AMERICAN BAR ASSOCIATION SECTION OF LABOR AND EMPLOYMENT LAW INTERNATIONAL LABOR LAW COMMITTEE MIDYEAR MEETING UNITED STATES LAW ON RESTRICTIVE COVENANTS AND TRADE SECRETS Presented by GARY R. SINISCALCO Istanbul, Turkey May 9-13, 2010 ORRICK, HERRINGTON & SUTCLIFFE LLP THE ORRICK BUILDING 405 HOWARD STREET San Francisco, CA 94105 Telephone: 415-773-5700 Facsimile: 415-773-5759 www.orrick.com BEIJING · BERLIN · DÜSSELDORF · FRANKFURT · HONG KONG · LONDON · LOS ANGELES · MILAN · MOSCOW · NEW YORK · PARIS PORTLAND · ROME · SACRAMENTO · SAN FRANCISCO · SEATTLE · SHANGHAI · SILICON VALLEY · TOKYO · WASHINGTON, D.C. © 2010, Orrick, Herrington & Sutcliffe LLP. All rights reserved. These materials are distributed for informational purposes only and are not intended nor should be construed as legal advice. TABLE OF CONTENTS Page I. INTRODUCTION ......................................................................................................... 1 II. WHAT IS A TRADE SECRET?.................................................................................... 1 A. B. III. IV. Uniform Trade Secrets Act and the California Definition.................................... 1 1. Secrecy. .................................................................................................. 3 2. Reasonable Efforts to Preserve Secrecy................................................... 6 3. Value Derived From Secrecy. ................................................................. 7 Restatement of Torts and the New York Definition............................................. 8 KEEPING YOUR EMPLOYEES FROM COMPETING OR WORKING FOR COMPETITORS UPON THEIR DEPARTURE .......................................................... 12 A. Background. ..................................................................................................... 12 B. In Most States, Covenants Not to Compete Will Be Enforced If They Are Necessary to Protect a Legitimate Interest of the Employer. ............................. 13 1. What Is a “Legitimate Employer Interest”? ........................................... 14 2. Reasonableness Standard for Enforcement of Covenants Not to Compete. .............................................................................................. 19 3. Other Factors Affecting the Reasonableness of Covenants Not to Compete. .............................................................................................. 20 C. The Employee Choice Doctrine ........................................................................ 21 D. Under California Law, Employee Covenants Not to Compete Upon Termination of Employment Are Void. ............................................................ 23 1. The California Rule and Its Application. ............................................... 23 2. California Courts May Enforce Certain Types of Non-Competition Clauses That Limit, but Don’t Prohibit, Competition ............................ 27 3. Enforcement of Non-Solicitation Clauses.............................................. 30 PREVENTING DEPARTING EMPLOYEES FROM USING OR DISCLOSING TRADE SECRETS ...................................................................................................... 35 A. Background. ..................................................................................................... 35 B. Sources of Protection for Employers................................................................. 35 1. Civil Remedies for Trade Secret Misappropriation................................ 35 Restrictive Covenants and Trade Secrets i TABLE OF CONTENTS (continued) Page V. 2. The Inevitable Misappropriation Doctrine May Be Used to Prevent “Threatened” Misappropriation of Trade Secrets................................... 40 3. Other Potential Remedies Available to the Employer ............................ 46 4. Effect of Trade Secret Preemption ........................................................ 50 5. Criminal Statutes. ................................................................................. 52 6. Racketeer Influenced Corrupt Organizations Act................................... 56 A PRIMER ON STRATEGY: BEFORE AND AFTER AN EMPLOYEE LEAVES...................................................................................................................... 56 A. Drafting: Establishing and Maintaining Secrecy ............................................... 56 1. B. VI. Drafting Issues...................................................................................... 56 What To Do When An Employee Leaves ......................................................... 59 1. Conduct and Document an Exit Interview ............................................. 60 2. Search the Departing Employee’s Workspace and Review the Employee’s Computer........................................................................... 62 3. If the Risk of Misappropriation is Present, Conduct a Forensic Analysis of the Employee’s Computer .................................................. 62 4. Send Follow-Up Letters ........................................................................ 66 5. Determine The Applicability of Restrictive Covenants and Insist on Compliance...................................................................................... 66 6. Monitor the Risk ................................................................................... 67 CONCLUSION............................................................................................................ 67 Restrictive Covenants and Trade Secrets ii I. INTRODUCTION The protection of trade secrets has become a number one priority for many employers. To succeed in these extraordinarily competitive times, companies must face the daunting tasks of creating innovative products and services; developing and maintaining a customer base; recruiting and maintaining an expert and efficient work force; and keeping all of their innovations—and all of their customers and employees—from falling into the hands of their competitors. These tasks are especially difficult because the most valuable, knowledgeable and highly skilled employees are also the most mobile. When such employees leave their jobs and move on to work for a competitor—or to start their own competitive company—they present an unparalleled risk to their former employer. This risk is further exacerbated by the fact that sensitive data can be transported with unprecedented ease. A departing employee can export important documents and company secrets to external storage devices, PDA’s, portable hard drives, and cell phones in mere seconds. What can an employer do to minimize the damage in such circumstances? What risks do employers face when they hire their competitor’s employees and how can they reduce the risk that these hiring decisions will result in litigation? This chapter will address these commonly asked questions, focusing on the law of California and New York, as well as review the newly emerging legal theories that are increasingly being used to inhibit unfair competition by ex-employees, to keep competitors from raiding employees, and to keep employees from using or disclosing their former employer’s trade secret and confidential and proprietary information. II. WHAT IS A TRADE SECRET? A key to the success of most employers is the development and use of “trade secrets,” i.e., information that is known only by the employer and its agents, and that gives the employer a commercial advantage over its competitors. Trade secrets—which may involve technical information such as formulas and diagrams, or business information such as customer lists1 and marketing or strategic plans—often comprise the most valuable portion of an employer’s intellectual property. A. Uniform Trade Secrets Act and the California Definition. There is no uniform definition of the type of information that constitutes a trade secret. A majority of the states have adopted the Uniform Trade Secrets Act (some with slight 1 Ohio joined the majority of states to recognize that memorized customer lists can be the basis for a trade secret violation. Al Minor & Assocs. v. Martin, 117 Ohio St. 3d 58 (Ohio 2008); see also General Reinsurance Corp. v. Arch Capital Group, Ltd., No. X05CV074011668S, 2007 Conn. Super. LEXIS 2629 (Conn. Super. Ct. Oct. 17, 2007) (the absence of physical or electronic misappropriation was immaterial; misappropriation may occur by more intangible means like “remembered” information). Restrictive Covenants and Trade Secrets 1 modification). Under the Act, adopted by California and codified at Cal. Civ. Code §§ 3426 et seq., a trade secret is defined as: [I]nformation, including a formula, pattern, compilation, program, device, method, technique, or process, that: (1) Derives independent economic value, actual or potential, from not being generally known to the public or to other persons who can obtain economic value from its disclosure or use; and (2) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. Cal. Civ. Code § 3426.1(d). Under this definition, virtually any type of information – technical, business or administrative – is capable of being a trade secret. Many courts have held that simply labeling or defining a particular piece of information as a trade secret by contract does not necessarily make it a trade secret if it does not otherwise meet the test. See, e.g., Thompson v. Impaxx, Inc., 113 Cal. App. 4th 1425, 1430 (Cal. Ct. App. 2003) (“Labeling information as a trade secret or as confidential information does not conclusively establish that the information fits this description”); Metro. Traffic Control, Inc. v. Shadow Traffic Network, 22 Cal. App. 4th 853, 860-63 (Cal. 1994); American Paper & Packaging Products, Inc. v. Kirgan, 183 Cal. App. 3d 1318, 1325 (Cal. Ct. App. 1986).2 Nevertheless, a wide variety of information has been found to be a trade secret. This information includes, but is not limited to, the following: · Customer lists: see, e.g., Am. Family Mut. Ins. Co. v. Roth, 485 F.3d 930 (7th Cir. 2007); Hair Club for Men, LLC v. Elite Solutions Hair Alternatives, Inc., No. 2:07-cv-546-GEB-KJM, 2007 U.S. Dist. LEXIS 30167 (E.D. Cal. Apr. 5, 2007); MPW Indus. Servs. v. Pollution Control Sys., No. 2:02-CV-955, 2006 U.S. Dist. LEXIS 9360, *32 (D. Ohio Mar. 9, 2006); Surface Shields v. PolyTak Prot. Sys., No. 02 C 7228, 2003 U.S. Dist. LEXIS 13185, *3 (N.D. Ill. July 29, 2003); Liveware Publ’g, Inc. v. Best Software, Inc., 252 F. Supp. 2d 74, 85 (D. Del. 2003); Lamorte Burns & Co. v. Walters, 167 N.J. 285, 299300 (N.J. 2001); Home Pride Foods, Inc. v. Johnson, 262 Neb. 701, 709 (Neb. 2001); Morlife, Inc. v. Perry, 56 Cal. App. 4th 1514 (1997); Ivy Mar. Co. v. C.R. Seasons, Ltd., 907 F. Supp. 547, 556-57 (E.D.N.Y. 1995); · Pricing, distribution and marketing plans, market analysis information and sales data: see Johnson Controls, Inc. v. A.P.T. Critical Sys., 323 F. Supp. 2d 525, 532-33 (S.D.N.Y. 2004); Lucini Italia Co. v. Grappolini, No. 01 C 6405, 2003 WL 1989605 (N.D. Ill. Apr. 24, 2003); Ikon Office Solutions, Inc. v. Am. Office Prods., Inc., 178 F. Supp. 2d 1154, 1169-1170 (D. Or. 2001); Star Sci., 2 But cf. Loral Corp. v. Moyes, 174 Cal. App. 3d 268, 275 (Cal. Ct. App. 1985) (“[c]ases suggest that when permissible solicitation of an employer’s customers is at issue, a contract may prohibit more than the law of the marketplace otherwise would.”). Restrictive Covenants and Trade Secrets 2 Inc. v. Carter, 204 F.R.D. 410, 414 (D. Ind. 2001); Union Carbide Corp v. UGI Corp., 731 F.2d 1186, 1191 (5th Cir. 1984); · Drawings and specifications: see Ctr. for Auto Safety v. Nat’l Highway Traffic Safety Admin., 93 F. Supp. 2d 1, 8-9 (D.D.C. 2000); La Calhène, Inc. v. Spolyar, 938 F. Supp. 523, 529 (W.D. Wis. 1996); Taco Cabana Int’l, Inc. v. Two Pesos, Inc., 932 F.2d 1113, 1123 (5th Cir. 1991); Boeing Co. v. Sierracin Corporation, 43 Wash. App. 288 (Wash. Ct. App. 1986); · Information Contained in Unpublished Patent Applications: see QR Spex, Inc. v. Motorola, Inc., No. CV 03-6284, 2004 U.S. Dist. LEXIS 27378, *15 (C.D. Cal. Oct. 28, 2004) (court recognized that trade secret protection available until patent application was published); Stutz Motor Car of America, Inc. v. Reebok Int’l Ltd., 909 F. Supp. 1353 (C.D. Cal. 1995) (same); · Chemical formulas: Ctr. for Auto Safety v. Nat’l Highway Traffic Safety Admin., 93 F. Supp. 2d 1, 8-9 (D.D.C. 2000); Wright Chemical Corp. v. Johnson, 563 F. Supp. 501 (M.D. La. 1983); Kewanee Oil Co. v. Bicorn Corp., 416 U.S. 470, 473 (1974). Indeed, even negative information can satisfy the definition of a trade secret. Learning, after expending significant time and money, that a certain procedure or technology does not work is a classic “negative trade secret.” See Morton v. Rank America, Inc., 812 F. Supp. 1062 (C.D. Cal. 1993); see also Metallurgical Industries, Inc. v. Fourteen, Inc., 790 F.2d 1195 (5th Cir. 1986) (granting trade secret protection to zinc recovery process modifications to unusable furnaces). Courts consider a variety of factors in determining whether a particular piece of information satisfies the standard of a trade secret. These factors are described briefly below in subsections 1 through 3. 1. Secrecy. The cardinal requirement of a trade secret is that it be secret. The information should be known by only those employees and third parties who “need to know” it (and those who know it should be bound not to disclose it to others, especially the employer’s competitors). See Metro. Traffic Control, Inc. v. Shadow Traffic Network, 22 Cal. App. 4th 853, 863 (Cal. Ct. App. 1994) (“the information imparted to Metro by KFWB is equally available to anyone contracting with KFWB”); Courtesy Temporary Serv., Inc. v. Camacho, 222 Cal. App. 3d 1278, 1288 (Cal. Ct. App. 1990) (noting that employer’s reasonable steps to preserve secrecy of its customer information included giving “[a]ccess to such customer information ... to [e]mployees only on an ‘as needed basis’ to perform their duties”); Morlife, Inc. v. Perry, 56 Cal. App. 4th 1514, 1522 (Cal. Ct. App. 1997) (reasoning that amount of effort employers expend in protecting information will be probative of conclusion that information is in fact trade secret). Restrictive Covenants and Trade Secrets 3 California removed the phrase “not readily ascertainable” altogether from its UTSA definition of a trade secret. See Cal. Civ. Code § 3426.1(d). Thus, it is not the plaintiff’s burden to establish that a particular piece of information is “not readily ascertainable;” instead, plaintiff must establish merely that the information is not publicly known. This point is illustrated by ABBA Rubber Company v. Seaquist, 235 Cal. App. 3d 1 (Cal. Ct. App. 1991). In ABBA, the plaintiff claimed trade secret status for its customer and inventory data, and sued the defendant Seaquist, alleging that former ABBA employees now at Seaquist had taken the information. The employees, familiar with the identities of ABBA’s customers, denied taking any records from ABBA, but admitted soliciting business from some ABBA customers. Although the appellate court overturned the lower court’s preliminary injunction on an unrelated issue (failure to furnish an adequate undertaking), the court set forth the principle that: [O]ur Legislature chose to exclude from the definition [of a trade secret] only that information which the industry already knows, as opposed to that which the industry could easily discover. Therefore, under California law, information can be a trade secret even though it is readily ascertainable, so long as it has not yet been ascertained by others in the industry. Accordingly, we decline to follow American Paper & Packaging Products, Inc. v. Kirgan, supra, to the extent that it suggests that information is not protectible as a trade secret if it is ‘known or readily ascertainable.’ Id. at 21 (emphasis added). Still, the ABBA court noted that “the assertion that a matter is readily ascertainable by proper means remains available as a defense to a claim of misappropriation.” Id. at 21, fn. 9 (emphasis added). Accordingly, it is the defendant’s burden to establish the defense of ready ascertainability by proper means. Applying this definition, California courts will not protect public information that is easily discoverable by a competitor. However, protection may be afforded to secret information that is not particularly hard to recreate–if the defendant used the secret (but easily recreated) information. Compare, e.g., Scott v. Snelling & Snelling, Inc., 732 F. Supp. 1034, 1044 (N.D. Cal. 1990) (customer and temporary employee lists held not trade secrets because customers were discoverable through public directories and identities of temporary employees were already on file with competing agencies) with Morlife, 56 Cal. App. 4th at 1522-23 (protecting a customer list as a trade secret because it was not published in public business directories) and Courtesy Temporary Service, Inc. v. Camacho, 222 Cal. App. 3d 1278, 1288 (Cal. Ct. App. 1990) (customer lists held trade secret because they included information on billing rates, key contacts, mark-up rates and specialized requirements not available through public sources). Restrictive Covenants and Trade Secrets 4 a. Publicly Known Through Internet Disclosure In the last decade, courts have had to consider the issue of whether trade secret status is extinguished when the information is posted on the Internet. Whether such information deserves protection turns on how the information was obtained by the Internet publisher or user. The rule that has emerged is that a party who simply downloads misappropriated information from the Internet will not be liable for misappropriation so long as that party was not involved in the initial improper acquisition of or posting of the information. However, a misappropriator cannot free itself from liability simply by making the information available on the Internet and then arguing that the information is therefore no longer secret. See, e.g., Religious Technology Center v. Lerma, 908 F. Supp. 1362 (E.D. Va. 1995). In Religious Technology, a former member of the Church of Scientology posted portions of the Church’s scriptures on the Internet for two days. The defendant, who did not post the information on the Internet, but merely downloaded it, was sued by the Church. While the court found that the Church had taken reasonable measures to preserve the secrecy of its teachings – thereby permitting trade secret status – it held that the status was lost with respect to defendant because the defendant committed no wrong by simply looking at the information that was now publicly available through the simple use of the Internet. The Church’s remedy was against the former member/misappropriator, not the third party Internet user. The corollary is neatly illustrated by a later case, again involving the Church of Scientology. There, the district court reversed an earlier denial of a preliminary injunction when portions of the Church’s scripture were once again posted on the Internet by the defendant. See Religious Technology Center v. Netcom On-Line Communication Services, Inc., No. C-9520091, 1997 U.S. Dist. LEXIS 23572 (N.D. Cal. Jan. 3, 1997). In overturning a prior ruling, the Court held that “[t]he court believes that its statement in its [earlier] order that ‘posting works to the Internet makes them ‘generally known’ to the relevant people’ is an overly broad generalization and needs to be revised. The question of when a posting causes the loss of trade secret status requires a review of the circumstances surrounding the posting. . . including . . innocent third parties who acquire information off the Internet.” As the party who posted the information on the Internet was not “innocent,” the court found an injunction appropriate. Similarly, in DVD Copy Control Ass’n v. McLaughlin, the court enjoined a defendant from continuing to distribute an encryption program that it had reverse engineered. See DVD Copy Control Ass’n, Inc. v. McLaughlin, No. CV 786804, 2000 WL 48512 (Cal. Sup. Ct., Jan. 21, 2000). The defendant argued that because he reverse engineered the program, the program could not be afforded trade secret status. The court rejected this argument, as the defendant’s use of the program was subject to a “click license” which expressly prohibited him from attempting to reverse engineer the program. In holding that the public posting of the information did not extinguish trade secret status, the court stated: Restrictive Covenants and Trade Secrets 5 The Court is not persuaded that trade secret status should be deemed destroyed at this stage merely by the posting of the trade secret on the Internet. To hold otherwise would do nothing less than encourage misappropriators of trade secrets to post the fruits of their wrongdoing on the Internet as quickly as possible and as widely as possibly, thereby destroying a trade secret forever. Such a holding would not be prudent in this age of the Internet. Id. (citations omitted). The case eventually reached the California Supreme Court, which affirmed this basic aspect of the ruling. DVD Copy Control Ass’n, Inc. v. Bunner, 31 Cal. 4th 864 (Cal. 2003). 2. Reasonable Efforts to Preserve Secrecy. For information to qualify as a trade secret, the employer must exercise “reasonable efforts” to preserve its secrecy. Cal. Civ. Code § 3426.1(d)(2). What is reasonable will vary with the circumstances, but the cases and legislative history do provide guidance. For example, the Legislative Committee Comment to the Uniform Trade Secrets Act states that employers need not engage in “extreme and unduly expensive procedures” to protect their trade secrets— only reasonable efforts. The following are examples of the kinds of procedures California courts have recognized as reasonable and appropriate. a. Require That Employees (and Third Parties) Who Are Given Access to Trade Secrets Sign Confidentiality Agreements. One step that employers should take to protect the trade secret status of their confidential information is to require that employees and third parties who are given access to the information sign confidentiality agreements. See, e.g., MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511, 521 (9th Cir. 1993) (holding that a requirement that employees sign confidentiality agreements was enough to demonstrate “reasonable steps” to preserve secrecy). In addition to the typical non-disclosure and non-use provisions, it is useful to have the employee acknowledge in the agreement that specified information is in fact confidential, valuable and protected as the trade secret of the employer. It is also useful to have the employee agree to return all documents upon termination of employment. b. Alert Employees (and Third Parties) with Access to Trade Secrets Regarding Their Confidential Nature. A second step for protecting trade secret status is to alert employees and third parties who are given access to confidential information that the information constitutes a trade secret and should be kept confidential. See, e.g., Courtesy Temporary Serv., Inc., 222 Cal. App. 3d at 1288 (customer information held trade secret where employees were told of its confidential and proprietary nature when list was revealed to them). This can be accomplished through personnel manuals, use of a “confidential” stamp on key documents, reminder memoranda, posted Restrictive Covenants and Trade Secrets 6 warnings and the like. Obviously, before others can be made aware that information constitutes a trade secret, the employer must make that determination. A periodic trade secret audit is a very useful exercise in this regard. Employers should be aware that taking special measures to protect the confidentiality of some documents may lead courts to deny trade secret protection to other materials that were not subject to the same special measures. See In re Providian Credit Card Cases, 96 Cal. App. 4th 292, 308 (Cal. Ct. App. 2002) (where, in the course of business, party had stamped certain documents “confidential,” court could conclude that party did not deem documents lacking such a stamp to be trade secrets). c. Limit Access to Only Those Employees (and Third Parties) Who “Need to Know” Trade Secrets to Perform Their Jobs. A third step that is an important factor in obtaining judicial recognition of trade secrets is limiting trade secret access to only those employees and third parties who “need to know” the trade secrets in order to perform their jobs or otherwise successfully carry out their relationships with the employer. See Courtesy Temporary Serv., Inc., 222 Cal. App. 3d at 1288; Buffets, Inc. v. Klinke, 73 F.3d 965 (9th Cir. 1996) (reasonable efforts to maintain secrecy include limiting access to a trade secret on need to know basis). This can be accomplished by use of security guards, key-lock entries, computer passwords, locked file drawers and the like. d. Avoid Public Disclosure of Trade Secret Information Through Display, Publication, Advertising, Etc. A fourth step for ensuring trade secret status is to avoid publicly disclosing the trade secret information, such as through public displays, publications, or advertising. See, e.g., Cal. Civ. Code § 3426.1, Legislative Committee Comment (“proper means [of acquiring the trade secret of another person] include ... [o]bservation of the item in public use or on public display”); Computer Economics, Inc. v. Gartner Group, Inc., 50 F. Supp. 2d 980, 988 (S.D. Cal. 1999) (holding that trade secret status is unavailable where the information could be disclosed in course of litigation); Self Directed Placement Corp. v. Control Data Corp., 908 F.2d 462, 465-66 (9th Cir. 1990) (holding that teaching techniques were not trade secrets because they were disclosed to students); In re Providian Credit Card Cases, 96 Cal. App. 4th at 305-06 (holding that telemarketing scripts were not trade secrets because they were disclosed to public, albeit in piecemeal fashion). 3. Value Derived From Secrecy. In order to qualify as a trade secret, confidential information must not only be secret, it must also derive value from not being known to potential or actual competitors. Cal. Civ. Code § 3426.1(d)(1). “Value” can often be established by showing the amount of time or money used to develop the information. See Am. Family Mut. Ins. Co. v. Roth, 485 F.3d 930 (7th Cir. 2007) (customer information may be protected if it represents an investment on the part of the firm seeking to protect it—apart from its value in limiting competition); Courtesy Temporary Serv., Restrictive Covenants and Trade Secrets 7 Inc., 222 Cal. App. 3d at 1287 (customer list held trade secret because it “was acquired by lengthy and expensive efforts”); Gable-Leigh, Inc. v. North American Miss, No. CV 01-01019, 2001 WL 521695, *16 (C.D. Cal. Apr. 9, 2001) (“Given the multiple-step process that was required to distill publicly available information into a list of 900 names, Gable-Leigh’s customer lists are likely the sort of information that derives independent economic value” from secrecy); see also Fred’s Stores of Mississippi, Inc. v. M & H Drugs, Inc., 725 So. 2d 902, 909 (Miss. 1998) (same). “Negative information”—i.e., knowledge that a process, strategy or method does not work—can also be valuable because it can save a competitor time and money in making a new discovery. See, e.g., Courtesy Temporary Serv., Inc., 222 Cal. App. 3d at 128788; Hollingsworth Solderless Terminal Co. v. Turley, 622 F.2d 1324, 1333-34 (9th Cir. 1980); Morton, 812 F. Supp. at 1073. Generally, the more complicated, detailed or sophisticated the information, the more likely it will be found to satisfy the “value” requirement. B. Restatement of Torts and the New York Definition. Many states that have not adopted the Uniform Trade Secrets Act, including New York, (and even some that have) rely on the classic definition of a “trade secret” found in the Restatement of Torts, which provides that a trade secret includes: [A]ny formula, pattern, device, or compilation of information which is used in one’s business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it. It may be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a machine or other device, or a list of customers... A trade secret is a process or device for continuous use in the operation of the business. Restatement of Torts § 757 cmt. b (1939); see U.S. Reinsurance Corp. v. Humphreys, 618 N.Y.S.2d 270, 273 (N.Y. App. Div. 1994) (adopting definition of trade secret contained in Restatement of Torts § 757 cmt. b); Fabkom, Inc. v. R.W. Smith & Assocs., Inc., No. 95 Civ. 4552, 1996 WL 531873, at *6 (S.D.N.Y. Sept. 19, 1996); Faiveley Transport Malmo v. Wabtec Corp., 559 F.3d 110 (2d Cir. 2009). A variety of factors are used to determine whether certain information qualifies for protection as a trade secret or confidential information under the Restatement’s definition. These factors include: 1. the extent to which the information is known outside the business; 2. the extent to which the information is known by the employee and others involved in the business; Restrictive Covenants and Trade Secrets 8 3. the extent of measures taken by the company to guard the secrecy of the information, compare, e.g., Ecolab, Inc. v. Paolo, 753 F. Supp. 1100 (E.D.N.Y. 1991) (reasonable security measures include disclosure only on need-to-know basis and use of employee confidentiality agreements); with Gillis Associated Indus., Inc. v. Cari-All, Inc., 564 N.E.2d 881 (Ill. App. Ct. 1990) (employer did not reasonably maintain secrecy of customer lists; employer failed to mark documents, did not have employee entrance or exit interviews to demonstrate to employees importance of maintaining secrecy of documents, and did not use employee confidentiality agreements); 4. the ease or difficulty with which the information could properly be acquired or duplicated by others; 5. the amount of effort and money expended by the company in developing the information; and 6. the value of the information to the company and its competitors. Although the weight given to each individual factor varies on a case-by-case basis, whether the information was “kept secret” is generally regarded as the most significant, since courts have been more willing to protect information when it is not known in the trade or is discoverable only though extraordinary efforts. See Geritrex Corp. v. Dermarite Indus., LLC, 910 F. Supp. 955, 961 (S.D.N.Y. 1996); Consolidated Brands, Inc. v. Mondi, 638 F. Supp. 152, 156 (E.D.N.Y. 1986). However, courts have recognized that a trade secret need not be an isolated idea which is entirely secret. Eagle Comtronics, Inc. v. Pico, Inc., 453 N.Y.S.2d 470 (N.Y. App. Div. 1982). Rather, “a trade secret can exist in a combination of characteristics and components, each of which, by itself, is in the public domain, but the unified process, design and operation of which, in unique combination, affords a competitive advantage and is a protectable secret.” Imperial Chem. Indus., Ltd. v. National Distillers & Chem. Corp., 342 F.2d 737, 742 (2d Cir. 1965); see also Anacomp, Inc. v. Shell Knob Servs., Inc., No. 93 Civ. 4003, 1994 WL 9681, at *8 (S.D.N.Y. Jan. 10, 1994) (“even assuming that the information at issue were in the public domain, the non-secret nature of the individual components would not prevent the combination of components from comprising a trade secret”). But see International Paper Co. v. Suwyn, 966 F. Supp. 246, 257 (S.D.N.Y. 1997) (noting that plaintiff was not entitled to injunctive relief against defendant, its former executive vice president, because, among other things, “technology” discussed in its business plan was “commercially available” and could be purchased from “outside,” plaintiff’s profit margins were available with “reasonable precision” from outside sources, and plans for producing certain of its products were commonly available in industry). Confidentiality does not require absolute secrecy. Rather, the standard of review is one of reasonable efforts to maintain secrecy. See A.F.A. Tours, Inc. v. Whitchurch, 937 F.2d 82, 89 (2d Cir. 1991) (as long as employer “take[s] appropriate precautions to alert the employee to the Restrictive Covenants and Trade Secrets 9 need to maintain the confidentiality” of trade secret, employee’s access to such secret information will not void confidential nature of that information). In determining whether the information is sufficiently confidential, the courts not only look to the availability of the information in the market place, but they also consider the manner in which the employer itself treats the information. The question courts seek to answer is, “Did the employer treat the ‘trade secret’ information in a manner which most appropriately reflects its relative importance?” In Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 475 (1974), the United States Supreme Court held that a company’s trade secret is not lost if the trade secret is made known to another in circumstances of confidence and under an implied obligation not to disclose it, including employees to whom it is necessary to make the trade secret known in order to undertake their work for the employer/holder of the trade secret. Some of the more common examples of potential trade secrets include customer lists; customer pricing and preference information; marketing strategies, revenue projections, and product and pricing strategies, see DoubleClick, Inc. v. Henderson, No. 116914/97, 1997 WL 731413 (N.Y. Sup. Ct. Nov. 7, 1997); and corporate business and marketing plans, see PepsiCo, Inc. v. Redmond, 54 F.3d 1262, 1265 (7th Cir. 1995); Kamyr AB v. Kamyr, Inc., No. 91-CV0453, 1992 WL 317529, at *1 (N.D.N.Y. Oct. 30, 1992) (“confidential treatment of information ... includ[es] financial and business records and plans”); Support Sys. Assocs., Inc. v. Tavolacci, 522 N.Y.S.2d 604, 606 (N.Y. App. Div. 1987) (statements of company’s “approach” to business and recruiting plans constituted trade secrets); Webcraft Techs., Inc. v. McCaw, 674 F. Supp. 1039, 1043 (S.D.N.Y. 1987) (“project specifications and pricing details” held to be trade secrets); Triangle Sheet Metal Works, Inc. v. Silver, 222 A.2d 220, 225 (Conn. 1966) (financial details of product costs, pricing and bidding strategies “fully meet the definition of trade secrets”). The following checklist, albeit not all-inclusive, provides an employer with some guidance on maintaining the trade secret status of its trade secrets: 1. Are employees and third parties with access to trade secrets required to sign confidentiality agreements? 