criminal consequences of trade secret misappropriation

advertisement
CRIMINAL CONSEQUENCES OF TRADE SECRET
MISAPPROPRIATION: DOES THE ECONOMIC ESPIONAGE
ACT INSULATE TRADE SECRETS FROM THEFT AND
RENDER CIVIL REMEDIES OBSOLETE?
Mark D. Seltzer, Angela A. Burns *
Contents
I. The Threshold Elements of An EEA Prosecution In A Nutshell: The Narrowing of the EEA
Heartland
II. Background to Enactment
III. The Intended Scope of Criminal Conduct
IV. A Comprehensive Look at the Substantive Provisions of the EEA
A. The High Intent Requirements
B. Broad Definition of Trade Secret
C. Meeting the Interstate or Foreign Commerce Requirement
V. How Maintaining the Secrecy of the Trade Secret During the EEA Trial Is Problematic: Hsu
and the Perils of Voluntary Disclosure to the Government
VI. Legal Impossibility Is Not a Defense to Attempt and Conspiracy Under the EEA
VII. Trade Secrets May Be Discoverable in a Substantive EEA Case
VIII. The Hsu Dilemma
IX. A Victim Corporation Pursues Civil Remedies
X. The Balancing Test: Civil Remedies or Government Disclosure?
XI. Draconian Punishment
XII. A Survey of Government Enforcement Efforts Under the EEA
XIII. EEA Compliance Programs: How To Guard Against Potential EEA Violations
XIV. Conclusion
1
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
The enactment of the Economic Espionage Act of 1996 [1] (“EEA”) was greeted with
great fanfare as an unprecedented and broad federal attack on foreign and domestic trade secret
misappropriation. Negligent, even inadvertent conversions of trade secrets seemed subject to
criminal prosecution in the broad wake of the statute. The statute's draconian criminal penalties
for individual and corporate offenders alike, coupled with its license to the Government to seek
protective orders, civil injunctive relief, and forfeiture, were viewed as the preferred remedy for
the victim of trade secret misappropriation. Yet the plain language of the threshold elements of
EEA offenses, and the statute's restrained interpretation and application by the United States
Department of Justice, reveal a statute more limited in prosecutorial scope, with its application
bound by significant legal obstacles.
The EEA does not criminalize every theft of trade secrets. Traditional notions of what a
protected trade secret is and when a theft is actionable may not apply to an EEA prosecution.
Ultimately, the EEA is not a panacea for the victim of a trade secret misappropriation. A civil
cause of action that seeks injunctive relief and economic compensation remains the preferred
and, perhaps, the most effective method for a victim to achieve an expedited and comprehensive
remedy.
Indeed, the single published opinion by a federal appellate court involving an EEA
prosecution sends clear warning signals to American private industry of the perils of referring
suspected trade secret misappropriation to the Department of Justice for criminal prosecution. [2]
The commencement of a federal criminal prosecution under the EEA may compel the disclosure
of formerly confidential proprietary information to the defendant and defense counsel as part of
discovery in the criminal case; the very same corporate secrets that the victim corporation sought
to protect by making its referral to the Government.
United States v. Hsu, which was decided by a panel of the Third Circuit during the
summer of 1998, raises troubling issues that corporations and their counsel should carefully
consider when weighing the decision of whether to disclose an incident of trade secret theft to
the Government or, alternatively, to pursue private remedies under available civil statutes or
common law theories. [3] These private remedies, however, may not give comfort to a corporate
victim that its proprietary information will be insulated from discovery in civil litigation.
Yet the EEA is not a sword of Damocles to the unknowing or unwitting corporate
beneficiary of a rogue employee's unlawful conversion of a trade secret. The multiple and
substantial intent requirements of the statute would preclude the imposition of corporate
vicarious liability for the ultra vires conduct of such an employee. [4] Nevertheless, corporate
and other business organizations should take affirmative steps to avoid any exposure under the
EEA to the risk of Government investigation through the implementation and enforcement of
comprehensive and well-documented trade secret protection programs.
2
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
I. THE THRESHOLD ELEMENTS OF AN EEA PROSECUTION IN A NUTSHELL: THE NARROWING OF
THE EEA HEARTLAND
The Government must satisfy high intent and knowledge requirements to prosecute
successfully a domestic trade secrets misappropriation violation under the EEA. [5] The
prosecutions brought under the statute to date evidence that the effect of these threshold proof
requirements has been to limit the exercise of prosecutorial discretion under the EEA to the
indictment of conspicuous trade secret theft, which is often motivated by the payment of outright
bribes.
Congress imported into the EEA many of the specific intent requirements of the
traditional white collar crime statutes--mail and wire fraud, interstate transportation of stolen
property, money laundering--utilized by the Department of Justice to prosecute the
misappropriation of tangible and intangible property crimes. Like the specific intent and
knowledge requirements codified in other white collar crime statutes, the EEA mandates that the
Government demonstrate to a trier of fact that a defendant acted deliberately and knowingly at
the time of the alleged offense. [6] This is a formidable burden for the Government to carry
beyond a reasonable doubt at any white collar criminal trial and typically requires the
presentation of compelling proof of intent and knowing criminality, which may include the
defendant's own admissions and other direct inculpatory evidence.
Chief amongst the threshold intent requirements of the EEA are three elements that the
Government must prove beyond a reasonable doubt at any criminal trial: first, that the defendant
acted with specific intent to convert the trade secret with knowledge that the trade secret was
proprietary or closely guarded; second, that the defendant attempted to or conspired to convert
the trade secret for the economic benefit of anyone other than the rightful owner; and third, that
the defendant intended or knew that the conversion offense would injure the lawful owner of the
trade secret. [7]
This substantial burden of proof is further heightened by the threshold secrecy
requirements of the EEA, which requires that the Government prove beyond a reasonable doubt
that the victim-owner of the trade secret had taken reasonable measures to preserve and protect
the secrecy of the information at issue, and that the secret information had independent economic
value. [8]
These threshold proof requirements have seemingly narrowed the breadth of EEA
prosecutions by the Department of Justice to only clear cases of theft of tangible property where
there is physical evidence of the misappropriation. Such evidence is usually obtained from
Government-controlled sting operations, in which the defendant's knowledge and intent are
captured in surreptitiously recorded conversations. The indicted and unsealed cases approved by
the Department of Justice involving prosecutions of EEA violations reflect that the heartland of
EEA criminal conduct excludes historical disputes in which a putative defendant's intent and
knowledge are not easily illuminated by his statements and conduct. [9] In short, defensible
claims of trade secret misappropriation are not candidates for prosecution under the EEA.
