Latin American Companies Back New US Trade Secrets Law

A new Defend Trade Secrets law may give Latin American companies reason to move computer servers to the United States.

This past week the US Congress passed the Defend Trade Secrets Act (DTSA), less than two weeks after the European Parliament voted through the EU Trade Secrets Directive. What might at first seem like an extraordinary coincidence in fact has a lot to do with pressure applied by industry on both sides of the Atlantic to improve the remedies that are available for theft of trade secrets.

Businesses are relying increasingly on secrecy as the preferred way to protect their innovations, as well as the massive amount of analytics, financial and customer data that drive competitive advantage. But this valuable information is also vulnerable, not just to hacking and other kinds of espionage, but also to careless behaviour by employees and business partners. Having access to robust and predictable legal remedies is important.

Those aren’t available in Europe, the Commission found in a 2013 report. That concern led to its proposal for the EU Trade Secrets Directive, an attempt at minimum harmonisation.

Meanwhile, in the US, where thanks to broad discovery rights and a (mostly) uniform set of state laws, trade secret protection has been viewed as relatively powerful, business called for amendment of the federal Economic Espionage Act – which provides only criminal remedies – to include an option for companies to bring their private trade secret disputes to federal court as well. (Up to now, they have been able to do that only in cases where there is “complete diversity” of citizenship among the parties, an unusual occurrence in trade secret cases, or where there is another federal claim – such as patent infringement – pending based on closely related facts.)

Introduced only nine months ago, the DTSA enjoyed unusually bipartisan political support, buoyed by enthusiastic intervention from industry groups. In fact, the only organised opposition came from a group of law professors who were worried that provisions for seizure of infringing property could lead to a new class of “trade secret trolls” terrorising unsuspecting companies. After a Senate hearing last December, at which I was called to rebut the professors’ arguments, work began on a set of amendments that were all accepted by the end of January. On 4 April, the Senate voted unanimously to accept the legislation, and the House followed suit on 27 April. President Obama is expected to sign it soon.

The DTSA adds a private right of action to the existing federal criminal law, using the same standards expressed in the Uniform Trade Secrets Act, which is the basis for almost all US state laws, and was also the pattern for Article 39 of TRIPS. As a result, it can now be said that the US has fully complied with its TRIPS obligations, since it has a single national law covering the subject. However, the new federal law will not displace existing state statutes. Instead, it will be used optionally for trade secret disputes where the federal courts provide a distinct advantage: cases with
interstate or foreign actors, where attorneys can initiate discovery anywhere in the country, and where judicial experience is needed to handle complex jurisdictional issues.

State courts in the US, even though having similar substantive laws on trade secret protection, apply local procedural rules that can vary enormously, impacting multi-state cases where speed matters. This is why industry was so supportive of the legislation: instead of having to go to various county courts with unpredictable local customs, they can take advantage of a single nationwide system and set of rules.

The DTSA also provides an ex parte seizure when the trade secret holder has advance warning that someone is about to destroy a stolen secret or leave the jurisdiction. This provision has been quite controversial; however, applications have to be so well supported, and the penalties for a mistaken application are so severe, that most believe the remedy will not be invoked often and will be allowed only in obviously deserving cases.

Two other aspects of the DTSA deserve special comment. First, although US law has always allowed courts to issue orders against a “threatened” misappropriation, concern was raised whether this standard language might allow a federal court to stop a departing employee from taking a similar job with a competitor. This so-called “inevitable disclosure doctrine” has provoked fear – not always rational – that courts might be able to bar competitive employment merely based on how much sensitive data the employee knows. The DTSA’s solution to this mobility issue was to prohibit any order that is based only on what the person knows, requiring instead that it be based substantially on the employee’s behaviour that indicates untrustworthiness.

