(2)

advertisement
The Role of Trade Secrets in the Protection of IP Rights1
Definition and Conceptual Analysis:
In the Federal Republic of Nigeria the concept of intellectual property rights and its various
subsets are relatively very well known by both legal practitioners and the owners of these rights.
However, far less written or talked about is the concept of ‘trade secrets’ and the significant role
they play in enhancing and adding value to the more established rights.2 Indeed, the paucity or
near absence of decided local authorities with a direct bearing on this area is clear confirmation
of its relative obscurity and wraithlike nature.3
Traditionally, the concept of trade secrets would fall under the rubric of confidential information
under the Common Law.4 In the United States, it is the conventional wisdom that there are at
least three separate regimes of the trade secret doctrine.5 According to the Restatement (First)
of Torts: “A trade secret may consist of any formula, pattern, device, or compilation of
information which is used in one’s business, and which gives him an opportunity to obtain an
advantage over competitors who do not know or use it. It may be a formula for a chemical
compound, a process of manufacturing, treating or preserving materials, a pattern for a machine
or other device or a list of customers.” 6
From this definition the need for relative secrecy is almost indispensable to the idea of a
protectable trade secret and while some have argued that the requirement of Reasonable
Secrecy Precautions (RSP) is for the most part redundant,7 some indication or colourable
1
John Onyido- LL.B., BL., LL.M., M.I.L.D., LL.M. [Attorney and Counselor at Law], New York, September 2012.
E.g. Trademarks, Patents, Copyright, Entertainment and Media, Sports, Art Law and Franchising. In an article
featured on Reuters online News on 15th February 2011, the alleged re-discovery of the secret Coca-Cola recipe
developed by John Pemberton in 1886 was re-visited, in an apparent attempt to illuminate the dark corridors of this
mysterious area of Intellectual Property Law. See “Coca Cola says secret of its recipe still intact” by Martinne Geller.
http://www.reuters.com/article/2011/02/15/cocacola-idUSN1523031020110215.
3 Most local authorities that address some of the features encountered in the field of trade secrets are generally
limited to employment related matters and general breach of confidence actions. There appears to be no local
legislation specifically regulating trade secrets in Nigeria.
4 In his introduction to Trade Secrets and Confidential information, W. R. Cornish writes that “…countries have
responded in various ways, some confining protection to general civil remedies affecting Contract, Tort, Property and
perhaps unjust enrichment; some building specific provisions into their law of Unfair Competition; some (notably
common law jurisdictions) generating a form of sui generis protection that is akin to but is not quite a property right.
Countries in this last tradition, such as the United Kingdom, have tended to place the protection of trade secrets in a
broader conceptual frame which also encompasses governmental secrets and personal confidences and indeed
privacy…However the protection of secrets is formulated, the rights given are likely to be unlimited in time and also to
be effective against unjustified uses and disclosures of all kinds. Hence the reluctance to give them the absolute
character of ‘property’.” See W. Cornish and D. Llewellyn, Intellectual Property: Patent, Copyright, Trade Marks &
Allied Rights, 6th Ed., London Sweet & Maxwell, 2007 pg. 10 para. 1-10.
5 Found variously in the Restatement First on Torts, The American Uniform Trade Secrets Act and the Restatement
Third of Unfair Competition.
6 Section 757 cmt. b. RESTATEMENT (FIRST) OF TORTS (1939). Articles 1(2) and 39 of the TRIPS Agreement
impose an obligation on member states of the WTO to take appropriate steps to protect trade secrets. See also the
Computer Fraud and Abuse Act 18 U.S.C. § 1030 (a) (4) 1984 and the 1996 Economic Espionage Act (EEA). 18
U.S.C. Section 1839 (3) (2006) effective from 1st January 1997. Section 97 of the Nigerian Criminal Code Act Cap.
C38 LFN 2004 prohibits the disclosure of official secrets by public servants.
7 See for instance Robert G. Bone, Trade Secrecy, Innovation, and the Requirement of Reasonable Secrecy
Precautions, (Boston University School of Law Working Paper No. 09-40) September 3, 2009. Some of these
objections are that the requirement of secrecy is alien to the whole field of intellectual property; most of the policy
justifications do not withstand careful scrutiny, while the increased limitation of public access to valuable information
may inhibit technological innovation, whether in a sequential or cumulative sense.
2
1
attempt to keep the valued information from general knowledge is still an important pre-requisite
of trade secret protection under the law.
The 1977 commentary to the Restatement clarifies that, “…A substantial element of secrecy
must exist, so that, except by use of improper means, there would be difficulties in acquiring the
information…The protection is merely against breach of faith and reprehensible means of
learning another’s secret.”
The American Uniform Trade Secrets Act now adopted in about 45 States in the US provides
that: “A trade secret means information, including a formula, pattern, compilation, program,
device, method, technique, or process, that: (i) derives independent economic value, actual or
potential, from not being generally known to, and not being readily ascertainable by proper
means by, other persons who can obtain economic value from its disclosure or use, and (ii) is
the subject of efforts that are reasonable under the circumstances to maintain its secrecy”.8
The requirement that secrecy be maintained by the owner of a trade secret in order to obtain the
protection of the law is analogous to the often proffered advice to intellectual property rights
holders to effectively police their rights or risk encroachment and possible evisceration by
competitors. The necessity to take active and precautious steps to contain the dissemination of
such information is inextricably linked to the perceived value of the know-how or technical
information sought to be preserved, such that the lack thereof creates an appearance of a
voluntary assumption of risk which the courts are generally reluctant to encourage.9
Additionally, the ephemeral nature of trade secrets as essentially wasting assets (considering
the high probability of independent creation, the relative ease of re-enactment by reverse
engineering and the likelihood of dissipation by disclosure) imposes a compelling need that
actual verifiable steps be taken to keep them from becoming public knowledge. Consequently,
the existence of these verifiable steps would provide circumstantial evidence of value, actual
secrecy and improper appropriation, as the case may be.10
Another writer in highlighting an ancillary notice requirement has correctly opined that, “It is
clear that the efforts must be actual, affirmative measures. Mere intent to maintain secrecy is
not enough. The trade secret claimant must manifest its intent by making some effort to keep
the information secret. The law also requires such efforts to be a continuing course of conduct,
signalling to all concerned that the information is secret.”11
In the United States, the development of the trade secret concept has progressively evolved
from a strict property rationale, to one that emphasized and condemned the defendant’s
8
Section 1 (4), 14 U.L.A. 372 (Supp. 1989). On the other hand, Section 39 of the Restatement (Third) of Unfair
Competition 1995 provides that “A trade secret is any information that can be used in the operation of a business or
other enterprise and that is sufficiently valuable and secret to afford an actual or potential economic advantage over
others.”