3
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
The formidable statutory barriers to EEA prosecution also may have the effect of
spawning parallel civil suits brought by victim corporations to obtain expedited relief including
preliminary injunctive relief and compensatory damages. These private civil suits also will
impede the successful prosecution of EEA violations by subjecting the Government's material
witnesses in the pending criminal case to searching and protracted depositions and
interrogatories even before the Government can present testimony to a jury. Without being able
to resort to a private cause of action under the EEA, victim litigants who fear on-going harm and
the defendant's secretion of valuable assets may oppose Government requests for a stay of the
parallel civil proceeding. Avery Dennison Corporation and the Government are presently
involved in such a dispute. [10]
II. BACKGROUND TO ENACTMENT
The backdrop to enactment of the EEA was the perception by Congress that foreign and
domestic industrial espionage posed a major threat to American business enterprises. That
perception was correct. Corporate spying and theft of proprietary economic information by
employees, competitors and foreign governments have cost American businesses billions of
dollars. According to a study reported in 1996 by the American Society for Industrial Security,
financial losses to American industry resulting from intellectual property theft and
misappropriation amount to as much as $63 billion, with losses occurring at an estimated rate of
$2 billion a month. The high-tech industry alone suffers an average loss per incident of $19
million. [11]
The biotechnology and pharmaceutical industries are also primary targets for trade
secrets theft. The FBI reports more than 800 cases of economic espionage. Most are perpetrated
by company insiders who are motivated by both revenge and greed; about 20 percent of
economic espionage is committed by agents of foreign governments. [12]
Congress also viewed the prior statutory structure as inadequate in responding to the
increased theft of proprietary information. [13] Congress noted that prior to the EEA, federal
prosecutors primarily relied on traditional white collar crime statutes, including the Interstate
Transportation of Stolen Property Act (“ITSPA”), to prosecute intellectual property-related
crimes. [14] ITSPA was enacted in the 1930's to prevent the movement of stolen property across
state lines by individuals attempting to evade the applicability of state and local law. ITSPA,
however, relates to “goods, wares, or merchandise.” [15] It was “drafted at a time when
computers, biotechnology, and copy machines did not even exist.” [16] Congress recognized,
rightfully, that ITSPA was not “particularly well suited to deal with situations involving
intellectual property, which by its nature is not physically transported from place to place.” [17]
Additionally, courts were reluctant to extend ITSPA's coverage to criminalize intangible
property crimes. [18] In United States v. Brown, the defendant worked as a computer software
programmer for The Software Link, Inc. (“TSL”), a computer software company located in
Georgia. The FBI had conducted a search of Brown's apartment in connection with a separate
investigation and had discovered portions of a source code for TSL's computer programs. A
federal grand jury returned a three-count indictment charging Brown with transporting and
4
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
receiving stolen property. The United States Court of Appeals for the 10th Circuit affirmed the
trial court's dismissal of the indictment reasoning that the computer program and source code
were intangible intellectual property that had not crossed state lines in tangible form, and
therefore were not within the statute's meaning of physical property. [19]
Prior to the enactment of the EEA, prosecutors also relied on the mail and wire fraud
statutes to reach crimes involving theft of proprietary information. [20] Courts have held that
both of these statutes cover the misappropriation of intellectual property. [21] In United States v.
Seidlitz, the Fourth Circuit considered evidence that the owner of a computer software product
had invested substantial financial resources in the software and had taken steps to prevent
unauthorized persons from using the product. The court held that a software system was
“property” within the meaning of the wire fraud statute and that the defendant had violated the
statute when he used the telephone to tamper with and manipulate the system. [22]
The application of these traditional white collar crime statutes to trade secret theft is
limited. For example, the mail fraud statute is applicable only when the mails are used to commit
or facilitate the commission of the offense. [23] Similarly, the wire fraud statute requires proof
that wire, radio, or television technology were used to commit or facilitate the commission of the
crime. [24]
Congress also recognized that state criminal law was also ineffective in preventing
instances of trade secret misappropriation. Although most states have some form of civil remedy
for the theft of proprietary economic information (either by recognizing the tort of theft and
misappropriation of trade secrets, or through the enforcement of contracts governing the use of
such information), only a few states have directly criminalized trade secret thefts. [25]
Additionally, many state statutes only apply to the theft of scientific or technical information.
The definition of trade secrets under the EEA, on the other hand, addresses the full nuances of
protected intangible property. [26]
The EEA has a number of important features that seek to fill the gap in existing federal
law and supplement weak state laws. The EEA prescribes stiff penalties including imprisonment,
fines and forfeiture of any property or proceeds derived from or facilitating violations. [27] It
also authorizes the Government to institute civil enforcement actions and obtain injunctive relief
when there is proof of an on-going harm. [28] There is also an extraterritorial jurisdiction
provision which applies to conduct occurring outside of the United States if the defendant is
either a citizen or permanent resident alien of the United States or a corporation organized in the
United States. [29] The Government also can prosecute foreign conduct actionable under the
EEA if a significant act in furtherance of the potential offense occurred in the United States. [30]
Due to the serious penalties involved and the potential to inhibit technological
innovation, all prosecutions brought under the EEA for a period of five years from its enactment
must first be approved by the Attorney General, the Deputy Attorney General, or the Assistant
Attorney General of the Criminal Division. [31] This centralized review and approval process
will effectively standardize the Department of Justice's enforcement of the EEA nationwide.
5
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
Furthermore, Congress recognized that corporate victims would be hesitant to report
incidents of trade secret misappropriation because of the resulting publicity. The EEA therefore
requires that courts enter appropriate protective orders to preserve a trade secret's confidentiality
during the pendency of the EEA criminal proceeding. [32] The scope of this provision of the
EEA, as it relates to the conspiracy and attempt provisions of the EEA, has recently been defined
by the United States Court of Appeals for the Third Circuit in United States v. Hsu, the first
appellate court case to interpret the level of protection a corporate victim has under the EEA.
[33] The decision offers corporate victims of trade secret theft little assurance that their
proprietary information will be protected from discovery during EEA proceedings.
III. THE INTENDED SCOPE OF CRIMINAL CONDUCT
By its plain language, the EEA addresses traditional instances of theft, for example, when
the defendant physically takes the information from the owner's possession, as well as nontraditional methods of misappropriation and destruction of intangible property involving
electronic duplication or alteration. [34] In the latter instance, while the theft may not deprive the
owner of possession of the original property, the alleged illegal activity itself effectively destroys
the value of what is left. Given the rapid increase in technology, the EEA's application to less
traditional methods of theft may be its most powerful tool.
The EEA was specifically drafted by Congress to minimize the risk that it would be used
by the Government to prosecute individuals, including lawful competitors, who use their general
business knowledge, skills, and experience to compete with former employers, even as to the
“parallel development of a similar product.” [35] Congress did not intend that the EEA “apply to
innocent innovators or to individuals who seek to capitalize on the personal knowledge, skill, or
abilities they may have developed. The statute is not intended to be used to prosecute employees
who change employers to start their own companies from using general knowledge and skills
developed while employed.” [36] “[I]t is the intent of Congress ... to make criminal the act of
employees who leave their employment and use their knowledge about specific products or
processes in order to duplicate them or develop similar goods for themselves or a new employer
in order to compete with their prior employer.” [37] Reverse engineering, however, is “an
entirely legitimate practice” which is not prohibited by Congressional mandate. [38] The EEA's
high intent requirement makes it clear, according to Congress, that a prosecutable violation
requires “extraordinary theft, not mere competition.” [39]
IV. A COMPREHENSIVE LOOK AT THE SUBSTANTIVE PROVISIONS OF THE EEA
A. The High Intent Requirements
The EEA has two separate provisions that criminalize the foreign and domestic theft or
misappropriation of trade secrets. [40] Both provisions require that the Government prove
beyond a reasonable doubt that the defendant obtained, destroyed or conveyed the trade secret
information without the authorization of the owner. The requisite mens rea under both provisions
is that the defendant “knowingly” misappropriated the trade secret: that is, that the defendant
6
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
knew that the information was closely-guarded when he converted the secrets to his personal
benefit at the expense of the true owner.