2. Are employees and third parties with access to trade secrets alerted to its confidential and proprietary nature, e.g., through personnel manuals, use of a “confidential” stamp on key documents, reminder memoranda, posted warnings and the like? 3. Is sensitive data kept under lock and key? 4. Is access to sensitive data limited to those with a particular need for the information? 5. Is the information copied, or maintained in an area with a photocopying machine? Restrictive Covenants and Trade Secrets 10 6. Are documents containing sensitive data kept by people at their own desks? If so, is it necessary? Are desks locked and access limited only to those with need? 7. Are the number of copies of such documents kept to an absolute minimum? 8. Is the data marked plainly and obviously as “Secret,” “Confidential,” “Restricted Access” or with some other appropriate term? 9. If confidential documents are given to certain employees, are they serially numbered, with a complete record kept by a company official? 10. Are the documents containing confidential data ever left unattended on desks, in a lunch room, or in conference rooms where personnel not authorized to see such information could come in contact with it? 11. Are visitors, guests and nonessential personnel restricted from areas in which secret processes or machines are developed, operated, or displayed in a way which could be considered negligent to a knowledgeable observer? 12. Are visitors and guests allowed to visit factories or facilities where secret processes or machines are in use or operation? 13. Are all visitors, including suppliers, vendors and maintenance persons, required to sign in, state the nature of their visit, indicate with whom they are visiting and sign out? 14. Are special internal procedures in place to verify the service calls of repair and service personnel, including verifying the service person’s credentials and the purpose of the visit? 15. With respect to doors and entryways leading to areas where secret processes are maintained or performed or where machinery is operated, does the company make sure that they are kept locked? Are keys issued only to those employees who need them? 16. If security and alarm systems are required to protect a secret process effectively, are they installed? Are security guards used when necessary? 17. Are all document control systems, such as those described above, periodically reviewed and revised? 18. Is disclosure of a substantial portion of trade secret information through display, publication, or advertising prohibited? Restrictive Covenants and Trade Secrets 11 19. III. Are employees instructed not to discuss secret company projects in the presence of visitors, especially suppliers and vendors? KEEPING YOUR EMPLOYEES FROM COMPETING OR WORKING FOR COMPETITORS UPON THEIR DEPARTURE A. Background. Employers frequently attempt to prevent their employees from competing with them upon termination of their employment by having them covenant, as part of an employment agreement, that they will not compete with their employer after their employment ends. Although many of these disputes end up in federal court under diversity jurisdiction, the enforceability of such agreements is a matter of state common law and statutory law. Many states, including New York, follow the general rule that such agreements are enforceable, provided they are necessary to protect a legitimate interest of the employer and are reasonably limited in time, geography, and the restrictions they place on the employee in pursuing his or her profession. Other states, including California, Montana, North Dakota, and Oklahoma, do not follow the general rule. For example, California Business & Professions Code section 16600 provides that “every contract by which anyone is restrained from engaging in a lawful profession, trade or business of any kind is to that extent void.” California courts have rigorously applied this provision in the employment context and have routinely invalidated agreements purporting to preclude employees (expressly or implicitly through penalties) from working for competitors upon completion of their employment. See, e.g., Metro. Traffic Control, Inc. v. Shadow Traffic Network, 22 Cal. App. 4th 853, 859 (Cal. Ct. App. 1994); Scott v. Snelling & Snelling, Inc., 732 F. Supp. 1034, 1042 (N.D. Cal. 1990). See also Section III.D.1., infra. A cautionary caveat is warranted at this point. Our discussion in this chapter aims to provide merely an overview of the law. Readers should always consult with local practitioners regarding each state’s laws as this area of the law is especially susceptible to deviations and variations from state to state.3 3 For example, in Texas, covenants not to compete are governed by the Covenants Not to Compete Act. That Act includes a requirement that a covenant be “ancillary to or part of otherwise enforceable agreement.” Until late 2006, Texas Supreme Court precedent held that because an at-will employee can be fired at any time, promises by the employer to provide confidential information or training to the employee were “illusory,” and therefore at-will agreements would not be considered “an otherwise enforceable agreement” under the Act. Thus making the noncompete covenants in at will employment agreements void. The Texas Supreme Court in Alex Sheshunoff Mgmt. Servs., L.P. v. Johnson, 209 S.W.3d 644 (Tex. 2006) significantly changed the analysis for non-compete clauses in Texas. The Sheshunoff court modified this rigid application and determined that a non-compete covenant in an atwill employment relationship is enforceable if the employer provides confidential information or training to the employee at any time during employment in accordance with the promises in its employment contract. Restrictive Covenants and Trade Secrets 12 Although slightly beyond the scope of this chapter, it is worth mentioning that special attention should be paid to drafting restrictive covenants for use internationally. This includes common clauses in restrictive covenants that cover confidentiality, noncompetition, nonsolicitation of customers, and poaching of employees. Policies on such clauses vary throughout the world. To limit potential liability, companies should tailor such agreements based on the geographic location and job level or the responsibilities of the employee. B. In Most States, Covenants Not to Compete Will Be Enforced If They Are Necessary to Protect a Legitimate Interest of the Employer. Although covenants not to compete are generally disfavored by the courts, in most states they will be enforced if the covenant not to compete is designed to “protect against ... ‘unfair and illegal’ conduct” on the part of the former employee and not simply “to insulate the employer from competition.” American Inst. of Chem. Eng’rs v. Reber-Friel Co., 682 F.2d 382, 386-87 (2d Cir. 1982).4 The prevalent standard is to enforce restrictive covenants to the extent that they are “reasonable.” See Empire Farm Credit, ACA v. Bailey, 657 N.Y.S.2d 211, 212 (N.Y. App. Div. 1997). Thus, a covenant not to compete will be enforced only if it restricts the employee’s ability to compete no more than is reasonably necessary to protect the employer’s legitimate interests. BDO Seidman v. Hirshberg, 93 N.Y.2d 382 (N.Y. Ct. App. 1999); see also Branson Ultrasonics Corp. v. Stratman, 921 F. Supp. 909, 913 (D. Conn. 1996) (Connecticut courts will enforce covenants not to compete as long as they are reasonable and entered into knowingly and for adequate consideration); Chi. Title Ins. Corp. v. Magnuson, 487 F.3d 985 (6th Cir. 2007) (Ohio courts will enforce a post-employment restriction on competition as long as it (1) is no greater than required for protection of the former employer, (2) does not impose undue hardship on the employee, and (3) is not injurious to the public.). There are no bright-line rules for drafting enforceable restrictive covenants because litigation typically arises only after the covenants have been breached and, therefore, the reasonableness of the covenants is often evaluated with the benefit of hindsight not available at the time of drafting. Generally, however, courts view non-compete agreements more sympathetically if, for example, the employer attempts to enforce it against a former long-term employee that is in possession of trade secrets or highly proprietary information, an employee going to work for a direct competitor to perform the exact same job functions performed for the prior employer, or an employee who seeks new employment “across the street” from the former employer. 4 Many states have enacted legislation regulating restrictive employment covenants. See Ala. Code § 8-1-1 (1984); Cal. Bus. & Prof. Code §§ 16601-16602 (West 1987); Colo. Rev. Stat. § 8-2-113 (1973); Fla. Stat. Ann. § 542.33 (West 1988); Ga. Code Ann. §§ 13-8-2 to 13-8-2.1 (1990); Haw. Rev. Stat. § 480-4 (1985); La. Rev. Stat. Ann. § 23:921 (West 1985); Mass. Gen. Laws ch. 112, §§ 12X, 74D (1984); Mich. Comp. Laws Ann. § 445.774a (West 1990); Mont. Code Ann. § 28-2-703 (1989); N.C. Gen. Stat. § 75-2 (1988); N.D. Cent. Code § 9-08-66 (1987); Okla. Stat. tit. 15, §§ 217-219 (Supp. 1991); Or. Rev. Stat. § 653.295 (1989); S.D. Codified Laws §§ 53-9-8 to 53-911 (1990); Tex. Bus. & Com. Code § 15.05 (Vernon 1990); Wis. Stat. Ann. § 103.465 (West 1988). Restrictive Covenants and Trade Secrets 13 Because covenants not to compete are viewed as restraints of trade, they are evaluated against a standard of reasonableness as opposed to a strict contract construction standard. In analyzing the enforceability of restrictive covenants, courts balance the legitimate interests of the employer in protecting its property against the public policy prohibiting restraints of trade. Therefore, an employee’s promise not to compete is likely to be valid only if the court concludes, after balancing the hardships, that the employer’s legitimate interests outweigh the hardship to the employee and likely injury to the public. For example, in Lumex, Inc. v. Highsmith, 919 F. Supp. 624, 636 (E.D.N.Y. 1996), the court concluded that the covenant at issue contained “fair and reasonable counterbalancing provisions,” because the former employee was permitted to work for a competitor, but not on a “competitive product”; the six month duration of the covenant was a “relatively short time”; and, under the six-month term of the covenant, the former employer was to continue to receive full salary and benefits payments from his former employer. Courts differ in their treatment of overly broad covenants. Some courts hold noncompete agreements totally unenforceable if they are overly broad and unreasonable in scope or duration. See, e.g., Fields Found., Ltd. v. Christensen, 309 N.W.2d 125 (Wis. Ct. App. 1981). Some courts choose this approach in order to encourage employers to write more narrowlytailored covenants. See Telxon Corp. v. Hoffman, 720 F. Supp. 657 (N.D. Ill. 1989). In other jurisdictions, including New York, courts will “blue pencil” invalid portions and enforce the rest; that is, the courts will sever the unenforceable provisions of the covenant to the extent that they can do so without destroying the intent of the covenant. See, e.g., BDO Seidman, 93 N.Y.2d at 394. Yet others will modify a covenant by rewriting it so that it is reasonable. See, e.g., Ferrofluidics Corp. v. Advanced Vacuum Components, Inc., 968 F.2d 1463 (1st Cir. 1992). 1. What Is a “Legitimate Employer Interest”? As a threshold matter, courts require an employer to have a “legitimate interest” before they will enforce a covenant not to compete. An employer’s generalized wish to be insulated from competition with ex-employees, even those in whom the employer has invested time, money, and training, is not sufficient to overcome the competing interests of the employee and the public in employee mobility and free trade. Because covenants not to compete can discourage employees from seeking alternative employment if their choices are limited by such a covenant, these covenants are carefully scrutinized by courts to ensure that a legitimate employer interest is present. The existence of a legitimate employer interest is often dispositive because the question of the covenant’s reasonableness is never even reached when such interest is not implicated. “Only after determining that a restrictive covenant would serve to protect against such unfair and illegal conduct, and not merely to insulate the employer from competition, does the reasonableness of the covenant in terms of its time, space or scope, or the oppressiveness of its operation become an issue.” American Inst. of Chem. Eng’rs, 682 F.2d at 387 (internal quotations omitted). Restrictive Covenants and Trade Secrets 14 Although states differ as to what each deems a legitimate protectable employer interest, most generally find interests legitimate when necessary to prevent some combination of the following: 1. disclosure or use of trade secrets; 2. disclosure or use of confidential customer information; 3. customer solicitation; and 4. special harm to the employer due to the unique nature of the employee’s services. For example, in Illinois, an employer is deemed not to have a business interest sufficient to warrant enforcement of a restrictive covenant not to compete absent a showing of trade secret/confidential information or a near-permanent customer relationship. See, e.g., Rapp Ins. Agency, Inc. v. Baldree, 597 N.E.2d 936 (Ill. App. Ct. 1992). In New York, by contrast, courts have found that employers have a protectable interest in their trade secrets, customer lists, customer relationships and good will of the business, as well as in preventing special harm because of the uniqueness of the employee’s services. See, e.g., BDO Seidman, 93 N.Y.2d at 392 (“It follows from the foregoing that BDO’s legitimate interest here is protection against defendant’s competitive use of client relationships which BDO enabled him to acquire through his performance of accounting services for the firm’s clientele during the course of his employment”); Empire Farm Credit, ACA, 657 N.Y.S.2d at 212 (“It is now axiomatic that restrictive covenants ... will be enforced to the extent necessary to prevent the use of trade secrets or confidential customer information, but only so long as they are reasonable in time and area, not harmful to the general public and not unreasonably burdensome to the employee.”); see also Ivy Mar Co. v. C.R. Seasons Ltd., 907 F. Supp. 547, 555 n.7 (E.D.N.Y 1995) (employer has protectable interest in the goodwill of its business). a. Trade Secrets as a “Legitimate Employer Interest.” It is well settled that the protection of trade secrets is a legitimate employer interest that justifies the enforcement of a restrictive covenant. See, e.g., BDO Seidman, 93 N.Y.2d at 392. Thus, a restrictive covenant may be enforced if it is designed to protect any of the employer’s trade secrets. See section II., supra, for a discussion of the definition of a trade secret under California and New York law. b. Customer Lists as a “Legitimate Employer Interest.” The vast number of restrictive covenant cases involve an ex-employee’s actual or threatened use of his former employer’s customer lists. The reason for this is clear: the importance of customer lists to a company’s success, as well as the high cost of assembling them, have caused many employers to seek trade secret protection for them if they believe their lists have been (or might be) misappropriated. Indeed, the United States Supreme Court in Restrictive Covenants and Trade Secrets 15 Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 483 (1974), recognized the importance of protecting customer lists, stating: [I]t is hard to see how the public would be benefited by disclosure of customer lists or advertising campaigns; in fact, keeping such items secret encourages businesses to initiate new and individualized plans of operation and constructive competition results. This, in turn, leads to a greater variety of business methods than would otherwise be the case if privately developed marketing and other data were passed illicitly among firms involved in the same enterprise. Customer lists will not merit protection, however, if the names of past or prospective customers are “readily ascertainable” from sources outside the employer’s business, such as through industry directories. See, e.g., Webcraft Techs., Inc. v. McCaw, 674 F. Supp. 1039 (S.D.N.Y. 1987); Leo Silfen, Inc. v. Cream, 278 N.E.2d 636 (N.Y. 1972). For example, in Kucker Kraus & Bruh, LLP v. Szold & Brandwen, P.C., N.Y.L.J., Sept. 12, 1997, at 26 col. 1 (N.Y. Sup. Ct. Sept. 11, 1997), the court denied trade secret protection to the plaintiff’s customer list because all of the plaintiff’s clients, comprised of real estate managing agents, cooperatives, and condominiums, could be readily ascertained through public tax assessment records, court records, and office building directories. See also Panther Sys. II, Ltd. v. Panther Computer Sys., Inc., 783 F. Supp. 53, 67 (E.D.N.Y. 1991). Conversely, where customer names are discoverable only through extraordinary efforts, and the employer’s clientele has been secured over many years through the expenditure of time and money, the court may confer trade secret status upon a customer list. See, e.g., Subcarrier Communications, Inc. v. Day, 691 A.2d 876, 880 (N.J. App. Div. 1997) (“[t]here are cases where customer lists have been protected,” especially where company must obtain its customers at cost of time, trouble and expense); Tyler Enters. of Elwood, Inc. v. Shafer, 573 N.E.2d 863 (Ill. App. Ct. 1991). Finally, the more detailed and sophisticated the information contained in customer list, the more likely that it will be afforded trade secret protection. See, e.g., Health Mgmt., Inc. v. Hotte, No. 97 Civ. 3267 (E.D.N.Y. Sept. 15, 1997) (affording trade secret protection to customer list where it contained purchasing preferences of clients; specific volume of business done with each client; and names of key contact people associated with each client); Royal Carbo Corp. v. Flameguard, Inc., 645 N.Y.S.2d 18, 19 (N.Y. App. Div. 1996) (noting that plaintiff’s customer lists, which contained information regarding re-servicing dates and prices offered to each customer, constituted trade secret information); Giffords Oil Co. v. Wild, 483 N.Y.S.2d 104, 106 (N.Y. App. Div. 1984) (concluding that plaintiffs’ customer list was trade secret because it contained information “such as fuel oil capacity of customers’ tanks, and the amount certain customers are willing to pay, which aids plaintiffs in establishing prices and which could only be achieved through personal solicitation.”). Restrictive Covenants and Trade Secrets 16 c. Customer Solicitation as a “Legitimate Employer Interest.” Generally, in the absence of an express non-solicitation agreement, an ex-employee is allowed to solicit his former employer’s customers unless the customer list could be considered a trade secret or there was wrongful conduct by the employee such as taking or copying the employer’s files or using confidential information. See, e.g., Leo Silfen, Inc., 278 N.E.2d 636; Amana Express Int’l, Inc. v. Pier-Air Int’l, Ltd., 621 N.Y.S.2d 108, 109 (N.Y. App. Div. 1995). In BDO Seidman v. Hirshberg, 93 N.Y.2d 382 (N.Y. 1999), the New York Court of Appeals held that an employer has a legitimate interest in preventing a former employee from exploiting client relationships that were created and maintained at the employer’s expense. Moreover, an employee may not solicit the customers of his former employer if the customers would be unknown to the employee but for information obtained during his prior employment. McRand, Inc. v. Van Beelen, 486 N.E.2d 1306 (Ill. App. Ct. 1985). Thus, a court may prevent a former employee from soliciting customers who are not openly engaged in business in advertised locations or whose availability as patrons cannot readily be ascertained. American Inst. of Chem. Eng’rs, 682 F.2d at 387. Conversely, where customers are “readily ascertainable” outside of the former employer’s business as prospective users or consumers of the former employer’s services or products, and there is no proof of physical appropriation or copying of confidential data, trade secret protection will not be allowed and solicitation of such customers is not prohibited. Amana Express Int’l, 621 N.Y.S.2d at 109. d. An Employee’s Unique Services as a “Legitimate Employer Interest.” In some states, covenants not to compete will be enforceable if the employee’s services are special, unique, or extraordinary, even though no other protectable interest is involved. See Lumex, Inc. v. Highsmith, 919 F. Supp. 624, 628 (E.D.N.Y. 1996) (employers have legitimate interest in being protected “if the former employee’s services are unique or extraordinary”); Contempo Communications, Inc. v. MJM Creative Servs., Inc., 582 N.Y.S.2d 667, 669 (N.Y. App. Div. 1992) (concluding that defendants, who were plaintiff’s former project managers, performed services that were “‘special, unique and extraordinary’ and therefore, [plaintiff was] entitled to protection”); see also Bradford v. New York Times Co., 501 F.2d 51 (2d Cir. 1974). To succeed on this basis, an employer must prove that the employee’s services are so significant that replacement would be impossible or that loss of the services would cause irreparable harm. It is not enough that the employee excels in his job or that his performance is of high value to the employer. International Paper Co. v. Suwyn, 966 F. Supp. 246, 259 (S.D.N.Y. 1997) (noting that defendant’s services, as plaintiff’s former executive vice president, were not “unique” because within month of his resignation all of his job duties had been reassigned to other employees); Ivy Mar Co., 907 F. Supp. at 555 n.7; Rich Prods. Corp. v. Parucki, 578 N.Y.S.2d 345 (N.Y. App. Div. 1991) (employee was merely of high value to employer and was not performing unique or extraordinary services); Kanan, Corbin, Schupak & Aronow, Inc. v. FD Restrictive Covenants and Trade Secrets 17 Int’l LTD, 797 N.Y.S.2d 883 (N.Y. Sup. Ct. 2005) (holding that investor relations executives are not “unique” employees). Recently, however, the Second Circuit Court of Appeals held that a title insurance salesman who maintained unique relationships with his employer’s clients was unique for purposes of enforcing a post employment non-compete agreement. Ticor Title Ins. Co. v. Cohen, 173 F.3d 63 (2d Cir. 1999). Some states, such as New York, find that “where an employee refuses to render services to an employer in violation of an existing contract, and the services are unique or extraordinary, an injunction may issue to prevent the employee from furnishing those services to another person for the duration of the contract.” ABC, Inc. v. Wolf, 52 N.Y.2d 394, 402 (N.Y. 1981) (citation omitted); see also Arias v. Solis, 754 F. Supp. 290 (E.D.N.Y. 1991). Injunctive relief is available even if the employee has not specifically promised not to work elsewhere during the term of his contract; where such a promise was explicitly made, a negative injunction is particularly appropriate. ABC, Inc., 52 N.Y.2d at 402-03; Arias, 754 F. Supp. at 293-94. The burden of proving uniqueness of service is significant, as demonstrated by the dearth of reported cases in which a court has validated covenants not to compete on this basis. Indeed, several courts have held certain skilled professions, namely insurance agents, hairdressers, and technicians, not “special” because there is nothing inherently extraordinary or unique in the functions of these professions. See Cool Insuring Agency, Inc. v. Rogers, 509 N.Y.S.2d 180, 182 (N.Y. App. Div. 1986); Family Affair Haircutters, Inc. v. Detling, 488 N.Y.S.2d 204, 207 (N.Y. App. Div. 1985); Earthweb, Inc. v. Schlack, 71 F. Supp. 2d 299, 313 (S.D.N.Y. 1999), aff’d in part and remanded, 205 F.3d 1322 (2d Cir. 2000). However, in MTV Networks v. Fox Kids Worldwide, Inc., No. 605580/97, 1998 WL 57480 (N.Y. Sup. Ct. Feb. 4, 1998), the court enforced a non-compete provision on the ground that the employee was a “unique employee with unique skills and knowledge.” In MTV, the defendant was president of MTV’s newly launched cable network called “TV Land” and was in charge of Nick-at-Night, a sister network to “TV Land” also owned by MTV. In concluding that the defendant was unique, the court relied on (1) the defendant’s ”key role” in launching both of these networks; (2) his position on the “executive team” of Nickelodeon, where he was responsible for reviewing its operations, budgets and strategic operations; and (3) his involvement in “developing strategies which led to making Nick-at-Night the top rated cable network in its time period. Id. at *6. The court also noted that the defendant was “very visibly involved in relationships with advertisers” and that he was the “public face” of MTVN who “represented the network at many public functions and in contacts with firms with which MTVN dealt.” Id. 2. Reasonableness Standard for Enforcement of Covenants Not to Compete. In addition to the legitimate employer interest requirement, the restrictions imposed by the covenant must be reasonable. A finding of reasonableness is entirely case-specific and varies Restrictive Covenants and Trade Secrets 18 significantly depending on the jurisdiction. Despite the lack of a concrete rule, the New York Court of Appeals’ formulation of “reasonableness” is illustrative of the standard: “Such covenants will be enforced only if reasonably limited temporally and geographically ... and then only to the extent necessary to protect the employer from unfair competition which stems from the employee’s use or disclosure of trade secrets or confidential customer lists.” Columbia Ribbon & Carbon Mfg. Co. v. A-1-A Corp., 42 N.Y.2d 496, 499 (N.Y. 1977). The following are guidelines to follow in order to achieve “reasonableness” when drafting restrictive covenants: 1. The activities restricted must be related to the protectable interest of the employee’s prior responsibilities, see, e.g., Scott v. General Iron & Welding Co., 368 A.2d 111 (Conn. 1976) (covenant restricting managers from obtaining management position with competing company found reasonable); 2. The covenant’s duration should correspond to the trade secret’s useful life, compare Frederick Chusid & Co. v. Marshall Leeman & Co., 326 F. Supp. 1043, 1065 (S.D.N.Y. 1971) (two years enforceable), with Coolidge Co. v. Mokrynski, 472 F. Supp. 459, 463 (S.D.N.Y. 1979) (two years unreasonably long because confidential information revised twice per year); see also DoubleClick, No. 116914/97, 1997 WL 731413 at *8 (one year injunction was too long given the speed with which internet advertising industry changes); Earthweb, Inc., 71 F. Supp. 2d at 313 (one-year covenant too long given dynamic nature of industry, its lack of geographic borders, and employee’s former position, where employee’s success was measured by his keeping up with daily changes in internet content); 3. The covenant should be limited to the geographical area in which the employer’s goodwill extends, see Innovative Networks, Inc. v. Satellite Airlines Ticketing Ctrs., Inc., 871 F. Supp. 709, 728 (S.D.N.Y 1995) (covenant preventing former employee from competing anywhere in continental United States deemed reasonable in light of former employer’s nationwide business); HBD Inc. v. Ryan, 642 N.Y.S.2d 913, 914 (N.Y. App. Div. 1996) (25-mile radius restriction found reasonable); Mallory Factor, Inc. v. Schwartz, 536 N.Y.S.2d 752, 754 (N.Y. App. Div. 1989) (finding that covenant not to solicit former client-contacts for a competitor, without geographic limitation, was reasonable); Mixing Equip. Co. v. Philadelphia Gear, Inc., 436 F.2d 1308, 1314 (3d Cir. 1971) (“We further find ... that the absence of a geographical limitation does not render the [one-year] covenant unreasonable” under New York law, where court determined that business was national and that covenant had been signed only by employees “capable of appreciating the technical information” constituting trade secrets); Award Incentives, Inc. v. Van Rooyen, 263 F.2d 173 (3d Cir. 1959) (applying New York law to same effect); Business Intelligence Servs., Inc. v. Hudson, 580 F. Supp. 1068 (S.D.N.Y. 1984) (enforcing restrictive covenant not limited in Restrictive Covenants and Trade Secrets 19 territory nor in application to trade secrets because plaintiff’s business was international in scope); Estee Lauder Co. v. Batra, 430 F. Supp. 2d 158, 167 (S.D.N.Y. 2006) (holding that worldwide geographic limitation reasonable given international scope of Estee Lauder’s business operations and former employee’s job responsibilities while working for Estee Lauder); Victaulic Co. v. Tieman, 499 F.3d 227 (3d Cir. 2007) (global restrictive covenants are reasonable for global companies as long as they are consistent with the scope of the employee’s duties); Quaker Chem. Corp. v. Varga, 509 F. Supp. 2d 469 (E.D. Pa. 2007) (same). 