9 J.T. Healey & Son, Inc. v. James A. Murphy & Son, Inc., 357 Mass. 728 (1970); RTE Corp. v. Coatings, Inc., 267
N.W.2d 226, 233 (Wis. 1978).
10 Enterprise Leasing Co. v. Ehmke, 197 Ariz. 144, 150 (1999).
11 David W. Slaby et al., Efforts Reasonable Under the Circumstances to Maintain Secrecy, in Trade Secret
Protection: An Analysis of the Concept, 5 Santa Clara Computer & High Tech. L.J. 321, 327 (1989).
In Faccenda Chicken v. Fowler [1986] 1 All E.R. 617, for instance the factors to be considered by the courts should
include: a) the nature of the employment, b) the nature of the information in question, c) the degree to which the
employer demanded that secrecy be maintained, d) the degree of isolation from other none confidential information,
e) the availability of the information in the public domain and, f) the likely damage that would be occasioned to the
owner by virtue of such use or disclosure.
2
wrongful conduct as constituting unfairly competitive business practice, congealing into the
reasonable precautions requirement which now holds sway.12
Trade Secrets vis-à-vis Other IP Rights:
The rights encapsulated in a trade secret are not contradictory or antithetical to other sister
rights but are complementary in nature and generally accounts for the fringe aspects of other IP
rights, indispensable to their effective enjoyment. Unless protected these rights would go into
the public domain or into the general pool of knowledge, depriving the owners of the full benefit
and just compensation for their inventions and other creative efforts.
The US Supreme Court in Kewanee Oil Co. v. Bicron Corporation13 held that the trade secrets
law applicable in the various states are not pre-empted by the federal patent law but instead the
policy justifications that underpin both concepts can and do co-exist as alternatives or
complementary incentives for inventiveness and creativity. The court observed in that case that:
“Certainly the patent policy of encouraging invention is not disturbed by the existence of another
form of incentive to invention. In this respect the two systems are not and never would be in
conflict.”
In Aronson v. Quick Point Pencil Co.,14 Mrs Jane Aronson who had filed a patent application in
October of 1955 over a new design for a keyholder negotiated a contract with Quick Point Pencil
in June the following year (and while the patent application was still pending) in which Quick
Point agreed to pay a 5% royalty in return for an exclusive right to make and sell the keyholders.
The parties also agreed that if Mrs Aronson did not obtain a patent within 5 years the royalty
payments would be reduced to 2 ½% of sales as long as Quick Point continues to sell them. No
duration was prescribed for the agreement. In September 1961, the Board of Patent Appeals
issued a final rejection to the patent application on the ground that the keyholder was obvious
and therefore not patentable.
Quick Point continued the royalty payments to Mrs Aronson for the next 14 years despite this
development, but at the agreed reduced rate of 2 ½% of sales. However, by the late 1960s
copies had begun to emerge on the market from competitors who did not have to make similar
royalty payments, severely cutting into Quick Point’s established market share. In a bid to get
out of its obligation, Quick Point brought an action in the United States District Court claiming
that the agreement to pay royalties was unenforceable on the ground that state law which
justified the arrangement was pre-empted by federal patent law. The District Court decided that
as long as Quick Point continued to manufacture the keyholders, it was bound under the
agreement to pay royalties under the contract.
12
As late as 1984 the US Supreme Court still held a property concept of trade secret rights as can be gleaned from
the decision in Ruckelshaus v. Monsanto Co. 467 U.S. 986, 1001 – 04 (1984). For a breach of confidence justification
see E.I. du Pont & Co. v. Masland, 244 U.S. 100, 102 (1917).
In the United States, the earliest reported case in which the concept of trade secret was clearly formulated is the case
of Peabody v. Norfolk, 98 Mass. 452 (1868). Even earlier decisions recognizing a cause of action as involving a
misappropriation of trade secrets can be found in cases like Newberry v. James, 35 Eng. Rep. 1011, 1013 (Ct. Ch.
1817); Vicky v. Welch, 36 Mass. 523, 527 (1837). For the UK, see Lamb v. Evans [1893] 1 Ch. 218; House of Spring
Gardens v. Point Blank [1983] F.S.R. 213 at 253, [1985] F.S.R. 327 at 335 S.C. (Ir.); Stephenson Jordan v. McDonald
and Evans (1951) 68 R.P.C.190. Also see Cadbury Schweppes v. FBI Foods (1999) 83 C.P.R. 289; (Supreme Ct.
Canada). Then see Maggbury v. Hafele Australia [2001] 53 I.P.R. 1 HC. Australia.
13 416 U.S. 470 (1974). See also Aronson v. Quick Point Pencil, 440 U.S. 257 (1979); Bonito Boats, Inc. v. Thunder
Craft Boats, Inc., 489 U.S. 141 (1989).
14 440 U.S. 257 (1979).
3
On appeal, the Court of Appeal reversed, holding that the agreement between the parties was in
contemplation of Mrs Aronson’s ability to secure a valid patent and that a continuing obligation
to pay royalties was contrary to “the strong federal policy favouring the full and free use of ideas
in the public domain”. In any event, if Mrs Aronson had actually obtained a patent as
contemplated, Quick Point would have escaped its obligations upon the patent’s expiration after
the then 17-year protectable period.
