Basic Guidelines for Protecting Company Trade Secrets

Lewis & Roca

Under the Uniform Trade Secrets Act (UTSA), “trade secrets” are generally defined as confidential proprietary information that provides a competitive advantage or economic benefit. Trade secrets are protected under the Economic Espionage Act of 1994 (EEA) at the federal level, and the vast majority of states have enacted statutes modeled after the UTSA (note that some jurisdictions, such as California, Texas and Illinois, have adopted trade secret laws that differ substantially from the UTSA; thus, businesses should research laws in the relevant jurisdiction(s).). Under the UTSA, to be protectable as a trade secret, information must meet three requirements:

i. the information must fall within the statutory definition of “information” eligible for protection;

ii. the information must derive independent economic value from not being generally known or readily ascertainable by others using appropriate means; and

iii. the information must be the subject of reasonable efforts to maintain its secrecy.

Trade secret theft continues to accelerate among U.S. companies, and can have drastic consequences. To combat this threat, Congress and certain state legislatures have recently enacted legislation to broaden trade secret protection. As a result, it is paramount that companies safeguard all proprietary information that may qualify as protectable trade secrets. This blog post explains some key trade secrets concepts, and offers pointers on how to identify and protect trade secrets.

(1) Determine Which Data Constitutes “Information”

The UTSA-type statutes generally define “information” to include:

Financial, business, scientific, technical, economic, and engineering information;

Computer code, plans, compilations, formulas, designs, prototypes, techniques, processes, or procedures; and

Information that has commercial value, such as customer lists or the results of expensive research.

Courts have similarly interpreted “information” to cover virtually any commercially valuable information. Examples of information that has been found to constitute trade secrets includes pricing and marketing techniques, customer and financial information, sources of supplies, manufacturing processes, and product designs.

(2) “Valuable” and “Not Readily Ascertainable” Information

To be protectable, information must also have “economic value” and not be “readily ascertainable” by others. Courts generally determine whether information satisfies this standard by considering the following factors:

Reasonable measures have been put in place to protect the information from disclosure;

The information has actual or potential commercial value to a company;

The information is known by a limited number of people on a need-to-know basis;

The information would be useful to competitors and would require a significant investment to duplicate or acquire the information; and

The information is not generally known to the public.

(3) Take Reasonable Measures to Maintain Secrecy

Businesses should implement technical, administrative, contractual and physical safeguards to keep secret the information sought to be protected. Companies should identify foreseeable threats to the security of confidential information; assess the likelihood of potential harm flowing from such threats; and implement security protocols to address potential threats. Examples of security measures might include restricting access to confidential information on a need-to-know basis, employing computer access restrictions, circulating an employee handbook that outlines company policies governing confidential information, conducting entrance interviews for new hires to determine whether they are subject to restrictive covenants with former employers, conducting exit interviews with departing personnel to ensure that the employee has returned all company materials and agrees to abide by post-employment obligations, encrypting confidential information, limiting access to confidential information through passwords and network firewalls, track all access to network resources and confidential information, restrict the ability to email, print or otherwise transfer confidential information, employ security personnel, limit visitor access, establish surveillance procedures, and limit physical access to areas that may have confidential information.

Conclusion

This blog post is intended to provide some broad guidelines to identifying and protecting company trade secrets. Most if not all companies have confidential information that may be protectable as a trade secret. But certain precautions need to be in place to ensure that the information is protectable. Because each company and situation is different, you should seek advice about your specific circumstances.

Article By:

 of

The Inside Job: Can Employees Walk Out The Door With Your Company's IP?

Recently in The National Law Review was an article by Katie L. ClarkRohan Massey, and Hiroshi Sheraton of McDermott Will & Emery regarding IP Security:

With the economic downturn forcing redundancies, most employers are aware that the Q1 period brings an increase in employee movement. But have employers considered how much value could be walking out the door when an employee leaves? In today’s “knowledge economy”, businesses increasingly understand the value of intangible assets in the form of information.  Yet few businesses give thought to how and where those assets reside, or consider how much can be lost or passed to a competitor when employees move on.

The ease with which knowledge can be taken by employees has increased exponentially in recent times.  USB drives are now large enough to store literally millions of documents and cloud computing can provide limitless secure storage.  The increase in remote working also allows employees to download your documents and information in the privacy of their own homes.