Section 1831(a) specifically addresses foreign economic espionage, punishing the theft,
misappropriation, wrongful alteration, and delivery of trade secrets to benefit a foreign
government, instrumentality or agency. [41] Here, the prosecution must show beyond a
reasonable doubt that the defendant acted with the intent to aid, or had knowledge that his
actions would aid, a foreign government, instrumentality or agent. [42]
When there is no such evidence of foreign government involvement, the Government
may charge a putative defendant with violations of section 1832(a). This section addresses
domestic instances of trade secret theft. Since Congress did not intend for the law to hinder
innocent innovators who seek to capitalize on their lawfully developed knowledge or skills,
§1832(a) incorporates a high threshold of specific intent and knowledge. Here, the Government
must show beyond a reasonable doubt that: (i) the defendant actually attempted or conspired to
steal trade secrets with the specific intent of converting the trade secret to the economic benefit
of someone other than the owner; (ii) the defendant intended to or knew that the offense would
harm or injure the owner; and (iii) the trade secret was related to, or included in a product that
was produced for or placed in, interstate or foreign commerce. [43]
The substantial intent and knowledge requirements of the EEA were designed by
Congress to prevent Government prosecutions of mistaken or accidental conversions of trade
secrets, or instances of misappropriation where the purported trade secrets may be publicly
known or without potential economic value.
This section requires that the government prove that the person charged with the crime
acted with the intent to accomplish one of two goals. One, a person will be guilty under this
section if they wrongfully copied or otherwise controlled a trade secret with the intent to benefit
any foreign government. [Second, for domestic violations of the Act,] the government must
prove that the defendant intended to confer an economic benefit, not an abstract benefit or
reputational enhancement, through his actions. Therefore, a person who discloses a trade secret
but who does not intend to gain economically from it, or intends that some other person
economically gain from [the] trade secret, cannot be prosecuted under this section .... The
government must also show that the defendant intended to disadvantage the rightful owner of the
B. Broad Definition of Trade Secret
The EEA's broad definition of a trade secret includes a wide array of technological and
intangible information that is “no longer restricted to formulas, patterns, and compilations, but
now includes programs and codes, ‘whether tangible or intangible, and whether or how stored.”’
[45] Section 1839 defines “trade secrets” as “all forms and types of financial, business, scientific,
technical, economic, or engineering information.” [46]
7
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
Information such as a customer list may easily qualify as a trade secret if it has been
developed at significant expense over time and is kept a secret by the owner. Similarly, market
analysis procedures, service manuals, and technical data can be defined as trade secrets under the
EEA.
The information is deemed a trade secret if: (1) the owner took reasonable measures to
keep the information secret commensurate with the value of the trade secret; and (2) the
information derives actual or potential independent economic value from not being made known
to the public. [47]
The Government must demonstrate that the information was not known to, or readily
ascertainable by the victim's competitors in the industry and the general public. [48] Prosecutors
must determine the extent of security measures used to protect the trade secret, including
physical security, computer security, as well as the company's policies on sharing information
with employees, sub-contractors and licensed vendors. If low-level employees in a large
company could have gained access to the information then the information is not considered a
protected trade secret under the EEA. [49]
Further, the trade secret must derive “independent economic value ... from not being
generally known to ... the public.” [50] The Act does not require that the Government provide a
specific value for the information. In some circumstances, the value of the information can be
established by showing what the trade secret was worth on the open market. Case law in a civil
trade secret context might be instructive in determining what constitutes a relevant market value.
This economic value element may pose a substantial evidentiary obstacle to the
Government if the trade secret was stolen at the developmental stage or if the victim-company
chose not to sell or license the technology. Proof of the potential economic value of the
technology at any jury trial would require expert testimony that would likely be subject to
extensive cross-examination and impeachment by rebuttal testimony.
C. Meeting the Interstate or Foreign Commerce Requirement
The Government must prove beyond a reasonable doubt that the trade secret was “related
to or included in a product that is produced for or placed in interstate or foreign commerce.” [51]
When the trade secret is related to a product which is being manufactured and sold, the element
is easily established by evidence of interstate sales. However, when the trade secret is related to a
product which is in the research and development stage and not yet being produced for sale, the
Government may have difficulty meeting the interstate commerce requirement beyond a
reasonable doubt at any trial.
V. HOW MAINTAINING THE SECRECY OF THE TRADE SECRET DURING THE EEA TRIAL IS
PROBLEMATIC: HSU AND THE PERILS OF VOLUNTARY DISCLOSURE TO THE GOVERNMENT
Section 1835 of the EEA authorizes a court to grant a protective order to maintain the
secrecy of the purported trade secret during the EEA criminal litigation. [52] However, this
8
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
Congressional intent to preserve the confidentiality of trade secrets during EEA litigation and
encourage victims of misappropriation to disclose wrongdoing to the Government may be
thwarted by a defendant's Fifth and Sixth Amendment right to prepare effectively for trial by
gaining access to and reviewing the Government's material discovery. This tension between the
Congressional intent to protect proprietary information from disclosure to the “public” versus the
constitutionally-mandated disclosure of discovery to a defendant involved in an EEA criminal
prosecution was confronted by the United States Court of Appeals for the Third Circuit in the
Hsu case. [53] In Hsu, the defendants were charged under 18 U.S.C. §1832(a)(4)(5) with attempt
and conspiracy to steal the manufacturing formulas and processes for Taxol, an anti-cancer drug
manufactured by Bristol-Myers Squibb and regarded as a valuable company trade secret.
According to the indictment, returned by a federal grand jury more than a year before the
Third Circuit's opinion on the Government's interlocutory appeal, the defendants were ensnared
in an FBI-orchestrated “sting” operation in which they were negotiating to purchase the Taxol
technology from an FBI undercover agent posing as a technological information broker. The
operation culminated in the defendants meeting with a purportedly corrupt Bristol-Myers
scientist who was cooperating with the FBI. [54]
Over a fourteen-month period, the defendants allegedly offered to pay $400,000 in cash,
stock, and royalties to obtain the Taxol technology. At the pre-arranged meeting, the scientist
provided detailed information about Taxol production and displayed sensitive corporate
documents that were clearly marked “confidential.” The defendants reviewed the documents and
asked the Bristol-Myers scientist numerous questions about the Taxol technology. The
defendants were arrested by the FBI before the sale of the documents could be consummated.
