Proprietary Techniques vs. Employee Rights: The Struggle to Balance Competing Interests

It’s football season, so of course we should be talking about beer. Specifically, beer secrets. For fourteen years James Clark had an enviable job at Anheuser-Busch, where he had access to the brewer’s confidential recipes. For unexplained reasons he resigned. Instead of joining a competitor, he went to see a lawyer about planning a class action against his former employer for “intentionally overstating the alcohol content” of the company’s “malt beverages.”

Building his case would be a problem, however, without a copy of something mysteriously called “Page 13.” Having neglected to take this document with him when he left, he contacted a friend still working at Anheuser-Busch, who readily passed it on, even though it was obviously top secret. Apparently alerted to the disclosure, the company demanded that Mr. Clark certify, as required by his contract, that he had not used or disclosed any confidential information. He refused, and a few days later the class action lawsuit was filed. A week after that, Anheuser-Busch sued him for misappropriation of its secrets for making beer.

There are multiple ways we could now turn with this story. There’s the history of beer, which goes back over five thousand years, beginning with a wet and presumed ruined grain cellar that fermented into a happy ending. There’s the difference between corporate and craft beers. And then there’s the high cost of lawyers relative to beer.

But instead we’ll focus on civil procedure. Mr. Clark filed a motion to dismiss the company’s lawsuit, in effect suing them for suing him. This turnabout is called an “anti-SLAPP” motion, based on a California statute enacted in 1992. The law, which stands for Strategic Litigation Against Public Participation, was intended to punish those who file frivolous, but expensive, suits for the sole purpose of intimidating and silencing critics. A legitimate goal, you might say, since it protects freedom of speech. But then the First Amendment also guarantees the right to petition the government, including by filing litigation. So the legislature crafted a long, carefully worded set of instructions to judges, expecting that this would strike the right balance between competing interests.

But as happens so often, a higher law – that of unintended consequences – intervened. It turned out that far too many legitimate lawsuits were being shut down. So the legislature added a new law to cut back on the original. And then it layered on another a few years later, so that in addition to anti-SLAPP motions, we now have “SLAPPbacks” through which the frustrated plaintiff can recover its damages and fees against an over enthusiastic SLAPP-er.

Mr. Clark’s case has wound its way twice to the Ninth Circuit Court of Appeals, which is now considering whether Anheuser-Busch opposed his motion with sufficiently strong evidence that it actually had trade secrets for making beer.

In the meantime, Texas followed the lead of California and enacted its own anti-SLAPP law, called the Texas Citizens Participation Act. It applied to any lawsuit that seemed to target not just a person’s free speech, but also their constitutional right of association. In one notable case, a high-end restoration shop called Elite Auto Body sued former employees who formed a competing company, allegedly taking with them “proprietary client forms, such as payment sheets and vehicle check lists,” and unfairly using confidential information to recruit other employees. These allegations, the defendants argued, invoked their right of association among themselves and to speak freely during their recruiting.

The trial court denied the anti-SLAPP motion, but the appellate court reversed, holding that the TCPA applies in any action that involves “communications,” and that it requires the plaintiff to prove the substance of its claims – the misuse of its proprietary information – by “clear and specific evidence.” Here, the former employer, with no opportunity to take discovery, fell short. The action was dismissed and the plaintiff ordered to pay the defendants’ attorneys fees.

Cases like these are a reflection of the struggle in trade secret law to balance legitimate competing interests. For every employer that has invested in developing proprietary techniques to improve its business, there are employees that have accumulated skills on the job and would like to use them elsewhere. When they leave, the risk of disclosure or misuse may be high, but as a society we not only want to protect investment in innovation, but we also value a freely mobile workforce.

When I arrived at law school in 1970, the Freedom of Information Act was only a few years old. It was supposed to increase public understanding of the workings of government by providing access to records. But the vast majority of requests for information come not from ordinary individuals, but from lawyers representing the competitors of companies who have been required to file confidential information with agencies. Those agencies need the information to do their job, and FOIA has arguably made some companies reluctant to share data with the government.

Tensions abound in the courtroom too. We need a place to resolve disputes over trade secrets; but how can we do that when the courts are supposed to be open to the public? In cases of broad interest, like regulated industries, what should we be doing to protect the public’s right to know through media access? And what about trade secret injunctions? It’s not just departing employees or whistleblowers that need protection from overreach; sometimes the public does too. In one case a judge had to consider whether to shut down an ambulance service that was operating unfairly but was also relied on by a hospital.

Judges frequently have to weigh in the balance diametrically opposed but valid interests. Although this is true in many other areas, it seems woven into the fabric of trade secret law. We should be thankful that our independent judiciary does such a good job dealing with these conflicts and finding thoughtful, fair resolutions.

I’m sure that many people find it exciting to read about U.S. college athletics, although it’s hard to imagine how that could result in any trade secrets. But consider this: Andy Bitter, a former sports journalist covering the travails and triumphs of the Virginia Tech football team, was recently sued by his former employer, a local newspaper, for trade secret theft. The violation? Refusing to turn over the login and password for his Twitter account when he left.

Never mind that the account had been given to him by a previous writer and that he had renamed it “@AndyBitterVT” to reflect his personal devotion to Virginia Tech. According to the plaintiff Roanoke Times he was obligated by the company’s employee handbook to turn over all company property, and this necessarily included the Twitter account he had used to stay in touch with his fans (more precisely “followers” of which he had about 17,000). The information associated with the account was alleged to be worth $150,000. (One fellow journalist, commenting on the story, wondered out loud how a sportswriter’s tweets about a single college team could be “worth as much as a small yacht.”)

As often happens in trade secret cases, it seems that the plaintiff didn’t think this one through before filing. After all, they call it “social” media because people tend to form communities of interest online, and those who had signed up to follow Mr. Bitter’s commentary on their favorite football team were pretty unhappy about how he was treated by his former bosses. One of the scores of reader comments to stories about the lawsuit read, “You guys are out of your minds. I follow Andy Bitter, not you.” Subscription cancellations followed.

In spite of the mess it created, the Roanoke Times has reminded us of some important questions for industry in the information age. Who owns social media accounts? What role do they play in building competitive advantage? And how should companies manage their use?

In ancient times (that is ten years ago, before Facebook, Twitter, LinkedIn and the like), businesses could control their own messaging to the public, through advertising and public relations firms. Social media, like other aspects of the internet, disrupted and “disintermediated” this structure, allowing not just traditional journalists but everyone else with a computer or smartphone to step out in public and (occasionally) be heard. Companies (and a few politicians) recognize the advantage of this direct marketing opportunity and have jumped on the bandwagon with their own accounts and campaigns.

But then there are the hundreds of millions of individual accounts, including in the hands of employees. What new challenges do employers face as a result?

One of the biggest threats is to corporate information security. Social media companies have succeeded, through incessant and automated behavioral conditioning, in convincing an entire generation of workers that sharing is a good thing. And sharing more is even better. That is what many employees do in the evening on their smartphones: reveal everything about what is going on in their lives.