On further appeal to the Supreme Court, that court observed that the agreement which had
been freely negotiated at arm’s-length between the parties was binding on them. Quick Point
had clearly bargained for the benefits of a novel design which had been disclosed to it in
confidence and which had enabled it to pre-empt the market to its financial advantage.15 The
court stated in part:
On this record it is clear that the parties contracted with full awareness of both
the pendency of a patent application and the possibility that a patent might not
issue. The clause dis-escalating the royalty by half in the event no patent issued
within five years makes that crystal clear. Quick Point apparently placed a
significant value on exploiting the basic novelty of the device, even if no patent
issued; its success demonstrates that this judgment was well founded.
Assuming, arguendo, that the initial letter and the commitment to pay a 5%
royalty was subject to federal patent law, the provision relating to the 2 ½%
royalty was explicitly independent of federal law. The cases and principles relied
on by the Court of Appeals and Quick Point do not bear on a contract that does
not rely on a patent, particularly where, as here, the contracting parties agreed
expressly as to alternative obligations if no patent should issue.16
Trade secrets in practice are utilised in the early stages of an invention, as manufacturing
processes, technical information or know-how, business information or as protection devices for
sub-patentable innovations. They can also form part of the implementation details and
techniques that go beyond the scope of the issued patent17. Peripheral aspects of a patentable
invention although not eligible for patent protection could still be preserved as a trade secret.
And right from the patent drafting stage, through the pendency of a patent application up until
publication, the protection afforded via the utilisation of trade secrets is invaluable.18 The
process of transforming an invention from a patented item to a marketable product could result
in the creation of valuable enabling know-how that could require trade secret protection.
From the nature of a trade secret, as deducible from the foregoing, it could offer additional
benefits to supplement the rights conferred either in the form of a trademark, patent or
copyright.19 Furthermore, there is neither a registration nor a concretization requirement, and
there are no formalities that need to be met like novelty, enablement, and reduction to practice
or a term limitation of any kind as long as the subject matter of the relevant trade secret is
15
As at September 1975, Quick Point had raked in over $7 million in revenue from sales of the keyholder from which
it had paid Mrs. Aronson royalties in the sum of $203,963.84.
16 Id. at ----17 Celeritas Technologies, Ltd. v. Rockwell International Corp. 150 F.3d 1354, 1358 (Fed. Cir. 1998)
18 Wyeth v. Natural Biologics, Inc. civ. No. 98-2469, 2003 WL 22282371 (D.Minn. Oct. 2 nd 2003); C& F Packaging Co.
v. IBP, Inc. 224 F. 3d 1296 (Fed. Cir. 2000) - [The Pizza Hut Case]. Patent applications are usually published 18
months after the filing date and the application remains confidential prior to publication. 35 USC § 122 (a); 122 (b) 1
and 122 (b) (2) (B). See also Paul E. Rossler & Scott Rowland, Originality is Great, but Plagiarism is Faster: Holding
Back the Rising Tide of Trade Secrets Thefts, WhatsUpinIP.com (Dec. 14, 2010).
19 For jurisdictions where copyright registration is a pre-requisite, it may be necessary to redact the portions of the
protected work that constitutes a trade secret.
4
preserved.20 They are not territorially confined and do not entail any periodic renewals or
maintenance expense.
In Warner Lambert Pharmaceutical Co. v. John J. Reynolds, Inc.,21 a certain Dr J.J. Lawrence, a
Physician and editor of a medical journal in St. Louis, Missouri having devised a formula for an
antiseptic liquid compound called ‘Listerine’, entered into an agreement with J. W. Lambert in
1881 for the disclosure of the secret formula in consideration of which Lambert agreed on behalf
of himself, his heirs, executors and assigns to pay the sum of $20.00 to Dr Lawrence, his heirs,
executors or assigns for each gross of Listerine which he subsequently manufactures and sells.
This payment was reduced by Dr Lawrence himself to $12.00 and thereafter to $6.00 per gross
between October 1881 and March 1883. And in January of 1885, Dr Lawrence assigned his
rights to Listerine and other synthetic compounds to Lambert Pharmacal Company, the Plaintiffs
predecessor in title. Lambert Pharmacal Company also executed an instrument assuming Mr
Lambert’s obligations under the two aforesaid agreements.
Several years later, the Plaintiffs subsequently alleged before the New York District Court for
the Southern District that over the years the Listerine formula had become a matter of public
knowledge, having being disclosed through no fault of the Plaintiff as a result of proceedings
brought against its predecessor before the Federal Trade Commission and through publication
in the United States Pharmacopoeia, the National Formulary and in the Journal of the American
Medical Association. They further contended that in view of the fact that both the 1881 and 1885
agreements were indefinite in duration, the terms thereof were ambiguous and the Plaintiff
should be relieved from the responsibility of making further royalty payments.
The trial judge held unequivocally that the defendants were entitled to judgment as a matter of
law in view of the undisputed facts. The court reasoned that a distinction ought to be drawn
between instances in which a promisor’s obligations are expressed to last in perpetuity,
normally found in real property cases and which are regulated based upon public policy
considerations, and instances where though apparently intended, the parties have omitted to
prescribe a termination date. In this second instance, the courts would supply a date by
construing the contract based on the perceived intention of the parties as may be discoverable
from the tenor of the contract.22 If no intention can be reasonably ascertained, then such
contracts are deemed to be terminable at will or revocable within a reasonable time.
Both scenarios above are distinguishable from instances where the relevant contract fails to
prescribe a definite termination date but conditions the termination of the promisor’s obligation
upon the occurrence of a definite event, a category to which the facts of the present case
belonged. Consequently, as long as the plaintiff continues to manufacture and sell the Listerine
products it remained obligated to make the royalty payments under the various contracts.
The court went on to remark that:
One who acquires a trade secret or secret formula takes it subject to the risk that
there be a disclosure. The inventor makes no representation that the secret is
non-discoverable. All the inventor does is to convey the knowledge of the formula
or process which is unknown to the purchaser and which in so far as both parties
20
Warner-Lambert Pharmaceutical Co. v. John J. Reynolds, Inc. 178 F. Supp. 655 (S.D.N.Y 1959).
178 F. Supp. 655 (S.D.N.Y 1959). See also Cammack v. J.B. Slattery & Bros., 241 N.Y. 39, 148 N.E. 781.
22 Town of Readsboro v. Hoosac Tunnel & W.R. Co., [6 F.2d 733 (2d Cir. 1925)]. Zimco Restaurants, Inc., v.
Bartenders & Culinary Workers, 165 Cal. App. 2d 235, 331 P.2d 789.
21
5
then know is unknown to any one else. The terms upon which they contract with
reference to this subject matter are purely up to them and are governed by what
the contract they enter into provides. Id.
Parameters and Scope of Trade Secrets Protection:
As a practical matter, the need to maintain secrecy should not be confused with the general
perception of keeping a secret in every and all circumstances. In the course of doing business,
there will invariably be a need to reveal or disclose the valuable information to those who have a
need to know in order to work or practice that invention or patent. This calls for appropriate
measures to be put in place to restrict the scope of dissemination as much as practicable.
The usual steps adopted by most establishments is to ensure that employees, contractors,
agents and licensees enter into a non-disclosure agreement and that employment contracts
impose confidentiality obligations on employees.23 Other methods include: the introduction of a
trade secret protection policy, labelling appropriate documents as proprietary and confidential,
and ensuring the safe keeping of valuable documents among other measures.24
In the Nigerian case of Andreas Koumoulis v. Leventis Motors Limited25, the appellant was sued
for breach of his contract of service as spare parts Sales Manager, a position which he
subsequently relinquished and joined, less than 3 weeks later, a rival company located within
400 yards of the respondent’s business in Apapa.
According to Clause 6 of his Service Agreement, the appellant was not for at least a year
following the determination of his employment, to undertake or carry on a similar business or
employment as that of the respondent within a radius of less than 50 miles from any Trading
Station in West Africa, which was then or thereafter owned or managed by the respondent.
Generally, where a covenant is imposed they should go no further than is necessary to protect the employer’s
interest. Failure to limit the scope of the covenant could render it unenforceable on public policy grounds as an undue
restraint of trade. In Expansion Plus Inc., v. Brown Foreman Corp., 132 F.3d 1083 (5th Cir. 1998). The Court
concluded that where an obligation not to disclose is imposed by agreement of the parties, such obligation is
automatically extinguished on the expiration of the applicable limitation period and no further implied obligation could
validly exist.
24 Paul E. Rossler and Scott Rowland op. cit., fn. 18, have identified specific steps that can be taken to reduce the
risk of exposure by corporations and employers. Some of these include, limiting employee access to trade secret
information, strengthening the security of storage facilities, specifically protecting electronically stored information and
taking deliberate steps to control disclosure to third parties even when disclosure is unavoidable.
Under common law rules applicable to breach of confidential information, a distinction can be drawn between
disclosure of discrete technical secrets which are protectable even in the absence of a covenant and merely
incidental or ancillary information revealed to an employee during his employment, which can only be protected if an
appropriate covenant is imposed. There is a further category that deals with the general skill and knowledge acquired
by the employee in the course of employment, which are not protectable in any event.
See SI Handling Systems v. Heisley, 753 F.2d 1244, 1266-69 (3d Cir. 1985), where the court applied a balancing test
between the employer’s needs and the reasonable expectations of the employee and society in general. It would
seem that even in the absence of an express covenant restricting disclosure of confidential information or trade
secrets, the employer can rely on the employee’s implied duty of fidelity during the currency of the employment.
Baker v. Gibbons [1972] 2 All E.R. 759. On the duty of fidelity generally, see Asaolu v. Olaiya Fagbamigbe [1982] 1
FNR 88.
25 (1973) 11 S.C. 100; (1973) All N.L.R. 789; [1973] N.M.L.R. 452; (1973) LPELR-SC. 250/ 1971. Also see CFAO v.
George Leuba (1918) 2 NLR 67; Anglo-African Supply Company v. Benvie (1937) 13 NLR 158; John Holt & Co
(Liverpool) Ltd. v. Chalmers (1918) 3 NLR 77.
23
6
Justice Lambo sitting at the Lagos High Court entered judgment in favour of the respondent
(former employer), whereupon the appellant filed an appeal at the Supreme Court, contending
that clause 6 of the contract of service aforesaid was too wide and consequently unenforceable.
The Supreme Court affirmed the decision of the trial court with Udo Udoma JSC., summarising
the court’s decision in the following words:
It was argued by learned counsel that there was no definite finding by the court
as to the specific trade secrets concerning the respondent’s business which had
been acquired by the appellant and that, in any case, the area of operation of the
respondent’s being West Africa, the covenant was too wide. The short answer to
this is that there was un-contradictory evidence that the appellant as a spare
parts sales manager dealt directly on behalf of the respondents and as their
agent with customers of the respondents both overseas and in this country. He
was in possession of the respondent’s trade secrets and soon after his
resignation and departure from this country the respondents lost Overseas
Agencies for which they were negotiating to their rivals, the Nigerian Technical
Company Limited and thereafter they were advised in letters signed by the
appellant to deal with their competitor based about 400 yards away, by whom the
appellant was then employed…Surely, the inference that the appellant had
something to do with the sudden change as regards the respondent’s dealers or
suppliers is irresistible.26
In certain unique circumstances, facts may exist which can justify a court imposing an order
restraining an ex-employee from assuming employment with a competitor even though no
actual misappropriation has occurred but the mere existence of a real likelihood of its
occurrence.
This is what happened in the case of PepsiCo, Inc., v. William Redmond.27 The facts of that
case arose from a fierce beverage-industry competition involving the Plaintiff PepsiCo and
Quaker Oats Company in the sports and new age drinks market. PepsiCo had introduced its ‘All
Sport’ brand to compete with Quaker’s more famous brand ‘Gatorade’ with little success.
PepsiCo which had entered the market through joint venture arrangements with Thomas Lipton
Company and Ocean Spray Cranberries, Inc., had developed extensive plans and strategies for
increasing its market share for the year 1995. Quaker on the other hand, had acquired Snapple
Beverage Corp., in a bid to consolidate its position in the market by integrating the Gatorade
and the Snapple distribution networks. The defendant was the General Manager of the Northern
California business unit of Pepsi-Cola North America division (PCNA) having worked for the
company from 1984 until 1994. From the beginning of 1994, Quaker through an ex-PepsiCo
employee began making overtures at the defendant Redmond and eventually offered Redmond
the position of Vice-President for Gatorade Field Operations, which he accepted.
Redmond thereafter notified his superiors at PepsiCo that he was accepting the offer from
Quaker whereupon he was informed of PepsiCo’s intention to institute legal action against him
based on a Confidentiality Agreement which he had previously signed as a management staff
with the company.
The action which was eventually filed by PepsiCo sought to enjoin the defendant from assuming
his duties at Quaker and from disclosing the company’s confidential information or trade secrets
26
27
Id. at…
54 F.3d 1262 (7th Cir. 1995).
7
to Quaker. The District Court after conducting a preliminary injunction hearing, sided with
PepsiCo on the strength of the substantial evidence of sensitive marketing and distribution
information adduced and to which Redmond had been privy as a former high level managerial
staff. The court enjoined the defendant from assuming his new position at Quaker until May of
1995 and permanently from divulging any PCNA trade secrets or other confidential
information.28 The court held that there existed a real threat of misappropriation of said sensitive
information, exacerbated by the defendant’s lack of honesty and candor in his conduct prior to
accepting the job and in his testimony before the court.
On appeal to the 7th Circuit Court of Appeal, the decision of the District Court was affirmed
under the Illinois Trade Secrets Act (ITSA) 1988.29 The Court of Appeal commented that:
Admittedly, PepsiCo has not brought a traditional trade secret case, in which a
former employee has knowledge of a special manufacturing process or customer
list and can give a competitor an unfair advantage by transferring the technology
or customers to that competitor. PepsiCo has not contended that Quaker has
stolen the All Sport formula or its list of distributors. Rather PepsiCo has asserted
that Redmond cannot help but rely on PCNA trade secrets as he helps plot
Gatorade and Snapple’s new course, and that these secrets will enable Quaker
to achieve a substantial advantage by knowing exactly how PCNA would price,
distribute, and market its sports drinks and new age drinks and being able to
respond strategically. This type of trade secret problem may arise less often, but
it nevertheless falls within the realm of trade secret protection under the present
circumstances.30
The increasing importance of this field to any serious business enterprise cannot be
understated. It is frequently the subject of international espionage and the unspoken justification
behind the success of major multi-national corporations and perhaps, the reason for various
shades of regional and international conflicts.31 According to Karl Jorda, “…patents are but the
tips of icebergs in an ocean of trade secrets. Most technology is unpatented. Based on my
experience, I have reached two conclusions: (1) trade secrets cover over 90% of all new
technology; and (2) over 80% of all license and technology transfer agreements cover trade
secrets or constitute hybrid agreements relating to patents and trade secrets.” 32
The extensive evidence introduced by PepsiCo included: a) PCNA’s ‘Strategic Plan’ an annual documents
reflecting the company’s competition plans, financial goals, manufacturing strategies, production, marketing and
distribution for the next three years, b) PCNA’s ‘Annual Operating Plan’ for the relevant year, disclosing its financial
goals, marketing plans, promotional events calendar, operational changes and growth expectations, c) PCNA’s
‘Pricing Architecture’, showing its pricing structure in the market, its pricing approach and specific price points for
specific regions, trade channels, package sizes and other unique characteristics, d) PCNA’s ‘Attack Plans’ for
designated markets against other brands and, e) PCNA’s innovations in its selling and delivery systems with retailers
over things like shelf space and merchandising targeted at gaining an advantage over its competitors.
29 George S. May Int’l Co. v. Int’l Profit Associates, 256 Ill. App. 3d 779, 195 Ill. Dec 183, 189, 628 N.E.2d 647, 653
(1st Dist. 1993), appeal denied, 156 Ill. 2d 557, 202 Ill. Dec. 921, 638 N.E.2d 1115 (1994).
30 Id at… See Teradyne, Inc., v. Clear Communications Corp., 707 F. Supp. 353 (N.D. Ill. 1989) and AMP Inc. v.
Fleischhacker, 823 F.2d 1199 (7th Cir. 1987).
31 See generally Peter Wright, Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer (Viking
Penguin Inc., 1987).
32 See Karl F. Joda, Patent and Trade Secret Complementariness: An Unsuspected Synergy, published in Washburn
Law Journal Vol. 48 2008. Also see All Pro Sports Camp, Inc. v. Walt Disney Co. 727 So. 2d. 363, 364, 368 (Fla.
Dist. Ct. App. 1999). Also see Dave Price, Cargill Reaps Bitter Harvest in Pioneer Dispute, FINANCE & COMMERCE
May 17, 2000. Lexar Media Inc. v. Toshiba Corp., No 1-02-CV- 812458, 2005 WL 5872071, at 1 (Cal. App. Dep’t
Super. Ct. 14, 2005). The over 120 year old trade secret associated with the famous Coca-Cola recipe is widely
known and cited by other authors. This famous brand is reputed to be the subject of near paranoid and elaborate
28
8
The governments of most developed countries also engage in the monitoring of technology
transfers of sensitive goods, technology and software through export control regulations. These
regulations are driven by national interests and foreign policy objectives that manifest in the
form of trade embargoes or boycotts of designated countries and territories. In the United
States, the Commerce Department through its Bureau of Industry and Security (BIS)
administers the Export Administration Regulations (EAR), while the Directorate of Defense
Trade Controls (DDTC) of the US Department of State implements the International Traffic in
Arms Regulations (ITAR). The goal is to closely monitor and circumscribe the transfer of
sensitive information, data or technology to foreign countries without the appropriate license or
permits.33
Trade Secrets and Technology Transfer to Developing Countries:
The importance trade secrets is further underscored by the fact that most patents and
inventions are of very little value without the accompanying know-how to work them and in most
licensing and transfer of technology contracts, the value of the transfer is vastly enhanced if
there is some related trade secret incorporated into the conveyance. Most developing countries
have found to their dismay that without this all important component, attempts to replicate any
and all none locally generated technological knowledge are futile for the most part or
ineffectual.34
The relevance of technology to increased productivity and economic development and as a
means of ensuring a country’s competitiveness within the international market is apparent.35
How to ensure the effective transfer of useful and relevant technological know-how to the less
developed economies has been a source of deep concern both at the international level and at
local-state levels not only in terms of eliciting the willingness of the corporate entities who own
such technologies to transfer them and what the condition for such transfers should be, but also
in terms of how to create an enabling local environment that engenders proper assimilation and
measures to conceal its secret recipe. As the story goes, only two topmost senior staff have knowledge of this
formula at any given time and who are not allowed to travel together in addition to the formula being stored in a bank
vault. One of the early presidents of the company was so obsessed with the idea of protecting the Coca-Cola formula
that he ensured that it was never written down and would remove labels from containers listing the ingredients
together with invoices reflecting those ingredients from the accounts department. With a ₤3.58bn net income reported
for this company for the 4th quarter of 2010, this strange and unusual behavior can be placed in proper context. Other
examples include the secret method for making Cymbals and the secret recipe for the Angostura Bitters both of which
have remained trade secrets for over 200 years. (See Karl F. Joda, above)
33 See Gomulkiewicz, Nguyen and Conway-Jones, Licensing Intellectual Property: Law and Application (Aspen
Publishers/Wolters Kluwer, 2008) pg. at 228-229.
34 Robert M. Sherwood, Intellectual Property and Economic Development (1990). Melvin F. Jager, The Critical
Role of Trade Secret Law in Protecting Intellectual Property Assets, in Licensing Best Practices: The LESI Guide
to Strategic Issues and Contemporary Realities 127 (Robert Goldscheider ed. 2002). See for instance the
National Office for Technology Acquisition and Promotion Act Cap. N62 LFN 2004, which established the NOTAP
office to monitor and regulate the transfer of foreign technology to Nigeria. Also see S. K. Date-Baah, Transfer of
Technology to Nigeria and the Patents and Designs Act, (Journal of African Law, Vol. 25, No. 2, 1981).
35 See for instance Daniel Tien-Pei Lee, Technology Transfer to Developing Countries with Special Reference to
the Economy of the Republic of China (1977 Doctoral Thesis, eBook edition by Barnes and Noble). He argues that
productivity in the manufacturing sector is linked to increased output, capital intensity and capital formation through
foreign investment. And while economic growth is a function of increased productivity through technological
advancement, technological growth is in itself a function of capital formation. Also see Andres Guadamuz,
Technology Transfer: Open Licensing and Developing Countries (eBook edition- Creative Commons Attribution,
2012), highlighting the importance of technology acquisition and development to the problems of poverty and
underdevelopment in Third World countries.
9
diffusion of the transferred technology and know-how, in order to propel economic growth and
extract the attendant social benefits for the masses.36
Part of the problem encountered by policy makers involves the monopolistic control of
technology through the patent regime and through the instrumentality of trade secrets as
identified in this paper as vehicles for increasing financial returns on investments from capital
intensive research and development efforts. Theoretical analysis regarding how far the exercise
of these monopoly rights can go before the justification for granting them is completely eroded,
vis-à-vis how far the public’s right to benefit from the disclosure of such rights within the shortest
possible time can be accommodated, constitutes further challenges for policy makers and
researchers.37
Most of the technology exported to developing countries are of the embodied type, in the form of
equipment, machinery and other finished products, through foreign direct investments to those
regions with the primary if not sole objective of exploiting a new and viable market by the
investors.38 These investment arrangements are often tailored to maintain foreign managerial
control of the local enterprises and the secrecy of the proprietary technologies which the
recipient countries anticipate would be transferred. Furthermore, the repatriation of virtually all
related profits from the venture to the investor’s home country fundamentally interferes with any
meaningful entrenchment of technological knowledge in the host-state.39
A number of developing countries have attempted to address these challenges and problems
through the enactment of legislations that directly regulate the importation and acquisition of
technological know-how, through the use of compulsory licenses in some instances40 and
through parallel importation in other instances.41
36
See Draft International Code of Conduct on the Transfer of Technology, June 20, 1985, Ch. 1.2. United Nations
Conference on Trade and Development UNCTAD. http://www.unctad.org/en/pub/pubframe.htm. Which defines
technology as “…the systematic knowledge for the manufacture of a product, for the application of a process or for
the rendering of a service and does not extend to the transactions involving the mere sale or lease of goods.” Also
see D. Babatunde Thomas, Importing Technology into Africa: Foreign Investment and the Supply of
Technological Innovations (Praeger Publishers Inc., 1976) at pgs. 1-21.
37 For a thorough consideration of these and other issues see G. Sipa-Adjah Yankey, International Patents and
Technology Transfer to Less Developed Countries: The Case of Ghana and Nigeria (Avebury/ Gower
Publishing Company Limited, 1987) at pgs. 1-57. The author identifies some of the restrictive practices inherent in
Patent Licensing arrangements that could stifle the effective transfer of technology to developing countries as
including export prohibitions, the use of grant-backs and improvement clauses, tying clauses, price fixing, field of use
restrictions and no-contest clauses.
38 Other modes for the transfer of technology are through management contracts, technology licensing, bilateral
technical assistance contracts and the transfers of technologies over expired patented rights relevant to the peculiar
needs of developing countries on a non-exclusive royalty free basis. The development of locally grown technology
even on an intermediate scale has been described as risky, expensive, time consuming and perhaps an ill-advised
and wasteful attempt to reinvent the wheel, so to speak. See Thomas op. cit., at pg. 11.
39 Thomas op. cit., at pgs. 4-15.
40 See Section 11 and the First Schedule to the Nigerian Patents and Designs Act Cap. P2 LFN 2004, which allows
for the grant of compulsory licenses to private local concerns on specially identified grounds including the need to
satisfy local demands for the product following the refusal of the patentee to license the subject matter within a
reasonable time and on reasonable terms. On the other hand, the Second Schedule confers similar rights on state
and federal agencies in times of national emergencies. Articles 30 and 31 of the TRIPS Agreement recognizes the
right of contracting state parties to license patented products and processes on a compulsory basis on a nonexclusive, non- assignable basis and after payment of adequate compensation to the rights holder. Also by virtue of
Article 67 of TRIPS, developed countries have committed to provide incentives for the transfer of technological knowhow to developing countries. WTO Doc. WT/L/540 (September 2nd 2003) on the implementation of Paragraph 6 of the
Doha Declaration on the TRIPS Agreement and Public Health and the General Council Amendment of 2005.
41 TRIPS Articles 31 (f) and (h) and 27.1, respectively.
10
The local legislations on technology acquisition are formulated to ensure the full access to the
use and exploitation of the relevant technology by the local enterprise, an assessment of the
value and applicability of the technology in question, the availability and access to the
necessary know-how, technical information or proprietary process needed to work the invention
locally, the extraction of appropriate performance guarantees for technological processes,
ensuring a correlation between the remuneration payable by the local enterprise and the value
of the transferred technology, the use of adequate clauses in technology agreements which
ensure the creation of indigenous technological capabilities through the training of local skilled
manpower and utilization of local content additions, the maintenance of open channels through
technical and managerial support and assistance and through access to improvements in
technology42, and through the imposition of appropriate controls on the repatriation of
earnings.43
How far these strategies have succeeded in facilitating the transfer of essential and useful
technologies to developing countries is doubtful for various reasons not unconnected with the
disadvantaged position of the recipients of such technologies and their economic dependency
on foreign investments and international aid. With the incidence of sovereign debts spiralling out
of control, most developing countries have had to concede, out of perceived desperation, to
unfair trade terms as expressed in a number of bilateral investment treaties and Free Trade
Agreements, that have had the singular consequence of reversing what minor gains may have
resulted from the proper implementation of local legislations on technology acquisition and other
national science, technology and development policies.44
There is also an obvious dread on the part of the corporate owners of these essential
technologies that the full transfer of relevant know-how to third parties, even for fair and
reasonable compensation, would mean loss of full spectrum dominance in the relevant field and
loss of market access and opportunities to sell their products at a premium.
Salient Issues in the Licensing of Trade Secrets:
There is a tendency to group together all sensitive material over which a company seeks to
exercise some form of property control as proprietary information. When faced with the business
decision entailed in the possible transfer of technology or an alleged trade secret, it is vital to
ascertain the value of the information or data to be received. This is in view of the fact that
certain ‘submitted ideas’, ‘know-how’45 and ‘proprietary information’ could indeed be of doubtful
legitimacy or lack any real technical value.
42
See generally the National Office for Technology Acquisition and Promotion (NOTAP) Act supra and the revised
guidelines on acquisition of foreign technology.
43 Pursuant to Section 7 of the NOTAP Act for instance, “no payment shall be made in Nigeria to the credit of any
person outside Nigeria by or on the authority of the Central Bank of Nigeria or any licensed Bank in Nigeria in respect
of any payments due under a contract or agreement mentioned in this Act unless a certificate of registration issued
under the Act is presented by the party or parties concerned, together with a copy of the contract or agreement
certified by the National Office in that regard.” See Beecham Group Ltd. v. Essdee Food Products [1977- 1989] 2
I.P.L.R. 239.
44 A good example is the current North American Free Trade Agreement NAFTA. See Andreas F. Lowenfeld,
International Economic Law (Oxford University Press, 2nd Edition, 2008) pgs. 555-556. See also The Free Trade
Agreement between Singapore and the United States of May 6 th 2003 (Art. 16.9) and the Free Trade Agreement
between Australia and the United States of May 18th 2004 (Arts. 17.1 to 17.2). See Lowenfeld at 363.
45 In Mycalex Corp. of America v. Pemco Corp., 64 F. Supp. 420, 68 USPQ 317 (D. Md 1946) , aff’d, 159 F.2d 907,
72 USPQ 290 (4th Cir. 1947), the court defined ‘Know-how’ as: “…factual knowledge not capable of precise, separate
description but which, when used in an accumulated form, after being acquired as the result of trial and error, gives to
the one acquiring it an ability to produce something which he otherwise would not have known how to produce with
11
A strategy adopted by some is to limit exposure to liability to the submitter of such information
by the use of an appropriate clause in the license agreement. This shields the receiving party
from being saddled with the weighty responsibility of maintaining the secrecy of clearly useless
information. Be that as it may, it is necessary also to be mindful that “…subject matter called
simply ‘Licensor’s Data’ for example, may be highly protectable if the data referred to are limited
by the contract to safeguarded information that is of esoteric quality and substantial business
value.”46
It is necessary to define the nature and scope of the transferred information or technology, the
obligations to be assumed by the recipient regarding their use and protection and the conditions
of use as well as associated responsibilities following the termination of such rights. When the
transfer is in the nature of valuable information there are practical constraints that follow from
termination of obligations in a license arrangement which render the Licensor’s restoration to
exclusive ownership somewhat challenging once there is disclosure.