The indictment charged the defendants, in part, with attempt and conspiracy to steal trade secrets
in violation of 18 U.S.C. §§1832(a)(4) and (a)(5). [55]
In pre-trial motions, the defendants had sought discovery of the confidential documents
used in the FBI sting operation. The Government had produced to the defense a sanitized version
of the documents after they had been redacted by Bristol-Myers Squibb. The defendants argued
that they needed the entirety of the very documents they were accused of conspiring and
attempting to steal in order to establish that the Government had failed to prove an essential
element of its case: the existence of a trade secret. [56] The defendants asserted a legal
impossibility defense: they contended that, as a matter of law, they could not be convicted of
attempting and conspiring to steal a trade secret if the documents they were shown by the
Government during the sting operation did not contain trade secrets. [57]
The defendants proposed a protective order that would have required the Government to
disclose the proprietary information about Taxol to defense attorneys, experts, and witnesses.
The Government opposed the defendants' discovery motion and sought a protective order under
§1835 of the EEA to protect the Bristol-Myers' trade secrets from disclosure. [58] Section 1835
provides that a district court “shall enter such orders and take such other action as may be
necessary and appropriate to preserve the confidentiality of trade secrets, consistent with the
requirements of the Federal Rules of Criminal and Civil Procedure, the Federal Rules of
Evidence, and all other applicable laws.” [59]
9
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
The Government argued that the defense did not need access to the confidential
information because the indictment only charged the defendants with attempt and conspiracy,
and not an actual theft of trade secrets. The Government also proposed that the district court
review the documents in camera to determine the discoverability of the proprietary information
prior to any court-ordered disclosure to the defense.
The trial court balanced the competing interests of trade secret confidentiality and the
defendant's constitutionally-mandated right to full discovery of material evidence, and ruled in
favor of the defendants' access to the claimed proprietary information. [60] U.S. District Judge
Stewart Dalzell of the Eastern District of Pennsylvania held that the defendants' constitutional
right to use the alleged stolen material to prove at trial that it was not a trade secret exceeded the
victim's right to absolute trade secret confidentiality, and ordered Bristol-Myers to hand over the
information to the defendants in unredacted form. [61] The trial court reasoned that “... the
defendants must be given the ‘correlative right’ to compare the information relating to Taxol
production that is publicly available, e.g. in the form of patents and scientific literature, with
whatever details of the Taxol technology that the Government will claim at trial is a confidential
‘trade secret’.” [62]
The trial court reduced the scope of the protective order sought by the Government under
§1835 to a signed non-disclosure agreement binding the defendants' attorneys, outside defense
experts, and certain prospective defense witnesses who would need access to the proprietary
information to assist in the preparation of a defense. [63]
The defense camp was precluded by the terms of the protective order from utilizing the
proprietary information for purposes collateral to the defense of the EEA prosecution. They also
were prohibited from disclosing the information to unrelated third parties. The district court's
protective order was, at best, a Pyrrhic victory for the Government and Bristol-Myers Squibb.
The Government immediately took an interlocutory appeal of this decision to the Third
Circuit pursuant to 18 U.S.C. §1835, which provides that “[a]n interlocutory appeal by the
United States shall lie from a decision or order of a district court authorizing or directing the
disclosure of any trade secret.”
VI. LEGAL IMPOSSIBILITY IS NOT A DEFENSE TO ATTEMPT AND CONSPIRACY UNDER THE EEA
The Third Circuit, in an opinion by Judge Marjorie O. Rendell, reversed the district
court's mandated disclosure of the unredacted Bristol-Myers Squibb documents. [64] The Court's
rationale was two-fold: first, it ruled that legal impossibility is not a viable defense to charges of
attempt and conspiracy to steal trade secrets in violation of the EEA. Second, the Court noted
that the district court had mistakenly believed that the defendants were charged with the
completed offense of trade secret theft. [65]
10
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
The Court held that the Government can satisfy its burden in a conspiracy and attempt
prosecution under the EEA by proving beyond a reasonable doubt that the defendants had sought
to acquire information that they believed to be a trade secret, regardless of whether the
information actually qualifies as trade secret information under the EEA. Since the Government
does not have to prove that actual trade secrets were used in a sting operation that did not result
in the actual sale of proprietary information, the Court concluded that the defendants had not
established a legal basis for discovery of the Taxol information. [66]
In reaching its holding that the defense of legal impossibility is not available in an EEA
attempt and conspiracy prosecution, the Court relied on the legislative history of the EEA. The
Court opined that Congress intended to provide a comprehensive solution to corporate economic
espionage, and had not intended to recognize the common law defense of legal impossibility as a
complete defense to a charged violation of the EEA. The Court indicated that such a defense
would severely undercut the enforcement of the EEA because the Government would be forced
to disclose actual trade secrets during undercover or “sting” operations. [67] Similarly, the Court
reasoned that legal impossibility is not a defense to a charge of conspiracy because it is the
conspiratorial agreement, and not the underlying substantive acts, that forms the basis of a
conspiracy charge. [68]
The Hsu defendants had raised for the first time on appeal the contention that the
unredacted documents were also material to their presentation of potential defenses of
entrapment, outrageous government misconduct, and lack of jurisdiction. Noting its skepticism
of the relevance and materiality of the Bristol-Myers Squibb trade secret information to those
defenses, the Third Circuit refused to address the claims because the defendants had not raised
these issues in the district court as a basis for discovery. [69]
The Third Circuit remanded the case to the district court to (i) conduct an in camera
review to determine whether Bristol-Myers Squibb had in the first instance, at the Government's
behest, properly redacted the documents to exclude only confidential information; and (ii) to
determine whether the redacted information is material to the other defenses raised for the first
time on appeal. [70]
VII. TRADE SECRETS MAY BE DISCOVERABLE IN A SUBSTANTIVE EEA CASE
The Third Circuit did not decide whether a defendant may obtain production of a
corporate victim's trade secret information when a completed trade secret theft has been charged
by the Government. Although Hsu left unresolved this tension between the EEA confidentiality
provision and a criminal defendant's constitutional right to discover documents that will assist in
his or her defense, the Court did frame the inquiry: is the actual content of a victim's confidential
information relevant to the determination of whether the information is a “trade secret” as
defined under the EEA? [71]
The legislative history of the EEA suggests that proof of the existence of a trade secret
may be essential to the prosecution of an EEA violation. Under §1839(3) of the EEA,
information is deemed to be a trade secret if: (1) the owner took reasonable steps commensurate
11
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
with the value of the trade secret to keep the information secret; and (2) the information derives
actual or potential independent economic value from not being made known to the public. [72]
The Third Circuit also suggested that proprietary information may be discoverable if it is
material to a recognized defense. The Court indicated that “[e]ven if proof of an actual trade
secret is not an element of § §1832(a)(4) and (a)(5), an independent assessment of whether
materials are nonetheless discoverable is anticipated in the language of §1835 ....” [73] The
Court was guided by the language of Rule 16(a)(1)(C) of the Federal Rules of Criminal
Procedure which provides that “defendants can obtain documents in the government's possession
that are material to the preparation of their defense, or which are intended for use by the
government as evidence in chief at trial.” [74]
VIII. THE HSU DILEMMA
Since a court's determination of materiality is influenced by the Government's charging
decisions and the defenses raised by the indicted defendants, the corporate victim may have little
control over the discoverability of its proprietary information in an EEA prosecution. In Hsu,
Bristol-Myers Squibb had sought to protect its Taxol process from disclosure by itself redacting
the documents, without oversight by either the district court, or the Government, let alone the
defendants. The Third Circuit, however, refused to grant such absolute discretion to the owner of
a trade secret, noting that the unredacted documents could reveal information material to theories
of defense. It ruled that the district court could not make a judgment about the materiality of the
unredacted materials without first reviewing the materials in camera. [75]
After Hsu, prosecutors may opt to protect a victim's trade secrets from disclosure during
an EEA prosecution by structuring the indictment to foreclose discovery of trade secret
information. To gain a victim's cooperation in an EEA prosecution, the Government may be
forced to charge only attempt and conspiracy violations and use documentary evidence at trial
that does not contain the victim's valuable trade secret information. For example, in Hsu, the
Government assured the Court that it did not intend to use or refer to the alleged trade secret
documents at trial. Instead, the Government indicated that it intended to prove the attempt and
conspiracy violations with other evidence, including an e-mail list that defendant Chou had
allegedly sent to the cooperating Bristol-Myers Squibb scientist outlining the “core technology”
that the defendants would need to complete a deal. [76] The Government intends to use this
evidence to prove that the defendants attempted to steal what they believed were trade secrets,
although the Government will present to the jury the actual content of the redacted proprietary
information.