And then we expect them to come into the office the next morning and use those same devices – which by the way are connected to the company’s networks and databases – with mature, sober discretion? If someone wants to brag, why not talk about the cool (but unannounced) product they’re working on? If they want to complain, why not troll management (anonymously of course) for its blunders? And if an engineer faces a knotty technical problem on a project, why shouldn’t she just post a description to a Facebook group where other engineers can see it and offer suggestions?

The inclination toward sharing, reinforced constantly by social media, represents a serious challenge that can only be addressed through training and consistent management, providing the antidote of a culture of confidentiality. Click here to read my October 2016 newsletter about training, “The Most Cost-Effective Way You Can Protect Your Trade Secrets?”.

But getting back to the more specific set of problems reflected in the litigation filed against Mr. Bitter, the good news is that managing these accounts, and separating the personal from the corporate, is straightforward. It begins with establishing and communicating a company policy about the use and ownership of social media. Accounts created by the company, which can be usefully deployed for sales and marketing purposes and to enhance the company’s image, should be designated and named appropriately, with control over credentials and content just as with company networks and data.

It may be best simply to prohibit employee use of personal accounts for any company business. But if you allow it, employees should be obligated by contract to provide access and to transfer ownership and control when asked, or at termination.

Employees and contractors who are employed to create content need special attention, to ensure that what they do for you is designated a “work for hire” and that they have agreed to assign to the company all rights to the content.

A word about managing the risk of new hires. In addition to getting the usual assurances that they will not bring to the job any information that doesn’t belong to them, you may want to inquire about whether they intend to use any pre-existing social media accounts to help them in their new assignment.

As for suing departing employees over their Twitter accounts, be careful what you ask for. In addition to provoking the rage of many of his followers, the Roanoke Times was just countersued by Mr. Bitter for defamation. Remember, the emotionalism that drives trade secret litigation can take it in unpredictable directions.

The Journal spoke with Jim, who shared his thoughts on the importance of trade secret protection in the global economy and how the Defend Trade Secrets Act (DTSA) has affected this practice area in the two years since it was signed into law. The following is an excerpt from the discussion.


Thank you for joining us, Jim. Can you give us a little background about where you grew up and whether there were any signs in your childhood that indicated an interest in intellectual property law?

I grew up in Wilmington, Delaware, where I think everyone in the community was affected to some degree by DuPont and the chemical industry. But I wasn’t very interested in science myself. I've frequently told people that my high school teachers would be very amused to find out what I've been doing as an adult.

I loved college geology because it got me outdoors, but the chemistry of it was a challenge. So, there wasn't anything about my upbringing that anticipated what I ended up doing. I was just very lucky to have landed in Palo Alto, CA, in the early 1970s after law school.

What would your classmates most remember about you from high school?

Well, they probably would remember me mostly as a Boy Scout. That was my main activity.

They would also remember me because my buddies and I created a feature-length movie our senior year. We went out and rented a camera and bought some 16-millimeter film and did a kind of James Bond spoof built around the school. It was a ton of fun.

Since then, you have developed world-renowned expertise in trade secret law. How did you decide to specialize in this area of law?

I certainly didn't plan that. I arrived in Palo Alto in the summer of 1972, having received a summer-job offer from an 11 lawyer firm, which is now Wilson Sonsini.

As Silicon Valley was developing, people were often leaving one company and moving to another, and very frequently, there were lawsuits against the people who left to do these startups. There weren’t so many lawyers around Palo Alto at that time, so I ended up working on these trade secret lawsuits simply because I was there, and I was a trial lawyer working with companies where these issues came up a lot.

After I had been doing this about seven years, I noticed that there was a common theme to every one of these cases, which was that someone had done something really dumb. And so it occurred to me that if people understood the basic rules of the road in leaving one company to go to another, and respecting the integrity of the trade secrets that they'd left behind, these lawsuits just wouldn't happen anymore.

Working with a publisher that I met on one of my cases, I decided to write a book on trade secrets, which was published in 1982, and six weeks later, a very big trade secret case broke, IBM-Hitachi, a criminal case where Japanese executives were being taken in handcuffs to the federal courthouse in San Jose. When the media needed someone to comment on what was going on, my book happened to be on their desk. So, it was another case of being in the right place at the right time. I started providing a lot of public commentary on trade secrets, and between that and the experience that I had developed, I just fell in love with this practice area. I eventually started teaching it, and then wrote a treatise.

It's now been a little over two years since the federal DTSA was signed into law. You recently testified before the House Judiciary Committee in D.C. as to whether the DTSA was working as intended. In your view, what were the problems that the DTSA was designed to solve?

The main issue was the patchwork nature of the laws and procedures that faced anyone who needed to enforce their trade secret rights. There was an array of state laws which varied to some extent and were administered at state- or county-level courts, making it a real challenge for companies that had actors in multiple states or internationally to address their concerns.

Many years ago, trade secret cases tended to be local, in part because information traveled only on paper, but once we moved into the computer age, and particularly the networked era, that old system of dealing at a state or local level with trade secret disputes wasn't working very well.

And so, the main reason for bringing federal civil law into the picture was to provide trade secret owners an opportunity to use the federal system, with its nationwide service and its common rules.
Now, when the act was first being considered, most of the focus was on a specific provision of the act that addressed ex parte seizures. That was something useful for a narrow set of circumstances, where you had some specific secrets that were about to be taken from the jurisdiction or destroyed unless you got very fast relief.

Do you believe the DTSA has accomplished its goals?

Yes, it has, or I should say it's well on its way to doing that. One of the expected advantages of having this federal system installed as an overlay – not as a substitute – in state-law adjudication of trade secrets was to achieve some level of harmonization. If you get harmonized rules and approaches, then enforcement of rights becomes more predictable and easier. We are starting to see federal courts look to the decisions of state courts that use the Uniform Trade Secrets Act, and state courts are now referring to federal court decisions. And federal judges in different districts throughout the country are referring to each other's decisions.

Plus, I think it's fair to say that those who thought that it might overwhelm the federal system are happy to see that there hasn't been an avalanche of cases. There's been a noticeable, but modest, increase in the workload of the federal courts over trade secret cases.

Do you foresee the need for any further tweaks or changes to make the DTSA even more effective?

There is one unsettled area that I think could benefit from greater attention, either legislatively or perhaps through the courts, and that has to do with the extra-territorial application of the DTSA. It's not entirely clear to what extent the DTSA applies to trade secret misappropriation that happens outside the U.S.

Section 1837 of the Economic Espionage Act, into which the DTSA was inserted, states the intent of Congress to apply the law extra-territorially as long as at least one act in furtherance of the offense happened in the U.S., or the offender is a U.S. citizen or permanent resident. And as you can tell from my emphasis on the words "offender" and "offense," that section is a little bit awkward to apply in a civil cause of action. In Sections 4 and 5 of the DTSA that were not codified, but were part of the bill, Congress found that any misappropriation of U.S.-based trade secrets occurring overseas must necessarily have an impact in this country, on our economy, lost jobs, etc.