A second significant feature of the DTSA is its grant of immunity to employee whistleblowers reporting suspected wrongdoing. Existing law in the US is sparse and unreliable, based on a highly contextual backward look at the facts to determine whether the employee’s action may have been justified. Unsurprisingly, under these circumstances, the risks of coming forward are too great, and studies show that many who might otherwise have reported significant wrongdoing have remained silent. Of course, the employer has legitimate interests at stake as well, since the claim may turn out to be wrong, or the employee’s disclosure may be broader than necessary. The DTSA resolves this tension by providing clear immunity, but only for disclosures made in confidence to law enforcement, or as part of a court filing under seal. In this way, the information can be provided without fear of retributive litigation, while the relevant authorities can maintain the integrity of the secrets while they determine whether there is a basis to proceed.

The DTSA will improve the efficiency of, but will not revolutionise, trade secret disputes in the US. As already noted, there will be a certain class of cases brought in federal court because they involve foreign actors or witnesses spread across the country. Strictly local cases – where the chef leaves a restaurant with the secret recipes and moves down the street – will still be handled in state courts. That’s in part because the DTSA requires that the information in controversy be related to a product or service in “interstate commerce”, the minimal jurisdictional requirement for federal courts to act. And it’s in part because local cases will be brought by local lawyers who are familiar with their local courts.

Although some lawyers will want to use federal courts for trade secret cases just because they handle patent matters and are more comfortable there, that may not be the smartest tactical move. Federal judges take their cases on “single assignment”, meaning that they are in charge of all issues from beginning to end. They are therefore more likely to view the case skeptically than state court judges, who typically have a “departmental” system and are sometimes seen as waving through weak cases so that they can be taken care of by a different judge at trial. In addition, federal judges are usually more demanding of a plaintiff’s identification of its trade secrets. So we may not see a general rush toward filing in federal court.

What of the EU Trade Secrets Directive? Also driven by industry concerns over the need for harmonisation, the EU effort starts from a much lower base of harmony than has existed in US states. Indeed, the Commission’s report found a disturbing level of inconsistency among the 28 national regimes. So by establishing common definitions, some common remedies and an approach for protecting secrets during litigation, the directive represents a major step forward.

But measured by the expectations and needs of customers, there is quite a distance left to travel. For cultural and political reasons, the directive does not deal with criminal remedies and so there remains an uneven regime for enforcement in the most egregious cases of information theft. More importantly perhaps for business, there has been no progress on addressing the fundamental problem of pursuing trade secret cases in civil law systems: the lack of discovery. Say what you will about the excesses of US civil discovery in general; the trade secret plaintiff, facing losses from behaviours that only the defendants can know, is always disadvantaged at the outset of a dispute by asymmetric access to information about what happened. Without discovery to set the balance right, there will always be a significant number of legitimate cases that cannot be pursued.

Worse still may be the exceptions provided in the Directive. Unlike the DTSA, whistleblowers are free to disclose confidential information not just to government but also to media, so long as it is in the public interest. And the catchall exception for “protecting a legitimate interest” under national or EU law seems a yawning loophole that even the CJEU may not be able to constrain adequately.

The EU Trade Secrets Directive is a very good start on harmonising standards in this critical area. But for the time being, if your clients need extremely reliable civil remedies they are probably well advised to find ways to bring their cases in the US.

Back in 1974, when a lot of people thought that trade secret law couldn't survive alongside a patent system that encouraged public disclosure, the Supreme Court in the Kewanee case patted us on the head and said, "don't worry," assuring us that anyone with a patentable invention would be crazy to elect secrecy instead. Patents were exclusionary and "strong" while secrets were "weak." And for a number of years after the Federal Circuit was formed it seemed that patents kept getting stronger all the time, while the risks of secrecy (what if my competitor gets a patent on this?) were pretty obvious.

How times have changed. The courts have been shrinking the universe of what can be patented (business methods, software, therapies), the bars to patenting (obviousness, indefiniteness), and the enforceability of patents (injunctions, damages, fee-shifting). And Congress, through the America Invents Act, has made it easier and cheaper to challenge patents without going to court, establishing the Patent Trial and Appeal Board, which some have referred to as "patent death squads." While patents seem under attack, trade secrets are basking in a new level of attention from industry, reinforced by provisions of the AIA that virtually eliminate the old risks of protecting innovation by secrecy.