The Hsu trial court rightly warns American private industry that the EEA was not
designed by Congress to offer “perfect” protection in a highly competitive global market. [77]
This warning was echoed by the Third Circuit's refusal to offer Bristol-Myers Squibb absolute
protection from the potential discovery of its confidential information. Hsu does not allay the
concerns of victim corporations who fear that reporting trade secret misappropriation schemes to
the Government will inevitably result in the judicially-compelled disclosure of their proprietary
information to the defense.
12
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
The principal lesson of Hsu for the corporate victim may be that, ultimately, the best
remedy is the implementation of a well-documented trade secret protection program that
minimizes the risk of future incidents and, if necessary, assists in demonstrating the
confidentiality of a trade secret in any legal proceeding. Owners of trade secrets should: (i)
clearly mark information which they consider to be proprietary; (ii) protect the physical property
in which trade secrets are stored; (iii) limit employees' access to trade secrets to only those who
need access in the performance of their duties; and (iv) train all employees on the nature and
value of the company's trade secrets.
IX. A VICTIM CORPORATION PURSUES CIVIL REMEDIES
An EEA prosecution scheduled for trial in mid-March in an Ohio federal district court
evidences the continuing tension between the Government's interest in successfully enforcing the
EEA and that of a corporate victim, the Avery Dennison Corporation, in protecting its
proprietary information from public disclosure. Rather than wait for the Government to vindicate
the confidentiality of its proprietary information in the EEA case, Avery Dennison chose to seek
civil remedy. United States v. Pin Yen Yang, involves the alleged theft and attempted theft of
Avery Dennison proprietary manufacturing information and research data over an eight year
period. [78] A parallel civil RICO suit brought by Avery Dennison against the criminal
defendants, seeks preliminary injunctive relief and compensatory damages. A Government
motion, opposed by Avery Dennison and the defendants, to stay the discovery in the civil RICO
action pending the trial of the EEA criminal case was granted in part. The Government's
principal witness in the criminal case, cooperating defendant Lee, cannot be deposed prior to the
commencement of the criminal trial, unless the civil trial proceeds first and Avery Dennison calls
Lee as a witness. The Government's other material witnesses are subject to deposition.
The Avery Dennison case may help to resolve the unanswered question in Hsu: whether
proof of the existence of a trade secret is required when a defendant is charged with the
substantive offense of trade secret theft.
X. THE BALANCING TEST: CIVIL REMEDIES OR GOVERNMENT DISCLOSURE?
A victim corporation's calculus of the benefits of disclosure to the Government of an
incident of trade secret theft or threatened misappropriation should include an analysis of
potential civil remedies as an alternative to triggering an EEA prosecution. Although civil
statutes and common law theories may offer victim corporations greater protection than the EEA
because of the potential to obtain compensatory damages, civil remedies in fact raise similar
problems of compelled trade secret disclosure during legal proceedings.
Civil statutes impose similar burdens of proof in establishing the existence of a trade
secret which may compel a victim corporation to disclose confidential information during the
course of discovery. For example, when a departing employee misappropriates corporate trade
secrets, the former corporate employer will inevitably seek, through the commencement of
litigation, to enjoin the former employee from using the misappropriated information during the
course of his or her new employment. If there is a valid non-competition or confidentiality
13
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
agreement, an employer will seek to enforce it to prevent disclosure of the confidential
information. Here too, however, the employer must initially establish that the proprietary
information is a trade secret. Much like the inquiry under the EEA, courts that have decided civil
claims have looked to such factors as (1) the extent to which the information is known outside of
the business; (2) the degree of measures taken by the employer to guard the secrecy of the
information; and (3) the ease or difficulty with which the information could be properly acquired
by others. [79]
In Hsu, the Third Circuit noted that the definition of a trade secret under the EEA is
similar to that required by many state civil statutes and the Uniform Trade Secrets Act (UTSA).
The only apparent distinction is that under the EEA, information is a trade secret if it is not
generally known to, or readily ascertainable by, the victim's competitors and the general public.
Under the UTSA, however, information is a trade secret if it is not known by competitors. [80]
Regardless of the legal remedy that a corporate victim may pursue to prevent the
unauthorized use of proprietary information, the corporation must confront the very real
possibility that it may be forced to disclose sensitive information during the discovery and trial
phases of legal proceedings. Civil remedies may provide the corporate victim a greater degree of
control over the direction of trade secret litigation, and afford the victim the opportunity to obtain
monetary relief. The EEA's stiff criminal penalties, on the other hand, are a strong deterrent
against the misappropriation of trade secrets.
XI. DRACONIAN PUNISHMENT
The EEA prescribes stiff maximum criminal sanctions. [81] The maximum penalties for
an individual offender of §1831, the foreign economic espionage provision, is 15 years of
imprisonment, and a $500,000 fine. A violation of §1831 by an organization triggers a maximum
fine of $10 million. Since Congress considered domestic offenses of trade secret
misappropriation less serious than foreign economic espionage, §1832 prescribes less severe but
equally harsh penalties. An individual violator of §1832 faces maximum penalties of 10 years of
imprisonment and a $500,000 fine. Organizations that violate §1832 are subject to a maximum
fine of $5 million. Section 1834 of the EEA also provides for criminal forfeiture of property and
proceeds derived from, used, or intended to be used in alleged unlawful activities proscribed by
the Act.