If you take that expression by itself, that may be enough under existing Supreme Court jurisprudence to indicate that the law should be applied extra-territorially in a general way, but we don't know yet. We really don't have a definitive ruling from the courts, but we know that from the way trade secrets have to be distributed around the world as part of modern commerce, misappropriations happen overseas. And so, it will be very important over time to get clarity on the extent to which the DTSA can provide a robust tool for owners of secrets that happen to have been misappropriated outside of the U.S.

In your congressional testimony, you cited a National Science Foundation Census Bureau survey in which companies rated the importance of different types of IP laws in protecting their competitive advantages. According to the survey results, trade secrets were rated number one, rated at more than twice the level of patents. Did those results surprise you?

They did not surprise me. The first reason is that they were consistent with a similar survey that had been done in 2000 that indicated secrecy was at the forefront of measures taken by companies to protect competitive advantage. And it also was consistent with my own observations in working with companies regarding their intellectual-property and commercialization strategies. In many industries, like pharma and biotech, patents form an existential part of doing business, but for many other industries, they are simply one of a series of tools that are available.

And even in pharma and biotech, the secrecy of research and development is enormously important. It's important in order to preserve competitive advantage. It's important in order to be able to ever get a patent because you have to treat it as a trade secret to begin with.

As important as patents are, there is only a narrow band of information that qualifies as a patentable invention that's novel and not obvious, whereas trade secret law applies to protect any kind of information that's helpful to a business. And so the coverage is massively greater in terms of applying to information assets of modern business.

Over the past 40 years, we've shifted from a tangible asset-based economy to an intangible asset-based economy. In other words, data have become the primary asset of business these days, and data are protected mainly by secrecy. So no, the results of that survey did not surprise me, and I see it only going in a similar direction in terms of the impact of secrecy as a management tool going forward.

In light of IP-rights challenges, patentability restrictions such as Alice, and stricter damage standards in patent matters, it seems that the value of obtaining patents has taken a hit. Should companies re-evaluate the importance of trade secrets in their IP-protection strategies?

Yes. In industries where patentability issues have been hit pretty hard, looking at secrecy as an alternative way to protect information assets is extremely important.

In speaking to friends who are running intellectual property programs inside major companies, many of them have overseen a shift in the way that the company deals with their patent program. Everyone in the past had a patent committee that looked at disclosures and decided what to patent. Generally speaking, when something was determined not to justify patenting, it more or less fell to the cutting-room floor. These days, the approach is how you're going to protect these innovations if not through the patent system. How are we going to make sure that somebody in the organization is assigned to that task so that these assets get properly managed.

What are some of the decision points for a company to consider in determining whether to protect IP with patents, as opposed to trade secrets, understanding that once a trade secret is disclosed, the trade secret is gone? In addition, for some ideas and technologies, if you are going to sell it in the marketplace, that would be a big concern for using trade secrets if a competitor could take a look at it, reverse-engineer it, then figure it out on their own.

If you are putting out a product or service that reveals to the world the secrets of its composition, then you've lost it. You might have some first-mover advantage, but that's basically it.
And so, in situations where the innovation can be seen immediately or is relatively easy to reverse-engineer, you are much better off trying to find a way to use the patent system because you can get that extra period of protection.

On the other hand, we have the situation where innovations that are commercialized in secret, like process technology, are typically better protected by secrecy than by patenting because if you patent it, then you teach the world what it's all about.

In the 1940s, DuPont developed a revolutionary method for processing titanium dioxide and decided to maintain it as a trade secret rather than seek a patent. And that was, in part, because if someone else was using the process, particularly in a foreign country, there would be no way that they could find out. And so the best way to protect it was to keep it a secret, and they successfully did that for decades and decades, way longer than they would have had any patent protection. And they were able to spin off the business for a couple of billion dollars a few years ago. So, in the cases where you have technology that cannot be easily reverse-engineered, that's a very important reason to use secrecy instead of a patent.

Of course, there are some innovations that have such a short shelf life that patenting would almost be a waste of time. By the time you get the patent, it's no longer an advantage. So, one of the things that companies look at is: How long do we expect to be able to exploit this?

No matter how broadly trade secrets are used and applied, patents offer a unique kind of strength because patents allow you to exclude anyone else in the country from practicing the innovation, whereas with trade secrets, you take the risk that someone else is going to come up with the same thing and may even publish it. And so, you may lose the benefit at any time. So, patents are stronger, and particularly if you're preparing to license some of your technology or want to be able to do that, it's a good thing still to wrap it in a patent because it's generally easier to value.

For companies that decide to pursue trade secret-protection strategies for certain assets, are there any particular trapdoors or cautions that they should avoid to make their trade secret-protection strategies more effective?

The most important idea, and the most significant driver of success, is paying attention to the management of these assets. Many companies tend to think about them as kind of soaked into the woodwork, and they don't pay enough attention to the importance of active engagement.

These assets are volatile; they are vulnerable to loss. Studies have shown that 80 percent to 90 percent of information loss happens through employees or contractors who are trusted with access to these very important assets.

The biggest trapdoor for businesses is failing to focus on information security risk management. So much can be done in this area just by ensuring that you have the right policies and procedures in place, you're doing the right training, you have the right people involved running the program, you’re reviewing it for effectiveness over time, and so on. It doesn't take a whole lot of effort, and in any event the effort aligns with most companies' existing risk management and compliance programs.

At Stout, our team is involved in determining damages in disputes involving many different types of intellectual property. It appears to us that remedies for trade secret damages are still pretty wide open compared with damage remedies for other types of IP. Do you foresee that the DTSA might impose some stricter discipline in the determination of trade secret damages?

That's a very good question, and I think it's quite possible that we will see more frameworks and restrictions on trade secret damages simply because we have federal courts handling these cases under federal law. I would not be surprised if over time, we see some very illuminating commentary in the issued opinions of federal courts on what are the boundaries and touchpoints for calculating damages in trade secret cases.

Having said that, it's really important to remember the basic difference between patent damages and trade secret damages. Patent damages are based on the analysis of rights created under a federal statutory framework, and so, the issue has attracted a great deal of attention and analysis over the years, all grounded in the statute.

Trade secret damages ultimately and historically are grounded in the common law of tort, and tort law is designed mainly to provide full compensation to the victims of a wrong. Remember: Patents are a no-fault system. Trade- secret misappropriation is about fault, and so, that fundamental aspect of the law of secrecy informs how courts generally look at damages. So, you will see judges being very flexible in favor of the plaintiff because that's fundamentally how the law is supposed to work.

The DTSA provisions on damages are a direct reflection of the rules under common law, which provide the greatest recovery possible under several different theories: plaintiff’s loss, defendant’s gain, or a “royalty” measure. The plaintiff has a choice and can use one or two or three of them as long as they aren’t duplicative, and that means that, generally speaking, you can get what looks like very big verdicts that aren't constrained by some finer points of law, as you do with patents.