Therefore it may be expedient to acknowledge that certain portions of the transferred data or
information are hypothetically discoverable by the licensee by the application of reasonable
efforts and investment. The Licensor can however insist on the return of all related data,
drawings, specifications and sketches, as well as all modifications, copies and adaptations
thereof by means of which the technology or trade secret was transferred and to insist on the
non-application or utilization of the technology for a definite period after the termination of the
agreement.47
Applicable Remedies and Defences to Misappropriation of Trade Secrets:
In case of unlawful disclosure of the protected information/trade secret to a third party, the
Licensor has a clear contractual right to sue for trade secret misappropriation, where the trade
secret forms the subject matter of a license agreement. In order to maintain an action in tort
however, the Licensor has to disclose an on-going confidential relationship with the Licensee.48
On the other hand, while an exclusive Licensee has standing to sue for trade secret
misappropriation, a non-exclusive licensee has no such right.49
The general defences available to a defendant accused of the misappropriation of a trade secret
is to contend that the secret was obtained by proper means either through independent effort or
reverse engineering. By the same token, if the information is generally available or in the public
domain, a third party is not precluded from making valid use of it. Being a limited negative right,
use of a trade secret by a third party is only prohibited if it is obtained through improper means
either through breach of a duty or obligation to maintain secrecy, electronic espionage, theft,
bribery or other forms of inducement.50
the same accuracy or precision found necessary for commercial success.” Id. at 425. Also see United States v.
Timken Roller Bearing Co., 83 F. Supp. 284, 81 USPQ 28 (N.D. Ohio 1949).
46 See Brian G. Brunsvold and Dennis P. O’Reilley, Drafting Patent License Agreements (The Bureau of National
Affairs, Inc., 2007) at pg. 240 para. 21.00.
47 Id. at 257-259 para. 21.07.
48 See generally Gomulkiewicz, Nguyen and Conway-Jones, Licensing Intellectual Property: Law and Application
(Aspen Publishers/Wolters Kluwer, 2008) pg. 226.
49 RMS Software Dev., Inc. v. LCS, Inc., 1998 WL 74245 (Tex. App.-Hous. (1st Dist.) Feb. 19, 1998).
50 Sony Computer Entm’t v. Connectix Corp., 203 F.3d 596 (9 th Cir. 2000). Sega Enters., Ltd. v. Accolade, Inc., 977
F.2d 1510 (9th Cir. 1993).
12
As earlier discussed, in some jurisdictions covenants not to compete are either void outright or
voidable at the instance of the employee as being in restraint of trade and the freedom of an exemployee to seek employment or practice a profession. In other jurisdictions, the restrictions
must be reasonable in time and geographical limits and specifically limited in scope to the
protection of the alleged trade secrets.
Although theoretically the remedies of injunction and damages are available to a Licensor who
has successfully maintained an action for trade secret misappropriation,51 the actual benefits of
these remedies are debatable and are largely dependent on the scope and nature of the
breach. Since valuable secret information or data once released to the public cannot be recalled
nor can it be replaced like merchandise, it has been argued by some authors that consequential
damages may be the only meaningful remedy available to an aggrieved party.52
Concluding Remarks:
It has been suggested that for technologies which are susceptible to protection under multiple
fields of intellectual property law, that the benefits conferred by the complementary IP fields be
explored, in order to ensure the adequate protection of these rights. Along those lines, the
benefits of trade secrets protection, as argued in this paper, are viable tools which inventors and
employers can put to very good use.53
However, it is instructive to emphasize that the unique role which trade secrets play in the
proper and effective utilization of other forms of intellectual property protection and in the
instigation of technological growth and economic development through technology transfer
arrangements, are far reaching and incontestable.
It is therefore of paramount importance to carefully monitor and regulate the pervasive
monopolisation of proprietary rights to patented technology and know-how (in the form of trade
secrets) merely for unbridled profiteering and rent collection, at the expense of the benefits
which they are designed to confer upon society through proper disclosure or through the
transfer of essential technologies to meet the developmental needs of Third World Countries
and to assuage their legitimate health and welfare concerns.54
“…the foundation of economic development is the acquisition of more productive knowledge.
The stronger the international protection for IPRs is, the more difficult it is for the follower
countries to acquire new knowledge. This is why, historically, countries did not protect
foreigners’ intellectual property very well (or at all) when they needed to import knowledge. If
knowledge is like water that flows downhill, then today’s IPR system is like a dam that turns
potentially fertile fields into a technological dustbowl. This situation clearly needs fixing.”55
51
Others include the award of reasonable royalty payments and profits. See 35 USC Sections 283-284 (2000).
See Gomulkiewicz et al supra at 228.
53 The interdependence of intellectual property rights as complementary avenues of protection for individual products
or processes has been endorsed by Robert Merges et al in their book: Intellectual Property in the New
Technological Age, Aspen Publishers, 2007.
54 Under Article 7 of TRIPS: “The protection and enforcement of intellectual property rights should contribute to the
promotion of technological innovation and to the transfer and dissemination of technology, to the mutual advantage of
producers and users of technological knowledge and in a manner conducive to social and economic welfare, and to a
balance of rights and obligations.”
55 See Ha-Joon Chang, Bad Samaritans: The Myth of Free Trade and the Secret History of Capitalism
(Bloomsbury Press, New York, 2008) at 142. The author also recounts the sordid history of the technological arms
race of the 17th and 18th centuries during which all manner of illegal means were employed (i.e. clandestine high level
personnel recruitment schemes, the smuggling of complex machinery and industrial espionage) to acquire desirable
52
13
scientific knowledge and technologies from competitor countries. See Bad Samaritans at pp. 127-131. Ironically, the
United States has for many years been accusing the Chinese government of sponsoring cyber-attacks and industrial
espionage to gain access to valuable trade secrets belonging to US companies and corporations. In a recent
development, the House Intelligence Committee held a hearing on September 13 th 2012, targeted at two Chinese
companies (Huawei and ZTE Communications) striving to gain substantial market share in the US Telecoms market.
According to a former assistant director of the FBI on cyber security, Shawn Henry: “Telecommunications equipment
is put in place, and its purpose is to route data through a network. An adversary who had control over programming
that hardware or that software could potentially re-route data [by creating a back-door to the system], so that it was
able to be siphoned off or viewed by others.” See U.S. Scrutinizes Chinese Telecom Companies over Spy Fears
(CBS News) http://www.cbsnews.com/2102-505263_162-57511974.html (Accessed September 14th 2012).
14
Download