XII. A SURVEY OF GOVERNMENT ENFORCEMENT EFFORTS UNDER THE EEA
To date, the Government has prosecuted alleged violations of the EEA when there is
conspicuous evidence of intentional trade secret theft, or attempted theft, often obtained in a
Government-sponsored sting operation. Some of these EEA cases also are buttressed by proof of
the payment of outright bribes to obtain control of the tangible property embodying the trade
secret. As the cases summarized below demonstrate, the EEA prosecutions sometimes include
the existence of physical evidence of the misappropriation. The EEA prosecutorial record also
reveals that the Government has not brought prosecutions when trade secrets have been disclosed
unintentionally, i.e. through mere negligence or inadvertence. No reported case has involved a
14
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
theft of trade secrets sponsored by or intended to benefit a foreign government, but several of the
prosecuted cases have involved efforts by foreign companies to obtain trade secrets from
“insiders” of domestic companies. [82]
The following is a brief survey of the illustrative EEA case developments.
United States v. Worthing, Crim. No. 97-9 (W.D. Pa, Crim. Complaint filed Dec. 9,
1996). On December 7, 1996, the first arrest under the EEA was made in Pittsburgh,
Pennsylvania. Patrick Worthing and his brother, Daniel, were arrested by FBI agents after
agreeing to sell Pittsburgh Plate Glass (“PPG”) proprietary information for $1,000 to a FBI
undercover agent posing as a representative of Owens-Corning. The Government alleged that
Worthing solicited Owens-Corning's CEO under an assumed name in a letter that stated: “Would
it be of any profit to Owens-Corning to have the inside track on PPG?” The Owens-Corning
executive, in turn, provided the letter to PPG executives who then contacted the FBI. Both
defendants were charged under 18 U.S.C. § 1832. Patrick Worthing admitted to stealing
documents, blueprints, photographs, and product samples from PPG. He pled guilty to the theft
of trade secrets, and was sentenced to 15 months in jail and three years of probation. His brother
also pled guilty to conspiracy to violate the EEA for which he received five years of probation.
United States v. Davis, Crim. No. 97-CR-124 (M.D. Tenn. 1997). On January 26, 1998,
Steven Louis Davis, a contractor who was employed by Massachusetts-based Gillette, pled guilty
to five counts of theft of trade secrets in violation of the EEA. Davis was an engineer with
Wright Industries, a contractor engaged by Gillette to develop production equipment for a new
shaving system design. Davis downloaded 600 megabytes of secret data and drawings from the
confidential Gillette project onto his laptop computer. In anger at his supervisor and fearing that
his job was in jeopardy, Davis disclosed the proprietary information to Gillette competitors by
fax and e-mail, including Schick, Wilkinson, and Bic. Davis was sentenced to 27 months of
imprisonment and ordered to pay $1.2 million in restitution to Gillette.
United States v. Yang, Crim. No. 97-CR-288 (N.D. Ohio 1997). On September 5, 1997,
Dr. Ten Hong Lee, an employee of the Avery Dennison Corporation in Concord, Ohio was
arrested when an FBI surveillance team captured him rummaging through a colleague's files
which contained confidential documents. After his arrest, Lee cooperated with officials to obtain
the indictment of the chairman of Four Pillars, Pin Yen Yang, and his daughter Hwei Chen
Yang, an employee of Four Pillars. Lee had reportedly received between $150,000 and $160,000
from Four Pillars/Pin Yen Yang for his involvement in causing the transfer of Avery Dennison's
proprietary manufacturing information and research data over an eight year period. On October
1, 1997, a federal grand jury returned a 21 count indictment charging Four Pillars, Pin Yen Yang
and Hwei Chen Yang with theft and attempted theft of trade secrets, mail fraud, wire fraud,
money laundering, and receipt of stolen property. Lee pled guilty to one count of wire fraud. A
parallel civil RICO suit brought by Avery Dennison against Four Pillars, both of the Yangs, and
Lee, seeks preliminary injunctive relief and compensatory damages. The case is scheduled for
trial in mid-March of this year.
15
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
On January 5, 1999, it was reported that Four Pillars, the Taiwanese adhesive company
that employed the defendants, filed a civil complaint in Taiwan against Avery Dennison alleging
fraud and theft, and seeking $262 million in damages. Four Pillars alleges that Avery Dennison
initiated talks with it about a joint venture agreement with the intent to gain trade secrets from
Four Pillars during the course of negotiations. Avery Dennison has denied the claims and asserts
that the complaint is an attempt by Four Pillars to distract attention from its own legal problems
spawned by the Yang prosecution. [83]
United States v. Trujillo-Cohen, Crim. No. 97-CR-251 (S.E. Tex. Indictment filed Nov.
14, 1997). In November, 1997, federal prosecutors in Houston charged a former employee of
Deloitte and Touche with attempting to sell confidential software programs. The employee
allegedly downloaded the programs onto her personal laptop computer and then engaged in
negotiations to sell the software to a company in New York for $7 million. The indictment
charged her with two counts of EEA violations. The defendant pled guilty to one EEA violation
and a wire fraud count, and was sentenced to 48 months of imprisonment and ordered to pay
$337,000 in restitution.
United States v. Pei, Crim. No. 98-M-4090 (D.N.J. 1998). In July 1998, Huang Dao Pei,
a former research scientist for Roche Diagnostics, a division of health care giant Hoffman La
Roche, was arrested and charged with attempting to steal Roche's trade secret for a Hepatitis C
monitoring kit Pei hoped to sell in China. Pei allegedly attempted to buy the information from a
Roche employee who was cooperating with FBI agents. Pei requested specific documents that
would show him how to duplicate parts of the kit. It is reported that the diagnostic kit took
millions of dollars to develop and is the market leader.
United States v. Camp, Crim. No. 98-CR-48-P-H (D. Maine 1998). In late July 1998,
Caryn L. Camp, a chemist at Idexx Labs, a Maine-based manufacturer of veterinary products,
accidentally sent an e-mail that contained allegedly incriminating evidence about Camp's theft of
confidential Idexx information to an Idexx manager. The e-mail allegedly revealed Camp's plan
to resign and deliver Idexx trade secrets to her new employer, Stephen R. Martin, a Sonoma
county veterinarian. Both Camp and Martin were indicted on multiple counts of conspiracy to
steal trade secrets, mail and wire fraud, interstate transportation of stolen property, and
conspiracy to transport stolen property. Trial is tentatively scheduled for June 7, 1999.
United States v. Hallstead, Crim. No. 98-CR-00041 (E.D. Texas 1998); United States v.
Pringle, Crim. No 4:98-M00037 (E.D. Texas 1998). In July, 1998, Steven Craig Hallstead pled
guilty to a conspiracy to steal trade secrets. Hallstead and an accomplice, Brian Russell Pringle,
who also pled guilty, contacted Cynix Corp., a division of National Semiconductor Corp.,
offering to sell stolen prototype Intel Corp. “Slot II” computers for $75,000. An FBI sting
operation exposed Hallstead and Pringle. Hallstead was sentenced to a term of imprisonment of
77 months, three years of supervised release, and was ordered to pay a criminal fine of $10,000.
Pringle was sentenced to a 60-month term of imprisonment, three years of supervised release,
and a $50,000 fine.