What should companies understand about the distinctions and differences between internal trade secret theft, such as theft by departing employees, and external trade secret theft, such as competitive espionage or hacking?

In general terms, the external, hacking-related espionage theft is more limited and harder to control than the internal issues. There's only so much you can do about hacking. It's important to address issues around information systems, your network, and to ensure that you've done as much as you can afford to do to install systems that allow rapid detection and response when you have a problem. But as we all know, there's a technological arms race where cyber hackers are concerned, and there's a limit to how much you can assure yourself that you are fully protected.

In contrast, we have frequent losses from internal operations through those whom we trust on a day-to-day basis that have access to our information. The most obvious example is the regular employee who is allowed access to the company's systems through a smartphone or a tablet or personal computer. And they take this everywhere they go, often using it to engage in robust sharing of everything that's happening in their life because they've been trained by social media to understand that sharing is good.

This is the same population that we have to deal with when they come in the next morning with those smartphones that they now use to access the company's networks as well as external ones. So, figuring out how to address the behavior of the workforce that has access to the secrets and training them to understand what the company considers to be confidential and their role in protecting it is, in my experience, far more effective in terms of mitigating the risk of loss than another program directed at cyber security.

Good advice. You are currently participating in a Sedona Conference Working Group on trade secrets, whose mission is to develop a set of guidelines to help federal and state judges do a better job in handling trade secret cases, and help companies do a better job in managing their intellectual assets. Can you give us a progress report on the activities of this working group?

The progress is very good, but we are still in the early stages. We are focusing on two topics to begin with. The first one relates to the issue of trade secret identification. The second one is about the employee life cycle. In other words, addressing the protection of secrets throughout the time that an employee comes, is recruited into the company, is trained, is supervised, and ultimately exits the company, and how companies should be looking at managing those issues.

At the end of a multiyear process, we expect to have a number of consensus-view statements on best practices for litigation and for managing information security within the company.

From 2009 to 2014, you served as deputy director general of the World Intellectual Property Organization. What were your impressions of the relative importance of intellectual property protection in the U.S. compared with other countries?

IP protection has always been very important to us as an economy, playing a critical role as a supporter and an accelerant for innovation in most industries. Over the years, the U.S. has been a leader in the international effort to promote the use of strong intellectual-property laws as a way to achieve economic development.

History teaches that countries that have thoughtful, robust intellectual property systems are much more likely to nurture domestic-innovation economies. And so, if they want to go in that direction, they need to embrace IP. You see it happening right now in China, where 15-20 years ago, there was a lot of concern that the Chinese economy was basically copying and not innovating. Now China has some leading world-class companies in many industries. And they have built a very strong patent system to support its domestic economy. This happened decades ago in Japan. It then happened in Korea.

In your recent congressional testimony, you sounded an alarm regarding 28 U.S.C. Section 1782, in which you suggested there is a danger in allowing foreign litigants to have access to testimony and other evidence from U.S. courts for use in foreign proceedings. You called this practice a one-way street for the acquisition and export of U.S. information. Please explain your concerns and what you think Congress should do to allay those concerns?

At a general level, I called this a one-way street because we offer this opportunity for foreign litigants to come here without insisting that they provide the same kind of access to evidence in their own countries. I think that the original assumption behind the statute was that if other countries saw how transparent and open we were about access to evidence, that they would institute similar procedures in their own countries, and we would achieve some level of reciprocity.

That has not happened, though, and there is no reciprocity built into this statute. The experiment has failed in terms of encouraging other countries to provide similar mechanisms so that U.S.-based organizations can get access to information in those jurisdictions. There is not a level playing field.

My more specific concern had to do with the maintenance of secrecy and confidentiality of information that's being handled in foreign jurisdictions. The assumption in most countries is that information that comes into a court is going to be publicly available.

This is certainly true throughout much of Europe, and it's one reason why the Europeans have drafted and promulgated the EU Trade Secrets Directive, one part of which requires that member states enact laws that will provide protections for confidential information that is produced in litigation.

And so we have this fundamental insecurity that exists in many other countries for information that's being handled by courts and, of course, by government agencies. Because 1782 applies very broadly to any court tribunal, and that includes, we now know, agencies of foreign governments, the information that's being sent over through Section 1782 necessarily is put at some level of risk.

What I suggested to Congress is that it require the federal judges who hear these petitions to engage in some analysis of the risk to the information and to require that protections be instituted in foreign jurisdictions for its use. This would be done as a condition of making the information available – get assurances that it will be protected when it gets to the foreign country. Some judges do that now on an ad hoc basis, but there's nothing in the statute that requires it.

Looking into your crystal ball, which industries or markets do you foresee as being most likely to face future IP challenges, and what do you see those challenges as being?

Any company that has to deal globally with secure information faces very high levels of risk in most other countries in the world. One of the reasons trade secret protection works well in the U.S. is that we have fairly easy access to proof. If you suspect that some secret has been stolen, you can start litigation and then get the information you need to prove what happened. In most of the rest of the world, you can't do that.

And so I hope over time that as a result of various actors, governments, and industry speaking about these issues and engaging in dialogue, we can find a way for companies, when they suspect they have a problem, to find and get access to the information wherever it is. This can happen in different ways.

I'm not suggesting that other countries adopt the U.S. system of litigation discovery, which has, in many ways, overburdened us, but there are ways, even in civil-law systems, to set up frameworks and protocols for the victim of a misappropriation to be able to get access to data, either through some form of seizure process or lowering the standard of proof that is required to initiate an action, and requiring the defendant to come forward and prove that it developed the information independently.

If we want to fully support companies that drive the global economy, we have to find ways to more realistically enforce trade secret rights.

Any last words of caution for our readers?

We just saw the Waymo v. Uber (“Waymo”) case, which is a reminder of the importance of managing risk around these very important assets. When Uber hired this fellow, [Anthony] Levandowski, away from Waymo, it took on a level of risk that it should have appreciated was almost existential for the company.

And yet, what it did about it actually exposed the company to more risk. Now, I'm not trying to make the point that Uber screwed up, but it's a reminder of the things that can go wrong in a rapidly evolving technological landscape, which is something that applies to an awful lot of companies these days.

When you hire away smart, experienced talent from a competitor, you face the risk that your valuable data assets may be tainted in some way, which could be a potentially massive problem. It is imperative to have careful management of these issues because they just don't come up in the same way that patent and copyright and trademark issues do – kind of clean and predictable. They tend to sneak up on you when you're not watching, or perhaps distracted by the excitement of an acquisition. Once you’ve been infected with someone else’s confidential data, extracting it can be complicated and expensive.

It was late 2010. The technician, an American in northwestern China, was performing a software check on a wind turbine when he noticed something strange. After the diagnostic program finished running, the turbine was supposed to stop. But this time the blades kept spinning. The same thing happened at the next turbine at the wind farm. And the next, and the next.

