigate you!
• Burden of proof is beyond reasonable doubt
Greenberg Gross LLP | GGTrialLaw.com
29
8 - Enforce your rights: TRO?
• USE FORENSIC EXPERT TO SHOW BAD ACTS
– Metadata analysis
– File deletion activity
– Chronology of electronic documents movement across
different storage media
 Timing of Attachment of USB storage drives
– Analysis of authors/editors of key electronic documents
– Timing of opening or printing specific documents
– Use of wiping of any media
Greenberg Gross LLP | GGTrialLaw.com
30
9 - Managing Inbound Risks
• Defense wins championships.
– Make clear in interview and offer letter/employment
agreement the prohibition against possession or use of
confidential information from prior employers.
– Ask if candidate is bound by any restrictive agreements.
– Have legal counsel review restrictive agreements.
– Confirm candidate has complied with any restrictions on
use of confidential information and the return of company
property.
– Do not ask the candidate about specific proprietary
information.
Greenberg Gross LLP | GGTrialLaw.com
31
9 - Managing Inbound Risks
• Document Prophylactic Measures
– Make clear candidate can be fired for using another
company’s confidential information.
– Have new employee acknowledge in writing he/she
will not use and has not retained another company’s
confidential information
– Monitor to ensure no use of a competitor’s
information.
– Have IT verify whether new employee has imported
any questionable information on to the company’s
system
Greenberg Gross LLP | GGTrialLaw.com
32
10 – Conduct audits
• Publicly traded cos. must identify and value its ip
• Audit should cover entire business
• Audit team should be inclusive
• Conduct periodic review audits
Greenberg Gross LLP | GGTrialLaw.com
33
Federalizing Trade Secret Law
• Trade Secrets = only IP governed by state law
• Perceived shortfalls in state law
• Lack of uniformity
• Inadequate remedies for int’l espionage
Greenberg Gross LLP | GGTrialLaw.com
34
Federalizing Trade Secret Law
• Defend Trade Secrets Act of 2015
– Tracks the UTSA
– Provides ex parte applications for seizure of
property (including electronic data) used to
facilitate trade secret misappropriation
– Five year SOL period
– No preemption of state laws
Greenberg Gross LLP | GGTrialLaw.com
35
Federalizing Trade Secret Law
Problems
• Negative trade secrets – jurisdiction
under the Commerce Clause?
• No preemption of common law claims
• Federalization of state law issues, e.g.,
contract interpretation and breach of
fiduciary duty
Greenberg Gross LLP | GGTrialLaw.com
36
European Trade Secrets Directive
• Council of the EU draft legislation (May 2014) to create
uniform trade secret laws in Europe
• Unlawful = “any … conduct under the circumstances..
Considered contrary to honest commercial practices”
• Criticized for overly broad protections that would
interfere with the public interest
Greenberg Gross LLP | GGTrialLaw.com
37
Download