There is also a growing international market for transferable knowledge, making the temptation even greater for employees to maximise their value to their new employer.  Emerging economies, with different laws, regulations, and cultural values, provide a ready market into which intellectual capital can be dispersed.

This issue affects every industry.  A number of high profile cases in the United States and China have seen former employees jailed for theft of trade secrets relating to consumer electronics and financial trading software, but every business has a wealth of internal knowledge that is used to give it a competitive advantage over its rivals.  Business plans, presentations, strategies, customer lists, market positioning, and protocols and procedures are all valuable assets that can find their way to new employers.

Most worryingly, this movement of information is not confined to “rogue” employees.  Many salespeople will claim that their address books of contacts belong to them, not to their employer.  Each type and level of employee and each type of business is likely to have a different understanding of what belongs to the company.  In addition, international cultural differences play an enormous role in determining where employees perceive the boundary to be between legitimate and illicit use of information.

So, how do you distinguish between what an employee is free to take away and what should remain with the business before it’s too late?  What procedures should be in place to maximise the intangible value retained by the business when employees move?  To what extent do data protection and privacy laws permit monitoring of employees’ activities?  What procedures are available when employees are suspected of taking valuable information and/or passing it to competitors?

In 2012, McDermott will be running a number of IP- and employment-focused seminars to provide an overview of how intellectual property and employment laws can help your company to protect it, and the policies and procedures that can be used to mitigate value walking out the door.

© 2012 McDermott Will & Emery

Hooters Sues Competitor over Alleged Trade Secrets Theft after Top Executives Fly Away

Recently posted in the National Law Review an article by Eric H. RumbaughLuis I. Arroyo and Steven A. Nigh of Michael Best & Friedrich  LLP regarding  misappropriating its trade secrets and other confidential business information following the departure of several Hooters executives:

 

Hooters of America LLC has sued a competitor in Georgia Federal Court for allegedly misappropriating its trade secrets and other confidential business information following the departure of several Hooters executives to Twin Peaks Restaurants.

Hooters’ complaint alleges that former vice president of operations and purchasing, Joseph Hummel, gained unauthorized access to Hooters’ computers and took trade secrets and other confidential information. Specifically, Hooters claims that around the time of his departure, Hummel downloaded and transferred confidential sales figures, employee training and retention strategies and purchasing information to his personal e-mail account. The suit also accuses Hummel of additional unauthorized access of private business information following the termination of his employment.

Hummel, as well as Hooters’ former Chief Executive Officer and its general counsel, left the beach-themed restaurant franchise to join up with Twin Peaks, which operates a mountain lodge-themed restaurant chain featuring an all-female wait staff. Hooters contends that Hummel’s alleged theft has allowed Twin Peaks to hit the ground running in its efforts to open 35 restaurants in the next decade, several of which are planned for markets with Hooters restaurants.

The case illustrates the potential damage that departing employees, particularly those with access to sensitive information, can wreak on an employer. Hooters has already taken one step towards protecting itself; before Hummel left, he signed a confidentiality agreement requiring him to return all confidential and proprietary information to Hooters. In addition to confidentiality agreements, employers should consider having their top executives or other employees with access to sensitive information sign non-competition agreements. Moreover, most states’ trade secret statutes require businesses to take steps that are reasonable under the circumstances to protect their confidential information in order to preserve the trade secret status of that information. Accordingly, employers should consider implementing electronic security measures beyond just login credentials; limiting the number of employees who are authorized to access confidential information; and regulating employees’ ability to take information off company premises.

Next, when key employees depart, and especially when they depart for a competitor, businesses should consult with counsel immediately, and before examining (and arguably damaging) electronic evidence. Departing employees who take information often leave a shockingly obvious electronic trail; but that trail can be lost quickly if not preserved, or inadvertently destroyed if improperly accessed.

Lastly, businesses engaging talent, and especially talent that comes from a competitor, cannot be too careful or too forceful in making sure that the incoming talent does not make, retain or transfer any copies of information from their previous employer. Businesses engaging talent that acted improperly on the way out can quickly embroil their new employers in costly and risky litigation.

© MICHAEL BEST & FRIEDRICH LLP