Back at the headquarters of American Superconductor Corporation near Boston, the news confirmed executives’ worst fears. Their biggest customer, Sinovel, a Chinese wind farm company financed in part by the government, had recently refused to pay an outstanding bill and had canceled all future orders, citing what it claimed as poor quality and performance of AMSC’s software. That software had supplied the brains for Sinovel’s massive turbines, enabling an efficient flow of electricity into China’s electric power grid. But Sinovel had decided to build its own controller software and had already begun to install it.

The relationship had started out so well just four years before. Following the enactment of China’s first clean energy law, Sinovel had been launched to supply wind power to vast stretches of the country, and ultimately abroad. AMSC, originally formed to apply futuristic superconductor technology to high voltage transmission networks, had pivoted to the more mundane but still complex and profitable business of wind turbine controllers. Their agreement was heralded by the companies in a joint announcement as an“example of Sino-U.S. cooperation in the new energy area,” and both companies became wildly successful in a very short time.

As happens so often, the bilateral enthusiasm was overtaken by greed as Sinovel found a way to eliminate its partner from the business. AMSC had sent a team to China to help support Sinovel. Among them was a programmer named Dejan Karabasevic, a Croatian from AMSC’s Austrian subsidiary. Recently demoted from the design group, Karabasevic was unhappy – and vulnerable.

Sinovel encouraged him to leave AMSC, promising to pay him a million dollars over five years (along with an apartment, and, reportedly, a prostitute). His advance was only 15,000 euros, but it did the trick. Karabasevic resigned, but his supervisor asked him to stay on for a while, with full access to the company’s systems. This allowed him time to create a bootleg version of the AMSC controller software, and to transfer it to his future employer in China.

This was the software that evaded the AMSC technicians’ diagnostic tools and allowed the windmills to keep turning when they should have turned off. It would be some months before the company learned about their former employee’s treachery, but in the meantime it had lost almost 90% of its revenue, shed a billion dollars in shareholder equity, and had to lay off 700 employees.

A flurry of lawsuits followed, in China, the U.S. and Austria. Karabasevic quickly confessed and spent a year in jail but cooperated in AMSC’s pursuit of Sinovel.

In 2013 the Department of Justice joined in, indicting Sinovel and two of its Chinese employees. On January 24, 2018, after an 11-day jury trial, the defendants were convicted in Wisconsin federal court of conspiracy, wire fraud and theft of trade secrets under the Economic Espionage Act. On July 3 AMSC and Sinovel announced a settlement totaling $57.5 million, including a license for Sinovel to use the AMSC technology in its current model turbines. Within a week the judge sentenced Sinovel to a year’s probation, on condition that it pay the agreed amount.

Analysts have pointed out that Sinovel’s available cash had dwindled to less than $100 million, so the outcome was probably a good deal for AMSC under the circumstances. But after six years of litigation and proven losses of over $550 million, this was a “victory” only in a very relative sense.

What lessons can be drawn from AMSC’s experience dealing with a business partner that stole its most valuable information assets? The most obvious is probably not to let enthusiasm mask obvious risks when relying on one customer, particularly in a foreign country. When you are that exposed, your trade secret protection systems need to be proportionately robust.

Of course, you can also reduce risk of theft by continuous improvement of your technology, proving to your customer the futility of trying to compete. But for your crown jewels, you must control access as if the life of your business depended on it. Because it does.

Always remember that insiders (employees, embedded contractors and temporary workers) account for 90% of information loss. Be aware of circumstances that could turn their loyalty around, and manage accordingly. Don’t keep people on after they resign without carefully assessing the risk of their maintaining access to your systems and what you can do to mitigate that risk. More broadly, use data loss prevention software that can alert you to potential problems through real-time analysis of unusual behavior by those with trusted access.

And if you suspect actual espionage, call the FBI. There’s nothing to concentrate the mind like possible jail time.

It seemed like such a good idea at the time. Quicken Loans affiliate Title Source had signed an agreement with start-up HouseCanary to build specialty software. The relationship deteriorated, and Title Source sued to avoid the $5 million fee it had agreed to pay. To underscore its determination, it served the lawsuit personally on HouseCanary executives at their trade show booth, right in front of their customers.

Commercial litigation often starts with this sort of bravado, and Title Source apparently felt it had been seriously wronged. But less than two years later, in March 2018, a jury disagreed. It decided that Title Source had used HouseCanary’s secret data to build a competing product and slapped it with a verdict for $706 million.

The back story of this turnabout case provides some important lessons, grounded in the special nature of trade secret disputes. But first let’s understand how a hopeful software development deal turned so ugly.

Real estate appraisals traditionally rely on a physical inspection by a trained professional. But much of the data they collect about a house is already available online, or can be extrapolated. So just like many other industries, this one is undergoing disruption through automation, as firms develop Automated Valuation Models, or AVMs.

Title Source, one of the country’s largest title insurance and real estate valuation companies, signed a contract with software start-up HouseCanary to develop an AVM. The product would be licensed to Title Source for an annual fee of $5 million, but HouseCanary would maintain ownership and rights in its own data. The relationship began to break down over requested changes, and Title Source decided that it wasn’t getting what it bargained for. In the meantime, HouseCanary had shared its secret information with Title Source engineers.

Those same engineers were tasked with building their own AVM. From the perspective of Title Source, this project was necessary in order to cover for HouseCanary’s failures and to mitigate the damage it was suffering. When the time came to pay the $5 million fee, Title Source decided that an aggressive litigation strategy would best serve its needs and reflect its frustration.

This is where the drama begins its teaching. Title Source believed its own narrative, in which it was a victim of HouseCanary’s breach. Its commitment to that narrative masked the possibility that hidden in the records of the two companies’ dealings lurked a massive potential liability. When emails were produced as part of the litigation, it appeared that the engineers tasked with building Title Source’s AVM had used HouseCanary’s confidential information to do it. (One email exhorted colleagues to “think big and wide about how to maximize the value of the HouseCanary data to our business.”)

Some of this evidence was ambiguous, and Title Source argued that what it did was within its rights. But it was looking through its own lens, and didn’t fully appreciate the risk that HouseCanary’s alternative narrative of deliberate misappropriation would be accepted.

Why didn’t Title Source see the potential disaster when deciding whether to sue? The answer almost certainly lies in the emotional content of disputes where information has been shared between companies. The relationship starts, as it must, with declarations of trust on both sides. So when things start to go downhill, disappointment morphs into loathing and a sense of victimhood. Each side, anxious to see its own behavior as fully justified, develops a committed perspective.

Here, the miscalculation had very serious consequences. HouseCanary, having convinced the jury that its information had been misused, was able to present a simple and compelling damage model. It argued – again, using its adversary’s own records – that Title Source planned to save a certain amount of money on each AVM that it sold. Assuming that it would have taken two years to develop that product legitimately, and using internal projections of likely use, the benefit to Title Source worked out to be over $201 million.

The jury accepted that calculation, and added HouseCanary’s lost profits of almost $34 million. Then, because it had embraced HouseCanary’s narrative of a deliberate misappropriation, the damages were tripled, for a total of $706 million.