4. The covenant should be limited to the employer’s customers specifically, or perhaps only to the small group of customers with whom the employee actually dealt, see Ivy Mar Co., 907 F. Supp. at 555, 559 (restrictive covenant terms that prohibited former employee from communicating with former employer’s “prospective” customers were unreasonable as a matter of law); Webcraft Techs., Inc. v. McCaw, 674 F. Supp. 1039, 1047 (S.D.N.Y. 1987) (refusing to enforce covenant to the extent that it covered “potential” customers with whom the former employee had no contact); Contempo Communications, Inc., 582 N.Y.S.2d at 669 (concluding that restrictive covenant at issue was reasonable because it precluded defendants from soliciting those of plaintiff’s clients for whom they had worked prior to their termination, and not those for whom they had not worked); and 5. The interest of the public must be evaluated because courts will not enforce a restrictive covenant which is harmful to the public good. 3. Other Factors Affecting the Reasonableness of Covenants Not to Compete. Additional factors that appear to affect courts’ consideration of whether to enforce a restrictive covenant (albeit sometimes implicitly or in a less crucial respect) are: 1. the employee’s ability or inability to find alternative employment and other hardships to the employee if the covenant is enforced; 2. the employee’s reasonable understanding of the meaning of the agreement at the time he or she signed the agreement; 3. the length of the employee’s employment after signing the agreement (the more time that has expired, the more likely the covenant will be enforced, because it shows both adequate consideration for the covenant and adequate time for the employee to have been exposed to (and to have absorbed) trade secrets); 4. misrepresentations, concealment, thefts or bad faith by either party (including any pre-termination competitive activities by the employee, which constitute breaches of fiduciary duty); Restrictive Covenants and Trade Secrets 20 5. the employee’s bargaining power; 6. any negotiations before the covenant was signed; 7. the executive or professional nature of the employee’s position (higher-level employees tend to be more likely to receive trade secrets, to be “unique,” to be mobile, and to understand contracts they sign); 8. the employee’s knowledge and experience prior to beginning employment with the ex-employer (the more experience, the more likely it is that the employee’s knowledge is his own rather than the employer’s trade secret; on the other hand, more experience may indicate more mobility); 9. the ex-employer’s intent in enforcing the contract (focus on trade secrets rather than beating competition is key); 10. whether it is industry custom to sign and adhere to restrictive covenants; 11. whether the ex-employer has treated its employees consistently; 12. the ex-employer’s inability to find a replacement employee (where “uniqueness” is the justification for obtaining relief); 13. the established or long-term nature of the ex-employer’s business; 14. the number of employees departing to the new employer; and 15. whether the employee continues to receive a salary from the former employer during the period that the covenant prohibits the employee from working. C. The Employee Choice Doctrine Some states, including New York, have adopted the “employee choice doctrine,” an exception to the general rule that disfavors the enforcement of post-employment non-compete provisions. Under the employee choice doctrine, a post-employment non-compete will not be subject to the usual reasonableness analysis where it is contingent on an employee’s choice between receiving a benefit (e.g., restricted stock or stock options under an incentive compensation plan) and competing and thereby forfeiting the benefit. If the employee has a genuine choice of whether to leave the employer and engage in competitive activities, then the employer may penalize the departing employee through forfeiture of the applicable benefits. In Lucente v. International Business Machines Corporation, 310 F.3d 243 (2d Cir. 2002), the Second Circuit affirmed the validity of the employee choice doctrine. In Lucente, the plaintiff was a 30-year employee of IBM who left his position as a senior executive in 1991, Restrictive Covenants and Trade Secrets 21 when he was allegedly told by the CEO that it would be in his and IBM’s best interests if he sought employment elsewhere. Lucente was the recipient of substantial award packages, in the form of restricted stock and stock options under two IBM incentive compensation programs. Both programs provided that the awards would be forfeited if the employee engaged in postemployment competition with IBM, a determination left to IBM’s sole discretion. In anticipation of leaving IBM, Lucente secured a job with Northern Telecom and was assured by IBM that the new position would not be deemed competitive with IBM. Two years later, Lucente accepted a position with Digital Equipment Corporation. IBM then sent him a letter informing him that his employment with Digital was “competitive employment” and that his outstanding stock options and restricted stock awards would be canceled. Id. at 249-50. Lucente sued, alleging breach of contract and other claims. The district court awarded summary judgment to Lucente, holding that (1) the employee choice doctrine did not apply because Lucente did not have a genuine choice whether to leave IBM, and (2) the non-compete provisions of the incentive compensation plans were unreasonable. Id. at 250-51. On appeal, the Second Circuit reversed, finding genuine issues of fact as to whether Lucente was fired or voluntarily left IBM. If Lucente voluntarily left the company, the court said, then the employee choice doctrine would preclude him from challenging IBM’s forfeiturefor-competition clause. In so holding, the court reaffirmed that the doctrine remains a viable part of New York law concerning post-employment non-competes. The court also held that three standards govern the application of the doctrine: (1) the employer must demonstrate a continued willingness to employ the party who agreed not to compete; (2) the employer cannot invoke the doctrine when it involuntarily terminates an employee without cause; and (3) the factual determination whether an employee was involuntarily terminated if generally not appropriate for summary judgment. Id. at 254-56. Recently, the Second Circuit certified the following undecided question to the New York Court of Appeals: “Is the factual determination of whether an employee was voluntarily or involuntarily terminated under the New York common law employee choice doctrine governed by the ‘constructive discharge’ test from federal employment discrimination law, and, if not, what test should courts apply?” Morris v. Schroder Capital Mgmt. Int’l, 445 F.3d 525 (2d Cir. 2006). The Second Circuit answered the first question in the affirmative rendering the second question academic. Morris v. Schroder Capital Mgmt. Int’l, 481 F.3d 86 (2d Cir. 2007). The court held that where an employer constructively discharges an employee by intentionally making the employee’s work environment so intolerable that it compels the employee to leave, the employee’s choice of preserving his rights under an employment contract by not competing or losing them by engaging in competition has been taken away. In those instances, an employer should not be permitted to enforce an unreasonable non-compete clause and simultaneously deny the employee his benefit under the guise of the employee choice doctrine. The Second Circuit then affirmed the district court’s dismissal of the employee’s complaint, thereby affirming and expanding the application of the employee choice doctrine to forfeiture for competition provisions. Restrictive Covenants and Trade Secrets 22 D. Under California Law, Employee Covenants Not to Compete Upon Termination of Employment Are Void. 1. The California Rule and Its Application. California (along with Montana, North Dakota and Oklahoma) does not follow the general rule that covenants not to compete are valid if they are reasonable in purpose and scope. California Business & Professions Code section 16600 provides that “[e]xcept as provided in this chapter, every contract by which anyone is restrained from engaging in a lawful profession, trade or business of any kind is to that extent void.” California courts have rigorously applied this provision in the employment context and have routinely invalidated agreements purporting to preclude employees (either expressly or implicitly through penalties) from working for competitors upon completion of their employment. See, e.g., Application Group, Inc. v. Hunter Group, Inc., 61 Cal. App. 4th 881, 895 (Cal. Ct. App. 1998); Metro. Traffic Control, Inc. v. Shadow Traffic Network, 22 Cal. App. 4th 853, 859-60 (Cal. Ct. App. 1994); Scott v. Snelling & Snelling, Inc., 732 F. Supp. 1034, 1042-43 (N.D. Cal. 1990). Employee non-compete covenants are void in California even if they are reasonably limited in time and geographic scope. See Scott, 732 F. Supp. at 1042-43. Not only are non-compete covenants void in California, but an employer may be liable in tort for wrongful termination if it fires an employee who refuses to sign an employment agreement that contains an unenforceable covenant not to compete. D’Sa v. Playhut, Inc., 85 Cal. App. 4th 927 (Cal. Ct. App. 2000). This rule holds even if the agreement contains a choice of law or severability provision. Id. at 934. The concern is that the presence of an unenforceable non-compete covenant in an employment agreement may have an undesirable deterrent effect on employees who do not know their rights under California law. “[I]t is not likely that [the defendant’s] employees are sufficiently versed in California’s law of contracts such that they would know (1) that the covenant not to compete is invalid and therefore not enforceable by [the defendant] and (2) that they could sign the agreement without fear they would be bound by the covenant not to compete.” Id. The California rule embodied in section 16600, however, invalidates only those restraints that apply after termination of employment. During the term of employment, of course, each employee owes a common law duty of loyalty to the employer (which may be underscored by a contract to that effect) precluding the employee from competing with the employer in any way, whether by soliciting the employer’s customers or employees, by using the employer’s trade secrets, or otherwise. a. The Policy Behind the California Rule. California has a “strong public policy” against the enforcement of restrictive covenants in the employment context. Scott, 732 F. Supp. at 1039-40. According to the California Supreme Court: Restrictive Covenants and Trade Secrets 23 Every individual possesses as a form of property, the right to pursue any calling, business or profession he may choose. A former employee has the right to engage in a competitive business for himself and to enter into competition with his former employer, even for the business of those who had formerly been the customers of his former employer, provided such competition is fairly and legally conducted. Continental Car-Na-Var Corp. v. Moseley, 24 Cal. 2d 104, 110 (Cal. 1944). “The interests of the employee in his own mobility and betterment are deemed paramount to the competitive business interests of the employers, where neither the employee nor his new employer has committed any illegal act accompanying the employment change.” Diodes, Inc. v. Franzen, 260 Cal. App. 2d 244, 255 (Cal. Ct. App. 1968). b. Choice of Law Provisions Cannot Be Used to Avoid the California Rule. Employers cannot avoid the application of the California rule by inserting a choice of law provision into the employment agreement purporting to select the law of another state to govern disputes arising out of the agreement. If the term of employment is to be carried out substantially in California, section 16600 will apply, regardless of any choice of law provision. See, e.g., Frame v. Merrill Lynch, Pierce, Fenner & Smith, Inc., 20 Cal. App. 3d 668, 673 (Cal. Ct. App. 1971); Scott, 732 F. Supp. at 1039-41. California’s interest in enforcing Section 16600 is so strong that in Application Group, Inc. v. Hunter Group, Inc., 61 Cal. App. 4th 881 (Cal. Ct. App. 1998), a California court of appeal invalidated and refused to enforce an out-of-state non-compete agreement signed by an out-of-state employee who quit his job and took a new job with a California employer. In other words, the California court invalidated a non-compete agreement that was unquestionably valid in the state in which it was entered, just because the employee planned to move to California to take the new job. Likewise, in Robinson v. Jardine Ins. Brokers Int’l Ltd., 856 F. Supp. 554 (N.D. Cal. 1994), the court issued a preliminary injunction enjoining the defendant (the plaintiff’s former employer) from enforcing in the United States a temporary restraining order issued by the English courts that prohibited the plaintiff from doing business with the defendant’s clients, regardless of who initiated contact, on the ground that the restriction was invalid under section 16600. As discussed in the following section, however, the court may not have had the power to issue such an injunction if the temporary restraining order had been issued by a state court rather than an English court. The California Supreme Court, however, has since softened somewhat the harsh effect of this rule in Medtronics, Inc. v. The Superior Court of Los Angeles, 29 Cal. 4th 697 (Cal. 2002). In Medtronics, the Supreme Court reversed the lower California court’s issuance of a temporary restraining order which prohibited a former employer in Minnesota from taking any steps to Restrictive Covenants and Trade Secrets 24 further its Minnesota action against the former Minnesota employee that had moved to California. The Court held that Section 16600 was not so strong as to constitute an exceptional circumstance warranting enjoining proceedings that were initiated in Minnesota before the California had been initiated. The court noted, however, that the employee was free to continue the California action while the Minnesota action proceeded. Similarly, the court in Jones v. Humanscale Corp., 130 Cal. App. 4th 401 (Cal. Ct. App. 2005), recognized that a New Jersey arbitrator did not exceed his authority by enforcing a noncompete clause. Here, the parties agreed to arbitrate “any dispute involving the performance, interpretation of [sic] breach of this agreement or the relationship created hereby, including…disputes involving…discrimination and other rights and protections afforded by … law… .” Id. at 409. The agreement further includes a New York choice-of-law provision, and expressly authorized an arbitrator to modify any part of the noncompetition covenant found unenforceable. The court opined that none of the cases on which plaintiff attempted to rely, including Application Group, involved judicial review of an arbitrator’s findings as to the enforceability of a covenant not to compete in a contract containing a choice-of-law provision applying the law of another state. Additionally, the court found that the arbitrator’s findings and decision were not palpably erroneous under California law. For discussion of specific instances where California courts have enforced non compete clauses that limited, but did not prohibit competition, see Section III.D.2.a., infra. In Bennett v. Medtronic, Inc., 285 F.3d 801 (9th Cir. 2002), several employees of a Tennessee company, Medtronic, sought to ignore the non-competition covenants in their employment agreements and move to NuVasive, a competing company in California. Medtronic sued NuVasive in Tennessee state court and, on the same day, the employees sued Medtronic in California state court. After Medtronic moved the California case to federal court, the employees sought, and the federal court granted, a temporary restraining order (characterized by the Ninth Circuit as a preliminary injunction) prohibiting Medtronic from proceeding with the Tennessee action. The Ninth Circuit held that this order violated the Anti-Injunction Act, 28 U.S.C. § 2283, which prohibits a federal court from enjoining state court proceedings except in limited circumstances. The court found that “[t]he Act creates a presumption in favor of permitting parallel actions in state and federal court” and that none of the exceptions applied. Id. at 805-07. In particular, the court found that the injunction was not “necessary in aid of the federal court’s jurisdiction.” Id. at 807. c. California Courts Will Not Rewrite an Overly Broad Noncompetition Provision to Make It Valid. The burden is on the employer to draft a noncompetition provision that will pass muster under section 16600. California courts will not rewrite an overly broad provision to make it valid. See Kolani v. Gluska, 64 Cal. App. 4th 402, 408 (Cal. Ct. App. 1998); D’Sa, 85 Cal. App. Restrictive Covenants and Trade Secrets 25 4th at 934-35;5 but see Armendariz v. Foundation Health Psychcare Servs., Inc., 24 Cal. 4th 83, 123, 124 n.13 (Cal. 2000) (“overbroad covenants not to compete may be restricted temporally and geographically,” citing General Paint Corp. v. Seymour, 124 Cal. App. 611, 614-15 (Cal. Ct. App. 1932), and will be invalidated only upon showing of bad faith). Rewriting a covenant would undermine the policy underlying section 16600. Kolani, 64 Cal. App. 4th at 408. If rewriting were permitted: Employers could insert broad, facially illegal covenants not to compete in their employment contracts. Many, perhaps most, employees would honor these clauses without consulting counsel or challenging the clause in court, thus directly undermining the statutory policy favoring competition. Employers would have no disincentive to use the broad, illegal clauses if permitted to retreat to a narrow, lawful construction in the event of litigation. Id. For tips on drafting a narrow, enforceable covenant not to use or disclose an employer’s trade secrets, see Section V.A.1., infra. 2. California Courts May Enforce Certain Types of Non-Competition Clauses That Limit, but Don’t Prohibit, Competition. a. Covenants by Employees Not to Use or Disclose Their Employers’ Trade Secrets Are Enforceable in California. Agreements not to use or disclose the company’s trade secrets during and after the term of employment or contractual engagement are fully enforceable. See, e.g., Muggill v. The Reuben H. Donnelley Corp., 62 Cal. 2d 239, 242 (Cal. 1965); American Credit Indemnity Co. v. Sacks, 213 Cal. App. 3d 622, 633-34 (Cal. Ct. App. 1989). In Morlife, Inc. v. Perry, 56 Cal. App. 4th 1514 (Cal. Ct. App. 1997), the court affirmed an injunction prohibiting two former employees from: (1) doing business with any company that switched its business to the employee’s new business as a result of the employee’s use of the former employer’s trade secret customer information, and (2) soliciting any business from any entity that did business with the former employer before the employees stopped working there. An employer cannot, however, prevent an employee from using or disclosing non-trade secret information simply by defining the information as a trade secret in the employee’s nondisclosure agreement. See, e.g., American Paper, 183 Cal. App. 3d at 1325 (“An agreement between employer and employee defining a trade secret may not be decisive in determining 5 For a non-California decision holding a federal court had no obligation to fix a flawed noncompetition agreement, see Cintas Corp. v. Perry, 517 F.3d 459 (7th Cir. 2008) (finding that “judicial modification of unreasonable or overbroad non-compete provisions … is discretionary, not mandatory,” and therefore refusing to “blue-pencil” the agreement to make it enforceable). Restrictive Covenants and Trade Secrets 26 whether the court will so regard it”). Nevertheless, there are at least two reasons why an employment agreement that contains a covenant not to use or disclose the employer’s trade secrets should attempt to define the trade secrets being protected, and with some degree of specificity (but not in so much detail that unlisted trade secrets will be deemed not to be protected by the agreement). First, putting employees (and others) on notice as to what information the employer considers a trade secret is an important step in the process of establishing a trade secret. Second, the courts are disinclined to enforce agreements requiring employees to keep confidential vaguely defined information the company later decides it would like to protect. See generally Motorola, Inc. v. Fairchild Camera & Instrument Corp., 366 F. Supp. 1173, 1185 (D. Ariz. 1973) (applying California law and refusing to enforce agreements in which employees agreed to “maintain strictly confidential during [and for two years after] my employment all ... information of the company ... which is of a confidential or secret nature”). However the protected information is defined in the agreement, it should be coupled with an acknowledgment by the employee that the information is owned by the employer, is secret, is the subject of reasonable efforts by the employer to keep it secret, and has value because of its secrecy. (These are the standards for establishing under the Uniform Trade Secrets Act that the information is a trade secret.) The contract should, of course, provide that the employee will not use or disclose the information during or after employment, and should expressly provide that the employee’s duties extend until the information becomes generally known through proper means. It should also require the return of all notebooks, documents, computer disks and the like upon the termination of employment. Further, although not necessary, a non-disclosure agreement is a useful tool for helping to protect an employer’s trade secrets. While the courts have held in numerous cases that an employer may prevent an ex-employee from using or disclosing its trade secrets under the tort theory of trade secret misappropriation even in the absence of a non-disclosure agreement, see, e.g., Morlife, Inc. v. Perry, 56 Cal. App. 4th 1514, 1522 (Cal. Ct. App. 1997); Klamath-Orleans Lumber, Inc. v. Miller, 87 Cal. App. 3d 458, 465 (Cal. Ct. App. 1978), such agreements are useful for many reasons. First, by notifying the employee of the existence of trade secrets, the employer lessens the risk of inadvertent disclosure to others, and serves to deter the employee (and his or her new employer) from using the information. Second, an agreement helps to eliminate disputes and misunderstandings about the trade secret status of confidential information. Third, as noted above, a contractual obligation to preserve the secrecy of information is evidence of the employer’s “reasonable efforts” to maintain the secrecy of its confidential information, and thus helps to establish its status as a trade secret under the Uniform Trade Secrets Act. Restrictive Covenants and Trade Secrets 27 b. Prohibition Against a Limited Subset of Activities In Edwards v. Arthur Andersen LLP, 44 Cal. 4th 937 (Cal. 2008), the California Supreme Court considered and rejected another exception to the general rule that had found support in a handful of federal court decisions. In those cases, the courts had held that non-competition agreements that resulted in only a “partial” or “narrow” restraint on an employee’s ability to work in his or her chosen profession were reasonable and enforceable. In a widely anticipated decision, Edwards flatly rejected this exception, finding that the state’s strong public policy – as clearly expressed in California Business and Professions Code Section 16600 – does not permit such a restraint, even if it is narrow or limited. In Edwards v. Arthur Andersen LLP, 44 Cal. 4th 937 (Cal. 2008), the plaintiff challenged the enforceability of a non-compete agreement he signed when he was hired in 1997 and also argued that he was wrongfully terminated for refusing to execute a general release of all claims that arguably would have involved non-waivable statutory claims. The Non-Compete agreement at issue purported to prohibit plaintiff from (1) performing similar services for clients he had assisted within 18 months of his departure, (2) soliciting, within 12 months of his departure, clients that had been serviced by an Andersen office Edwards had worked at during the 18 months prior to his departure, and (3) soliciting away any of Andersen’s professional employees for 18 months following his departure. The release was offered as part of a sale of Arthur Anderson to HSBC. In connection with the sale, Andersen required Edwards to sign a Termination of Non-Compete agreement containing a general release of “any and all claims” against Andersen, as well as other terms benefiting Andersen, and in turn released Edwards from the 1997 non-competition agreement. Concerned that he would be waiving indemnification rights for potential liability and legal fees related to Andersen’s Enron troubles, Edwards refused to sign the agreement. As a result, Andersen terminated Edwards and withdrew his severance benefits. HSBC subsequently withdrew his employment offer. Edwards sued Andersen for (among other things) interference with prospective economic advantage, alleging that (1) the 1997 non-competition agreement violated California Business and Professions Code Section 16600, and (2) that the general “any and all claims” release in the Termination of Non-Compete agreement ran afoul of California Labor Code sections 2802 and 2804, which render an employee’s indemnification rights nonwaivable. Edwards argued that requiring him to release indemnification rights to obtain a release from an unlawful noncompetition agreement amounted to “wrongful conduct” sufficient to satisfy the elements of his interference claim. The California Supreme Court held that the 1997 Non-Compete agreement was unenforceable. The Court considered the “narrow restraint” exception that had found support in a handful of federal court decisions. In those cases, the courts had held that non-competition agreements that resulted in only a “partial” or “narrow” restraint on an employee’s ability to work in his or her chosen profession were reasonable and enforceable. The Court flatly rejected Restrictive Covenants and Trade Secrets 28 this exception, finding that the state’s strong public policy – as clearly expressed in California Business and Professions Code Section 16600 – did not permit such a restraint, even if it was narrow or limited. With respect to the release, however, the Court rejected the lower court’s ruling that general releases that contain a release of “any and all claims” are invalid. It found it unreasonable to read such a general release as purporting to release indemnification rights which are expressly made nonwaivable by statute. To do otherwise would be to interpret the contract as unlawful, violating basic principles of contract interpretation. Accordingly, the Court found that the “any and all claims” release was enforceable. Edwards clarifies and reaffirms California’s longstanding public policy in favor of open competition and employee mobility, and it rejects non-competition agreements drafted to comply with the “narrow restraint” exception. The decision leaves intact the other limited exceptions to the general prohibition on post-employment non-competition agreements (such as non-compete agreements executed in connection with a sale of a business), and does not affect an employer’s ability to protect its trade secrets through non-disclosure and non-solicitation agreements. To the extent that existing non-competition agreements were drafted to comply with the “narrow restraint” exception, employers should reexamine these agreements, refrain from attempting to enforce them, and consider replacing them altogether with appropriate and enforceable agreements. c. Other Statutory Competition Exceptions Allowing Restraints On As recognized by the Edwards court, there are statutory exceptions to Section 16600 where parties may enter into enforceable covenants not to compete. These exceptions include the sale of goodwill or corporate stock of a business, Cal. Bus. & Prof. Code § 16601, or the dissolution of a partnership, Cal. Bus. & Prof. Code § 16602. Under these statutes, covenants have been upheld where the defendant arguably only had a limited ability to compete with the plaintiff. For instance, in Vacco Industries, Inc. v. Van Den Berg, 5 Cal. App. 4th 34 (Cal. Ct. App. 1992), the court upheld a non-compete agreement that the defendant entered into when he sold his stock, which totaled only 3% of the outstanding shares, to an acquiring company. The court found that the “purchaser of a business is entitled to negotiate and enforce an agreement by the seller(s) of the business imposing a reasonable restriction on competition by the seller(s) on the theory that such competition would diminish the value of the business which had been purchased.” Id. at 48. California courts will not enforce a non-compete covenant in a stock purchase agreement if it appears that the agreement is merely “a sham devised to circumvent California’s policy against such agreements as expressed in section 16600.” Hill Medical Corp. v. Wycoff, 86 Cal. App. 4th 895, 905 (Cal. Ct. App. 2001). “[T]here must be a clear indication that in the sales transaction, the parties valued or considered goodwill as a component of the sales price, and thus, Restrictive Covenants and Trade Secrets 29 the share purchasers were entitled to protect themselves from ‘competition from the seller which competition would have the effect of reducing the value of the property right that was acquired.’” Id. at 903 (quoting Monogram Indus., Inc. v. Sar Indus., Inc., 64 Cal. App. 3d 692, 701 (Cal. Ct. App. 1976)). In Hill Medical Corp., for example, the court invalidated a non-compete covenant that applied when the defendant physician quit his job and sold his shares in the practice back to the corporation, where there was no evidence that the repurchase price compensated the defendant for the sale of goodwill. Id. at 906-07. 