So does this mean that we should abandon patenting as a strategy? Not at all. Good patents remain strong, not only in protecting novel inventions from theft, but also in building recognized value, enabling financing and collaborations. Yes, our calculus needs to change, particularly in some technologies. But it was never an either/or situation anyway. The question of patenting or secrecy is less like arriving at an intersection than it is like eating at a buffet: you get to have something of everything that you like.

Hardly a week goes by without seeing a post or article by some well-meaning lawyer who insists that the first step in protecting your trade secrets is to know what you have, therefore you need to do an "inventory." That's only half right: knowing what you own is critical, but you don't have to create a detailed list, as if you were ticking off the contents of a hardware store. In fact, you shouldn't do that.

First, you don't have to. The legal standard is "reasonable efforts," and judges are generally understanding and flexible about the quality of a trade secret owner's efforts. And from a management point of view, making prudent decisions requires only that you assign a risk profile to categories of data, not to individual records.

Second, it's dangerous. Getting too granular risks counting the leaves on the trees, and passing over what makes the forest vulnerable (or valuable). You will end up wasting time and probably abandoning the project. Or worse, you'll miss some important things altogether.

Instead of counting all the leaves in your forest, start by pulling together an interdepartmental team and talking about what drives your competitive advantage, and identify your key vulnerabilities. You'll probably be surprised - and certainly will be better informed - by the different perspectives brought to the meeting.

With this grounding, you will be in a good position to begin designing an approach that will work for your unique organization. And don't worry, the categorization and labeling will come!

You can be sure that most of your employees are active on social media. For younger ones, in fact, Facebooking, Instagramming, and Tweeting are as natural as breathing. But suppose an employee shared pictures of your product prototype? Posted a draft patent application your company was about to file? Messaged a Dropbox link with confidential information (even if only to a fellow employee) over an insecure connection? Crowdsourced a question about a sensitive issue she was handling for a customer?

Do scenarios like these keep you up at night? They should. Social media and the "sharing" culture it has sparked are very real threats to your organization.The Internet—which spawned social media—has changed the way we work and communicate. That change has profound implications for a trade secret system that relies largely on human trust.

I'm not saying openness is inherently bad. Obviously, a certain amount is needed if we're to collaborate for innovation. Yet there's a dark side to the comfort level that's evolved around all this sharing. Companies need to acknowledge the risks of social media and work to prevent leaks by improving their employees' knowledge and good judgment.

Here are six tips to help you keep your company's sensitive information off social media feeds:

Understand that you're asking employees to go against their "digital instincts." By their very nature, social media platforms encourage users to publicly disclose the minutiae of their lives (usually the more, the better). The so-called Facebook generation is conditioned to casually communicate, swapping files and using the Cloud to store and access photos, music, and more. They are experts at revealing a lot using only 140 characters.

Making sure that social media doesn't become a hole through which your company's secrets leak is an especially challenging task because you're essentially asking employees to check their habits at the door. They'll need to learn to operate based on a different set of standards that often contradict how they deal with information in their private lives.

Put social media policies in writing. Don't assume that a few informal warnings and cautionary tales will keep all your employees from tweeting and posting what they shouldn't. If your company already has general policies about the disclosure of information assets, make sure they become part of the official set of rules that govern employees' use of social media. These policies will reinforce the need to keep personal and work issues separated and not to post about what is going on inside the company.

Larger companies need to have these policies reviewed by legal counsel, since typically broad confidentiality restrictions can violate labor laws that guarantee employees the right to discuss their working conditions. Additionally, companies need to decide if social media business contacts belong to them or to their staff. According to recent court decisions, if this isn't clearly specified in the company's policies, those contacts and the social media account itself can be claimed by the employee when he leaves.