16
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
United States v. Fulton, Crim. No. 98-CR-0059 (W.D. Pa 1998). John Fulton, a former
employee of Joy Mining Machinery, Inc., pled guilty on April 17, 1998 to stealing Joy trade
secrets. Fulton stole schematic designs for an electronic switch box that operates components of
a coal-mining machine that Joy manufactures. Fulton reportedly intended to use the diagrams to
start his own competing business. He admitted offering another Joy employee $1,500 for
confidential information. He was sentenced on November 13, 1998 to five years of probation,
including 12 months of home detention.
United States v. Campbell, Crim. No. 98-CR-64 (N.D. Georgia 1998); United States v.
Soucy, Crim. No. 98-CR-59 (N.D. Georgia 1998). Carroll Lee Campbell, a former circulation
manager for the Gwinnett Daily Post, was sentenced to three months in prison, four months of
home probation, and a fine of $2,800 for offering to sell confidential business information.
Campbell offered to sell Gwinnet's marketing plans and subscription lists to Gwinett rival, the
Atlanta Journal-Constitution, for $150,000 while the two papers were engaged in a lawsuit over
which had the right to publish Gwinett County legal notices. Campbell sent letters and used an
alias to communicate with representatives of the Journal by phone and through personal ads in
the paper. The Journal notified authorities. Campbell and a co-worker, Paul Soucy, both pled
guilty to conspiracy to steal trade secrets. Soucy was sentenced to three years probation, and was
ordered to pay a $1,000 criminal fine and $500 in restitution. Campbell was sentenced to three
months of imprisonment, four months of home confinement, and ordered to pay $2,800.
United States v. Krumrei, Crim. No. 98-CR-80943 (E.D. Michigan 1998). While
employed with Vactec Coatings, defendant David T. Krumrei allegedly attempted to sell the
process plan for Formica, information which Vactec was developing for Wilsonart. The
information is said to have been worth millions of dollars to a Wilsonart competitor. Trial is
scheduled for June 7, 1999.
There also are alleged reports of an ongoing criminal investigation as to whether Reuters
Analytics, Inc., a Stamford, Connecticut subsidiary of Reuters Holding P.L.C. of London, stole
proprietary data from a rival news service, Bloomberg, L.P. According to a published report, the
Reuters subsidiary allegedly induced a consultant to conduct electronic break-ins of Bloomberg
computers to obtain confidential data. The parent company claims that it had no knowledge of
any wrongdoing by the subsidiary. [84]
These Government prosecutions under the EEA should not mislead corporate victims that
the perils of compelled disclosure are unique to the Hsu decision. Hsu remains a significant
deterrent to bringing the Government into internal investigations of trade secret theft. Because
the Government is not involved in a civil suit, the decision to pursue civil remedy may invest a
business with greater control over litigation tactics. However, given that a civil suit may still
require that the victim prove the existence of a trade secret, a civil forum may not provide any
greater comfort for a corporate victim that its proprietary information will be absolutely insulated
from discovery.
17
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
XIII. EEA COMPLIANCE PROGRAMS: HOW TO GUARD AGAINST POTENTIAL EEA VIOLATIONS
Despite the stringent requirements for prosecution under the EEA, companies would be
well advised to take preventative measures to protect their secret information from
misappropriation and to guard against their own potential EEA corporate liability. Employers
should be particularly concerned about new employees and the knowledge that they may bring
from a competitor company. New employees with knowledge of a prior employer's trade secrets
should be debriefed by legal counsel upon hiring and instructed as to how to protect their prior
employer's trade secrets. Employers may consider debriefing a departing employee as to the
same information in order to protect its own proprietary information.
To ensure further compliance with the EEA and to avoid potential Government
enforcement investigations, companies may wish to take the following steps:
(1) Clearly identify and advise employees of what the company considers to be its
proprietary information;
(2) Require that employees who have access to confidential information sign a
confidentiality agreement;
(3) Establish a well-documented internal policy which clearly expresses the company's
strict compliance with the EEA. The policy should include a statement that spying, theft
or breach of a non-disclosure agreement will not be tolerated. The policy also should
include detailed examples of how the EEA may be violated. Finally, employees should be
advised that federal investigators and prosecutors are vigilant in seeking EEA
enforcement and may use surveillance and undercover techniques to record EEA
violations;
(4) Employees should be informed of their individual liability under the EEA. They also
should be warned of potential solicitations by foreign governments and competitors;
(5) Establish an internal self-reporting procedure which assures employees that there will
be no retaliation for reporting their knowledge of potential violations of the EEA to
designated senior corporate officers;
(6) If the company is solicited to purchase a competitor's proprietary information, report
any potential violation to the victim company;
(7) Report any potential violation to appropriate federal and state law enforcement
authorities; and
(8) Designate an internal compliance officer who has the central responsibility for
handling compliance issues and referring employee inquiries to counsel or to appropriate
Governmental authorities.
18
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
XIV. CONCLUSION
The Economic Espionage Act does not criminalize every theft of trade secrets. The high
intent and knowledge requirements of the EEA has limited the scope of federal prosecutorial
discretion. The Department of Justice's record of current prosecutions reveals an EEA heartland
reduced to conspicuous incidents of clear theft, or attempted theft, coupled with evidence of
outright bribery or attempted bribery. The Government has resorted to aggressive law
enforcement tactics, including sting and undercover operations, to develop compelling evidence
of specific intent. In addition, the Third Circuit's Hsu decision may significantly narrow the
corporate victim's ability to protect its valuable proprietary information from disclosure when
completed EEA violations are charged by the Government. The Hsu dilemma may lessen the
incentive for a victim business to report trade secret theft to the Government.
Thus, while the EEA does address the nuances of trade secrets, unlike the traditional
federal white collar crime offenses of mail or wire fraud, for a victim corporation it may not be a
preferred remedy to a civil cause of action for injunctive relief and compensatory damages.
* Mark D. Seltzer is Of Counsel at the Boston law firm Goulston & Storrs, where he
concentrates his practice in the representation of corporations and individuals in white collar
criminal investigations and trials, and related civil, administrative, and regulatory enforcement
proceedings, compliance matters, and internal investigations. He is a member of the firm's
Regulatory Compliance and White Collar Criminal Defense Practice Group. Prior to joining
Goulston & Storrs, Mr. Seltzer was a federal prosecutor for thirteen years both in Boston, as
Director of the New England Bank Fraud Task Force of the United States Department of Justice,
and in Miami, as an Assistant United States Attorney for the Southern District of Florida. He has
spoken and written extensively on issues involving trade secret theft, and has authored three
articles on the Economic Espionage Act of 1996 for White-Collar Crime Reporter: the first, for
the September 1998 issue, entitled “The Criminal Consequences of Trade Secret
Misappropriation;” the second, for the January 1999 issue, entitled “Trade Secret Information
May Still Be Discoverable To Defend Completed EEA Violations Under Recent Third Circuit
Case;” and the third, for the February 1999 issue, entitled “Victim Corporations May Be Forced
To Disclose Valuable Trade Secret Information In Economic Espionage Act Prosecutions.”
Angela A. Burns, J.D. 1999 Northeastern University Law School is a law clerk at Goulston &
Storrs.
[1]. See 18 U.S.C. §§ 1831-1839.
[2]. See United States v. Hsu, 155 F. 3d 189 (3d Cir. 1998).