3. Enforcement of Non-Solicitation Clauses a. What Is “Solicitation”? Even California courts are willing to enforce narrowly crafted non-solicitation clauses. The case law, however, does not clearly define “solicitation.” Nonetheless, some guidelines have emerged regarding the types of conduct that may and may not be enjoined by a nonsolicitation agreement. First, an employee may passively accept business from the former employer’s clients despite a non-solicitation agreement. See, e.g., Golden State Linen Service, Inc. v. Vidalin, 69 Cal. App. 3d 1, 8 (Cal. Ct. App. 1977). Second, “merely informing customers of one’s former employer of a change of employment, without more, is not solicitation.” Aetna Building Maintenance Co., Inc. v. West, 39 Cal. 2d 198, 204 (Cal. 1952). Note, however, that if the customers’ identities are trade secrets, merely calling them to announce a change of employment may be a misappropriation of trade secrets. Moss, Adams & Co. v. Shilling, 179 Cal. App. 3d 124, 128-30 (Cal. Ct. App. 1986). One court explained that any customer contact that “personally petitions, importunes and entreats . . . customers to call . . . for information about the better [products or services] [the departing employee] can provide and for assistance during the . . . transition period . . . is endeavoring to obtain their business [is] . . . , in a word, solicit[ation].” American Credit Indemnity Co. v. Sacks, 213 Cal. App. 3d 622, 636 (Cal. Ct. App. 1989) (enjoining employee where ex-employee’s “announcement letter” said “if you would like to learn more about the [new employer’s product], I will be happy to discuss it with you when you are ready to review your ongoing credit insurance needs at renewal time.”); see also Robert L. Cloud & Assocs., Inc. v. Mikesell, 69 Cal. App. 4th 1141, 1150 (Cal. Ct. App. 1999) (holding similarly); Merrill Lynch, Pierce, Fenner & Smith Inc. v. Chung, No. CV 01-00659, 2001 WL 283083 (C.D. Cal. Feb. 2, 2001) (personal follow-up phone calls constituted solicitation). b. Customer Solicitation In California, an employee’s covenant not to solicit the employer’s customers after termination of employment is enforceable to the extent that information regarding those customers constitutes a trade secret or the solicitation thereof would constitute unfair competition. See, e.g., Thompson v. Impaxx, Inc., 113 Cal. App. 4th 1425 (Cal. Ct. App. 2003); Loral Corp. v. Moyes, 174 Cal. App. 3d 268 (Cal. Ct. App. 1985); Retirement Group v. Galante, Restrictive Covenants and Trade Secrets 30 176 Cal. App. 4th 1226 (Cal. Ct. App. 2009). This rule is equally applicable in contracts between a company and its supplier or contract manufacturer. Companies typically contend in these contexts that information regarding the identities, addresses and key contact people of customers, as well as the customers’ peculiar needs, desires and pricing/bidding constraints, are trade secrets. This rule is illustrated by Thompson v. Impaxx, where defendant Impaxx purchased Pac-West Labels in September of 2000, at the time employer of plaintiff Daniel Thompson. After acquiring Pac-West, Impaxx asked Thompson to sign a covenant which read: “For a period of one (1) year following the termination of employment, I will not (1) call on, solicit, or take away any of Pac-West Label’s customers or potential customers with whom I have had any dealings as a result of my employment by Pac-West Label.” Id. at 1427. After refusing to execute the contract, Thompson was terminated by Impaxx. Thompson then sued Impaxx alleging wrongful termination for refusal to sign what he alleged was an unenforceable covenant not to compete. Impaxx’s motion for judgment on the pleadings, claiming the contract was enforceable as written, was granted by the trial court. In reversing the decision, the appellate court repeated the rule that “[a]nti-solicitation covenants are void as unlawful business restraints except where their enforcement is necessary to protect trade secrets.” Id. at 1429 (emphasis added, citing Moss, Adams & Co. v. Shilling, 179 Cal. App. 3d 124, 129 (Cal. Ct. App. 1986)). However, the court held that judgment on the pleadings was inappropriate because the complaint stated that the customer information at issue was not trade secrets. Id. at 1430 (“the issue of whether information constitutes a trade secret is a question of fact.”). Had Impaxx established this customer information constituted a trade secret, its restrictive covenant would be enforced. In Retirement Group v. Galante, 176 Cal. App. 4th 1226 (Cal. Ct. App. 2009), the court held that section 16600 bars a court from specifically enforcing (by way of injunctive relief) a contractual clause purporting to ban a former employee from soliciting former customers to transfer their business away from the former employer to the employee's new business, but a court may enjoin tortious conduct (as violative of either the Uniform Trade Secrets Act and/or the Unfair Competition Law) by banning the former employee from using trade secret information to identify existing customers, to facilitate the solicitation of such customers, or to otherwise unfairly compete with the former employer. It is not the solicitation of the customers, but is instead the unfair competition or misuse of trade secret information, that may be enjoined. Id. Like California, other states that invalidate non-competition agreements, such as Oklahoma, also harshly construe non-solicitation provisions. See Cardiovascular Surgical Specialists, Corp. v. Mammana, 61 P.3d 210, 212 (Okla. 2002) (refusing to enforce nonsolicitation clause preventing former surgeon from soliciting, diverting or accepting referrals from any source for nine months after terminating employment). Other states have held covenants not to solicit customers are enforceable even if the agreement is not keyed to trade secrets. In John Jay Esthetic Salon, Inc. v. Woods, 377 So. 2d Restrictive Covenants and Trade Secrets 31 1363 (La. App. Ct. 1979), the court enforced a non-solicitation provision that prevented a former employee from soliciting customers from the former employer hair salon for two years. In doing so, the court held: “An agreement not to engage in competition with the employer is vastly different from an agreement not to solicit the employer’s customers or employees or to engage in a business relationship with the employees or contractors.” Id. at 1366. There is some California authority that appears to follow these other states, i.e., upholding covenants not to solicit customers regardless of whether confidential information is involved. See John F. Matull & Associates, Inc. v. Cloutier, 194 Cal. App. 3d 1049, 1054-55 (Cal. Ct. App. 1987) (enforcing non-solicitation covenant that made no mention of trade secrets, and stating that, unlike agreements not to compete, agreements “delimiting how . . . employee can compete” are not automatically invalid under 16600); Golden State Linen Service, Inc. v. Vidalin, 69 Cal. App. 3d 1, 9 (Cal. Ct. App. 1977) (finding non-solicitation agreement “valid and enforceable” without even addressing whether the employee’s solicitation involved trade secrets). The weight of authority in California, however, appears to require trade secrets as a condition to enforcement of the non-solicitation covenant. See, e.g., Thompson v. Impaxx, Inc., 113 Cal. App. 4th 1425 (Cal. Ct. App. 2003); Loral Corp. v. Moyes, 174 Cal. App. 3d 268 (Cal. Ct. App. 1985); Moss, Adams & Co. v. Shilling, 179 Cal. App. 3d 124, 130 (Cal. Ct. App. 1986) (“Anti-solicitation covenants are void as unlawful business restraints except where their enforcement is necessary to protect trade secrets”); Gordon Termite Control v. Terrones, 84 Cal. App. 3d 176, 179 (Cal. Ct. App. 1978) (refusing to enforce non-solicitation covenant where no trade secrets were used); Fortna v. Martin, 158 Cal. App. 2d 634, 639 (Cal. Ct. App. 1958) (same). c. Competitor Employee Raiding Absent a Non-Solicitation Clause It is not uncommon for competitors to recruit or “raid” the employer’s most talented employees. In fact, the California Supreme Court recently held that “public policy generally supports a competitor’s right to offer more pay or better terms to another’s employee so long as the employee is free to leave.” Reeves v. Hanlon, 33 Cal. 4th 1140, 1151-1152 (Cal. 2004). Under ordinary circumstances, the law does not prohibit competitors, including former employees who now compete with their former employer, and who did not sign a valid non-solicitation contract, from soliciting other at-will employees to leave the employer’s workforce. Metro. Traffic, 22 Cal. App. 4th at 860 (“As a competitor of Metro, absent a showing of unlawful purpose or means, Shadow is privileged and not liable for inducing Metro’s employees to leave and move to Shadow”); Hollingsworth Solderless Terminal Co. v. Turley, 622 F.2d 1324, 1337 (9th Cir. 1980) (“Mere solicitation of an employee, under no contract of employment, to leave and associate with a competing firm is not illegal.”). As the court stated in Diodes, Inc. v. Franzen, 260 Cal. App. 2d 244, 255 (Cal. Ct. App. 1968): Restrictive Covenants and Trade Secrets 32 Even though the relationship between an employer and his employee is an advantageous one, no actionable wrong is committed by a competitor who solicits his competitor’s employees or who hires away one or more of his competitor’s employees who are not under contract, so long as the inducement to leave is not accompanied by unlawful action . . . . In the employee situation the courts are concerned not solely with the interests of the competing employers, but also with the employee’s interests. The interests of the employee in his own mobility and betterment are deemed paramount to the competitive business interests of the employers, where neither the employee nor his new employer has committed any illegal act accompanying the employment change. see also Reeves, 33 Cal. 4th at 1152-1153 (solicitation actionable only if plaintiff proves “that the defendant engaged in an independently wrongful act that induced an at-will employee to leave the plaintiff.”) As this statement makes clear, there are a number of exceptions to the general rule allowing employee solicitation (the discussion of which is beyond the scope of this chapter), which give the employer some protection against raiding by former employees and other competitors. d. Competitor Employee Raiding In Light of a Non-Solicitation Clause The most common way an employer can prevent raiding by former employees is by including a non-solicitation covenant in the employment contract. As discussed above, these covenants typically provide that, during the employment or contractual engagement, and for a certain period of time thereafter, the employee or contracting company shall not solicit any of the company’s employees for a competing business or otherwise induce or attempt to induce employees to leave their employment. Under California law, a covenant not to solicit an employer’s workforce may be enforceable, even in the absence of actual trade secret misappropriation, provided that there are legitimate trade secrets or other legitimate business interests that are protected by the covenant not to solicit. In Loral Corp. v. Moyes, 174 Cal. App. 3d 268 (Cal. Ct. App. 1985), the plaintiffs brought suit against a former executive officer claiming that he had breached his termination agreement by inducing the plaintiffs’ employees to work for the defendant’s subsequent employer. The termination agreement in Moyes provided in part that, as a condition for various salary and severance payments, the defendant would “not now or in the future disrupt, damage, impair or interfere with the business of [the plaintiffs] whether by way of interfering with or raiding its employees, disrupting its relationships with customers, agents, representatives or vendors or otherwise.” 174 Cal. App. 3d at 274. The defendant later offered jobs to two key Restrictive Covenants and Trade Secrets 33 employees of the plaintiffs, and both of these employees eventually went to work for the defendant’s new employer. In determining whether the non-interference covenant was enforceable under Section 16600 of the California Business and Professions Code, the court seemed to abandon the notion that the employer could restrain by contract only that conduct which would have been subject to judicial restraint under the law of unfair competition and trade secret misappropriation. Instead, the court applied a rule of reason test to the covenant, stating that “enforceability depends upon [the covenant’s] reasonableness, evaluated in terms of the employer, the employee, and the public.” 174 Cal. App. 3d at 279. In applying the rule of reason, the court found that, when read to last for only one year, the non-interference covenant was not void under Section 16600. The court explained: The restriction presumably was sought by plaintiffs in order to maintain a stable work force and enable the employer to remain in business. This restriction has the apparent impact of limiting [the defendant’s] business practices in a small way in order to promote [the employer’s] business. This non-interference agreement has no overall negative impact on trade or business. 174 Cal. App. 3d at 280. The holding in Loral Corp. appears to be inconsistent with dicta in some other California cases. For example, one court has stated that “[t]he corollary to [the] proposition [that an exemployee cannot be contractually barred from working for the former employer’s competitors] is that competitors may solicit another’s employees if they do not use unlawful means or engage in acts of unfair competition.” Metro. Traffic Control, Inc. v. Shadow Traffic Network, 22 Cal. App. 4th 853, 859 (Cal. Ct. App. 1994); see also Latona v. Aetna U.S. Healthcare, Inc., 82 F. Supp. 2d 1089, 1094-96 (C.D. Cal. 1999) (following Metro. Traffic’s reasoning). “The interests of the employee in his own mobility and betterment are deemed paramount to the competitive interests of the employers, where neither the employee nor his new employer has committed any illegal act accompanying the employment change.” Metro. Traffic, 22 Cal. App. 4th at 860 (quoting Diodes, Inc. v. Franzen, 260 Cal. App. 2d 244, 255 (Cal. Ct. App. 1968)). Nevertheless, employers can use Loral Corp. as authority to support a practice of including covenants not to solicit fellow employees in their employment agreements. Any such covenants should be reasonably limited in time and scope. Restrictive Covenants and Trade Secrets 34 IV. PREVENTING DEPARTING EMPLOYEES FROM USING OR DISCLOSING TRADE SECRETS A. Background. To develop trade secrets, employers recruit, hire and train highly skilled employees. It is the most highly skilled employees that are most sought after by competitors, and thus pose the greatest risk of disclosure and misuse of the employer’s trade secrets. In this section, we provide an overview of the claims available to employers seeking to protect their trade secrets and suggest steps employers should take to protect their trade secrets. B. Sources of Protection for Employers. 1. Civil Remedies for Trade Secret Misappropriation. a. Basis for Liability. If an employee learned the employer’s trade secrets and then used or disclosed, or threatened to use or disclose, the trade secrets without the employer’s consent, the employee may be liable for “misappropriating” the trade secrets. See Hudson Hotels Corp. v. Choice Hotels Int’l, 995 F.2d 1173, 1176 (2d Cir. 1993) (to prevail on claim for misappropriation of trade secrets, New York law requires that plaintiff demonstrate that it possessed trade secrets, and that defendant used trade secrets in breach of agreement or confidential relationship or duty, or as result of discovery by wrongful means), abrogated on other grounds, Nadel v. Play-by-Play Toys & Novelties, Inc., 208 F.3d 368 (2d Cir. 2000); Cal. Civ. Code § 3426.1(b)(2) (misappropriation includes actual or threatened use or disclosure of trade secret where trade secret was “[a]cquired under circumstances giving rise to a duty to maintain its secrecy or limit its use”). The exemployee’s new employer may also be liable for misappropriation. Thola v. Henschell, 140 Wash. App. 70 (Wash. Ct. App. 2007) (appellate court held that a future employer could be vicariously liable if it knowingly benefited from a future employee’s tortious conduct); see Cal. Civ. Code § 3426.1(b)(2) (misappropriation may also occur if person “derived [trade secret] from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use”). Indeed, a California court recently held that officers, directors, and majority shareholders of the new employer may be held personally liable for misappropriation if they knew or had reason to know of the unlawful conduct and thereby implicitly approved of or consented to it. See PMC, Inc. v. Kadisha, 78 Cal. App. 4th 1368 (Cal. Ct. App. 2000). Such persons may be personally liable even if they did not directly participate in the misappropriation and, if the misappropriation is continuing, even if the misappropriation initially occurred before they became an officer, director, or majority shareholder. Id. at 1380-85. An employee who uses a computer to obtain or send trade secrets without his employer’s authorization may also be liable, along with the recipient of the information, under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, which applies to “[w]hoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . Restrictive Covenants and Trade Secrets 35 information from any protected computer if the conduct involved an interstate or foreign communication . . . .” 18 U.S.C. § 1030(a)(2)(C). Section 1030 is primarily a criminal statute, but “[a]ny person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief.” 18 U.S.C. § 1030(g). Although the remedies are cumulative with those provided by state trade secret law, the statute may provide a basis for filing a trade secret misappropriation lawsuit in federal court in appropriate cases. b. Available Remedies. An injured employer may obtain monetary damages and/or an injunction to stop the use or disclosure of the trade secret information as remedies for trade secret misappropriation. See Cal. Civ. Code §§ 3426.2, 3426.3; Robert L. Cloud & Assocs., Inc. v. Mikesell, 69 Cal. App. 4th 1141, 1149-52 (Cal. Ct. App. 1999) (discussing remedies available under Uniform Trade Secrets Act); Cacique, Inc. v. Robert Reiser & Co., 169 F.3d 619, 623-24 (9th Cir. 1999) (same). Injunctive relief may include an injunction compelling affirmative acts, such as the return or destruction of misappropriated documents and materials. See Cal. Civ. Code § 3426.2(c); Lumex, Inc. v. Highsmith, 919 F. Supp. 624, 633-34 (E.D.N.Y. 1996) (threatened misappropriation enjoined). In New York, a party seeking a preliminary injunction must demonstrate: (1) “either (a) a likelihood of success on the merits or (b) sufficiently serious questions going to the merits to make them a fair ground for litigation and a balance of hardships tipping decidedly in the movant’s favor,” and (2) “irreparable harm in the absence of an injunction.” Faiveley Transport Malmo v. Wabtec Corp., 559 F.3d 110 (2d Cir. 2009) (quoting County of Nassau, N.Y. v. Leavitt, 524 F.3d 408, 414 (2d Cir. 2008)). A showing of irreparable harm “is the single most important prerequisite for the issuance of a preliminary injunction.” Id. at 118. To satisfy this requirement, a plaintiff “must demonstrate that absent a preliminary injunction they will suffer an injury that is neither remote nor speculative, but actual and imminent, and one that cannot be remedied if a court waits until the end of trial to resolve the harm.” Grand River Enter. Six Nations, Ltd. v. Pryor, 481 F.3d 60, 66 (2d Cir. 2007). Where there is an adequate remedy at law, such as an award of money damages, injunctions are unavailable except in extraordinary circumstances. Moore v. Consol. Edison Co. of N.Y., 409 F.3d 506, 510 (2d Cir. 2005). The Second Circuit recently clarified that a presumption of irreparable harm does not necessarily automatically arise upon the misappropriation of a trade secret. Faiveley, 559 F.3d at 118; see also American Airlines, Inc. v. ImHof, 620 F. Supp. 2d 574 (S.D.N.Y. 2009). Rather, a rebuttable presumption may be warranted, according to the court, in cases where there is a danger that, unless enjoined, a misappropriator of trade secrets will disseminate those secrets to a wider audience or otherwise irreparably impair the value of those secrets. Where a misappropriator seeks only to use those secretswithout further dissemination or irreparable impairment of valueRestrictive Covenants and Trade Secrets 36 in pursuit of profit, no such presumption is warranted because an award of damages will often provide a complete remedy for such an injury. Id. at 118-19. In Faiveley, the defendant corporation used the misappropriated trade secrets without further dissemination and treated them with the same confidentiality that they gave to their own proprietary information. Further, there was no evidence in the record that defendant was likely to irreparably impair plaintiff’s trade secrets by their continued usage. Therefore, the court found inappropriate the district court’s grant of a preliminary injunction. In American Airlines, Inc. v. ImHof, American Airlines alleged that a former employee, a mid-level managing director of sales for the New York region, misappropriated trade secrets and sought to use them to American’s detriment after joining a rival, Delta Airlines. After citing Faiveley and rejecting American’s argument that a misappropriation of trade secrets automatically raises the presumption of irreparable harm, the court addressed whether any of the documents the employee took before leaving his position with American, or even the information he remembered could constitute irreparable harm. However, the court found that none of the alleged misappropriations contained sufficiently confidential information that would likely be used against American with any material effect. Further, the court noted that any possible material effect could be compensated by readily attributable damages. c. Limitations Periods. Once there is a reasonable basis for believing misappropriation has occurred, action must be taken without undue delay. This includes an action for injunctive relief. Static Control Components, Inc. v. Future Graphics, LLC, No. 1:06CV00730, 2007 U.S. Dist. LEXIS 36474 (D.N.C. May 11, 2007) (injunctive relief not appropriate where employer laid off employee, employee remained unemployed for months, turned in the former employer’s computer and documents, and the employer delayed taking legal action for 8-12 weeks after learning that employee was joining competitor). Under California law, if a trade secret misappropriation action is not filed within three years after discovery of the misappropriation, the opportunity may forever be lost. See Cal. Civ. Code § 3426.6 (providing 3-year statute of limitations for trade secret misappropriation). This apparently will be true even if the misappropriator promises to stop its illegal activity, initially appears to abide by its promise, and then later resumes the misappropriation. See Glue-Fold, Inc. v. Slautterback Corp., 82 Cal. App. 4th 1018 (Cal. Ct. App. 2000) (holding that 3-year statute of limitations under section 3426.6 is not tolled during period of alleged suspension of misappropriation); see also Forcier v. Microsoft Corp., 123 F. Supp. 2d 520, 524-28 (N.D. Cal. 2000). Moreover: Restrictive Covenants and Trade Secrets 37 [W]hen the statute of limitations begins to run on some of a plaintiff’s trade secrets claims against given defendants, the statute also begins to run at the same time as to other trade secret claims against those same defendants, even if there have not yet been any acts of misappropriation of the other trade secrets, at least when the plaintiff shared all the trade secrets with the defendants during the same time period and in connection with the same relationships and when the trade secrets concern related matters. Id. at 525-26 (quoting Intermedics, Inc. v. Ventritex, Inc., 822 F. Supp. 634, 657 (N.D. Cal. 1993)). “California law assumes that once a plaintiff knows or should know that a particular defendant cannot be trusted with one secret, it is unreasonable for that plaintiff simply to assume that that defendant can be trusted to protect other secrets.” Id. at 1027 (quoting Intermedics, Inc., 822 F. Supp. at 654); but see Display Research Labs., Inc. v. Telegen Corp., 133 F. Supp. 2d 1170, 1176-77 (N.D. Cal. 2001) (limitations period begins running upon discovery of actual misappropriation, not discovery of plan to misappropriate). On certification of a question by the Ninth Circuit Court of Appeals, the California Supreme Court held that a trade secret infringement claim arises “only once, at the time of the initial misappropriation . . . . Each new misuse or wrongful disclosure is viewed as augmenting a single claim of continuing misrepresentation rather than as giving rise to a separate claim.” Cadence Design Sys., Inc. v. Avant! Corp., 29 Cal. 4th 215 (Cal. 2002). However, California law distinguishes between the original misappropriator and third parties who were not a part of the original misappropriation, such as customers who purchased products containing the trade secrets and continue to use them after learning of the misappropriation. In regard to these third parties, a California appellate court has recently held that the statute of limitations does not begin to run until trade secret owner first had reason to suspect that a third party of the original misappropriator had obtained or used the software knowing, or with reason to know, that it contained the trade secrets. Cypress Semiconductor Corp. v. Superior Court, 163 Cal. App. 4th 575 (Cal. Ct. App. 2008). This holding prevents allowing a third party to “merely have to lie low and wait out the clock.” Thus, to ensure that its trade secrets are protected against future misappropriation, a company should promptly file a lawsuit against a perceived misappropriator and seek resolution of the matter in the context of the lawsuit. Alternatively, it may be sufficient to enter into a written agreement with the misappropriator expressly providing that the statute of limitations is tolled until the discovery of subsequent misappropriation. d. Risks Associated with Civil Discovery. Employers should be aware, before filing a trade secret misappropriation lawsuit, that civil litigation entails the risk of further unwanted disclosure of confidential information. Before commencing discovery, the party alleging misappropriation must identify the misappropriated trade secrets to its adversary “with reasonable particularity.” Cal. Code of Civ. Proc. § 2019.210. Reasonable particularity mandated by section 2019.210 does not mean that the Restrictive Covenants and Trade Secrets 38 party alleging misappropriation has to define every minute detail of its claimed trade secret at the outset of the litigation. Brescia v. Angelin, 172 Cal. App. 4th 133, 145 (Cal. Ct. App. 2009). Nor does it require a discovery referee or trial court to conduct a miniature trial on the merits of a misappropriation claim before discovery may commence. Id. Rather, it means that the plaintiff must make some showing that is reasonable, i.e., fair, proper, just and rational, under all of the circumstances to identify its alleged trade secret in a manner that will allow the trial court to control the scope of subsequent discovery, protect all parties’ proprietary information, and allow them a fair opportunity to prepare and present their best case or defense at a trial on the merits. Id. Where credible experts declare that they are capable of understanding the designation and of distinguishing the alleged trade secrets from information already known to persons in the field, the designation should, as a general rule, be considered adequate to permit discovery to commence. Id. at 146. Section 2019.210 does not require in every case that a trade secret claimant explain how the alleged trade secret differs from the general knowledge of skilled persons in the field to which the secret relates. Rather, such an explanation is required only when, given the nature of the alleged secret or the technological field in which it arises, the details provided to identify the secret are themselves inadequate to permit the defendant to learn the boundaries of the secret and investigate defenses or to permit the court to understand the designation and fashion discovery. Brescia v. Angelin, at 143 (Cal. Ct. App. 2009). Further disclosures of confidential information are likely to be required as discovery progresses. While the court can issue a protective order to limit the use and disclosure of confidential information disclosed through the discovery process, the possibility of inadvertent disclosures—and even intentional ones—cannot be altogether eliminated. Trade secret litigation also raises the possibility that a party’s proprietary or trade secret information will be disclosed to the public. California courts have the authority to seal records containing such information, but their authority is limited and discretionary. See Cal. Rules of Ct. 243.1, 243.2. One court has held that, despite these rules, sealing is mandatory in trade secret misappropriation cases because the Uniform Trade Secrets Act provides that “a court shall preserve the secrecy of an alleged trade secret” in such cases, see In re Providian Credit Card Cases, 96 Cal. App. 4th 292, 298-99 (2002) (citing Cal. Civ. Code § 3426.5), but employers should nevertheless be aware of the risk of disclosure. 2. The Inevitable Misappropriation Doctrine May Be Used to Prevent “Threatened” Misappropriation of Trade Secrets. Consider the following hypothetical situation: An employee with knowledge of his or her employer’s valuable trade secrets quits to join a competitor. The new job is nearly identical to the old job. As a result, the former employer believes that the employee will use its trade secrets in his or her new job, whether the employee intends to or not. Moreover, the former employer has evidence that the employee is not trustworthy or has engaged in conduct such as taking its files or other materials belonging to it. In such situations, the employer may be able to obtain an injunction enjoining the former employee from performing certain functions for the Restrictive Covenants and Trade Secrets 39 competitor under an emerging legal theory called the “inevitable misappropriation” or “inevitable disclosure” doctrine. Employers trying to prevent the misappropriation of their trade secrets before it happens are faced with two problems: (1) proving the “threat” (because former employees will rarely admit that they intend to use the company’s trade secrets); and (2) obtaining meaningful relief (since the typical “don’t use, don’t disclose” injunction will not suffice when misappropriation is in fact “inevitable”). Under appropriate circumstances, the inevitable misappropriation doctrine is designed to address both these problems. It provides both a method of proving the threat of misappropriation by circumstantial evidence and a remedy designed to prevent the irreparable injury that will occur if the employee assumes new responsibilities and, inevitably, uses the trade secrets. The theory can be condensed into a three-part test, whereby the former employer must prove: 1. The former employee has knowledge of the first employer’s trade secrets. 2. The employee’s new job duties (and the products or technology the employee is working on) are so similar or related to those in the former position that it would be extremely difficult not to rely on or use the first employer’s trade secrets. 