The first lesson we can extract from this story is cautionary: assessment of risk in potential litigation requires a sober, objective analysis of the evidence, with plenty of “devil’s advocate” scenario planning. This means resisting the kind of confirmation bias that can interfere with management’s ability to appreciate how the same facts can be interpreted in different ways.

Second, and closely related to the first point, we need to be aware that trade secret cases often spring from facts learned in unrelated litigation. In one case I worked on, a patent infringement claim led to the production of records showing that a misappropriation had occurred more than fifteen years earlier. Because the statute of limitations runs from the time of discovery, the accumulated damage claim was massive, and immediately the trade secret claim eclipsed the patent dispute.

Third, the HouseCanary verdict provides a reminder of the flexible and often generous way that damages are calculated in trade secret cases. The aggrieved party can collect not only for the damage it has suffered, but also can recover the perceived benefit received by the defendant, even if it hasn’t produced any profits or even any products.

Finally, this case suggests that companies engaged in collaborative development of technology need to manage the process very carefully to reduce the risk of later disputes. Clear protocols and careful record keeping around the receipt and use of confidential information will go a long way to prevent problems.

And a bit of training in how to draft emails wouldn’t hurt.

In the wake of Uber’s blockbuster trade secrets lawsuit, prompted by its hiring of the manager of a competitor’s self-driving car program, one of the company’s lawyers published an articlecomplaining about the law that protects “negative information” stored in a person’s head. It was crazy, he argued, to force employees to feign amnesia and to deliberately repeat mistakes made in their last job, in the name of protecting confidential information.

As you may recall, a few months ago I wrote positively about negative trade secrets, invoking Edison’s string of failed experiments that led him to a working light bulb. That kind of information in the hands of a competitor would allow it to catch up without the effort, investment and risk faced by the original innovator. So it makes a lot of sense that the law protects against disclosure of the failures, mistakes and dead ends of research.

But how can we provide that protection in fast-growing industries where employees often leave to work for the competition? How can they be expected to apply their well-earned skill but to remain silent when they see their new team going down what they know is a hopeless path? And even if they are careful never to signal with an eye roll or grimace, won’t the former employer sue them anyway once it sees a competing product? Wouldn’t it be more fair – and more efficient – to just allow them to use whatever “negative” information they remember, so long as they don’t take records with them?

I don’t think so. Protecting knowledge of failed experiments encourages companies to invest in deep, long-term and risky research, since they know others can’t easily catch up. And there is other social value in the “inefficiency” of requiring competitors to do their own homework. That’s because they probably won’t follow the same path. What the first company considered a “failure,” when encountered by the second company, may provoke a new and unique insight. Indeed, this is how a lot of innovation happens, and it’s why some organizations deliberately set up competing teams to pursue identical objectives.

The same principle that recognizes value in redundancy of effort can apply to individuals as well as companies. Rather than lamenting the prospect of wasted re-work, departing employees can look forward to a new environment to apply their skills. They can challenge the assumption of past “failures” by taking a fresh look at the process of discovery, searching for new ways to tackle old problems.

But while that sounds fine in the abstract, the practical challenge remains: how does someone take his or her accumulated experience to a competitor without getting sued? And from another perspective, how do you hire someone with experience and skill, to make sure that’s all you’re getting? Here are a few suggestions.

First, recognize the risk that is wrapped inside the opportunity. Is this new position likely to put the employee in an ethical hot seat? If everyone has asked the right questions in the interviews and has been honest about what challenges the new company is facing, you can also identify the risk of having addressed the same or similar problems for the competitor. If so, are these issues critical to the expected work assignment, or merely incidental?

Second, discuss the nature of the risk at a high level, without getting into the specifics of the previous assignment, but identifying the areas where there may be some concern about applying prior knowledge of what doesn’t work. You should both agree that no one will ask for, or provide direction from, that learning. But if the discussion leads to real anxiety about whether confidentiality can be managed this way, it may make sense to temporarily steer clear of any project that looks like it will cover the same ground as the previous job. In any event, you should establish an understanding that all of the work to be done will be firmly grounded on general knowledge and skill.

Third, you should directly address what is that knowledge and skill, and how you expect it to add value in the new position. To be especially safe, the employee might also want to prepare by brushing up on the state of the art in the relevant field of work, so that they can think, speak and act comfortably from that platform.

Even in highly competitive industries we can enjoy the benefits of labor mobility while still respecting the value of “negative” trade secrets. All it takes is a healthy respect for risk and a willingness to start over in the pursuit of something better.

Here in the U.S. we have a litigation system for pre-trial “discovery” that allows access to virtually every email and every record a company owns.  It costs businesses more than $40 billion every year.  Foreign countries, where there is no “discovery,” sneer at this self-inflicted injury, and foreign companies do all they can to avoid getting involved in it.

Except when we give them a free pass to visit and try it out.

What would you think if I told you that anyone from France or China or Brazil that was just thinking about some legal action in their country could come here and easily force discovery from a U.S. company, even though they couldn’t dream of getting the same information through their home courts?  Crazy, right?  That is exactly what has resulted from a law that’s so obscure it doesn’t even have a name, so we call it by its legal citation: 28 U.S.C. Section 1782.

Congress put Section 1782 on the books decades ago, motivated by the generous impulse to help foreign courts and litigants get information they needed, and to encourage foreign countries to pass similar laws that would give our citizens the same kind of access.  On the first objective, the law has been a resounding success.  In recent years petitions under Section 1782 have grown to over sixty per year.

On the second one, here’s a quick quiz: how many countries do you think have enacted laws inviting our litigants to come and get discovery from their corporations?  Sorry, no prize for guessing the correct answer, zero.  In fact, a number of countries have responded rather rudely by passing laws that prohibit any use inside their borders of otherwise reliable information, just because it is the product of the U.S. discovery system.

But we have forged ahead anyway with our unilateral offer, nursing the hope that someone will emulate our generosity.  What exactly is the offer?  Under Section 1782, any “interested person” can petition a U.S. federal court to force someone “found” here to produce documents and testimony for use in a foreign “proceeding.”

It used to be that everyone assumed that getting an order like this would be at least modestly difficult.  Naturally the discovery would have to be really helpful, and so you would have to show at least that the information would be admissible in the foreign court.  And of course it had to be a court that wanted it, to help inform a proceeding that was, well, proceeding.  And the petitioner, you would assume, would have to be a party to that foreign proceeding.

All of these were reasonable assumptions, but they all turned out to be wrong.  About 15 years ago AMD tried to use Section 1782 to get discovery from Intel that it could then turn over to the European Commission, which it hoped would begin antitrust enforcement against its competitor.  The federal district court denied the petition: no proceedings were underway, only “contemplated.”  No foreign court was involved, only a government agency.  AMD was not a party.  And if the information had been located in Europe it would not have been accessible to the Commission.

The U.S. Supreme Court reversed, holding that the statute was broadly worded, and if Congress wanted to put limitations on it, it had to say so.  Needless to say, this ruling caused a lot of lawyers to dust off their statute books and take another look at Section 1782, causing a dramatic uptick in filings.  In fact, some law firms are now marketing this law to foreign companies as a way to collect information that they couldn’t get in their home courts.