[3]. See 155 F. 3d 189.
19
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
[4]. See 18 U.S.C. § 1832.
[5]. See H.R. Rep. No. 104-788 (1996).
[6]. See 18 U.S.C. §§ 1831(a)- 1832(a).
[7]. See Hsu, 155 F.3d at 195 (citing 18 U.S.C. § 1832).
[8]. See 18 U.S.C. § 1839(3).
[9]. See discussion infra, Part XII.
[10]. See United States v. Pin Yen Yang, Crim. No. 97-CR-288 (N.D. Ohio 1997).
[11]. See Neil J. Gallagher, Statement for the Record Before the Congressional Joint Economic
Committee, March 24, 1998, <http:// www.fbi.gov/congress/gallaher.htm>, (visited April 12,
1998); See also H.R. Rep. No. 104-788 (1996).
[12]. See Robert Matthews, Post Cold War Spies Will Stop at Nothing to Trade in Secrets,
SUNDAYTELEGRAPH, Dec. 14, 1997, at 4.
[13]. See H.R. Rep. No. 104-788 (1996).
[14]. See id. (citing 18 U.S.C. § 2314).
[15]. See id.
[16]. See S. Rep. No. 104-359 at 10 (1996).
[17]. See H.R. Rep. No. 104-788 (1996).
[18]. See e.g. United States v. Brown, 925 F.2d 1301, 1308 (10th Cir. 1991).
[19]. See id.; see also Dowling v. United State s, 473 U.S. 214, 216 (1985) (holding that ITSPA
“seems clearly to contemplate a physical identity between the items unlawfully obtained and
those eventually transported, and hence some physical taking of the subject goods.”).
[20]. See 18 U.S.C. §§ 1341 and 1343.
[21]. See e.g., United States v. Seidlitz, 589 F.2d 152, 160 (4th Cir. 1978).
[22]. See id.
[23]. See 18 U.S.C. § 1341.
[24]. See 18 U.S.C. § 1343.
20
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
[25]. See H.R. Rep. No. 104-788 (1996). Massachusetts has two provisions under General Laws
Chapter 266 that criminalize the theft of trade secrets. Section 30(4) addresses the theft of trade
secrets and section 60A criminalizes the sale or purchase of trade secrets. Like the EEA, the
Commonwealth must prove that the owner took precautionary measures to secure and protect the
confidentiality of the trade secret. See Commonwealth v. Robinson, 7 Mass. App. Ct. 470, 473
(1979) (quoting Jet Spray Cooler v. Crampton, 361 Mass. 835, 840 (1972) (though defendant
fraudulently obtained the victim's process and used the information to manufacture and sell a
similar device, section 30(4) did not apply because there was no indication that the victim took
any precaution to secure the secrecy of the information.). This high burden of proof may explain
the lack of published cases under 30(4) and 60A.
[26]. See 18 U.S.C. § 1839(3).
[27]. See 18. U.S.C. §§ 1831(a), 1832(a) and 1834.
[28]. See 18 U.S.C. § 1836.
[29]. See 18 U.S.C. § 1837.
[30]. See id.
[31]. See U.S. Dep't of Justice, Federal Prosecution of Violations of Intellectual Property Rights
85 & n. 109 (May, 1997) [hereinafter DOJ Manual].
[32]. See 18 U.S.C. § 1835
[33]. See 155 F. 3d 189 (3d Cir. 1998).
[34]. See 18 U.S.C. §§ 1831(a) and 1832(a).
[35]. See 142 Cong. Rec. S12,213 (1996); see also Hsu, 155 F.3d at 197.
[36]. H.R. Rep. No. 104-788 (1996).
[37]. Id.
[38]. 142 Cong. Rec. H10,462 (1996).
[39]. Id.
[40]. See 18 U.S.C. §§ 1831(a) and 1832(a).
[41]. See 18 U.S.C. § 1831(a).
[42]. See id.
21
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
[43]. See Hsu, 155 F.3d at 195-96 (citing 18 U.S.C. § 1832(a)).
[44]. See H.R. Rep. No. 104-788 (1996).
[45]. 18 U.S.C. § 1839(3).
[46]. Id.
[47]. See 18 U.S.C. § 1839(3).
[48]. See Hsu, 155 F.3d at 196.
[49]. See DOJ Manual, supra note 32, at 76.
[50]. See 18 U.S.C. § 1839(3)(B).
[51]. 18 U.S.C. § 1832(a).
[52]. 18 U.S.C. § 1835.
[53]. See Hsu, 155 F.3d 189.
[54]. See id. at 192.
[55]. See id. at 193.
[56]. See United States v. Hsu, 982 F. Supp. 1022, 1026 (E.D. Pa. 1997).
[57]. See id. at 1027.
[58]. See id. at 1026 & n.5.
[59]. 18 U.S.C. § 1835.
[60]. See Hsu, 982 F. Supp. at 1027.
[61]. See id. at 1025.
[62]. See id.
[63]. See id. at 1023, 1025.
[64]. See Hsu, 155 F.3d at 203.
[65]. See id.
[66]. See id.
22
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Boston College Intellectual Property and Technology Forum
http//www.bciptf.org
[67]. See id. at 202.
[68]. See id. at 203.
[69]. See id. at 205.
[70]. See id.
[71]. See id. at 198, n. 15.
[72]. 18 U.S.C. § 1839(3).
[73]. Id. at 205.
[74]. See id.; see also F.R.C.P. Rule 16(a)(1)(C).
[75]. See Hsu, 155 F.3d at 205.
[76]. See id. at 204-05, n. 22.
[77]. See Hsu, 982 F.Supp. at 1027.
[78]. United States v. Pin Yen Yang, Crim. No. 97-CR-288 (N.D. Ohio 1997).
[79]. See e.g. Danieli v. Braverman, Civ. No. 9306532, 1994 WL 879855, (Mass. Super. Jan. 20,
1994) (citing Augat, Inc. v Aegis, Inc., 565 N.E.2d 415 (1991)); Pepsico, Inc. v. Redmond, 54
F.3d 1262, 1269 (7th Cir. 1995) (citing Illinois Trade Secret Act, which supplants common law
remedies but does not dispense with the requirement that the plaintiff must show either the
existence of a trade secret or the likelihood that a former employee will compromise those
secrets or other confidential business information); see also Jet Spray Cooler, Inc. v. Crampton,
282 N.E.2d 921, 925 (1972) (citations omitted).
[80]. See Hsu, 155 F.3d at 196-97 (citing UTSA §1(4)).
[81]. See 18 U.S.C. §§ 1831(a), 1832(a), and 1834.
[82]. See Hsu, 155 F.3d 189; see also United States v. Yang, supra.
[83]. See Patricia M. Smith, Avery Dennison Charged with Fraud and Theft of Trade Secrets,
Business Wire, Jan. 5, 1999.
[84]. See Kurt Eichenwald, Reuters Unit is Investigated Over Theft of Rival's Data, N.Y. TIMES,
Jan. 30, 1998, at A1.
23
Copyright © 1999 Boston College Intellectual Property & Technology Forum, Mark D. Seltzer,
Angela A. Burns
Download