3. The former employee and the new employer cannot be depended upon to avoid using the trade secret information. See PepsiCo, Inc. v. Redmond, 54 F.3d 1262 (7th Cir. 1995) (preliminary injunction granted enjoining former employee from assuming certain duties at competitor because it was inevitable that former employee would rely on plaintiff’s trade secrets). a. New York and Most Other States Have Adopted the Inevitable Misappropriation Doctrine. In New York, various courts have accepted the inevitable disclosure doctrine on a limited basis in appropriate circumstances. For example, in DoubleClick, Inc. v. Henderson, No. 116914/97, 1997 WL 731413 (N.Y. Sup. Ct. Nov. 7, 1997), the court enjoined two former highlevel employees of an Internet advertising company from launching their own competitive venture, or working for any other company in a competitive capacity, for a period of six months—without even reaching the issue of whether either defendant had breached any express non-compete or confidentiality agreement with DoubleClick. The court explained that the central role of the defendants in DoubleClick’s operations “makes it unlikely that they could ‘eradicate [DoubleClick’s] secrets from [their] mind.” Id. at *6 (quoting Lumex, Inc., 919 F. Supp. at 631). The court also noted that in light of the defendants’ actual acts of misappropriation, and their “cavalier attitude toward their duties to their former employer,” there was a reasonable inference that they would continue to use DoubleClick’s trade secret information in their new positions. Id. Similarly, in Lumex, Inc., 919 F. Supp. at 631, the court Restrictive Covenants and Trade Secrets 40 granted an injunction preventing a management representative from working with the plaintiff’s competitor on the grounds that it was inevitable that the former employee would disclose trade secret and confidential information in his effort to improve his new employer’s products. The court wrote: The Plaintiff’s employees testified that “it would be impossible for Highsmith not to divulge confidential information.” The Court agrees. The Court finds that ... there not only is a high risk, but it is inevitable that he will disclose important ... trade secrets and confidential information in his efforts to improve the Life Circuit product, and aid his new employer and his own future .... [T]here [thus exists] a high risk that in the course of working on Life Circuit or on other Life Fitness business, he will, perhaps, inadvertently, disclose ... trade secrets ... or even the Cybex future prototypes. Highsmith was privy to the top secret Cybex product, business and financial information. He cannot eradicate these trade secrets from his mind. Id.; see also Eastern Business Systems, Inc. v. Speciality Business Solutions, LLC, 739 N.Y.S.2d 177 (N.Y. App. Div. 2002) (issuing injunction based on inevitable disclosure doctrine, without specifically referring to the doctrine); Monovis, Inc. v. Aquino, 905 F. Supp. 1205, 1234 (W.D.N.Y. 1994) (noting that “even assuming the best of good faith, it is doubtful whether [defendant] could completely divorce his knowledge of the trade secrets”); Business Intelligence Servs., Inc. v. Hudson, 580 F. Supp. 1068, 1072 (S.D.N.Y. 1984) (inevitable disclosure found by computer software developer where employee’s new job duties with plaintiff’s competitor were similar to former position). But see International Paper Co. v. Suwyn, 966 F. Supp. 246, 258-59 (S.D.N.Y. 1997) (refusing to issue injunctive relief under inevitable misappropriation theory where there was no evidence that defendant would disclose any trade secret information, parties’ industry—wood and building products—is not “highly technical” or “copy cat” or “cloning” industry, and defendant’s employment at International Paper “was driven by general managerial expertise as opposed to highly technical, proprietary or secret information”). In Earthweb, Inc. v. Schlack, 71 F. Supp. 2d 299 (S.D.N.Y. 1999), aff’d in part and remanded, 205 F.3d 1322 (2d Cir. 2000), the court refused to apply the doctrine of inevitable disclosure where the defendant-employee had signed a narrow non-compete agreement and the plaintiff-employer was seeking to enjoin defendant’s post-employment activity beyond those activities that were prohibited under the non-compete agreement. The court reasoned that the plaintiff was seeking to have the court “rewrite the parties’ employment agreement under the rubric of inevitable disclosure and thereby permit [plaintiff] to broaden the sweep of its restrictive covenant.” Id. at 311. The court rejected the request and refused to allow plaintiff from “mak[ing] an end-run around the agreement by asserting the doctrine of inevitable disclosure as an independent basis for relief.” Id. Restrictive Covenants and Trade Secrets 41 Relying on the decision in Earthweb, the court in Marietta Corporation v. Fairhurst, 754 N.Y.S.2d 62 (N.Y. App. Div. 2003), refused to apply the inevitable disclosure doctrine. In Marietta, the plaintiff, a supplier of hotel amenities, commenced an action for misappropriation of trade secrets against its former Vice President for Sales and Marketing after he accepted a similar position with one of Marietta’s chief competitors. Although the employee was not subject to any non-compete agreement and although the trial court found no persuasive evidence that the employee had disclosed any of the plaintiff’s confidential information, the court granted the plaintiff’s motion for a preliminary injunction, enjoining the employee from working for the competitor for a period of 11 months from the date of the court’s injunction order. The trial court relied exclusively on the inevitable disclosure doctrine in issuing the injunction, finding that the employee “is undeniably in possession of plaintiff’s trade secrets, and it appears extremely likely that he would use those secrets—if only unconsciously—in carrying out his duties with [the competitor], to the [plaintiff’s] unfair advantage.” Marietta Corp. v. Fairhurst, Nos. 37265, RJI No. 2002-0229-M, 2002 WL 31056732, *4 (N.Y. Sup. Ct., Aug. 23, 2002). The Appellate Division vacated the injunction on appeal, finding no evidence of a breach of the employee’s confidentiality agreement or that the confidential information at issue constituted trade secrets. Marietta, 754 N.Y.S.2d at 62. The court further rejected the application of the inevitable disclosure doctrine and suggested that the inevitable disclosure doctrine had not yet been adopted by New York State courts. See also Renaissance Technologies Corp. v. Millennium Partners, LP, 2004 WL 4963292 (N.Y. Sup. Ct. March 19, 2004) (refusing to apply inevitable disclosure doctrine). In American Airlines, Inc. v. ImHof, see supra, the court noted that application of the inevitable disclosure doctrine required consideration of: (1) the strength of the showing that the former employee once knew – and still knows – information, that use of which on behalf of a competitor would damages the former employer, a factor that includes the issues whether the information in question is highly technical or specialized scientific data as opposed to perhaps less valuable and sensitive sales or general business management information, (2) the degree of similarity between the employee’s former and newly assumed duties, including whether the newly assumed duties are to be performed on behalf of a direct competitor of the former employer, … (3) the presence or absence of deliberate misappropriation, [and] … [(4)] anything else pertinent to a particular case. 620 F. Supp. 2d at 582. Considering these factors, the court found no irreparable harm and therefore denied American’s motion for a preliminary injunction in all respects. First, none of the documents retained by defendant included any substantive information that if remembered would be sufficient to create a clear showing of irreparable harm. Next, the court rejected, as nothing more than vague generalities, American’s assertion that the employee was exposed to an Restrictive Covenants and Trade Secrets 42 abundance of “other confidential information” that would warrant an injunction, such as American’s strategies for contacts with certain major financial institutions including information regarding its program for tiering and tying with J.P. Morgan, American’s practices of “stealth pricing,” the expiration date of key corporate contracts, specific overseas markets targeted by American, and the details of American’s relationship with Credit Suisse. Even though the positions at his former company and new company were substantially similar, American failed to provide sufficiently detailed information about what the employee may have allegedly known and why it should be protected as confidential. Other jurisdictions also have shown an increasing willingness to consider the inevitable misappropriation doctrine among the panoply of remedies available to the employer seeking to legitimately protect disclosure of trade secrets. See, e.g., Proctor & Gamble Co. v. Stoneham, 747 N.E.2d 268, 278-80 (Ohio Ct. App. 2000) (“An actual threat of harm exists when an employee possesses knowledge of an employer’s trade secrets and begins working in a position that causes him or her to compete directly with the former employer or the product line that the employee formerly supported.”); Cardinal Freight Carriers, Inc. v. J.B. Hunt Transp. Servs., Inc., 987 S.W.2d 642, 646-47 (Ark. 1999) (“evidence and findings are more than sufficient to show a threatened or inevitable misappropriation of [plaintiff’s] trade secrets”); Merck & Co. v. Lyon, 941 F. Supp. 1443, 1457-62 (M.D.N.C. 1996) (finding inevitable disclosure doctrine applicable in absence of noncompetition agreement); La Calhène, Inc. v. Spolyar, 938 F. Supp. 523, 531 (W.D. Wis. 1996) (“[Defendant] has such intimate knowledge of plaintiff’s business that he could not engage in a competing business, selling to the same customers, without inevitably relying on his knowledge of plaintiff’s trade secrets”); Neveux v. Webcraft Techs., Inc., 921 F. Supp. 1568, 1573 (E.D. Mich. 1996) (refusing to preliminarily enjoin enforcement of noncompetition agreement where “it would be virtually impossible for plaintiff to service [certain customer accounts] for [new employer] without using confidential information obtained as a result of his [prior] employment”); Diversified Fastening Sys., Inc. v. Rogge, 786 F. Supp. 1486, 1492-93 (N.D. Iowa 1991) (court enjoined employee from working for competitor of former employer because there was threatened disclosure of former employer’s product development and marketing trade secrets); Ackerman v. Kimball Int’l, Inc., 652 N.E.2d 507, 51011 (Ind. 1995) (affirming injunction enjoining defendant from working for any competitor of his former employer for one year because threat of misappropriation arose due to defendant’s “predeparture harvesting of [plaintiff’s] proprietary information” and, if misappropriation occurred, no remedy at law would be adequate). b. California Has Rejected the Inevitable Misappropriation Doctrine. A California state court recently addressed—and rejected—the inevitable disclosure doctrine for the first time in a published opinion. See Whyte v. Schlage Lock Co., 101 Cal. App. 4th 1443 (Cal. Ct. App. 2002). In Whyte, the court held that “this doctrine is contrary to California law and policy because it creates an after-the-fact covenant not to compete restricting employee mobility.” Id. at 1447. (For a discussion of the presumption under California law that Restrictive Covenants and Trade Secrets 43 such covenants are invalid, see Section III.D., supra.) Surprisingly, the court did not rely primarily on California Business & Professions Code section 16600, a statute designed to foster employee mobility. The court found that the policy embodied therein might be offset by the conflicting policy in favor of protecting trade secrets. See Whyte, 101 Cal. App. 4th at 1462. Rather, “[t]he chief ill in the covenant not to compete imposed by the inevitable disclosure doctrine is its after-the-fact nature: The covenant is imposed after the employment contract is made and therefore alters the employment relationship without the employee’s consent.” Id. at 1462-63. The holding in Whyte is consistent with the result in several federal cases that preceded it, in which the inevitable disclosure doctrine was likewise rejected under California law. See Globespan, Inc. v. O’Neill, 151 F. Supp. 2d 1229, 1235-36 (C.D. Cal. 2001); Danjaq LLC v. Sony Corp., 50 U.S.P.Q.2d 1638, 1640 n.1 (C.D. Cal. 1999); Bayer Corp. v. Roche Molecular Sys., Inc., 72 F. Supp. 2d 1111, 1117-20 (N.D. Cal. 1999); Computer Sciences Corp. v. Computer Assocs. Int’l, Inc., Nos. CV 98-1374, 98-1440, 1999 WL 675446, *16 (C.D. Cal. Aug. 13, 1999); see also Surgidev Corp. v. Eye Tech., Inc., 648 F. Supp. 661, 679, 695 (D. Minn. 1986), aff’d, 828 F.2d 452 (8th Cir. 1987); Maxxim Med., Inc. v. Michelson, 51 F. Supp. 2d 773, 786 (S.D. Tex.), revd. without reported opn., 182 F.3d 915 (5th Cir. 1999); see also Meissner Filtration Prods., Inc. v. Harrington, No. B170707, 2004 WL 2189249 (Cal. Ct. App. Sept. 30, 2004) (refusing to apply inevitable disclosure doctrine). The holding in Whyte was also foretold by the California Supreme Court’s decision to depublish the opinion in Electro Optical Indus., Inc. v. White, 76 Cal. App. 4th 653 (Cal. Ct. App. 1999), in which a California appellate court had adopted the inevitable disclosure doctrine as “rooted in common sense.” The decision in Whyte does not leave California employers without remedies when a key employee begins working for a competitor. Much of the evidence that normally would be used to invoke the inevitable disclosure doctrine may still be used to show “threatened” misappropriation, for which an injunction may be granted under California’s trade secret statute. See Cal. Civ. Code § 3426.2(a); see also Whyte, 101 Cal. App. 4th at 1458 (“We emphasize our decision is not a final adjudication of the issue of actual or threatened misappropriation . . . and we have serious concerns over evidence in the record . . . .”). In addition, the Whyte opinion could be read to mean that a contractual provision seeking to implement the inevitable disclosure doctrine might be enforceable. A California employer hoping to protect itself against “threatened” misappropriation must take certain steps immediately after the employee announces an intention to leave. For example, it is crucial that certain questions be asked of the departing employee regarding his new job, his knowledge of the ex-employer’s trade secrets, and the like. A carefully planned exit interview and a quick but thorough factual investigation is vital to the ex-employer’s case. See Section V.B., infra. California employers must be careful, however, to avoid bringing specious claims in subjective bad faith. In FLIR Systems, Inc. v. Parrish, 174 Cal. App. 4th 1270 (Cal. Ct. App. Restrictive Covenants and Trade Secrets 44 2009), two employees – Parrish and Fitzgibbons – decided to leave FLIR to start their own company mass producing similar devises as those produced by FLIR. The employees offered FLIR a noncontrolling interest in the new venture, but FLIR rejected and wished Parrish and Fitzgibbons success in their new endeavor. Parrish and Fitzgibbons entered into negotiations with a third party to acquire licensing, technology, and manufacturing facilities to start their business. Fearful that the new business would undermine FLIR's market, FLIR sued for injunctive relief and damages. Upon hearing of the lawsuit, the third party terminated business discussions with Parrish and Fitzgibbons. In August, 2006, Parrish and Fitzgibbons told FLIR that they were not going forward with their venture. FLIR dismissed the damage causes of action but proceeded to trial for a permanent injunction. The trial court found no misappropriation or threatened misappropriation of trade secrets. According to the court, it was uncontroverted that the employees received no funding for their company, did not start a new business, had no employees or customers, did not lease a facility or develop technology, and did not design, produce, sell, or offer to sell competing devises. Because there was no showing of actual damages, misappropriation, threatened misappropriation, or imminent harm, the court determined that FLIR filed an objectively specious action for an anticompetitive purpose. The court also found that FLIR brought the action in bad faith based on a theory of “inevitable disclosure,” a doctrine not recognized by California courts because it contravenes a strong public policy of employee mobility. Accordingly, the trial court granted the employees attorney's fees and costs. The court of appeal affirmed the award of attorney fees and costs, and awarded costs and attorney fees on appeal to the former employees. 3. Other Potential Remedies Available to the Employer a. Common Law Duty of Loyalty and Law of Unfair Competition. In many states, including California and New York, two common law doctrines also protect an employer from the misappropriation of confidential business information and trade secrets by an employee: the employee’s duty of loyalty owed to his employer and the law of unfair competition. Every employee owes a duty of loyalty to his employer. E.g. Bancroft-Whitney Co. v. Glen, 64 Cal. 2d 327, 346 n.10 (Cal. 1966) (discussing Restatement (Second) of Agency § 393 cmt. e (1958)); Duane Jones Co. v. Burke, 117 N.E.2d 237 (N.Y. 1954); Fowler v. Varian Assocs., Inc., 196 Cal. App. 3d 34, 41 (Cal. Ct. App. 1987); Frederick Chusid & Co. v. Marshall Leeman & Co., 279 F. Supp. 913, 918 (S.D.N.Y. 1968). The duty of loyalty requires that an employee exercise the utmost good faith and undivided loyalty in the performance of his duties, and prohibits him from acting in any manner inconsistent with the employer’s interests. See Maritime Fish Prods., Inc. v. World-Wide Fish Prods., Inc., 474 N.Y.S.2d 281, 285 (N.Y. App. Div. 1984) (“It is a firmly established principle in the law of this State that [an employee] is prohibited from acting in any manner inconsistent with his agency or trust and is at all times Restrictive Covenants and Trade Secrets 45 bound to exercise the utmost good faith and loyalty in the performance of his duties.”) (internal quotation omitted). Furthermore, all confidential information an employee acquires by reason of employment is the property of the employer, and the employee holds it in trust for the employer. The employee cannot use the confidential information in violation of this trust. Thus, the employee may not divulge or use confidential business information or trade secrets, or solicit customers acquired by reason of his employment and exploit them for the benefit of a competitor. “[A]n employee’s use of an employer’s trade secrets or confidential customer information can be enjoined even in the absence of a restrictive covenant when such conduct violates a fiduciary duty owed by the former employee to his former employer.” Churchill Communications Corp. v. Demyanovich, 668 F. Supp. 207, 211 (S.D.N.Y. 1987) (citations omitted); see also 7th Sense v. Liu, 631 N.Y.S.2d 835, 836 (N.Y. App. Div. 1995) (enjoining defendant, plaintiffs’ former officer and director, from competing against plaintiffs because defendant’s resignation “did not relieve him of his fiduciary obligations or liability for his acts of misappropriation” and because the defendant “was not entitled to directly and unfairly compete with [plaintiffs] in bad faith for the very purpose of misappropriating the confidential information pertaining to plaintiffs’ business obtained during his employment”); Arnold’s Ice Cream Co. v. Carlson, 330 F. Supp. 1185, 1188 (E.D.N.Y. 1971) (former employee enjoined from competing against former employer where court found that such competition constituted breach of duty of loyalty); Frederick Chusid & Co. v. Marshall Leeman & Co., 326 F. Supp. 1043, 1060-61 (S.D.N.Y. 1971) (court issued injunction barring former employees from inducing current employees to break contracts with plaintiff because such defendants had breached their relationship of confidence with plaintiff); Tour & Study, Inc. v. Hepner, 432 N.Y.S.2d 148, 149 (N.Y. App. Div. 1980) (three-year injunction against solicitation of customers held to be proper despite absence of restrictive covenant). The duty of loyalty also prohibits a current employee who plans to leave for new employment from soliciting his co-workers to join him before he departs. In GAB Business Servs., Inc. v. Lindsey & Newsom Claim Servs., Inc., 83 Cal. App. 4th 409 (Cal. Ct. App. 2000), a regional vice-president of GAB Business Services, Inc. received a job offer from Lindsey & Newsom Claim Services. Before leaving GAB, he solicited 17 lower-level employees to join him at Lindsey. The group left GAB en masse. The court held that any corporate officer who participates in management of the corporation and exercises discretionary authority owes a fiduciary duty to the employer. Id. at 419-20. The fiduciary duty ends only when the officer resigns or is removed from office. Id. at 421. Under these principles, the regional vice-president owed a fiduciary duty to GAB and could be found to have breached that duty by soliciting his co-workers to join Lindsey. Id. at 421-24. The courts also have concluded that a former employee’s improper use of confidential business information or trade secrets constitutes unfair competition. See Comprehensive Community Dev. Corp. v. Lehach, 636 N.Y.S.2d 755, 756 (N.Y. App. Div. 1996) (employee misappropriated patient lists); Rao v. Verde, 635 N.Y.S.2d 660, 661 (N.Y. App. Div. 1995) Restrictive Covenants and Trade Secrets 46 (prospective buyers continued to use confidential information from plaintiff’s patient list); Advanced Magnification Instruments, Ltd. v. Minuteman Optical Corp., 522 N.Y.S.2d 287, 290 (N.Y. App. Div. 1987) (employee’s illegal appropriation or copying of employer’s files or confidential information constitutes unfair competition); Allan Dampf, P.C. v. Bloom, 512 N.Y.S.2d 116, 117 (N.Y. App. Div. 1987) (unfair competition found where employee misappropriated and exploited customer lists). An unfair competition claim may also be brought against an employee’s new employer who knowingly reaps the benefits of the employee’s breach of his or her duty of loyalty to the former employer. See GAB Business Servs., Inc., 83 Cal. App. 4th at 424-25 (employer liable for unfair competition in connection with employee’s solicitation of co-workers while he was still working for former employer); Design Strategies, Inc. v. Davis, 384 F. Supp. 2d 649 (S.D.N.Y. 2005) (sales manager who diverted contract to competitor and then took job with competitor breached his duty of loyalty to his original employer and must pay back his salary for period in which he was working to divert contract). Reliance on the common law of breach of the duty of loyalty and/or unfair competition alone does not adequately protect the employer since these doctrines do not prevent an exemployee from competing directly with a former employer. In fact, courts have stated that “[i]t is fundamental that absent a [non-compete] covenant, ... an employee is free to compete with his or her former employer unless trade secrets are involved or fraudulent methods are employed.” Walter Karl, Inc. v. Wood, 528 N.Y.S.2d 94, 97 (N.Y. App. Div. 1988); see also Navigant Consulting, Inc. v. Wilkinson, 508 F.3d 277 (5th Cir. 2007) (court found liability where employees procured an office lease for employer while at the same time negotiating a secret deal to sell the business that would occupy the offices and planning to go to work for the buyer). Accordingly, the common law does not prevent an employee from seeking a job with a competing company or prohibit the employee from establishing a competing corporation. As long as an ex-employee does not use company time, facilities or proprietary secrets to build a competing business, the common law duties owed to the employer are not violated. Because the common law only partially offers an employer protection from a former employee, contractual agreements provide the best (and most comprehensive) protection against an ex-employee’s customer solicitation and unauthorized use of confidential business information, trade secrets and inventions. b. Tortious Interference with Contractual Relations By its terms, the general rule allowing competitors to solicit an employer’s workforce may not apply when the employee being solicited is not an at-will employee, but instead is employed under an express employment contract for a term of years. A competitor’s solicitation of an employee with knowledge that he or she is employed under an express contract may give rise to liability for tortious interference with contractual relations or the tort of inducing breach of contract. See Dryden v. Tri-Valley Growers, 65 Cal. App. 3d 990, 995 (Cal. Ct. App. 1977); Moye v. Eure, 204 S.E.2d 221, 223 (N.C. Ct. App. 1974) (competition does not mean “privilege to induce an employee to breach his contract with plaintiff;” however, liability denied Restrictive Covenants and Trade Secrets 47 because no contract existed); Ryan, Elliot and Co. v. Leggat, McCall & Werner, Inc., 396 N.E. 2d 1009 (Mass. App. Ct. 1979) (recruiting competitor’s employees known to be under a fixed term employment contract is actionable; liability denied because defendant did not know of term-nature of contract); Restatement of Torts (Second) § 768; Restatement of Agency (Second) § 393, comment e (“An employee is subject to liability if, before or after leaving the employment, he causes fellow employees to break their contracts with the employer”). It is worth noting here, however, that absent proof of some independently wrongful act (such as the misappropriation of a trade secret or the breach of a non-solicit agreement), a competitor who solicits another company’s at-will employees cannot be liable in California for tortious interference of contract or prospective economic advantage. E.g., Reeves v. Hanlon, 33 Cal. 4th 1140, 1152-53 (Cal. 2004); Korea Supply Co., v. Lockheed Martin Corp., 29 Cal. 4th 1134, 1158-59 (Cal. 2003). Other states may be more receptive to such claims. See, e.g., Reading Radio, Inc. v. Fink, 833 A.2d 199, 212 (Pa. Super. Ct. 2003); Town & Country House & Home Service, Inc. v. Newberry, 147 N.Y.S.2d 550 (N.Y. 1955). c. Common Law Misappropriation Employers may also find the tort of common law misappropriation an effective method to prevent the use or disclosure of their proprietary information. Unlike trade secret misappropriation, common law misappropriation does not require a plaintiff to prove either (1) secrecy or (2) independent economic value. Instead, “the elements of a claim for misappropriation under California law consist of the following: (a) the plaintiff invested substantial time, skill or money in developing its property; (b) the defendant appropriated and used the plaintiff’s property at little or no cost to the defendant; (c) the defendant’s appropriation and use of the plaintiff’s property was without the authorization or consent of the plaintiff; and (d) the plaintiff can establish that it has been injured by the defendant’s conduct.” United States Golf Ass’n v. Arroyo Software Corporation, 69 Cal. App. 4th 607, 618 (Cal. Ct. App. 1999) (citing Balboa Ins. Co. v. Trans Global Equities, 218 Cal. App. 3d 1327, 1342 (Cal. Ct. App. 1990)). In United States Golf Association, the plaintiff United States Golf Association (“USGA”) provided software that calculated handicaps for golfers. USGA spent ten years and over $2 million dollars in developing a superior handicap system. In addition, they spent substantial time and money promoting and advertising their handicap formula and the USGA trademark. The defendant, Arroyo Software Corporation (“Arroyo”), began marketing a computer software program for golfers known as “Eagle Trak.” Instead of developing its own handicapping formula, Arroyo appropriated the USGA handicap system without USGA’s permission and incorporated the software into its own system. The court held that Arroyo was liable for common law misappropriation. The court’s analysis turned on whether USGA had been injured. The court held it had been because consumers were likely to believe the Eagle Trak handicap system was issuing USGA approved handicaps to them (causing damage to USGA’s reputation). USGA did not need to prove that the information was secret or derived independent economic Restrictive Covenants and Trade Secrets 48 value by virtue of being secret. Moreover, the court did not require USGA and Arroyo to be direct competitors, as many unfair competition torts do. d. Antitrust Law Under certain circumstances, the federal antitrust laws may prohibit an employer from raiding a competitor’s employees. That is, an employer may have a claim under section 2 of the Sherman Act if a competitor with monopoly power acquires employees of the employer not for the purpose of using their talents but for the purpose of denying the employees’ talents to the employer. See Universal Analytics, Inc. v. MacNeal-Schwendler Corp., 914 F.2d 1256, 1258-59 (9th Cir. 1990). The utility to employers of a claim of predatory hiring may be limited because it only applies to competitors with monopoly power and because evidence of predatory intent, e.g., the competitor’s nonuse of the acquired employee, may be difficult to establish. Id. 4. Effect of Trade Secret Preemption Employers seeking remedies for trade secret misappropriation may find relief under the “common law” unavailable in the future. In the last five years, several courts throughout the country have issued opinions finding that common law claims are preempted by the state’s governing trade secrets statute. Courts have justified preempting claims by reasoning that the state’s version of the UTSA constitutes comprehensive legislation on the issue that therefore supplants the common law. See I.E. Assocs. v. Safeco Title Ins. Co., 39 Cal. 3d 281, 285 n.3 (Cal. 1985) (quoting Justus v. Atchison, 19 Cal. 3d 564, 574-75 (Cal. 1977)). “‘[G]eneral and comprehensive legislation, where course of conduct, parties, things affected, limitations and exceptions are minutely described, indicates a legislative intent that the statute should totally supersede and replace the common law dealing with the subject matter.’” Id. (quoting 2A Sutherland, Statutory Construction (Sands 4th ed. 1984) § 50.05, pp. 440-41). In particular, several district courts applying California law have held that “all state law claims based on the same nucleus of facts as the trade secrets claim are preempted under California’s UTSA.” Digital Envoy, Inc. v. Google, Inc., 370 F. Supp. 2d 1025, 1034 (N.D. Cal. 2005) (vacated on other grounds); Airdefense, Inc. v. Airtight Networks, Inc., No. C 05-04615, 2006 U.S. Dist. LEXIS 55364, at * 11 (N.D. Cal. July 26, 2006) (claims based on the same factual allegations as the claim for misappropriation of trade secrets are preempted); Callaway Golf Co. v. Dunlop Slazenger Group Ams., Inc., 318 F. Supp. 2d 216, 219-20 (D. Del. 2004) (California UTSA preempts unjust enrichment, conversion, and negligence claims); Ernest Paper Prods. v. Mobil Chem. Co., No. 95-7918, 1997 U.S. Dist. LEXIS 21781, *21-28 (C.D. Cal. Dec. 2, 1997) (California UTSA preempts intentional interference with economic relations and unfair business practices claim under Business & Professions Code § 17200); Convolve, Inc. v. Compaq Computer Corp., No. 00 CV 5141, 2006 U.S. Dist. LEXIS 13848, at *22-3 (S.D.N.Y. Mar. 29, 2006) (“the California UTSA, like other UTSAs, preempts all claims based on Restrictive Covenants and Trade Secrets 49 misappropriation of trade secrets that are not specifically exempted by its § 3426.7(b) savings clause.”) District courts in other states have also issued opinions preempting common law claims for misuse of confidential information. See, e.g., Compuware Corp. v. IBM Corp., No. 02-CV70906, 2003 WL 23212863, *8 (E.D. Mich. Dec. 19, 2003) (preempting tortious interference claim) (UTSA’s purpose was to “codify all the various common law remedies for theft of ideas” so that “plaintiffs who believe their ideas were pilfered may resort only to the UTSA”); Bliss Clearing Niagara, Inc. v. Midwest Brake Bond Co., 270 F. Supp. 2d 943, 946-47 (W.D. Mich. 2003); Auto Channel, Inc. v. Speedvision Network, LLC, 144 F. Supp. 2d 784, 789 (W.D. Ky. 2001) (preempting unfair competition claim under Kentucky UTSA) (allowing a plaintiff to plead common law theories for information covered by its trade secret claim “would undermine the uniformity and clarity that motivated the creation and passage of the Uniform Act.”); Penalty Kick Mgmt. Ltd. v. Coca Cola Co., 318 F.3d 1284, 1297-98 (11th Cir. 2003) (preempting conversion claim under Georgia UTSA). In analyzing whether claims are preempted, some courts have held that “the issue is not what label the plaintiff puts on their claims. Rather, the court is to look beyond the label and to the facts being asserted in support of the claims.” Convolve, No. 00 CV 5141, 2006 U.S. Dist. LEXIS 13848, at *23; Embarcadero Mun. Improvement Dist. v. County of Santa Barbara, 88 Cal. App. 4th 781, 793 (Cal. Ct. App. 2001) (rejecting party’s attempt to avoid statute of limitations by labeling a cause of action as one for a constructive trust). Courts have held that “all common law claims that are based on the same conduct which could support a UTSA cause of action” even if the plaintiff fails to bring, or characterize its claims as, a misappropriation of trade secrets cause of action. Convolve, No. 00 CV 5141, 2006 U.S. Dist. LEXIS 13848, at *25 (emphasis added). In other words, “if the operative facts are arguably cognizable under the [UTSA], any common law claim that might have been available on those facts in the past now no longer exists.” Id. (emphasis added); Bliss Clearing Niagara, 270 F. Supp. 2d at 948. In AccuImage Diagnostics Corp. v. Terarecon, Inc., 260 F. Supp. 2d 941, 953 (N.D. Cal. 2003), the court reviewed the “eleven provisions of the UTSA” before holding that “[t]he comprehensive structure and breadth of the UTSA provides strong evidence of legislative intent to supersede claims for common law misappropriation after the enactment of the UTSA.” 260 F. Supp. 2d at 953. In doing so, the court held that a common law misappropriation claim was preempted. However, the AccuImage court did not limit its analysis to claims for common law trade secret misappropriation. Rather, according to that court, all “common law remedies based on misappropriation of trade secrets are superseded.” Id; see also, K.C. Multi Media v. Bank of America, 171 Cal. App. 4th 939 (Cal. Ct. App. 2009) (section 3426.7 implicitly preempts alternative civil remedies based on trade secret misappropriation). In K.C. Multi Media v. Bank of America, the court addressed whether California's UTSA (“CUTSA”) should be interpreted narrowly or broadly in favor of preemption. According to appellants, two views exist on the preemption issue. The first, the broad view, holds that a cause Restrictive Covenants and Trade Secrets 50 of action is preempted if it is based on the same set of facts as the trade secrets claim. See Callaway Golf v. Dunlop Slazenger Group Americas, supra, 318 F. Supp. 2d 216, 219-20 (D. Del. 2004); and Digital Envoy, Inc. v. Google, Inc., 370 F. Supp. 2d 1025, 1034 (N.D. Cal. 2005) (vacated on other grounds). The second view, the narrow interpretation of preemption followed in Colorado, Minnesota, and Wisconsin, holds that a common law cause of action can be based on the same nucleus of facts as the trade secrets claim, so long as it alleges new facts, different injuries and damages, or a different theory of liability. Powell Products, Inc. v. Marks, supra, 948 F. Supp. 1469 (D. Co. 1996); Micro Display Systems, Inc. v. Axtel, Inc., 699 F. Supp. 202 (D. Minn. 1988); Burbank Grease Services, LLC v. Sokolowski, 717 N.W.2d 781 (Wis. 2006). Appellants argued that California’s version does not contain broad preemption language, but rather lists exceptions to preemption. The court, however, disagreed and held that CUTSA’s “comprehensive structure and breadth” suggests a legislative intent to occupy the field. Depending on the particular facts pleaded, CUTSA can operate to preempt the specific common claims – breach of confidence, interference with contract, and unfair competition – asserted in this case that are based on the same nucleus of facts as a misappropriation of trade secrets claim. Some courts have held that plaintiffs cannot avoid preemption by labeling the material allegedly misappropriated as merely “confidential” and not a trade secret. They hold that “the UTSA’s preemption provision has generally been interpreted to abolish all free-standing alternative causes of action for theft or misuse of confidential, proprietary, or otherwise secret information falling short of trade secret status.” Hauck Manufacturing Co. v. Astec Indus., Inc., 375 F. Supp. 2d 649, 655 (E.D. Tenn. 2004); Bliss Clearing Niagara, 270 F. Supp. 2d at 948-949 (“the disputed status of information as a trade secret does not preclude a court from determining whether a claim or claims are displaced by the [UTSA].”); Thomas & Betts Corp. v. Panduit Corp., 108 F. Supp. 2d 968, 972-973 (N.D. Ill. 2000) (holding that breach of fiduciary duty claim was preempted by the UTSA where the plaintiff simply alleged that the defendant “took, disclosed and used confidential information” as opposed to trade secrets); Learning Curve Toys, L.P. v. PlayWood Toys, Inc., No. 94 C 6884, 1999 U.S. Dist LEXIS 11262, at *3 (N.D. Ill. July 20, 1999) (holding that a claim may be displaced by the UTSA even if the information at issue does not constitute a trade secret); Composite Marine Propellers, Inc. v. Van Der Woude, 962 F.2d 1263, 1265 (7th Cir. 1992) (“[UTSA] has abolished all common law theories of misuse of [secret] information. Unless defendants misappropriated a trade secret, they did no legal wrong.”); BioCore, Inc. v. Khosrowshahi, 96 F. Supp. 2d 1221, 1238 (D. Kan. 2000) (“Even if confidential information can be something less than a trade secret, it must at least be a trade secret to give its owner a property right in it”). 5. Criminal Statutes. a. Federal Statutes. Recognizing that domestic and international theft of intellectual property is on the rise and that such information must be protected to ensure continued investment in research and development, Congress enacted the Economic Espionage Act of 1996. See 18 U.S.C. §§ 1831 et Restrictive Covenants and Trade Secrets 51 seq. The Act makes the theft of trade secrets a federal crime and provides severe penalties for such activity. Section 1832 targets domestic trade secret theft and prohibits such acts as taking, copying, downloading, uploading, and possessing, without authorization, a known stolen trade secret that is related to a product in interstate or foreign commerce. Trade secret theft is punishable by a fine and up to ten years in prison. On the other hand, § 1831 prohibits the same acts if they are done on behalf of a foreign government or agent (i.e. economic espionage). Economic espionage may result in up to a $500,000 fine and 15 years in prison. Employers are often concerned that the confidentiality of their trade secrets will be compromised in the course of a criminal investigation or prosecution. Fortunately, there are safeguards established to protect against the disclosure of a victim company’s trade secrets in criminal proceedings. The Attorney General can seek an order or take other necessary and appropriate action to preserve the confidentiality of the trade secrets. 18 U.S.C. § 1835. The Attorney General may also file a civil action to obtain appropriate injunctive relief against any violation of the Act. 18 U.S.C. § 1836. Federal prosecutors have applied the Act in several instances, including cases involving PPG Industries, Inc. (two individuals pleaded guilty to attempting to sell proprietary information to a rival), Bristol-Myers Squibb Co. (involving alleged theft of trade secrets relating to a new shaving system), and Avery Dennison Corp. (involving alleged theft of trade secrets relating to self-stick postage stamps). The Computer Fraud and Abuse Act, 18 U.S.C. § 1030, is another source of criminal penalties for certain types of trade secret misappropriation. It provides that “[w]hoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer if the conduct involved an interstate or foreign communication . . . shall be punished” as provided in the statute. 18 U.S.C. § 1030(a)(2)(C). It was held in one case that the statute applied to the misappropriation of trade secrets by an employee who used his work computer to obtain his employer’s trade secrets and email them to a future employer. See Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121 (W.D. Wash. 2000). Recently, another court has clarified that a computer fraud claim must show an unauthorized procurement or alteration of information, not merely misuse or misappropriation. Brett Senior & Assocs. v. Fitzgerald, No. 06-1412, 2007 U.S. Dist. LEXIS 50833 (D. Pa. July 13, 2007) (because employer allowed employee full access to computers until he left the employer, the employee neither accessed the computer system without authorization nor exceeded his authorized access). The statute also creates a civil remedy. See Section IV.B.1.a, supra. Announcements about recent prosecutions and other useful information about computerrelated crime can be found at www.cybercrime.gov. Restrictive Covenants and Trade Secrets 52 b. California Statutes. In California, many district attorneys’ offices are focusing their attention on the prosecution of high tech crimes, which include trade secret thefts. The unauthorized use or disclosure of an employer’s trade secrets by either a current or former employee can be prosecuted under such statutes as California Penal Code sections 499c and 502(c)(2). Section 499c applies to general acts of trade secret misappropriation. The statute makes it a crime to steal, use, or copy a trade secret without the authorization of the owner. Cal. Pen. Code § 499c(b). Violation of the statute is punishable by up to a $5,000 fine and time in either state prison or county jail. Id. § 499c(c). Indeed, a jail sentence is mandatory if the value of the stolen trade secrets exceeds a specified amount. See Cal. Pen. Code § 1203.044; People v. Farell, 28 Cal. 4th 381 (Cal. 2002). Section 499c was amended in 1996 to make it clear that both technical and non-technical trade secrets are protected by the statute. Section 502 is targeted toward what are commonly referred to as Computer Crimes. Today, many of an employer’s trade secrets are maintained in computer data systems. The legislative intent in enacting section 502 was to expand the degree of protection afforded to businesses against persons who tamper with, interfere with, or gain unauthorized access to companies’ computer data and computer systems. See Cal. Pen. Code § 502(a). A current or former employee who knowingly accesses and without permission takes, copies or makes use of any data from a computer, computer system or computer network could possibly be in violation of the statute. See id. § 502(c)(2). However, there is no criminal violation of this section if a current employee is acting within the scope of his or her lawful employment. See id. § 502(h)(1). As in federal prosecutions, California recognizes the need to protect the confidentiality of trade secrets in state prosecutions. See Cal. Evid. Code §§ 1060 et seq. To obtain such protection, the trade secret owner may file a motion for a protective order or the District Attorney may file such a motion on the owner’s behalf. See id. § 1061(b)(2). Further, the trade secret owner or the District Attorney on behalf of the owner may file a motion to exclude the public from any portion of a criminal proceeding in which the trade secret would otherwise be disclosed to the public. See id. § 1062(a). The moving party must demonstrate that there is a substantial probability that disclosure of the trade secret would cause serious harm, and the court must find that there is no overriding public interest in an open proceeding. Id. Motions to exclude the public are very difficult to obtain and are rarely granted. Under California Evidence Code section 1063, the District Attorney can request the sealing of articles protected by a protective order entered pursuant to sections 1060 or 1061. Although district attorneys’ offices recognize the need to prosecute crimes such as trade secret thefts, most offices have limited financial and technical resources to pursue these cases. To overcome these problems, it is not uncommon for employers who are victims of trade secret thefts to want to offer their resources and expertise to prosecutors. The California Supreme Restrictive Covenants and Trade Secrets 53 Court has recognized that victims of commercial and corporate crimes often assist prosecutions by collecting and organizing necessary information from internal sources. See People v. Eubanks, 14 Cal. 4th 580, 598 (Cal. 1996). However, such efforts should not include financial or expert assistance. If an employer provides technical expertise or financial assistance or otherwise becomes intricately involved in the investigation and prosecution of a former employee for trade secret theft, a court could find that the district attorney’s office that accepted this assistance has a conflict of interest. The district attorney’s office may then be recused from the case. A recusal would cause a delay and would likely have an impact on the overall prosecution of the case. The longer a trade secret prosecution is delayed, the harder it is to ensure that confidentiality is maintained throughout the case. Finally, the employer should take into consideration that proceeding in the criminal arena for trade secret theft involves a complete loss of control over the matter. All decisions on how the case is to be handled will be strictly in the hands of the government prosecutors, the employee/defendant, and the court. The first major test of California’s trade secrets theft statutes ended successfully for the prosecution in May 2001. The defendants—Avant Corp., its CEO, and six other individuals— were charged under Section 499c with stealing computer code from Cadence Design Systems, Inc., the individuals’ former employer. After years of legal maneuvering, the defendants entered no-contest pleas after jury selection had started. The court ordered them to pay a total of $35 million in fines and $195 million in restitution. Four of the individuals were given one- to twoyear jail sentences and the other two were placed on probation. A related civil case is still pending. c. New York Statutes. Unlike California, New York does not have a penal statute that specifically prohibits the misappropriation of trade secrets. However, New York does provide some criminal sanction through the vehicle of property laws. For example, in New York, a person commits larceny when he or she wrongfully takes property from an owner with the intent to deprive the owner of the same or to appropriate it to himself or herself or a third person. N.Y. Pen. Law § 155.02.1. For purposes of trade secrets, the applicable statutes are sections 155.00 and 156.30 of the New York Penal Law. New York’s trade secret protection is substantially limited in scope, in that sections 155.00 and 156.30 only protect scientific and technical information. Specifically, section 155.00 prohibits the theft of “secret scientific material.” The statute defines “secret scientific material” to encompass any document, device or substance that constitutes a scientific or technical process, invention or formula, which is not intended to be available to anyone other than the person rightfully in possession or an authorized third party. Id. § 155.00.6. Theft of secret scientific material is a Class E felony punishable by either up to a $5,000 fine or double the profit of the crime, and a maximum one-year sentence in prison. Id. § 155.30. Restrictive Covenants and Trade Secrets 54 Although the language of section 155.00 is somewhat more expansive than covering purely scientific material, it does not protect purely business information. Thus, the statute does not protect the majority of business, financial, economic, marketing, or product information. The statute is largely directed toward the needs of companies with products focusing on scientific information, such as biotech companies. Section 156.30 of the New York Penal Law is the analogue of California’s section 502, specifically targeted to computer crimes. Under this provision, it is a Class E felony to unlawfully duplicate computer-related material, i.e., computer data or programs, if the economic value appropriated is greater than $2,500. Id. § 156.30.1. Both sections 155.00 and 156.30 solely prohibit the theft and appropriation of tangible physical substances. Consequently, while New York does proscribe the unauthorized duplication or reproduction of a trade secret, it does so only to the extent that the reproduction is embodied in a tangible form. 6. Racketeer Influenced Corrupt Organizations Act. In a case that attracted much media attention, General Motors Corporation commenced an action against Jose Ignacio Lopez de Arriortua (and others) alleging that Lopez (a former General Motors executive) had had secret communications with representatives of Volkswagen AG in which he agreed to join Volkswagen and bring with him confidential business plans and trade secret information. See General Motors Corp. v. Lopez de Arriortua, 948 F. Supp. 670 (E.D. Mich. 1996). General Motors claimed that, among other things, Lopez violated the Racketeer Influenced Corrupt Organizations Act (“RICO”), 18 U.S.C. §§ 1962(c) & 1964(c), based on allegations of wire fraud, interstate and foreign travel to aid racketeering, and transportation and receipt of stolen goods. In denying the defendants’ motion to dismiss the RICO counts, the General Motors court held that General Motors’ complaint alleged a series of predicate acts (including a telephone call inducing Lopez to steal General Motors’ trade secrets, the defendants’ receipt and use of stolen documents and trade secrets, and various steps to cover up the receipt of the stolen documents) which, if proven, would amount to a “pattern of racketeering” in violation of RICO. General Motors, 948 F. Supp. at 678-79. The case subsequently settled for $100 million. V. A PRIMER ON STRATEGY: BEFORE AND AFTER AN EMPLOYEE LEAVES A. Drafting: Establishing and Maintaining Secrecy 1. Drafting Issues As discussed, supra, an employer cannot unilaterally define by contract what information qualifies as a trade secret. See Thompson, 113 Cal. App. 4th at 1430 (“Labeling information as a trade secret or as confidential information does not conclusively establish that the information fits this description.”) (citing Morlife, 56 Cal. App. 4th at 1522 (Cal. Ct. App. 1997)). Similarly, an employer cannot prevent the employee from using or disclosing non-trade secret information simply by defining the protected information broadly in the non-disclosure agreement. See, e.g., Restrictive Covenants and Trade Secrets 55 American Paper, 183 Cal. App. 3d at 1325 (“An agreement between employer and employee defining a trade secret may not be decisive in determining whether the court will so regard it”). Nonetheless, for several reasons, the contract should at least attempt to define the trade secrets, and should provide some detail in doing so (but not so much detail that certain trade secrets not listed are deemed not to be protected by the agreement). First, putting employees (and others) on notice as to what information the employer considers a trade secret is an important step in the process of establishing a trade secret. Second, courts are disinclined to enforce agreements requiring employees to keep confidential vaguely defined information the company later decides it would like to protect. See generally Motorola, Inc. v. Fairchild Camera & Instrument Corp., 366 F. Supp. 1173, 1183 (D. Ariz. 1973) (applying California law and refusing to enforce agreements in which employees agreed to “maintain strictly confidential during [and for two years after] my employment all . . . information of the company . . . which is of a confidential or secret nature”). However the protected information is defined in the agreement, it should be coupled with an acknowledgment by the employee that the information is owned by the employer, is secret, is the subject of reasonable efforts by the employer to keep it secret, and has value because of its secrecy. (These are, in fact, the standards for establishing, under the Uniform Trade Secrets Act, that the information is a trade secret.) The contract should, of course, provide that the employee will not use or disclose the information during or after employment, and should expressly provide that the employee’s duties extend until the information becomes generally known through proper means, if not indefinitely. It should also require the return of all notebooks, documents and related materials upon the termination of employment. a. Require Employees (And Third Parties Who Are Given Access) To Sign Confidentiality Agreements Confidentiality agreements are perhaps the most important and easiest way to establish that the employer has undertaken “reasonable efforts” with respect to its trade secrets. See, e.g., MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1993), cert. denied, 510 U.S. 1033 (1994) (requiring employees to sign confidentiality agreements is enough to demonstrate “reasonable steps” to preserve secrecy). These agreements also serve the goal of notifying employees of their obligations, so that inadvertent violations do not occur. As discussed above, in addition to the typical non-disclosure and non-use provisions, it is useful to have the employee acknowledge in the agreement that specified information is in fact confidential, valuable and protected as the trade secret of the employer. It is also useful to have the employee agree to return all documents upon termination of employment. Restrictive Covenants and Trade Secrets 56 b. Draft Separate Non-Compete, Non-Solicitation and NonDisclosure Provisions and Include a Severability Clause Because non-competition clauses are at risk of being invalidated, employment agreements should contain separate non-compete, non-solicitation and non-disclosure provisions. It is also advisable to include a severability clause, which provides that if a provision of the contract is held invalid, it may be severed so that the remaining provisions of the contract may be enforced. Similarly, it may be advisable to include a reformation provision, which allows a court to reform a contract to rewrite offensive restrictions so that they are enforceable. As discussed below, different states treat severability and reformation clauses differently. Accordingly, an employer should determine the law of the state in which it is doing business prior to drafting its employment agreement. Courts have adopted three general approaches to deal with offensive non-competition provisions. Under the first approach, the court will void the entire offensive contract provision even if the contract contains a severability clause. See, e.g., D’Sa v. Playhut, Inc., 85 Cal. App. 4th 927, 934 (Cal. Ct. App. 2000) (despite severability clause, court refused to preserve nonoffensive confidentiality provisions which also contained unlawful non-competition provisions); Latona v. Aetna United States Healthcare, Inc., 82 F. Supp. 2d 1089, 1097-1098 (C.D. Cal. 1999) (court upheld wrongful termination clause when defendant refused to sign employment contract with unenforceable non-competition clause, stating “that the unenforceability of the Agreement cannot be saved by the severability clause”). The second approach is known as the “blue pencil” rule, whereby the court will “blue pencil” or strike offensive portions of a non-compete (i.e., overly broad temporal or geographic limitations) and enforce the remainder of the covenant. Amex Distrib. Co. v. Mascari, 150 Ariz. 510, 515 (Ariz. Ct. App. 1986) (“Arizona will follow the blue-pencil rule adopted by the Restatement of Contracts”); Rinks v. Courier Dispatch Group, Inc., No. 1:01-CV-0678, 2001 U.S. Dist. LEXIS 4728 (D. Ga. Apr. 11, 2001) (“[U]nder Georgia law, courts may ‘blue pencil’ restrictive covenants to remove offending clauses in a ‘sale of business’ context”); Hamrick v. Kelley, 260 Ga. 307, 308 (Ga. 1990) (Georgia courts will not, however, use a blue pencil to correct vagueness in geographic area). For states applying the blue pencil rule, a severability clause may be advisable. If the offensive covenant cannot be severed, the entire contract may be invalidated. Zajicek v. Koolvent Metal Awning Corp., 283 F.2d 127, 133 (9th Cir. 1960) (“If this clause be inseverable, the contract would have been void in its inception.”) Under the third approach, which appears to be the trend that most states are following, courts are willing to reform a non-competition clause so that it is enforceable by inserting reasonable time or geographic restrictions. See Alexander & Alexander, Inc. v. Frank B. Hall & Co., No. 88-A-1621, 1990 U.S. Dist. LEXIS 21024 (D. Colo. Jan. 31, 1990) (“even where a noncompetition agreement does not contain a reasonable territorial restriction, the court has the authority to reform it under Colorado law”); Raimonde v. Van Vlerah, 325 N.E.2d 544, 546-547 (Ohio 1975) (collecting authorities for “abandon[ing] the ‘blue pencil’ test in favor of a rule of Restrictive Covenants and Trade Secrets 57 “reasonableness,” which permits courts” to modify a contract in light of the evidence); see also Central Adjustment Bureau, Inc. v. Ingram, 678 S.W.2d 28, 36-37 (Tenn. 1984) (same). Employers should not run the risk of having an entire contract severed when portions of it would otherwise be enforceable. When such provisions are intertwined and no severability clause exists, an employer is more likely to find its entire contract invalidated if it finds itself litigating in a state that regularly invalidates non-competition clauses. Further, when a departing employee is required to sign a separation agreement upon conclusion of employment, care should be used in drafting that agreement in order to avoid invalidating or superseding prior non-compete or confidentiality agreements. Avery Dennison Corp. v. Naimo, No. 06 C 3390, 2006 U.S. Dist. LEXIS 84204 (D. Ill. Nov. 16, 2006) (manufacturer lost its right to enforce a noncompetition agreement against a former sales director when the sales director signed a separation agreement referring to a “full and final” settlement of all employment matters). c. Alert Employees (And Third Parties With Access) To Existence of Trade Secrets And Remind Them of Confidential Nature It is extremely important that the employees or third parties who are given access to trade secrets understand that this information is to be treated confidentially. See, e.g., Courtesy, 222 Cal. App. 3d at 1288 (customer list held trade secret where employees were told of its confidential and proprietary nature when list was revealed to them). This can be accomplished through personnel manuals, use of a “confidential” stamp on key documents, reminder memoranda, posted warnings and similar methods. Obviously, before the trade secrets can be highlighted, they need to be identified by the company itself. A periodic trade secret audit is a very useful exercise in this regard. d. Limit Access to Only Those Employees (And Third Parties) Who “Need to Know” It To Perform Their Jobs Some courts view “need to know” access as an extremely important component of “reasonable efforts.” See Courtesy, supra. This can be accomplished through many avenues, including the use of security guards, key-lock entries, computer passwords and locked file drawers. e. Avoid Public Disclosure of Significant Portion of Information Through Display, Publication, Advertising and the Like The sine qua non of trade secret status is, of course, secrecy. See, e.g., Legislative Committee Comment to UTSA; Self Directed Placement Corp. v. Control Data Corp., 908 F.2d 462 (9th Cir. 1990). As a result, employers must guard against disclosure of their trade secrets. Restrictive Covenants and Trade Secrets 58 B. What To Do When An Employee Leaves This chapter has touched upon the procedures an employer should follow – during the period in which an individual is employed by it – to minimize the chances of harm after the employee leaves. Once an employee quits or is asked to leave a company, however, there is more that can and should be done – especially if the employee may be hired by a competitor. As soon as an employee decides to quit, or the decision is made to lay off a high-risk employee, an employer should take affirmative steps to discourage any misuse or disclosure of confidential information by the exiting employee, and to investigate fully the intentions of the departing employee with respect to his or her potential new employer. To accomplish both of these goals, the employer should routinely establish limits on computer and data access for departing employees, conduct exit interviews, and send follow-up letters when high risk employees leave. In addition, once the employee begins the new employment, the ex-employer should monitor the activities or developments by the new employer in order to detect any misappropriation as soon as possible. 1. Conduct and Document an Exit Interview On or before the employee’s last day on the job, the employer should arrange an exit interview with the employee. The exit interview presents a perfect opportunity to remind the employee of his or her duty of confidentiality regarding trade secrets, to answer any questions the employee may have concerning that duty, and to obtain the employee’s agreement to continue to honor the duty. It also offers an employer an appropriate opportunity to recover all confidential documents in the employee’s possession, as well as to interrogate the employee about any confidential information which may still be stored in the employee’s personal computer (in the office and/or at home) or on disks in the employee’s possession. To accomplish this specific goal, the interviewer should ask that all company documents, both hard copy and electronic, be returned. Finally, the exit interview assists the employer in assessing whether the employee’s potential new employment position will pose threats to the company’s trade secrets. The exit interview should be conducted by at least one supervisor of the exiting employee who is familiar with the nature and scope of the employee’s duties and responsibilities for the company. It may also include a member of the company’s legal staff or outside counsel. Whoever attends, the interviewers should come prepared with a comprehensive file on the exiting employee (including a list of the types of trade secret information that the employee had had access to as a result of his or her job duties) to ensure that the meeting is comprehensive and productive. At least one of the attendees should be an individual who could testify effectively, if necessary. The exit interview should not be adversarial. If the interviewers are too aggressive, the employee may provide less information and adopt a combative attitude, and the interview may fail to achieve anything productive. Restrictive Covenants and Trade Secrets 59 Finally, the employer should always document the exit interview. This documentation should be in the form of a memorandum, or at least a detailed outline or checklist, describing the exiting employee’s admissions regarding knowledge of specific trade secrets gained from his employment with the company, regarding his or her new employment duties, roles and responsibilities, and regarding his or her duties to the ex-employer. In addition, the document should provide for an acknowledgement by the employee of both his or her duties and obligations to maintain the secrecy of the company’s confidential information and that all company documents, both hard copy and electronic, have been returned. Ideally, the employee should sign the finished product for verification. a. Discovering Sufficient Information About the New Employer During the exit interview, the employer should try to learn as much as possible about the employee’s potential new employment. This could be extremely important information if the employer ultimately seeks an injunction to protect its trade secrets. In addition to conducting independent research on the new employer, the former employer should ask the employee for any letters or other documents from the new employer detailing the employee’s new job responsibilities. It would be extremely helpful for the employer to learn, at a minimum (1) where the employee will be working; (2) what positions he or she will hold; (3) the general nature of the projects he or she will be working on, as well as the functions he or she will be performing; (4) the compensation and bonus incentives offered; and (5) other relevant information affecting the employee’s departure. b. Ensure the Continuous Safety of Confidential Information An employer should use the exit interview as an opportunity to take affirmative steps to ensure the safety of its confidential information. The employer should remind the employee of his or her duty of confidentiality regarding trade secrets and offer to answer any questions the employee may have concerning that duty. Moreover, the employer should ask that the employee return all company documents, both hard copy and electronic, and get confirmation that the employee has done so. This confirmation will be extremely useful later, if it is determined that the employee has, to the contrary retained company documents and information. In that event, the employee will be hard-pressed to claim this was merely an oversight. c. Determine Whether the Departing Employee Has Ill Will Or a Motive to Compete Unfairly If conducted non-adversarially, the exit interview presents an excellent opportunity to determine whether the departing employee is motivated to hurt the company. It is also an opportunity for the employee to “vent” and for the employer to understand and address any issues the departing employee raises. Doing so may significantly reduce the threat of misappropriation. It may also provide important evidence if an injunction is later sought. Restrictive Covenants and Trade Secrets 60 2. Search the Departing Employee’s Workspace and Review the Employee’s Computer To ensure that an exiting employee has returned all of a company’s confidential information upon his/her departure, the company may want co-workers familiar with the employee’s filing and record-keeping systems, work projects and responsibilities to search the employee’s workspace and computer files (looking especially at the employee’s recently deleted computer files, recent downloads, etc.) upon departure. The company should also speak to the departing employees’ co-workers – they may have seen or heard suspicious things in the last weeks of the employee’s employment. If the company has suspicions about the employee, it may decide to check the employee’s e-mails, voicemails and phone records. Because privacy concerns may be implicated by a review of these materials, the company should first consult its own policies to ensure that such reviews are permitted. 3. If the Risk of Misappropriation is Present, Conduct a Forensic Analysis of the Employee’s Computer a. What Computer Forensic Analysis May Show Employee-assigned computers 6 often contain a wealth of information about the employees who use or used them. They may contain personal email communications with a competitor or others showing that the employee began working for the competitor before leaving the company. They may show that the employee transmitted confidential company documents to a competitor or to a personal email account before leaving. They may contain evidence that the employee had planned to work on the same projects for a competitor, and took steps to sabotage the company’s work on those projects before leaving. They will almost certainly shed some light on what the employee was up to before leaving the company, or show that the employee took steps to delete files from this computer evidence before leaving. b. When To Perform Computer Forensic Analysis If the company has decided to examine forensically a departing employee’s computer, it is best to create a forensic image or copy of the computer as soon as possible. This will significantly reduce the risk of accidental or intentional loss of electronic evidence from the computer (as discussed in greater detail below). 