Congress has taken notice, and the House Judiciary Committee recently held a hearing at which I was invited to testify.  There I described the Section 1782 process as a “one way street for the acquisition and export of U.S. information.”

But I wasn’t there to focus on the asymmetry of this law.  My concern was rooted in the fact that it includes no safeguards to ensure that the discovery material — which often can include very sensitive trade secrets — is protected against disclosure or misuse once it lands in the foreign court (or agency).

This is not an abstract problem, I explained.  While U.S. courts regularly issue “protective orders” closely guarding information exchanged in litigation, foreign courts and governments often don’t have any similar tools.  In fact, most countries’ laws are insufficient to protect trade secret rights in general, and even less so when information is in the hands of courts that have to guarantee public access.  Even the European Commission, in proposing the EU Trade Secrets Directive to its member states, recognized that Europe had a serious problem, saying that the “main factor that hinders enforcement of trade secrets in Court derives from the lack of adequate measures to avoid trade secrets leakage in legal proceedings.”

So if we really want to help our sister courts in other countries, we should send them sensitive information only when we have first wrapped it up in limited use restrictions.  That is why I suggested in my testimony to Congress that an important “fix” to Section 1782 would be to require that federal judges consider the risk to U.S. trade secrets when ruling on these petitions.  And if they allow the discovery, it should come with serious, specific requirements on how it can be used in the foreign “proceeding” to avoid loss or damage.

Let’s hope that closing this loophole is something that both political parties can agree on.

You can read my formal remarks here and watch the entire hearing here.

In a boat out on the lake, the little boy says, “Grandpa, why are we holding our poles out here?” I say, “Because that’s where I think the fish are.” “Will we catch any?” “I don’t know. Let’s wait and see.”

To anyone familiar with the discovery process in U.S. litigation, involving production of millions of emails and other electronic records, and dozens of pre-trial depositions of witnesses, it may be surprising to learn that less than a century ago we allowed none of that. Trial was the place where documents were introduced and testimony taken. The idea of getting early access to the other side’s evidence was widely derided as a fishing expedition, casting about for something you weren’t sure existed.

It took over twenty years of fierce infighting within the American Bar Association before the idea of requiring disclosure to an adversary was embraced and reflected in the 1938 Federal Rules of Evidence. Within a decade, the Supreme Court declared the corner fully turned: “No longer can the time-honored cry of ‘fishing expedition’ serve to preclude a party from inquiring into the facts underlying the opponent’s case. Mutual knowledge of all the relevant facts gathered by both parties is essential to proper litigation.” Hickman v. Taylor, 329 U.S. 495, 507 (1947)

Unfortunately, old taboos tend to linger. The first major revision to the Federal Rules issued in 1970, liberalizing the framework to make discovery easier. Objections were still framed as encouraging “fishing expeditions,” or sometimes the more dramatic “draining the swamp” of evidence. (Of course we no longer use that metaphor, since it’s been usurped by people who want politicians out of Washington.)

Broad discovery can be critical in trade secret cases, where the plaintiff may not know which of its secrets have been taken or misused. Misappropriation rarely happens in broad daylight. Although forensics can sometimes show that information has been copied or accessed improperly, often the alleged victim can only provide an educated guess as to what happened. Here in the U.S. the basic rule allows a plaintiff to file its case based on reasonable suspicion, and to use the discovery process to fill in the gaps.

Of course, modern discovery can be quite disruptive and expensive. Recognizing that there is a particular danger of abuse in trade secret cases, where defendants are often individuals or vulnerable start-ups, courts long ago began to manage this risk by requiring plaintiffs to identify the relevant secrets with “reasonable particularity.” In 1985, California decided to reinforce that requirement with a statute that prohibits a plaintiff from taking any discovery until it has complied.

Some courts outside of California have embraced this approach as sensible case management, explaining that it prevents unbounded rummaging through the defendant’s own secrets. But a few have gone further, posing the issue as not just potential harassment of the defendant but also the risk that the plaintiff, once given access to the defendant’s files, will – in the words of the judge who presided over the Waymo v. Uber case – “cleverly specify whatever happens to be there as having been trade secrets stolen from plaintiff.”

The problem with this observation is that it is unsupported by empirical evidence. And logically, one would expect – and courts can insist – that a plaintiff will be able to prove its own trade secrets by pre-existing records, eliminating the abstract concern about copying.

Naturally, discovery in trade secret cases can be abused. It’s part of a court’s job to avoid deliberate damage to a party inflicted by the cost of litigation. But in an information economy, disputes over trade secrets require access to information. We should allow all parties to a case to be properly informed by giving them access to the facts, in a way that is reasonably managed.

It’s important that trade secret owners consider this tension before filing litigation, especially in cases involving departing employees, where the relative burdens of litigation can affect how the court handles discovery.

Here are some tips to help keep your case from being stalled by aggressive demands for details about your secrets.

  • Take time during an employee’s exit interview to discuss and record, in as much detail as possible, their access to sensitive information during their time at the company. If they sign an exit statement with a list of categories, it will be difficult for them to argue later that those same categories, when listed in a complaint, are too vague.
  • Your pre-filing investigation should not focus solely on gathering evidence of bad behavior, but should include a careful review with managers about the specific information and projects the defendants had access to. This way, you will be prepared to articulate the most relevant information, and to do it immediately.
  • Make two lists of the relevant secrets, one suitable for public view, and the other that provides much more detail.
  • Prepare a stipulated protective order that aligns with any forms or examples used by the court where you will be filing your complaint. At the time of filing, give notice that you have a more detailed list that will be made available to defense counsel under the restrictions of your proposed protective order.
  • Consider applying for an order to take expedited discovery, explaining your need to get access to the defendant’s information immediately, to understand and assess the risk and perhaps to support an application for a preliminary injunction. Of course, if you have enough evidence at the outset to justify a temporary restraining order, then you can make your discovery application in that context.

The overall objective is to get the discovery process moving while demonstrating that you have given careful thought to the court’s and the defendant’s need to know what you are claiming as trade secrets. Getting that issue out of the way will make it more likely that you can use discovery in the way it was intended, to “discover” facts that are important to your case.

That a plaintiff seems to be fishing is no reason by itself to view its discovery as unreasonable. In trade secret cases, just like when we’re out on the water, we go to where we think the fish are, and then we wait and see.

As I explain to my grandchildren, if we knew we would always succeed, we’d call it catching, not fishing.

There are many lessons to be drawn from Waymo v. Uber litigation. This is perhaps the most important. Lawsuits are about history, while business is about the future.

By the standards of most litigation, the suit by Waymo (a Google company) against Uber was fast-tracked, getting to trial within a year after it was filed. And what a year that was. Waymo started the case with forensic evidence showing that Anthony Levandowski, its former head of self-driving cars, had helped himself to 14,000 confidential files as he was leaving to form a start-up that Uber later acquired.