Train, train, and then train some more. In many organizations, after initial orientation, data protection policies are left on the shelf and more or less ignored. That's dangerous, because staff can easily forget about the rules or lose respect for the dangers of noncompliance. Meanwhile, they may be working on collaborative projects, examining acquisition possibilities, receiving development proposals, and more. All of these situations can lead to personal social media connections, where you will be relying on the knowledge and good judgment of your employees to control risks.

You can mitigate much of this risk by creating a quality training program that engages your employees as part of the security defense team. They'll make fewer mistakes themselves on social media (and elsewhere), and they'll also be on the lookout for the mistakes of others. Keep in mind that the best training is continuous, careful, upbeat, and professional, and does not rely on threats. And be sure to include everyone—not just key knowledge workers—in social media security training. That includes contractors, temporary employees, and interns.

Know which devices might represent a risk. The growing popularity of "BYOD" policies means that many of your employees may well be storing sensitive information on the same laptops, smartphones, and tablets they use to scroll through status updates in the evenings. That's cause for concern, because cyberthieves can gain access to these devices' contents and your company's systems through relatively easy-to-hack social media accounts and apps.

In addition to establishing clear policies on social media use and providing continuing training, consider technical mitigation measures. Mobile device management (MDM) tools can remotely configure devices, monitor what's on them, and even erase their data if lost. MDM techniques can also include encryption for data stored on or communicated from the device.

Teach employees to spot social media scams. In addition to using MDM tools, training employees on methods that information thieves often use can help them avoid falling prey to traps on social media. For instance, social media profiles give hackers a lot of information that they can use to compose realistic-looking, customized email phishing messages.

But beyond that, websites themselves can be used directly to fool people into joining a fake group, survey, or event, sometimes using a money coupon as a lure. Other traps involve fake 'like' buttons, browser extensions offered for download, or compelling offers designed to make the viewer want to share them with friends. All of these social network scams are grounded on the idea that we are all so used to rapidly connecting, sharing, and exposing that we'll do it more or less automatically with anything that looks attractive. Teaching employees to think twice before clicking can help secrets stay secret.

Be aware of your official social media presence. While you may not be able to fully control what your employees post on their personal social media accounts, you can certainly keep a close eye on official company Twitter, Facebook, and other social media pages.

Have a safety net of trusted employees monitoring and maintaining your company's presence on social media to stop potentially revealing posts from ever reaching the public eye. Also, regularly change passwords to lock out account thieves who may have successfully procured your company's login information.

Civil claims for trade secret misappropriation have always been grounded on state law, with only limited access to federal courts. That would change with the Defend Trade Secrets Act (S.1890) now pending in Congress as an amendment to the Economic Espionage Act. The proposed law enjoys broad industry and bipartisan political support, and was favorably reported out of the Senate Judiciary Committee on January 28. Most of the focus to this point has been on the need for a federal option when misappropriation occurs across state or national borders. But at the recent hearing a new amendment was proposed and accepted that would have an impact well beyond the original legislation. Suggested by Senators Patrick Leahy and Chuck Grassley, this part of the law would provide immunity under federal and state law to whistleblowers who confidentially report suspected illegal activity to the authorities.

The idea for this proposal originated with a draft article, Tailoring a Public Policy Exception to Trade Secret Protection, recently posted by Professor Peter Menell of the UC Berkeley School of Law. Professor Menell was confronting what should be a rather obvious issue: how do we support and encourage the private disclosure to government of needed information about possible wrongdoing, while recognizing the legitimate secrecy interests of business owners? It turns out that current law does not provide a clear answer, and this has negative consequences for whistleblowers and law enforcement.

Although an exception of sorts exists for personal disclosure of trade secrets in the public interest, it is expressed in vague terms that require a balancing of interests in the context of case-specific facts. For example, the Restatement (Third) of Unfair Competition § 40, comment c, states that “a privilege to disclose another’s trade secret depends upon the circumstances of the particular case, including the nature of the information, the purpose of the disclosure, and the means by which the actor acquired the information.” You might imagine that an employee, discovering evidence of corporate wrongdoing, should be comfortably protected by this principle when taking that evidence in confidence to the government. But you would be wrong.

