1 Protecting Trade Secrets Before, During and After Trial Michael Clarke, Esq. – E.I. duPont de Nemours and Company Rod Satterwhite – McGuireWoods LLP.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL Health Care 1 Scott Becker, Partner McGuireWoods LLP Presented to: Webinar September 26 th, 2007 Webinar September 26 th, 2007 Joint Ventures.
Advertisements

WIPO - TCCIA WORKSHOP ON INTELLECTUAL PROPERTY FOR BUSINESS FOR SMEs Dar-es-Salaam, Tanzania, May 10 and 11, 2005 Keeping Confidence: Trade Secrets in.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Drafting and Reviewing Confidentiality Agreements West LegalEdcenter 2012.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Restrictive Covenants, Confidentiality Agreements, and Trade Secrets.
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
Developing a Records & Information Retention & Disposition Program:
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Intellectual Property Boston College Law School February 9, 2009 Trade Secret – Part 1.
Trade Secrets Introduction Let’s begin our discussion of trade secrets with the following video and article (Video) “Shh! Food trade secrets you'll never.
1 SSHHHH! It’s a Trade Secret Steve Baron April 6, 2006.
CONFIDENTIAL 1 DOWNSIZING IN PUBLIC SCHOOLS: RIF PLANS, PROCEDURES AND PITFALLS Presented by: R. Craig Wood
Protecting your company’s valuable information
1 Renewable Energy Certificates Presented by Janice Moore, Partner ( )
Intellectual Property. Edwin Land Harvard dropout used to sneak into Columbia U. to conduct research 22 years old, obtained $375,000 from investors to.
Aerospace Industries Association Intellectual Property Committee Fall 2009 meeting SMC Enabling Clause Holly Emrick Svetz (703)
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
©2013 Duane Morris LLP. All Rights Reserved. Duane Morris is a registered service mark of Duane Morris LLP. Duane Morris – Firm and.
Trade Secrets By Timothy B. McCormack
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Protecting Trade Secrets in the United States 2007 US / China Legal Exchange (Xian, Beijing, Shanghai) Rex Hockaday, Caterpillar (China) Investment Co.,
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
How to Protect the Company’s Crown Jewels – Customers & Trade Secrets – Against Unfair Competition William M. Corrigan, Jr. Armstrong Teasdale LLP One.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
1 SSHHHH! It’s a Trade Secret Slides 1-19 Adapted from Steve Baron.
Trade Secrets & Protection of Trade Secrets ISYM540 Topic 5 – Info Assurance and Security Len Smith July 2009.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Bryce K. Earl, Esq. and Thomas G. Grace, Esq Presentation To: Association of Corporate Counsel January 26, 2010 ______________________________ Covenants.
CONFIDENTIAL 1 ASCs – The Next Five Years Presented by: Scott Becker, Partner
© Copyright 2010 Hemenway & Barnes LLP H&B
Seattle Intellectual Property Inn of Court TRADE SECRETS Introduction.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
T RADE S ECRETS Copyright © 2010 by Jeffrey Pittman.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
1 SSHHHH! It’s a Trade Secret Steve Baron April 3, 2003.
Data protection—training materials [Name and details of speaker]
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
Technology Transfer Office
A Litigator’s View of Software License Agreements
Indiana Access to Public Records Act (APRA) Training
Drafting Key Commercial and Consumer Contract Terms
Protection of CONSUMER information
Privacy & Confidentiality
Astrachan Gunst Thomas, P.C.
SSHHHH! It’s a Trade Secret
A Comparative Legal and Economic View of Global Trade Secret Regimes
Chapter 3: IRS and FTC Data Security Rules
Dräger US – Trade Secrets CAP Training
Pre-Close Rules of Engagement
Bob Siegel President Privacy Ref, Inc.
Red Flags Rule An Introduction County College of Morris
General Data Protection Regulation
Bonnie Weiss McLeod Cooley LLP
Information Sensitivity
Presentation To: Association of Corporate Counsel January 26, 2010
SSHHHH! It’s a Trade Secret
SSHHHH! It’s a Trade Secret
Indicator 3.02 Use communication skills to foster open, honest communications.
Protecting Trade Secrets in the US
Introduction to the PACS Security
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

1 Protecting Trade Secrets Before, During and After Trial Michael Clarke, Esq. – E.I. duPont de Nemours and Company Rod Satterwhite – McGuireWoods LLP Brian Riopelle – McGuireWoods LLP

Trade Secrets in the Spotlight Significant verdicts –St. Jude Medical Chinese medical device company No show at trial – $2.3 billion –DuPont v. Kolon Aramid fiber technology – Kevlar® $920 million –Mattel v. MGA (Bratz) $309 million including fees 2

Themes Foreign competition Value of trade secrets Agenda – How to Protect – Effectively –Before litigation – pitfalls –During litigation –In cooperation with law enforcement

Trade Secret Va. Code §

5 To be more precise... Must be “the subject of efforts that are reasonable under the circumstances to maintain its secrecy.”

6 Employee Confidentiality Agreements Employee education is key Agreement better than policy –Commitment –Evidence Universally recognized as reasonable

Confidentiality Agreements - Risks Too long –Not followed Too specific –Exclusionary –Static 7

Agreements – Strike a Balance Detailed enough to educate –Purpose of the agreement “Employer has developed commercially valuable technical and non-technical information.” “The aforesaid information is vital to the success of the Employer’s business.” –Provide examples, but not exhaustive list 8

All Employees Sign –Administrative employees will have access –Critical to show culture of organization

Policies Reinforce agreements Opportunity for education 10

Risks Not following Too much detail 11

Policy Risk – Narrow Definitions “Such information includes technical and financial data developed by or for the Company and not generally known to others. It can also include source and computer code, test results on new or modified software and any technical information and data pertaining to Company software or its implementation/integration.” 12

Updating Policies Reflect changes in confidential information New storage methods – technology Improvements to protective measures 13

Overzealous Training Justification for policy improvement Highlights weakness in prior policy “Our information is at risk.” “Our protections are not adequate.” “We have had severe security breaches.” Can undercut prior efforts 14

Federal Rule of Evidence 407 Excludes evidence of “subsequent remedial measures” Product liability context Original purpose: ongoing safety improvements Used in DuPont v. Kolon –After Mitchell, DuPont further tightened security –Kolon wanted to use it to attack prior efforts –Court excluded evidence 15

Confidentiality Markings Surprisingly tricky area 16

Default Treatment “No special designation is assigned to the large majority of documents which contain Company business or technical information but to which access should still be limited to [Company] personnel. Absence of a formal designation does not of itself exempt any information or document from the broad rule of ‘internal use only.’”

Distribution of Policy Proof of receipt – testimony –Opposing witness Acknowledgement

Physical Security Overlooked –Trade secrets not sole purpose Failure to address can be fatal –Edgewater – unlocked rooms

Physical Security Measures Fences / gates / guards Locked doors / offices / cabinets Badges Restrictions on visitor access

Visitor Access Sometimes necessary Precautions –Approval –Confidentiality agreement –Escort –Restricted areas –Photo / video prohibition

Third Party Agreements Sharing may be required Customers / partners / suppliers / vendors Non-disclosure Agreements common –Limit use of information –Sometimes require return or destruction

Third Party Agreements – Risks Agreements expire Relationship continues Problem: agreement describes information as “valuable” or “critical to process” No restriction on use after expiration KEY: monitoring & renewal

Electronic Security Password security for network access Additional security for sensitive materials Firewalls, network security Smart Cards – helpful, not required Encryption – helpful, not required “Reasonable” measures

Electronic Security – Risks Travel –Theft while abroad Work at home Retrieval of materials at termination

Education & Training Orientation Informal Reminders – OTJ Formal follow-up Mandatory attendance Documented attendance

Exit Interviews Tool for –Gathering information –Policy reminder –Return of materials –Reaffirm written commitment Risk: inconsistent application

Publications & Presentations Legitimate business reasons –Market presence –Academic / scientific community Policy requiring review Can send powerful message about culture

Unnecessary Precautions Trade Secret inventory Tracking every copy of a document De-designating dated information

In any Trade Secrets case: Protective measures will be challenged “Otherwise they wouldn’t have been able to steal the information.”

Litigating Trade Secret Claims

Filing Other Claims in a Trade Secret Case Preemption Can avoid dismissal by distinguishing confidential information from trade secret –Unjust enrichment –Conversion –Breach of contract

Defining Trade Secrets Law requires trade secret to be identified with “reasonable particularity” Constant tension throughout case

Discovery Developing legal elements –Misappropriation Acquisition Use –Trade secret Derives independent economic value from –Not being generally known –Not readily ascertainable Subject to reasonable efforts to maintain secrecy

Discovery Developing legal elements –Damages Actual damages Unjust enrichment Reasonable royalty

Discovery Develop themes/stories –What –Why –Who

Foreign Defendants Familiarity with U.S. discovery process Depositions –Interpreters Translations –Informal –Certified

Protecting Trade Secrets During Litigation Protective order During trial

Trial – Telling the Story Balancing technical details with simple themes/story Incorporate technical details into story DO NOT incorporate story into technical details

40 THE END Business Department Capital Markets | Energy & Utilities | Health Care | International | Land Use & Environmental Mergers & Acquisitions, Securities & Corporate Services | Real Estate Transactions | Tax & Employee Benefits | Technology & Business Litigation Department Antitrust & Trade Regulation | Business & Securities Litigation | Complex Commercial Litigation | Financial Services Litigation | Government Investigations IP Litigation/Patents | Labor & Employment | Product & Consumer Litigation | Restructuring & Insolvency | Toxic Torts & Environmental Litigation ATLANTA BALTIMORE CHARLOTTE CHARLOTTESVILLE CHICAGO JACKSONVILLE LOS ANGELES NEW YORK NORFOLK PITTSBURGH RALEIGH RICHMOND TYSONS CORNER WASHINGTON, D.C. WILMINGTON ALMATY, KAZAKHSTAN | BRUSSELS, BELGIUM | LONDON, UNITED KINGDOM  2012 McGuireWoods LLP