6 This discussion focuses on an individual employee’s workstation computer. A company’s extended network, databases, email system, and other electronic systems the employee has access to may also contain valuable information, and similar considerations apply when considering whether and when to investigate those sources of information. Restrictive Covenants and Trade Secrets 61 Sometimes employees take steps to destroy electronic evidence on their computers just before returning them. A pre-departure forensic preservation of the employee’s computer may contain all of the later-deleted files, showing precisely what the employee tried to delete.7 It is possible to conduct a forensic preservation with little or no disruption to an existing employee who is about to depart. An early examination may also provide valuable information for the company to use during the employee’s exit interview. If, for example, the computer shows that the employee downloaded or transmitted confidential documents outside the company during the employee’s last week of work, the exit interview might spend time discussing the confidentiality of those types of documents and seek confirmation that all such documents have been returned. Early information will better equip the company to respond to problems as they are occurring, expose misrepresentations, and obtain valuable evidence if an injunction is later sought. Even if an early forensic image was previously made, the employee’s computer should be forensically preserved after it is returned and before it is used by another. Sometimes employees download or transmit confidential documents or information outside the company just before returning their computers – i.e. before the employee loses access to the company’s electronic documents and databases. It is important to capture these final actions on the computer. c. Things To Remember When Performing Computer Forensic Analysis (1) Electronic evidence can be easily and inadvertently lost through computer use To preserve the volatile electronic evidence residing on a computer, the computer forensic analysis process starts by creating a forensic image of the computer. Every time a computer is used there is at least a risk that data on the computer will be inadvertently altered or destroyed. If someone boots the computer up after the departed employee returns it – but before it has been forensically preserved – deleted files of interest may be overwritten and rendered unrecoverable. Creating a forensic image of the computer preserves all evidence on the computer at the time the image was made. (2) Forensic images are special copies that preserve electronic evidence A forensic image of a computer is a sector by sector copy of the entire electronic storage media (computer hard drive) created without altering the original evidence. Often IT or HR personnel make copies that they mistakenly believe to be complete forensic copies. Without appropriate care, the processes used to make these copies may cause additional loss of evidence. 7 A computer forensic recovery, after the deletions have occurred, will likely recover some but not all of those files. The employee deletion process will effectively overwrite previously deleted files that may have otherwise been recoverable. Restrictive Covenants and Trade Secrets 62 Counsel or a computer forensic expert should be able to advise you on how to create a proper forensic image. Once a forensic image is made, it is possible to recover deleted files, search fragments of deleted files, and perform additional analysis with no risk 8 of losing the electronic evidence. Once the image is secure, the original hard drive could (in theory) be used freely without risk of losing the original data stored on the back-up image. It is safer, however, to leave the original computer hard drive untouched until you determine that no useful evidence resides on it or that the evidence will not be needed in court. (3) Don’t assume the “wiped” computer no longer contains useful evidence Sometimes an employee’s computer will be “wiped” by the Company’s IT personnel and reassigned to a new user at the company, as part of the employee’s termination process. The term “wipe” may mean different things, but when used in a typical business setting it does not usually mean that the computer no longer contains recoverable data. In this situation, or when a computer has been put back into use after the employee departed, do not assume that it is too late to obtain evidence using computer forensic analysis. Though it may be more difficult and costly, sometimes the results are well worth the effort. There is a chance of recovering anything that showed on the computer screen at one time – even if it was years ago and the computer has been in use since that time. (4) Complete forensic analysis requires input from the company and investigators A complete forensic analysis of a computer image requires input from the company and the investigating team. Disk storage capacity has increased rapidly in recent years, and computers today often contain huge amounts of information. The computer forensic analysis process involves sorting the relevant parts out from this mass of data, and attempting to make those parts understandable and user friendly. It is sometimes useful to compare what is known or suspected about an employee’s computer use or behavior against any electronic tracks left on the employee’s computer. An employer might want to provide information from employee files, witness interviews, timelines, summaries of suspected or possibly wrongful behavior, and/or examples of documents that may have been taken. Any information that helps target or narrow the analysis can be useful. Input from the company and investigators may be useful during forensic sorting processes such as keyword searching, database / internet history review, file use history review, software use analysis, event log review, and even deletion reconstruction / 8 It is worth noting that the process of creating a forensic image carries with it some risk of drive failure or data loss, as the hard drive may have to be removed from the computer box for imaging. This said, it is best to create a forensic image or use other forensically secure methods if the computer information might be relevant to litigation. Restrictive Covenants and Trade Secrets 63 analysis. The more information the forensic examiner has, the more relevant his or her results are likely to be. That said, a company should bear in mind that legal privilege may be waived regarding the input provided to a testifying forensics expert. Typically counsel is employed to oversee suspicious departed employee investigations and the associated computer forensic analyses. If the computer forensic expert later testifies, legal privilege may be waived in whole or part regarding the materials provided to the expert as part of that investigation. (5) Ask questions about the forensic analysis process and results Sometimes important information on a computer is overlooked because nobody asked follow-up questions about the initial forensic analysis. The computer forensics expert must merge his or her own vast software knowledge with the specific case facts and large repositories of information found on every computer. With so much information and so many possible variations of hardware, software and facts involved, it is unlikely that any forensics expert will know or remember everything required to cull out and interpret all of the useful information from every computer. The forensic analysis process tends to yield the best results when there is open communication, common sense questioning, and iterative review. Don’t be afraid to ask questions, even if you don’t think you know very much about computers. Some of the lessons above are illustrated by a case we had involving computer forensics on a drive that a departed employee had wiped. The forensic expert initially reported that the computer had been wiped clean in such a manner that essentially nothing remained other than the reinstalled Operating System. The overall report was that the computer was “pretty clean.” Our team asked when this reinstallation had occurred, and we were informed that the OS installation files were created almost a year ago (according to the system clock). This was odd, since we believed the computer had been used during the past year based on other case information. We probed further, and reviewed the image ourselves. It turned out that on the “second day” of the OS reinstallation, the user had accessed an Internet page. Some advertisement graphics from that page for episodes of the “Today Show” were still on the computer. The computer system clock seemed to tell us that these advertisements had been aired over a year ago, but we were able to determine (and later prove) that the Today Show episodes on which they appeared had in fact aired much later–just a few weeks before our examination. In addition, the OS reinstallation (according to the system clock) was begun exactly one year before it finished on the second day of the OS reinstallation – which, if correct, would have meant that (1) the computer had not been used during the employee’s time with the company (when we knew it had been used), and (2) the OS reinstallation took an entire year to complete. The truth that emerged, however, was that the defendant computer–user had intentionally and improperly rolled back the system clock a year to hide the fact that he had wiped the computer, and destroyed the electronic evidence, after we had demanded that the computer was not to be Restrictive Covenants and Trade Secrets 64 touched and the evidence was to be preserved. This ultimately was a critical and very powerful piece of evidence of spoliation in our case. 4. Send Follow-Up Letters Once an employee has left a company, and certainly before he/she has started his or her new job, the company may want to send follow-up letters to both the former employee and the new employer. The letters should remind the former employee, once again, of his or her duty not to disclose or misappropriate any of the former employer’s confidential information, and give notice to the new employer of the employee’s duty of confidentiality. The former employer should get concrete documentation of the delivery of follow-up letters by using registered mail. A follow-up letter to the new employer of a former employee should include: (1) a statement that the new employee has knowledge of certain, specific trade secrets; (2) an explanation of the continuing obligation that the employee has to maintain confidentiality; (3) an affirmative statement of the former employer’s rights to the trade secret information; and (4) a statement that the previous employer intends to vigorously pursue its legal rights with respect to the trade secrets. All letters, to be effective, should not merely make threats. Instead, they should seek answers to important questions and ask for confirmation that the obligations are being met. An effective letter sets the stage for a temporary restraining order or preliminary injunction, by putting the burden on the departing employee to demonstrate his or her good faith. All letters to the new employer must be drafted with caution. A company must make sure that follow-up letters do not threaten litigation based merely on the fact of changed employment. Nor should the letters contain any derogatory statements which may give rise to a defamation claim by the former employee. See Herzog v. A Company, 138 Cal. App. 3d 656 (Cal. Ct. App. 1982). 5. Determine The Applicability of Restrictive Covenants and Insist on Compliance If the employer determines that the employee’s new job responsibilities will entail a violation of an enforceable restrictive covenant, it should inform the employee at once of its intention to enforce the covenant. If this notice does not cause the employee to withdraw from (or to reformulate) his proposed new employment, the employer should contact the new employer. To avoid litigation and an injunction, the new employer may be willing to limit the new employee’s duties for a period of time. In some cases, where there is no way for the employee to be of use to his or her new employer without using the former employer’s trade secrets, it may be advisable for the former employer to seek to prevent the employee from doing any work for the new employer under the inevitable misappropriation doctrine (or a variation thereof), as discussed in Section IV.B.2., Restrictive Covenants and Trade Secrets 65 supra. One costly alternative short of litigation is to enter into a consulting contract with the key employee upon termination of employment. Under the consulting contract, the employer would be able to prevent the former key employee from working for and divulging information to a competitor. 6. Monitor the Risk Early detection of the disclosure or misappropriation of trade secret information is vital to protecting the information from further misuse. Therefore, when an employee leaves to work for a competitor, the former employer should closely monitor any apparent shifts in the competitor’s activities. The former employer should be particularly mindful of the sudden adoption of new marketing strategies; new, unanticipated business ventures; or large sales by the new employer to the former employer’s clients. While it is the company’s sales force or distributors who will most likely be making these observations, it is important that they pass on these developments to the legal department so that they can be evaluated in the trade secret context. VI. CONCLUSION In years to come, an employer is likely to find that the “crown jewels” of its intellectual property portfolio are its trade secrets. As such, employers must continue to protect their trade secrets by diligently monitoring the activities of their departing employees and their motivations for leaving. While this chapter has provided an overview of trade secrets law and summarized different avenues to safeguard against wrongful dissemination of trade secrets, it is by no means exhaustive. Employers should continue to update their knowledge of the law of their state to successfully preserve these valuable assets, prevent trade secret theft, and ultimately prevail in trade secret litigation. Restrictive Covenants and Trade Secrets 66 TABLE OF AUTHORITIES Page FEDERAL CASES A.F.A. Tours, Inc. v. Whitchurch, 937 F.2d 82 (2d Cir. 1991).................................................................................................... 9 AccuImage Diagnostics Corp. v. Terarecon, Inc., 260 F. Supp. 2d 941 (N.D. Cal. 2003) ................................................................................. 51 Airdefense, Inc. v. Airtight Networks, Inc., No. C 05-04615, 2006 U.S. Dist. LEXIS 55364 (N.D. Cal. July 26, 2006) .......................... 50 Alexander & Alexander, Inc. v. Frank B. Hall & Co., No. 88-A-1621, 1990 U.S. Dist. LEXIS 21024 (D. Colo. Jan. 31, 1990) ............................. 58 American Airlines, Inc. v. ImHof, 620 F. Supp. 2d 574 (S.D.N.Y. 2009) ............................................................................37, 43 Am. Family Mut. Ins. Co. v. Roth, 485 F.3d 930 (7th Cir. 2007)............................................................................................. 2, 7 American Inst. of Chem. Eng’rs v. Reber-Friel Co., 682 F.2d 382 (2d Cir. 1982).....................................................................................13, 15, 17 Anacomp, Inc. v. Shell Knob Servs., Inc., No. 93 Civ. 4003, 1994 WL 9681 (S.D.N.Y. Jan. 10, 1994).................................................. 9 Arias v. Solis, 754 F. Supp. 290 (E.D.N.Y. 1991) ...................................................................................... 18 Arnold’s Ice Cream Co. v. Carlson, 330 F. Supp. 1185 (E.D.N.Y. 1971) .................................................................................... 47 Auto Channel, Inc. v. Speedvision Network, LLC, 144 F. Supp. 2d 784 (W.D. Ky. 2001)................................................................................. 50 Avery Dennison Corp. v. Naimo, No. 06 C 3390, 2006 U.S. Dist. LEXIS 84204 (D. Ill. Nov. 16, 2006)................................. 59 Award Incentives, Inc. v. Van Rooyen, 263 F.2d 173 (3d Cir. 1959)................................................................................................ 20 Restrictive Covenants and Trade Secrets iii TABLE OF AUTHORITIES (continued) Page Bayer Corp. v. Roche Molecular Sys., Inc., 72 F. Supp. 2d 1111 (N.D. Cal. 1999) ................................................................................. 45 Bennett v. Medtronic, Inc., 285 F.3d 801 (9th Cir. 2002)..........................................................................................25, 26 BioCore, Inc. v. Khosrowshahi, 96 F. Supp. 2d 1221 (D. Kan. 2000).................................................................................... 52 Bliss Clearing Niagara, Inc. v. Midwest Brake Bond Co., 270 F. Supp. 2d 943 (W.D. Mich. 2003) ..................................................................50, 51, 52 Bradford v. New York Times Co., 501 F.2d 51 (2d Cir. 1974).................................................................................................. 17 Branson Ultrasonics Corp. v. Stratman, 921 F. Supp. 909 (D. Conn. 1996)....................................................................................... 13 Brett Senior & Assocs. v. Fitzgerald, No. 06-1412, 2007 U.S. Dist. LEXIS 50833 (D. Pa. July 13, 2007)..................................... 53 Buffets, Inc. v. Klinke, 73 F.3d 965 (9th Cir. 1996)................................................................................................... 7 Business Intelligence Servs., Inc. v. Hudson, 580 F. Supp. 1068 (S.D.N.Y. 1984) ...............................................................................20, 42 Cacique, Inc. v. Robert Reiser & Co., 169 F.3d 619 (9th Cir. 1999)............................................................................................... 36 Callaway Golf Co. v. Dunlop Slazenger Group Ams., Inc., 318 F. Supp. 2d 216 (D. Del. 2004) ...............................................................................50, 51 Ctr. for Auto Safety v. Nat’l Highway Traffic Safety Admin., 93 F. Supp. 2d 1 (D.D.C. 2000) ............................................................................................ 3 Chi. Title Ins. Corp. v. Magnuson, 487 F.3d 985 (6th Cir. 2007)............................................................................................... 13 Restrictive Covenants and Trade Secrets iv TABLE OF AUTHORITIES (continued) Page Churchill Communications Corp. v. Demyanovich, 668 F. Supp. 207 (S.D.N.Y. 1987) ...................................................................................... 46 Cintas Corp. v. Perry, 517 F.3d 459 (7th Cir. 2008)............................................................................................... 26 Composite Marine Propellers, Inc. v. Van Der Woude, 962 F.2d 1263 (7th Cir. 1992)............................................................................................. 52 Computer Economics, Inc. v. Gartner Group, Inc., 50 F. Supp. 2d 980 (S.D. Cal. 1999)...................................................................................... 7 Computer Sciences Corp. v. Computer Assocs. Int’l, Inc., Nos. CV 98-1374, 98-1440, 1999 WL 675446 (C.D. Cal. Aug. 13, 1999) ........................... 45 Compuware Corp. v. IBM Corp., No. 02-CV-70906, 2003 WL 23212863 (E.D. Mich. Dec. 19, 2003) ................................... 50 Consolidated Brands, Inc. v. Mondi, 638 F. Supp. 152 (E.D.N.Y. 1986) ........................................................................................ 9 Convolve, Inc. v. Compaq Computer Corp., No. 00 CV 5141, 2006 U.S. Dist. LEXIS 13848 (S.D.N.Y. Mar. 29, 2006)....................50, 51 Coolidge Co. v. Mokrynski, 472 F. Supp. 459 (S.D.N.Y. 1979) ...................................................................................... 19 County of Nassau, N.Y. v. Leavitt, 524 F.3d 408 (2d Cir. 2008)................................................................................................ 37 Danjaq LLC v. Sony Corp., 50 U.S.P.Q.2d 1638 (C.D. Cal. 1999) ................................................................................. 44 Design Strategies, Inc. v. Davis, 384 F. Supp. 2d 649 (S.D.N.Y. 2005) ................................................................................. 47 Digital Envoy, Inc. v. Google, Inc., 370 F. Supp. 2d 1025 (N.D. Cal. 2005) ..........................................................................50, 51 Restrictive Covenants and Trade Secrets v TABLE OF AUTHORITIES (continued) Page Display Research Labs., Inc. v. Telegen Corp., 133 F. Supp. 2d 1170 (N.D. Cal. 2001) ............................................................................... 38 Diversified Fastening Sys., Inc. v. Rogge, 786 F. Supp. 1486 (N.D. Iowa 1991) .................................................................................. 44 Earthweb, Inc. v. Schlack, 71 F. Supp. 2d 299 (S.D.N.Y. 1999), aff’d in part and remanded, 205 F.3d 1322 (2d Cir. 2000) ................................................................................................................18, 19, 42 Ecolab, Inc. v. Paolo, 753 F. Supp. 1100 (E.D.N.Y. 1991) ...................................................................................... 9 Ernest Paper Prods. v. Mobil Chem. Co., No. 95-7918, 1997 U.S. Dist. LEXIS 21781 (C.D. Cal. Dec. 2, 1997)................................. 50 Estee Lauder Co. v. Batra, 430 F. Supp. 2d 158 (S.D.N.Y. 2006) ................................................................................. 20 Fabkom, Inc. v. R.W. Smith & Assocs., Inc., No. 95 Civ. 4552, 1996 WL 531873 (S.D.N.Y. Sept. 19, 1996) ............................................ 8 Faiveley Transport Malmo v. Wabtec Corp. 559 F.3d 110 (2d Cir. 2009)............................................................................................ 8, 37 Ferrofluidics Corp. v. Advanced Vacuum Components, Inc., 968 F.2d 1463 (1st Cir. 1992) ............................................................................................. 14 Forcier v. Microsoft Corp., 123 F. Supp. 2d 520 (N.D. Cal. 2000) ................................................................................. 38 Frederick Chusid & Co. v. Marshall Leeman & Co., 326 F. Supp. 1043 (S.D.N.Y. 1971) ...............................................................................19, 47 Frederick Chusid & Co. v. Marshall Leeman & Co., 279 F. Supp. 913 (S.D.N.Y. 1968) ...................................................................................... 46 General Motors Corp. v. Lopez de Arriortua, 948 F. Supp. 670 (E.D. Mich. 1996) ................................................................................... 56 Restrictive Covenants and Trade Secrets vi TABLE OF AUTHORITIES (continued) Page Geritrex Corp. v. Dermarite Indus., LLC, 910 F. Supp. 955 (S.D.N.Y. 1996) ........................................................................................ 9 Globespan, Inc. v. O’Neill, 151 F. Supp. 2d 1229 (C.D. Cal. 2001) ............................................................................... 44 Grand River Enter. Six Nations, Ltd. v. Pryor, 481 F.3d 60 (2d Cir. 2007).................................................................................................. 37 Hair Club for Men, LLC v. Elite Solutions Hair Alternatives, Inc., No. 2:07-cv-546-GEB-KJM, 2007 U.S. Dist. LEXIS 30167 (E.D. Cal. Apr. 5, 2007) ........... 2 Hauck Manufacturing Co. v. Astec Indus., Inc., 375 F. Supp. 2d 649 (E.D. Tenn. 2004)............................................................................... 52 Health Mgmt., Inc. v. Hotte, No. 97 Civ. 3267 (E.D.N.Y. Sept. 15, 1997) ....................................................................... 16 Hollingsworth Solderless Terminal Co. v. Turley, 622 F.2d 1324 (9th Cir. 1980)......................................................................................... 8, 33 Hudson Hotels Corp. v. Choice Hotels Int’l, 995 F.2d 1173 (2d Cir. 1993), abrogated on other grounds, Nadel v. Play-by-Play Toys & Novelties, Inc., 208 F.3d 368 (2d Cir. 2000)............................................................ 35 Ikon Office Solutions, Inc. v. Am. Office Prods., Inc., 178 F. Supp. 2d 1154 (D. Or. 2001) ...................................................................................... 2 Imperial Chem. Indus., Ltd. v. National Distillers & Chem. Corp., 342 F.2d 737 (2d Cir. 1965).................................................................................................. 9 Innovative Networks, Inc. v. Satellite Airlines Ticketing Ctrs., Inc., 871 F. Supp. 709 (S.D.N.Y 1995) ....................................................................................... 19 Intermedics, Inc. v. Ventritex, Inc., 822 F. Supp. 634 (N.D. Cal. 1993)...................................................................................... 38 International Paper Co. v. Suwyn, 966 F. Supp. 246 (S.D.N.Y. 1997) .............................................................................9, 18, 42 Restrictive Covenants and Trade Secrets vii TABLE OF AUTHORITIES (continued) Page Ivy Mar. Co. v. C.R. Seasons, Ltd., 907 F. Supp. 547 (E.D.N.Y. 1995) ....................................................................... 2, 15, 18, 20 Johnson Controls, Inc. v. A.P.T. Critical Sys., 323 F. Supp. 2d 525 (S.D.N.Y. 2004) ................................................................................... 2 Kamyr AB v. Kamyr, Inc., No. 91-CV-0453, 1992 WL 317529 (N.D.N.Y. Oct. 30, 1992)............................................ 10 Kewanee Oil Co. v. Bicorn Corp., 416 U.S. 470 (1974)...................................................................................................3, 10, 16 La Calhène, Inc. v. Spolyar, 938 F. Supp. 523 (W.D. Wis. 1996) ................................................................................ 3, 44 Latona v. Aetna U.S. Healthcare, Inc., 82 F. Supp. 2d 1089 (C.D. Cal. 1999) ............................................................................35, 58 Learning Curve Toys, L.P. v. PlayWood Toys, Inc., No. 94 C 6884, 1999 U.S. Dist LEXIS 11262 (N.D. Ill. July 20, 1999) ............................... 52 Liveware Publ’g, Inc. v. Best Software, Inc., 252 F. Supp. 2d 74 (D. Del. 2003) ........................................................................................ 2 Lucente v. International Business Machines Corporation, 310 F.3d 243 (2d Cir. 2002)................................................................................................ 22 Lucini Italia Co. v. Grappolini, No. 01 C 6405, 2003 WL 1989605 (N.D. Ill. Apr. 24, 2003)................................................. 2 Lumex, Inc. v. Highsmith, 919 F. Supp. 624 (E.D.N.Y. 1996) ............................................................... 14, 17, 36, 41, 42 MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1993), cert. denied, 510 U.S. 1033 (1994) ................................... 6, 57 MPW Indus. Servs. v. Pollution Control Sys., No. 2:02-CV-955, 2006 U.S. Dist. LEXIS 9360 (D. Ohio Mar. 9, 2006) ............................... 2 Restrictive Covenants and Trade Secrets viii TABLE OF AUTHORITIES (continued) Page Maxxim Med., Inc. v. Michelson, 51 F. Supp. 2d 773 (S.D. Tex.), revd. without reported opn., 182 F.3d 915 (5th Cir. 1999) .................................................................................................................... 45 Merck & Co. v. Lyon, 941 F. Supp. 1443 (M.D.N.C. 1996) ................................................................................... 44 Merrill Lynch, Pierce, Fenner & Smith Inc. v. Chung, No. CV 01-00659, 2001 WL 283083 (C.D. Cal. Feb. 2, 2001) ............................................ 31 Metallurgical Industries, Inc. v. Fourteen, Inc., 790 F.2d 1195 (5th Cir. 1986)............................................................................................... 3 Micro Display Systems, Inc. v. Axtel, Inc., 699 F. Supp. 202 (D. Minn. 1988)....................................................................................... 51 Mixing Equip. Co. v. Philadelphia Gear, Inc., 436 F.2d 1308 (3d Cir. 1971).............................................................................................. 19 Monovis, Inc. v. Aquino, 905 F. Supp. 1205 (W.D.N.Y. 1994)................................................................................... 42 Moore v. Consol. Edison Co. of N.Y., 409 F.3d 506 (2d Cir. 2005)................................................................................................ 37 Morris v. Schroder Capital Mgmt. Int’l, 445 F.3d 525 (2d Cir. 2006)................................................................................................ 22 Morris v. Schroder Capital Mgmt. Int’l, 481 F.3d 86 (2d Cir. 2007).................................................................................................. 23 Morton v. Rank America, Inc., 812 F. Supp. 1062 (C.D. Cal. 1993) .................................................................................. 3, 8 Motorola, Inc. v. Fairchild Camera & Instrument Corp., 366 F. Supp. 1173 (D. Ariz. 1973) .................................................................................27, 57 Nadel v. Play-by-Play Toys & Novelties, Inc., 208 F.3d 368 (2d Cir. 2000)................................................................................................ 36 Restrictive Covenants and Trade Secrets ix TABLE OF AUTHORITIES (continued) Page Navigant Consulting, Inc. v. Wilkinson, 508 F.3d 277 (5th Cir. 2007)............................................................................................... 48 Neveux v. Webcraft Techs., Inc., 921 F. Supp. 1568 (E.D. Mich. 1996).................................................................................. 44 Panther Sys. II, Ltd. v. Panther Computer Sys., Inc., 783 F. Supp. 53 (E.D.N.Y. 1991)........................................................................................ 16 Penalty Kick Mgmt. Ltd. v. Coca Cola Co., 318 F.3d 1284 (11th Cir. 2003)........................................................................................... 51 PepsiCo, Inc. v. Redmond, 54 F.3d 1262 (7th Cir. 1995)..........................................................................................10, 41 Powell Products, Inc. v. Marks, 948 F. Supp. 1469 (D. Co. 1996) ........................................................................................ 51 QR Spex, Inc. v. Motorola, Inc., No. CV 03-6284, 2004 U.S. Dist. LEXIS 27378 (C.D. Cal. Oct. 28, 2004) ........................... 3 Quaker Chem. Corp. v. Varga, 509 F. Supp. 2d 469 (E.D. Pa. 2007)................................................................................... 20 Religious Technology Center v. Lerma, 908 F. Supp. 1362 (E.D. Va. 1995) ....................................................................................... 5 Religious Technology Center v. Netcom On-Line Communication Services, Inc., No. C-95-20091, 1997 U.S. Dist. LEXIS 23572 (N.D. Cal. Jan. 3, 1997).............................. 5 Robinson v. Jardine Ins. Brokers Int’l Ltd., 856 F. Supp. 554 (N.D. Cal. 1994)...................................................................................... 25 Scott v. Snelling & Snelling, Inc., 732 F. Supp. 1034 (N.D. Cal. 1990)..................................................................... 4, 12, 23, 24 Self Directed Placement Corp. v. Control Data Corp., 908 F.2d 462 (9th Cir. 1990)........................................................................................... 7, 59 Restrictive Covenants and Trade Secrets x TABLE OF AUTHORITIES (continued) Page Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121 (W.D. Wash. 2000)........................................................................... 53 Star Sci., Inc. v. Carter, 204 F.R.D. 410 (D. Ind. 2001) .............................................................................................. 3 Static Control Components, Inc. v. Future Graphics, LLC, No. 1:06CV00730, 2007 U.S. Dist. LEXIS 36474 (D.N.C. May 11, 2007).......................... 38 Stutz Motor Car of America, Inc. v. Reebok Int’l Ltd., 909 F. Supp. 1353 (C.D. Cal. 1995) ...................................................................................... 3 Surface Shields v. Poly-Tak Prot. Sys., No. 02 C 7228, 2003 U.S. Dist. LEXIS 13185 (N.D. Ill. July 29, 2003) ................................ 2 Surgidev Corp. v. Eye Tech., Inc., 648 F. Supp. 661 (D. Minn. 1986), aff’d, 828 F.2d 452 (8th Cir. 1987) ............................... 45 Taco Cabana Int’l, Inc. v. Two Pesos, Inc., 932 F.2d 1113 (5th Cir. 1991)............................................................................................... 3 Telxon Corp. v. Hoffman, 720 F. Supp. 657 (N.D. Ill. 1989)........................................................................................ 14 Thomas & Betts Corp. v. Panduit Corp., 108 F. Supp. 2d 968 (N.D. Ill. 2000) ................................................................................... 52 Ticor Title Ins. Co. v. Cohen, 173 F.3d 63 (2d Cir. 1999).................................................................................................. 18 Union Carbide Corp v. UGI Corp., 731 F.2d 1186 (5th Cir. 1984)............................................................................................... 3 Universal Analytics, Inc. v. MacNeal-Schwendler Corp., 914 F.2d 1256 (9th Cir. 1990)........................................................................................49, 50 Victaulic Co. v. Tieman, 499 F.3d 227 (3d Cir. 2007)................................................................................................ 20 Restrictive Covenants and Trade Secrets xi TABLE OF AUTHORITIES (continued) Page Webcraft Techs., Inc. v. McCaw, 674 F. Supp. 1039 (S.D.N.Y. 1987) .........................................................................10, 16, 20 Wright Chemical Corp. v. Johnson, 563 F. Supp. 501 (M.D. La. 1983) ........................................................................................ 3 Zajicek v. Koolvent Metal Awning Corp., 283 F.2d 127 (9th Cir. 1960)............................................................................................... 58 STATE CASES 7th Sense v. Liu, 631 N.Y.S.2d 835 (N.Y. App. Div. 1995) ........................................................................... 46 ABBA Rubber Company v. Seaquist, 235 Cal. App. 3d 1 (Cal. Ct. App. 1991) ............................................................................... 4 ABC, Inc. v. Wolf, 52 N.Y.2d 394 (N.Y. 1981)................................................................................................. 18 Ackerman v. Kimball Int’l, Inc., 652 N.E.2d 507 (Ind. 1995) ................................................................................................ 44 Advanced Magnification Instruments, Ltd. v. Minuteman Optical Corp., 522 N.Y.S.2d 287 (N.Y. App. Div. 1987) ........................................................................... 47 Aetna Building Maintenance Co., Inc. v. West, 39 Cal. 2d 198 (Cal. 1952) .................................................................................................. 30 Al Minor & Associates v. Martin, 117 Ohio St. 3d 58 (Ohio 2008) ............................................................................................ 1 Alex Sheshunoff Mgmt. Servs., L.P. v. Johnson, 209 S.W.3d 644 (Tex. 2006) ............................................................................................... 12 Allan Dampf, P.C. v. Bloom, 512 N.Y.S.2d 116 (N.Y. App. Div. 1987) ........................................................................... 47 Amana Express Int’l, Inc. v. Pier-Air Int’l, Ltd., 621 N.Y.S.2d 108 (N.Y. App. Div. 1995) ........................................................................... 17 Restrictive Covenants and Trade Secrets xii TABLE OF AUTHORITIES (continued) Page American Credit Indemnity Co. v. Sacks, 213 Cal. App. 3d 622 (Cal. Ct. App. 1989) ....................................................................27, 31 American Paper & Packaging Products, Inc. v. Kirgan, 183 Cal. App. 3d 1318 (Cal. Ct. App. 1986) ..............................................................2, 27, 56 Amex Distrib. Co. v. Mascari, 150 Ariz. 510 (Ariz. Ct. App. 1986).................................................................................... 58 Application Group, Inc. v. Hunter Group, Inc., 61 Cal. App. 4th 881 (Cal. Ct. App. 1998) .....................................................................23, 24 Armendariz v. Foundation Health Psychcare Servs., Inc., 24 Cal. 4th 83 (Cal. 2000)................................................................................................... 26 BDO Seidman v. Hirshberg, 93 N.Y.2d 382 (N.Y. Ct. App. 1999) ................................................................. 13, 14, 15, 17 Balboa Ins. Co. v. Trans Global Equities, 218 Cal. App. 3d 1327 (Cal. Ct. App. 1990) ....................................................................... 49 Bancroft-Whitney Co. v. Glen, 64 Cal. 2d 327 (Cal. 1966) .................................................................................................. 46 Brescia v. Angelin, 172 Cal. App. 4th 133, 145 (Cal. Ct. App. 2009)................................................................. 39 Boeing Co. v. Sierracin Corporation, 43 Wash. App. 288 (Wash. Ct. App. 1986) ........................................................................... 3 Burbank Grease Services, LLC v. Sokolowski, 717 N.W.2d 781 (Wis. 2006) .............................................................................................. 51 Cadence Design Sys., Inc. v. Avant! Corp., 29 Cal. 4th 215 (Cal. 2002)................................................................................................. 38 Cardinal Freight Carriers, Inc. v. J.B. Hunt Transp. Servs., Inc., 987 S.W.2d 642 (Ark. 1999) ............................................................................................... 44 Restrictive Covenants and Trade Secrets xiii TABLE OF AUTHORITIES (continued) Page Cardiovascular Surgical Specialists, Corp. v. Mammana, 61 P.3d 210 (Okla. 2002) .................................................................................................... 32 Central Adjustment Bureau, Inc. v. Ingram, 678 S.W.2d 28 (Tenn. 1984) ............................................................................................... 58 Columbia Ribbon & Carbon Mfg. Co. v. A-1-A Corp., 42 N.Y.2d 496 (N.Y. 1977)................................................................................................. 19 Comprehensive Community Dev. Corp. v. Lehach, 636 N.Y.S.2d 755 (N.Y. App. Div. 1996) ........................................................................... 47 Contempo Communications, Inc. v. MJM Creative Servs., Inc., 582 N.Y.S.2d 667 (N.Y. App. Div. 1992) ......................................................................17, 20 Continental Car-Na-Var Corp. v. Moseley, 24 Cal. 2d 104 (Cal. 1944) .................................................................................................. 24 Cool Insuring Agency, Inc. v. Rogers, 509 N.Y.S.2d 180 (N.Y. App. Div. 1986) ........................................................................... 18 Courtesy Temporary Serv., Inc. v. Camacho, 222 Cal. App. 3d 1278 (Cal. Ct. App. 1990) .................................................................passim Cypress Semiconductor Corp. v. Superior Court, 163 Cal. App. 4th 575 (Cal. Ct. App. 2008) ........................................................................ 39 D’Sa v. Playhut, Inc., 85 Cal. App. 4th 927 (Cal. Ct. App. 2000) ...............................................................23, 26, 58 DVD Copy Control Ass’n, Inc. v. Bunner, 31 Cal. 4th 864 (Cal. 2003)................................................................................................... 6 DVD Copy Control Ass’n, Inc. v. McLaughlin, No. CV 786804, 2000 WL 48512 (Cal. Sup. Ct., Jan. 21, 2000)........................................ 5, 6 Diodes, Inc. v. Franzen, 260 Cal. App. 2d 244 (Cal. Ct. App. 1968) ..............................................................24, 33, 35 Restrictive Covenants and Trade Secrets xiv TABLE OF AUTHORITIES (continued) Page DoubleClick, Inc. v. Henderson, No. 116914/97, 1997 WL 731413 (N.Y. Sup. Ct. Nov. 7, 1997) ..............................10, 19, 41 Dryden v. Tri-Valley Growers, 65 Cal. App. 3d 990 (Cal. Ct. App. 1977) ........................................................................... 48 Duane Jones Co. v. Burke, 117 N.E.2d 237 (N.Y. 1954) ............................................................................................... 46 Eagle Comtronics, Inc. v. Pico, Inc., 453 N.Y.S.2d 470 (N.Y. App. Div. 1982) ............................................................................. 9 Eastern Business Systems, Inc. v. Speciality Business Solutions, LLC, 739 N.Y.S.2d 177 (N.Y. App. Div. 2002) ........................................................................... 42 Edwards v. Arthur Andersen LLP, 44 Cal. 4th 937 (Cal. 2008)................................................................................................. 28 Electro Optical Indus., Inc. v. White, 76 Cal. App. 4th 653 (Cal. Ct. App. 1999) .......................................................................... 45 Embarcadero Mun. Improvement Dist. v. County of Santa Barbara, 88 Cal. App. 4th 781 (Cal. Ct. App. 2001) .......................................................................... 51 Empire Farm Credit, ACA v. Bailey, 657 N.Y.S.2d 211 (N.Y. App. Div. 1997) ......................................................................13, 15 Family Affair Haircutters, Inc. v. Detling, 488 N.Y.S.2d 204 (N.Y. App. Div. 1985) ........................................................................... 18 Fields Found., Ltd. v. Christensen, 309 N.W.2d 125 (Wis. Ct. App. 1981) ................................................................................ 14 FLIR Systems, Inc. v. Parrish, 174 Cal. App. 4th 1270 (Cal. Ct. App. 2009) ...................................................................... 45 Fortna v. Martin, 158 Cal. App. 2d 634 (Cal. Ct. App. 1958) ......................................................................... 33 Restrictive Covenants and Trade Secrets xv TABLE OF AUTHORITIES (continued) Page Fowler v. Varian Assocs., Inc., 196 Cal. App. 3d 34 (Cal. Ct. App. 1987) ........................................................................... 46 Frame v. Merrill Lynch, Pierce, Fenner & Smith, Inc., 20 Cal. App. 3d 668 (Cal. Ct. App. 1971) ........................................................................... 24 Fred’s Stores of Mississippi, Inc. v. M & H Drugs, Inc., 725 So. 2d 902 (Miss. 1998) ................................................................................................. 8 GAB Business Servs., Inc. v. Lindsey & Newsom Claim Servs, Inc., 83 Cal. App. 4th 409 (Cal. Ct. App. 2000) .......................................................................... 47 Gable-Leigh, Inc. v. North American Miss, No. CV 01-01019, 2001 WL 521695 (C.D. Cal. Apr. 9, 2001).............................................. 8 General Paint Corp. v. Seymour, 124 Cal. App. 611 (Cal. Ct. App. 1932) .............................................................................. 26 General Reinsurance Corp. v. Arch Capital Group, Ltd., No. X05CV074011668S, 2007 Conn. Super. LEXIS 2629 (Conn. Super. Ct. Oct. 17, 2007) .................................................................................................................................... 1 Giffords Oil Co. v. Wild, 483 N.Y.S.2d 104 (N.Y. App. Div. 1984) ........................................................................... 17 Gillis Associated Indus., Inc. v. Cari-All, Inc., 564 N.E.2d 881 (Ill. App. Ct. 1990) ...................................................................................... 9 Glue-Fold, Inc. v. Slautterback Corp., 82 Cal. App. 4th 1018 (Cal. Ct. App. 2000) ........................................................................ 38 Golden State Linen Service, Inc. v. Vidalin, 69 Cal. App. 3d 1 (Cal. Ct. App. 1977) ..........................................................................30, 32 Gordon Termite Control v. Terrones, 84 Cal. App. 3d 176 (Cal. Ct. App. 1978) ........................................................................... 33 HBD Inc. v. Ryan, 642 N.Y.S.2d 913 (N.Y. App. Div. 1996) ........................................................................... 19 Restrictive Covenants and Trade Secrets xvi TABLE OF AUTHORITIES (continued) Page Hamrick v. Kelley, 260 Ga. 307 (Ga. 1990)....................................................................................................... 58 Herzog v. A Company, 138 Cal. App. 3d 656 (Cal. Ct. App. 1982) ......................................................................... 66 Hill Medical Corp. v. Wycoff, 86 Cal. App. 4th 895 (Cal. Ct. App. 2001) .......................................................................... 30 Home Pride Foods, Inc. v. Johnson, 262 Neb. 701 (Neb. 2001)..................................................................................................... 2 I.E. Assocs. v. Safeco Title Ins. Co., 39 Cal. 3d 281 (Cal. 1985) .................................................................................................. 50 John F. Matull & Associates, Inc. v. Cloutier, 194 Cal. App. 3d 1049 (Cal. Ct. App. 1987) ....................................................................... 32 John Jay Esthetic Salon, Inc. v. Woods, 377 So. 2d 1363 (La. App. Ct. 1979)................................................................................... 32 Jones v. Humanscale Corp., 130 Cal. App. 4th 401 (Cal. Ct. App. 2005) ........................................................................ 25 Justus v. Atchison, 19 Cal. 3d 564 (Cal. 1977) .................................................................................................. 50 Kanan, Corbin, Schupak & Aronow, Inc. v. FD Int’l LTD, 797 N.Y.S.2d 883 (N.Y. Sup. Ct. 2005) .............................................................................. 18 K.C. Multi Media v. Bank of America, 171 Cal. App. 4th 939 (Cal. Ct. App. 2009) ........................................................................ 51 Klamath-Orleans Lumber, Inc. v. Miller, 87 Cal. App. 3d 458 (Cal. Ct. App. 1978) ........................................................................... 28 Kolani v. Gluska, 64 Cal. App. 4th 402 (Cal. Ct. App. 1998) .......................................................................... 26 Restrictive Covenants and Trade Secrets xvii TABLE OF AUTHORITIES (continued) Page Korea Supply Co., v. Lockheed Martin Corp., 29 Cal. 4th 1134 (Cal. 2003) ............................................................................................... 49 Kucker Kraus & Bruh, LLP v. Szold & Brandwen, P.C., N.Y.L.J., Sept. 12, 1997 (N.Y. Sup. Ct. Sept. 11, 1997) ...................................................... 16 Lamorte Burns & Co. v. Walters, 167 N.J. 285 (N.J. 2001) ....................................................................................................... 2 Leo Silfen, Inc. v. Cream, 278 N.E.2d 636 (N.Y. 1972) ..........................................................................................16, 17 Loral Corp. v. Moyes, 174 Cal. App. 3d 268 (Cal. Ct. App. 1985) .................................................... 2, 31, 32, 34, 35 MTV Networks v. Fox Kids Worldwide, Inc., No. 605580/97, 1998 WL 57480 (N.Y. Sup. Ct. Feb. 4, 1998) .......................................18, 19 Mallory Factor, Inc. v. Schwartz, 536 N.Y.S.2d 752 (N.Y. App. Div. 1989) ........................................................................... 19 Marietta Corp. v. Fairhurst, Nos. 37265, RJI No. 2002-0229-M, 2002 WL 31056732 (N.Y. Sup. Ct., Aug. 23, 2002) .................................................................................................................................. 42 Marietta Corporation v. Fairhurst, 754 N.Y.S.2d 62 (N.Y. App. Div. 2003) ........................................................................42, 43 Maritime Fish Prods., Inc. v. World-Wide Fish Prods., Inc., 474 N.Y.S.2d 281 (N.Y. App. Div. 1984) ........................................................................... 46 McRand, Inc. v. Van Beelen, 486 N.E.2d 1306 (Ill. App. Ct. 1985) .................................................................................. 17 Medtronics, Inc. v. The Superior Court of Los Angeles, 29 Cal. 4th 697 (Cal. 2002)................................................................................................. 25 Meissner Filtration Prods., Inc. v. Harrington, No. B170707, 2004 WL 2189249 (Cal. Ct. App. Sept. 30, 2004) ........................................ 45 Restrictive Covenants and Trade Secrets xviii TABLE OF AUTHORITIES (continued) Page Metro. Traffic Control, Inc. v. Shadow Traffic Network, 22 Cal. App. 4th 853 (Cal. 1994) ..................................................................................passim Monogram Indus., Inc. v. Sar Indus., Inc., 64 Cal. App. 3d 692 (Cal. Ct. App. 1976) ........................................................................... 30 Morlife, Inc. v. Perry, 56 Cal. App. 4th 1514 (1997)........................................................................................passim Moss, Adams & Co. v. Shilling, 179 Cal. App. 3d 124 (Cal. Ct. App. 1986) ....................................................................31, 32 Moye v. Eure, 204 S.E.2d 221 (N.C. Ct. App. 1974).................................................................................. 48 Muggill v. The Reuben H. Donnelley Corp., 62 Cal. 2d 239 (Cal. 1965) .................................................................................................. 27 PMC, Inc. v. Kadisha, 78 Cal. App. 4th 1368 (Cal. Ct. App. 2000) ........................................................................ 36 People v. Eubanks, 14 Cal. 4th 580 (Cal. 1996)................................................................................................. 54 People v. Farell, 28 Cal. 4th 381 (Cal. 2002)................................................................................................. 54 Proctor & Gamble Co. v. Stoneham, 747 N.E.2d 268 (Ohio Ct. App. 2000)................................................................................. 43 In re Providian Credit Card Cases, 96 Cal. App. 4th 292 (Cal. Ct. App. 2002) ...................................................................... 7, 40 Raimonde v. Van Vlerah, 325 N.E.2d 544 (Ohio 1975)............................................................................................... 56 Rao v. Verde, 635 N.Y.S.2d 660 (N.Y. App. Div. 1995) ........................................................................... 47 Restrictive Covenants and Trade Secrets xix TABLE OF AUTHORITIES (continued) Page Rapp Ins. Agency, Inc. v. Baldree, 597 N.E.2d 936 (Ill. App. Ct. 1992) .................................................................................... 15 Reading Radio, Inc. v. Fink, 833 A.2d 199 (Pa. Super. Ct. 2003)..................................................................................... 49 Reeves v. Hanlon, 33 Cal. 4th 1140 (Cal. 2004) ..........................................................................................33, 48 Renaissance Technologies Corp. v. Millennium Partners, LP, 2004 WL 4963292 (N.Y. Sup. Ct. March 19, 2004) ............................................................ 43 Retirement Group v. Galante, 176 Cal. App. 4th 1226 (Cal. Ct. App. 2009) .................................................................31, 32 Rich Prods. Corp. v. Parucki, 578 N.Y.S.2d 345 (N.Y. App. Div. 1991) ........................................................................... 18 Rinks v. Courier Dispatch Group, Inc., No. 1:01-CV-0678, 2001 U.S. Dist. LEXIS 4728 (D. Ga. Apr. 11, 2001)............................ 58 Robert L. Cloud & Assocs., Inc. v. Mikesell, 69 Cal. App. 4th 1141 (Cal. Ct. App. 1999) ...................................................................31, 36 Royal Carbo Corp. v. Flameguard, Inc., 645 N.Y.S.2d 18 (N.Y. App. Div. 1996) ............................................................................. 16 Ryan, Elliot and Co. v. Leggat, McCall & Werner, Inc., 396 N.E.2d 1009 (Mass. App. Ct. 1979) ............................................................................. 48 Scott v. General Iron & Welding Co., 368 A.2d 111 (Conn. 1976)................................................................................................. 19 Subcarrier Communications, Inc. v. Day, 691 A.2d 876 (N.J. App. Div. 1997) ................................................................................... 16 Support Sys. Assocs., Inc. v. Tavolacci, 522 N.Y.S.2d 604 (N.Y. App. Div. 1987) ........................................................................... 10 Restrictive Covenants and Trade Secrets xx TABLE OF AUTHORITIES (continued) Page Thola v. Henschell, 140 Wash. App. 70 (Wash. Ct. App. 2007) ......................................................................... 36 Thompson v. Impaxx, Inc., 113 Cal. App. 4th 1425 (Cal. Ct. App. 2003) ....................................................... 2, 31, 32, 56 Tour & Study, Inc. v. Hepner, 432 N.Y.S.2d 148 (N.Y. App. Div. 1980) ........................................................................... 47 Town & Country House & Home Service, Inc. v. Newberry, 147 N.Y.S.2d 550 (N.Y. 1955)............................................................................................ 49 Triangle Sheet Metal Works, Inc. v. Silver, 222 A.2d 220 (Conn. 1966)................................................................................................. 10 Tyler Enters. of Elwood, Inc. v. Shafer, 573 N.E.2d 863 (Ill. App. Ct. 1991) .................................................................................... 16 U.S. Reinsurance Corp. v. Humphreys, 618 N.Y.S.2d 270 (N.Y. App. Div. 1994) ............................................................................. 8 United States Golf Ass’n. v. Arroyo Software Corporation, 69 Cal. App. 4th 607 (Cal. Ct. App. 1999) .......................................................................... 49 Vacco Industries, Inc. v. Van Den Berg, 5 Cal. App. 4th 34 (Cal. Ct. App. 1992) .............................................................................. 30 Walter Karl, Inc. v. Wood, 528 N.Y.S.2d 94 (N.Y. App. Div. 1988) ............................................................................. 48 Whyte v. Schlage Lock Co., 101 Cal. App. 4th 1443 (Cal. Ct. App. 2002) .................................................................44, 45 FEDERAL STATUTES 18 U.S.C. § 1030............................................................................................................................36, 53 § 1030(a)(2)(C)..............................................................................................................36, 53 § 1030(g) ............................................................................................................................ 36 § 1831................................................................................................................................. 52 Restrictive Covenants and Trade Secrets xxi TABLE OF AUTHORITIES (continued) Page § 1832................................................................................................................................. 52 § 1835................................................................................................................................. 53 § 1836................................................................................................................................. 53 § 1962(c) ............................................................................................................................ 56 § 1964(c) ............................................................................................................................ 56 28 U.S.C. § 2283 ...................................................................................................................... 25 STATE STATUTES Ala. Code § 8-1-1 (1984).......................................................................................................... 13 Cal. Bus. & Prof. Code § 16600.........................................................................................................................passim § 16601..........................................................................................................................13, 30 § 16602..........................................................................................................................13, 30 Cal. Civ. Code §§ 3426 et seq....................................................................................................................... 2 § 3426.1................................................................................................................................ 7 § 3426.1(b)(2)..................................................................................................................... 36 § 3426.1(d) ....................................................................................................................... 2, 4 § 3426.1(d)(1)....................................................................................................................... 7 § 3426.1(d)(2)....................................................................................................................... 6 § 3426.2.............................................................................................................................. 36 § 3426.2(a) ......................................................................................................................... 45 § 3426.2(c) ......................................................................................................................... 36 § 3426.3.............................................................................................................................. 36 § 3426.5.............................................................................................................................. 40 § 3426.6.............................................................................................................................. 38 Cal. Code of Civ. Proc. § 2019.210........................................................................................... 39 Cal. Evid. Code §§ 1060 et seq..................................................................................................................... 54 § 1060................................................................................................................................. 54 § 1061................................................................................................................................. 54 § 1061(b)(2)........................................................................................................................ 54 § 1062(a) ............................................................................................................................ 54 § 1063................................................................................................................................. 54 Restrictive Covenants and Trade Secrets xxii TABLE OF AUTHORITIES (continued) Page Cal. Lab. Code § 2802................................................................................................................................. 29 § 2804................................................................................................................................. 29 Cal. Pen. Code § 499c......................................................................................................................53, 54, 55 § 499c(b) ............................................................................................................................ 53 § 499c(c) ............................................................................................................................ 54 § 502 .............................................................................................................................54, 56 § 502(a) .............................................................................................................................. 54 § 502(c)(2).....................................................................................................................53, 54 § 502(h)(1) ......................................................................................................................... 54 §1203.044........................................................................................................................... 54 Cal. Rules of Ct. 243.1 .................................................................................................................................. 40 243.2 .................................................................................................................................. 40 Colo. Rev. Stat. § 8-2-113 (1973) ............................................................................................. 13 Fla. Stat. Ann. § 542.33 (West 1988) ........................................................................................ 13 Ga. Code Ann. § 13-8-2 (1990)................................................................................................................... 13 § 13-8-2.1 (1990)................................................................................................................ 13 Haw. Rev. Stat. § 480-4 (1985)................................................................................................. 13 La. Rev. Stat. Ann. § 23:921 (West 1985)................................................................................. 13 Mass. Gen. Laws ch. 112, § 12X (1984) ...................................................................................................................... 13 § 74D (1984) ...................................................................................................................... 13 Mich. Comp. Laws Ann. § 445.774a (West 1990) .................................................................... 13 Mont. Code Ann. § 28-2-703 (1989)......................................................................................... 13 N.C. Gen. Stat. § 75-2 (1988) ................................................................................................... 13 Restrictive Covenants and Trade Secrets xxiii TABLE OF AUTHORITIES (continued) Page N.D. Cent. Code § 9-08-66 (1987)............................................................................................ 13 N.Y. Pen. Law § 155.00.........................................................................................................................55, 56 § 155.00.6........................................................................................................................... 55 § 155.02.1........................................................................................................................... 55 § 156.30.........................................................................................................................55, 56 § 156.30.1........................................................................................................................... 56 Okla. Stat. tit. 15, §§ 217-219 (Supp. 1991) .............................................................................. 13 Or. Rev. Stat. § 653.295 (1989) ................................................................................................ 13 S.D. Codified Laws §§ 53-9-8 to 53-9-11 (1990) ...................................................................... 13 Tex. Bus. & Com. Code § 15.05 (Vernon 1990) ....................................................................... 13 Wis. Stat. Ann. § 103.465 (West 1988)..................................................................................... 13 MISCELLANEOUS 2A Sutherland, Statutory Construction (Sands 4th ed. 1984) § 50.05, pp. 440-41...................... 50 Restatement of Torts § 757 cmt. b (1939) ................................................................................... 8 Restatement of Torts (Second) § 768 ........................................................................................ 48 Restatement (Second) of Agency § 393 cmt. e. (1958).........................................................46, 48 Restrictive Covenants and Trade Secrets xxiv