Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Protecting Trade Secrets Before, During and After Trial Michael Clarke, Esq. – E.I. duPont de Nemours and Company Rod Satterwhite – McGuireWoods LLP.

Similar presentations


Presentation on theme: "1 Protecting Trade Secrets Before, During and After Trial Michael Clarke, Esq. – E.I. duPont de Nemours and Company Rod Satterwhite – McGuireWoods LLP."— Presentation transcript:

1 1 Protecting Trade Secrets Before, During and After Trial Michael Clarke, Esq. – E.I. duPont de Nemours and Company Rod Satterwhite – McGuireWoods LLP Brian Riopelle – McGuireWoods LLP

2 Trade Secrets in the Spotlight Significant verdicts –St. Jude Medical Chinese medical device company No show at trial – $2.3 billion –DuPont v. Kolon Aramid fiber technology – Kevlar® $920 million –Mattel v. MGA (Bratz) $309 million including fees 2

3 Themes Foreign competition Value of trade secrets Agenda – How to Protect – Effectively –Before litigation – pitfalls –During litigation –In cooperation with law enforcement

4 Trade Secret Va. Code § 59.1-336

5 5 To be more precise... Must be “the subject of efforts that are reasonable under the circumstances to maintain its secrecy.”

6 6 Employee Confidentiality Agreements Employee education is key Agreement better than policy –Commitment –Evidence Universally recognized as reasonable

7 Confidentiality Agreements - Risks Too long –Not followed Too specific –Exclusionary –Static 7

8 Agreements – Strike a Balance Detailed enough to educate –Purpose of the agreement “Employer has developed commercially valuable technical and non-technical information.” “The aforesaid information is vital to the success of the Employer’s business.” –Provide examples, but not exhaustive list 8

9 All Employees Sign –Administrative employees will have access –Critical to show culture of organization

10 Policies Reinforce agreements Opportunity for education 10

11 Risks Not following Too much detail 11

12 Policy Risk – Narrow Definitions “Such information includes technical and financial data developed by or for the Company and not generally known to others. It can also include source and computer code, test results on new or modified software and any technical information and data pertaining to Company software or its implementation/integration.” 12

13 Updating Policies Reflect changes in confidential information New storage methods – technology Improvements to protective measures 13

14 Overzealous Training Justification for policy improvement Highlights weakness in prior policy “Our information is at risk.” “Our protections are not adequate.” “We have had severe security breaches.” Can undercut prior efforts 14

15 Federal Rule of Evidence 407 Excludes evidence of “subsequent remedial measures” Product liability context Original purpose: ongoing safety improvements Used in DuPont v. Kolon –After Mitchell, DuPont further tightened security –Kolon wanted to use it to attack prior efforts –Court excluded evidence 15

16 Confidentiality Markings Surprisingly tricky area 16

17 Default Treatment “No special designation is assigned to the large majority of documents which contain Company business or technical information but to which access should still be limited to [Company] personnel. Absence of a formal designation does not of itself exempt any information or document from the broad rule of ‘internal use only.’”

18 Distribution of Policy Proof of receipt – testimony –Opposing witness Acknowledgement

19 Physical Security Overlooked –Trade secrets not sole purpose Failure to address can be fatal –Edgewater – unlocked rooms

20 Physical Security Measures Fences / gates / guards Locked doors / offices / cabinets Badges Restrictions on visitor access

21 Visitor Access Sometimes necessary Precautions –Approval –Confidentiality agreement –Escort –Restricted areas –Photo / video prohibition

22 Third Party Agreements Sharing may be required Customers / partners / suppliers / vendors Non-disclosure Agreements common –Limit use of information –Sometimes require return or destruction

23 Third Party Agreements – Risks Agreements expire Relationship continues Problem: agreement describes information as “valuable” or “critical to process” No restriction on use after expiration KEY: monitoring & renewal

24 Electronic Security Password security for network access Additional security for sensitive materials Firewalls, network security Smart Cards – helpful, not required Encryption – helpful, not required “Reasonable” measures

25 Electronic Security – Risks Travel –Theft while abroad Work at home Retrieval of materials at termination

26 Education & Training Orientation Informal Reminders – OTJ Formal follow-up Mandatory attendance Documented attendance

27 Exit Interviews Tool for –Gathering information –Policy reminder –Return of materials –Reaffirm written commitment Risk: inconsistent application

28 Publications & Presentations Legitimate business reasons –Market presence –Academic / scientific community Policy requiring review Can send powerful message about culture

29 Unnecessary Precautions Trade Secret inventory Tracking every copy of a document De-designating dated information

30 In any Trade Secrets case: Protective measures will be challenged “Otherwise they wouldn’t have been able to steal the information.”

31 Litigating Trade Secret Claims

32 Filing Other Claims in a Trade Secret Case Preemption Can avoid dismissal by distinguishing confidential information from trade secret –Unjust enrichment –Conversion –Breach of contract

33 Defining Trade Secrets Law requires trade secret to be identified with “reasonable particularity” Constant tension throughout case

34 Discovery Developing legal elements –Misappropriation Acquisition Use –Trade secret Derives independent economic value from –Not being generally known –Not readily ascertainable Subject to reasonable efforts to maintain secrecy

35 Discovery Developing legal elements –Damages Actual damages Unjust enrichment Reasonable royalty

36 Discovery Develop themes/stories –What –Why –Who

37 Foreign Defendants Familiarity with U.S. discovery process Depositions –Interpreters Translations –Informal –Certified

38 Protecting Trade Secrets During Litigation Protective order During trial

39 Trial – Telling the Story Balancing technical details with simple themes/story Incorporate technical details into story DO NOT incorporate story into technical details

40 40 THE END Business Department Capital Markets | Energy & Utilities | Health Care | International | Land Use & Environmental Mergers & Acquisitions, Securities & Corporate Services | Real Estate Transactions | Tax & Employee Benefits | Technology & Business Litigation Department Antitrust & Trade Regulation | Business & Securities Litigation | Complex Commercial Litigation | Financial Services Litigation | Government Investigations IP Litigation/Patents | Labor & Employment | Product & Consumer Litigation | Restructuring & Insolvency | Toxic Torts & Environmental Litigation ATLANTA BALTIMORE CHARLOTTE CHARLOTTESVILLE CHICAGO JACKSONVILLE LOS ANGELES NEW YORK NORFOLK PITTSBURGH RALEIGH RICHMOND TYSONS CORNER WASHINGTON, D.C. WILMINGTON ALMATY, KAZAKHSTAN | BRUSSELS, BELGIUM | LONDON, UNITED KINGDOM www.mcguirewoods.com  2012 McGuireWoods LLP


Download ppt "1 Protecting Trade Secrets Before, During and After Trial Michael Clarke, Esq. – E.I. duPont de Nemours and Company Rod Satterwhite – McGuireWoods LLP."

Similar presentations


Ads by Google