Then things started going downhill for Uber. Levandowski asserted his constitutional right not to testify. And the evidence extracted from Uber looked pretty damning. Motivated by what he called an “existential” need for autonomous vehicle technology, Uber’s CEO Travis Kalanick had secretly agreed in advance to buy Levandowski’s new company for $680 million and to give Levandowski $250 million in stock. He also agreed to indemnify Levandowski against his prior “Bad Acts” and even some future mischief. (For more details on this very unusual transaction, see my earlier article, The Most Dangerous Hire.)

The federal judge overseeing the case, William Alsup, told Waymo “You have one of the strongest records I have ever seen in a long time of anybody doing something that bad.” He issued a preliminary injunction against Uber, and he referred the case to the U.S. Attorney for investigation of criminal trade secret theft.

But Uber punched back, demonstrating that nothing from the Levandowski files had made its way into the company, and challenging Waymo’s trade secrets. Judge Alsup joined in, requiring Waymo to describe its claims with patent-like precision, and forcing the company to pick only 10 of 131 secrets to take to trial. Later, he disqualified Waymo’s damages expert and limited the damages it could claim.

While all this was going on, Uber replaced Kalanick, who had come under fire for other executive misbehavior. But each company, represented by some of the best lawyers and PR firms in the country, kept slugging it out in the courtroom and in the press. Then, just before trial, the court found that Uber suppressed an employee’s letter that seemed to confirm Waymo’s allegations of trade secret theft.

The lawsuit had all the earmarks of a classic trade secret fight, with each side emotionally invested in proving that the other was morally wrong, if not corrupt. The difference here was scale: two Silicon Valley giants acting out a riveting, continuous public drama about the next innovation wave in an already disrupted industry. So when it came to the trial, it was the hottest ticket in San Francisco.

And then at the end of the first week, to the surprise of hundreds of spectators, the case suddenly settled. Waymo would get Uber stock nominally work $245 million, and Uber’s new CEO would express contrition for having bungled the recruitment of Levandowski. An inspector would ensure that Uber’s autonomous vehicle program was uncontaminated with Waymo information. The civil case would be dismissed, leaving Levandowski without a job and under investigation for criminal trade secret theft.

What happened here? Is there anything useful we can learn from it? I think so.

Most trade secret litigation is fueled by emotional reactions to perceived wrongs. Plaintiffs feel betrayed and abandoned, and defendants feel blamed and misunderstood. Each side wants to fight in order to validate its perspective. So the lawsuit begins with great energy. But over time, new facts emerge, and the parties begin to reconsider the cost/benefit analysis of continuing the struggle.

Well before trial, Waymo had managed to achieve most of its basic objectives. Levandowski was gone from the scene. Uber in its defense had erected strong barriers against the migration of any Waymo secrets, and this prophylactic was reinforced by the judge with a pre-trial injunction. Uber had also undergone a profound shakeup at the top, and its new leaders had no attachment to the posturing of their predecessors.

Still, the lawsuit ground on for months, pushed by the momentum of early (if fleeting) victories coupled with competing hopes for a meaningfully favorable outcome. Presumably the executives of each company knew they had better things to do. But it can be hard to come to agreement when each team is engaged mostly among themselves, preparing for battle. Sometimes it takes the transparency of a public trial, where everyone sees the same facts unfolding before them, to get to yes.

The leadership of these two companies, together with their teams of advisors, have demonstrated that it is possible to recalibrate once rock-hard positions, and to shift attention to future opportunities instead of past disappointments. We should all take note.

When the auctioneer’s hammer went down, the violin sold for almost $16 million. It was one of the masterpieces of Cremona, the small northern Italian town that was the 18th-century center of violin-making. Ever since, the world’s best violinists have insisted that instruments made by Antonio Stradivari and his colleagues demonstrate a uniquely wide dynamic range and subtle tonal quality. So why can’t we make them like that now? Nobody really knows.

To begin with, the masters left no instructions. Some critics of trade secret law have cited Cremona as an example of progress “lost” because it was buried instead of published through a patent application. There are several reasons why that argument fails, but for today let’s consider the possibility that the violin makers couldn’t have passed on their secrets if they wanted to, simply because they didn’t know what made their violins sound so good.

Maybe they thought it was just their extraordinary skill. Stradivari, who worked until he was 92 and is credited with creating over 1,100 instruments, was not shy about promoting both his talents and his violins to royal buyers. His friend Guarneri was almost as commercially successful, and the Cremona luthiers as a group did nothing to dispel everyone’s assumption that the beautiful sounds were a product of nothing more than their superior individual craftsmanship. In any event, it was the result that mattered, even if no one could say what produced it.

Within the last century, as the remaining instruments were collected and prices began soaring, the search was on to re-discover the secrets of Cremona. For years, many credited the varnish. Recently, scientists discovered a particular bacterium had infested logs floating down river from the alpine forests, munching away enough of the interior of each cell to create an unusual resonance when the wood was dried and fashioned into a violin body.

So can you have a trade secret just because it produces results, if you don’t know how it works? The answer is yes; the law doesn’t require that you fully understand the mechanism that generates the effect. This is a good thing, since otherwise we might spend an inordinate amount of time peeling back the onion layers of causation in the search for the “ultimate” explanation.

In medicine, we long have used natural materials or drugs that are correlated with improvement or cure without knowing exactly how they work. Even when we think we know it, the human body’s systems, being almost infinitely complex and interdependent, laugh at us.

That doesn’t mean that the search for causation is a fool’s errand. Frequently, in trying to understand how we get good outcomes, we stumble on a related discovery that proves very helpful. This is what happened with the Cremona violins. On the heels of the revelation about cellulose-eating bacteria, researchers identified two types of fungus that perform roughly the same feat, after the fact. Applied to existing violins of lesser quality, these fungi do just enough of the right kind of damage to help the instruments approach the sublime quality of a Stradivarius.

A child, by trial and error, learns to ride a bike, but ask her how she does it and she can’t really explain. It has something to do with balance, but what is that? How many adjustments per second does she have to make? What role does speed play? (If you’re thinking none, then just compete with other family members to see who can ride the slowest without falling over.)

Machine learning, a kind of artificial intelligence, allows us to recognize patterns and establish correlations but not necessarily causation. Instead, multiple variables breed multiple hypotheses, and these become multiple opportunities for mining useful insights. A pattern extracted from big data can be applied by itself to improve the functioning of some systems, but it can also point us toward deeper understanding and even greater advantage. Discovering a secret often begs many questions, and leads to the discovery of more.

One lesson is that, when it comes to outputs, the assumptions we make about causation can sometimes mislead us, preventing us from using information about the phenomenon to developing new innovations. While we don’t have to know how our valuable trade secrets work, it usually pays to keep looking while we’re exploiting the advantages they provide. In fact, there may be some nuggets waiting to be uncovered by reverse engineering the good results produced by others. That is one of the ways that secrecy incentivizes innovation every bit as well as patenting.

We can enjoy the music at the same time that we try to understand how it’s made and why it moves us.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram