Trade Secret Misappropriation: What To Do When You Hire A Thief

trade secret misappropriationEmployers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same employer may unwittingly — or worse, intentionally — have hired someone who has stolen trade secrets or confidential information. Failure to take appropriate precautions or implement sufficient remedial measures can expose the hiring employer to a variety of civil, and even potentially criminal, claims. Burying your head in the sand is not a winning strategy, especially given how easy technology has made it to copy and take confidential information.

The following tips can eliminate or minimize this risk and/or mitigate the consequences of having hired an individual who has misappropriated trade secrets. Prospective prevention steps include:

  • asking all potential hires if they are subject to a non-compete or restrictive covenant that could impact their duties in the proposed position, and potentially restructuring their job duties or whom they interact with, depending upon the circumstances;

  • reminding new hires, preferably in writing, that they are not to take, disclose, or use another company’s confidential and proprietary information — this should occur before they leave their current employer and before they start with you; and

  • educating employees, and especially hiring managers, on the company’s policy to respect the trade secrets rights of others.

What if despite these preventative measures, you discover that a new hire, who is now on your payroll, has taken the confidential information of a prior employer? The following steps can help mitigate the consequences to your company in such a circumstance.

  • Act immediately to preclude the use or disclosure of the information, including the quarantining of such information. Work with your information technology department or outside consultants to ensure that the steps you take are thorough and effective.

  • Investigate and assess what happened, the sensitivity of the information taken, and the culpability of the employee and others, especially when the matter involves a high-level employee, and consider retaining an attorney to conduct the investigation, to foster independence and obtain the benefits of attorney-client privilege.

  • Discipline or terminate the offending employee, depending on the circumstances.

  • Generally cooperate with the previous employer when confronted. Such cooperation could include anything from information sharing to a computer forensic review and agreed-upon deletion; this cooperation must be carefully managed to protect your trade secrets and bring closure to the situation.

All of this can be tremendously complex, nuanced, and important. Therefore, carefully consider each action and involve a multidisciplinary team, including Management, Human Resources, Information Technology and, Legal.

© 2017 Foley & Lardner LLP

Trade Secret Misappropriation: When An Insider Takes Your Trade Secrets With Them

Raymond Law Group LLC‘s Stephen G. Troiano recently had an article, Trade Secret Misappropriation: When An Insider Takes Your Trade Secrets With Them, featured in The National Law Review:

RaymondBannerMED

While companies are often focused on outsider risks such as breach of their systems through a stolen laptop or hacking, often the biggest risk is from insiders themselves. Such problems of access management with existing employees, independent contractors and other persons are as much a threat to proprietary information as threats from outside sources.

In any industry dominated by two main players there will be intense competition for an advantage. Advanced Micro Devices and Nvida dominate the graphics card market. They put out competing models of graphics cards at similar price points. When played by the rules, such competition is beneficial for both the industry and consumers.

AMD has sued four former employees for allegedly taking “sensitive” documents when they left to work for Nvidia. In its complaint, filed in the 1st Circuit District Court of Massachusetts, AMD claims this is “an extraordinary case of trade secret transfer/misappropriation and strategic employee solicitation.” Allegedly, forensically recovered data show that when the AMD employees left in July of 2012 they transferred thousands of files to external hard drives that they then took with them. Advanced Micro Devices, Inc. v. Feldstein et al, No. 4:2013cv40007 (1st Cir. 2013).

On January 14, 2013 the District Court of Massachusetts granted AMD’s ex-parte temporary restraining order finding AMD would suffer immediate and irreparable injury if the Court did not issue the TRO. The TRO required the AMD employees to immediately provide their computers and storage devices for forensic evaluation and to refrain from using or disclosing any AMD confidential information.

The employees did not have a non-compete contract. Instead the complaint is centered on an allegation of misappropriation of trade secrets. While both AMD and Nvidia are extremely competitive in the consumer discrete gpu market involving PC gaming enthusiasts, there are rumors that AMD managed to secure their hardware to be placed in both forthcoming next-generation consoles, Sony PlayStation 4 and Microsoft Xbox 720. AMD’s TRO and ultimate goal of the suit may therefore be to preclude any of their proprietary technology from being used by its former employees to assist Nvidia in the future.

The law does protect companies and individuals such as AMD from having their trade secrets misappropriated. The AMD case has only recently been filed and therefore it is unclear what the response from the employees will be. What is clear is how fast AMD was able to move to deal with such a potential insider threat. Companies need to be aware of who has access to what data and for how long. Therefore, in the event of a breach, whether internal or external, companies can move quickly to isolate and identify the breach and take steps such as litigation to ensure their proprietary information is protected.

© 2013 by Raymond Law Group LLC