In cases where the whistleblower has reported illegal activity through a qui tam action under the False Claims Act, 31 USC § 3729, some companies have reacted by asserting claims against the former employee for having misappropriated the very secrets that made the action possible. Claims have even been filed against the whistleblower’s attorneys for their part in their client’s alleged violation of a standard nondisclosure agreement. Arguments against applying a public interest exception include that the former employee took too much information, or should have reported their concerns in some other way. In any event, the limited case law and ambiguous formulation of the exception expose potential whistleblowers not only to the expense of litigation but also to its inherent personal stress.

And the risk of litigation is only one of many negative consequences that can result from reporting internal evidence of wrongdoing. As Professor Menell explains, studies show that whistleblowers frequently suffer job loss or demotion, personal shunning or blacklisting. This affects their finances, their families and their health. As one researcher put it, “the surprising part is not that most employees do not talk; it is that some talk at all.”

When employees know of illegal activity but are too scared to come forward, the public suffers. The insider typically is in a unique position to provide the evidence, which then remains walled up within the organization. On the other hand, businesses have a compelling need, particularly in the modern information economy, to protect their legitimate trade secrets from exposure, and sometimes whistleblowers are wrong, driven by self-interest. But at the moment there is no reliable way to balance and protect all these interests by ensuring that the relevant information can get to the officials who can consider it in confidence and make a decision on whether to proceed.

The Leahy-Grassley amendment appears to do this well, adopting what Professor Menell calls a “sealed disclosure/trusted intermediary” approach. Specifically, the amendment would rephrase 18 USC § 1833(2) (defining exceptions to the EEA) to provide that a person may not be held criminally or civilly liable for disclosure of a trade secret, if the disclosure is made (a) in confidence to a government official or to an attorney and (b) for the sole purpose of “reporting or investigating a suspected violation of law.” Immunity would also apply for disclosures made in a complaint or other filing, but only if done under seal. Nondisclosure agreements presented to employees or contractors must contain a notice of the immunity, at least by reference to the company’s relevant policy document. (Failure to provide the notice will forfeit the right to recover attorneys fees or enhanced damages against the employee under the DTSA.)

Significantly – and this point was emphasized by Senator Dianne Feinstein at the January 28 hearing – the amendment would not protect any otherwise wrongful behavior of the employee, such as hacking a computer system in violation of the Computer Fraud and Abuse Act.

If the amendment survives and becomes law, it is not likely to create substantial new burdens or risks for employers. Statutory notice provisions have been required in employee NDAs for decades, as a result of state laws protecting the rights of individual inventors. Recent action by federal agencies like the NLRB and SEC have signaled that employee contracts must expressly confirm the individual’s right to share and report certain kinds of information. And although there is always some incremental risk when secret data is provided to the government, experience has shown it to be manageable.

The benefit to the public of this new approach could be profound. Government plays a central role in the modern economy, and can only enforce rules affecting safety, public health and financial integrity when it has access to information about what might be going wrong. Whistleblowers are usually the best source of this information, but they will almost never come forward if they face the risk of being sued for violating obligations of confidentiality. The DTSA whistleblower amendment provides a sensible answer: a safe harbor for disclosures in confidence to the government.

The Defend Trade Secrets Act (S.1890) would for the first time allow trade secret plaintiffs to file their cases directly in federal court. The proposed law was favorably reported out of the Senate Judiciary Committee on Jan. 28, but with an important amendment protecting the right of employees to change jobs. Specifically, the bill requires that there be evidence of threatened misappropriation to justify an injunction putting limits on what an ex-employee can do. Although some might see this as reinforcing some states’ (particularly California’s) rejection of the “inevitable disclosure doctrine,” its practical effect instead should be to reframe the discussion away from that abstract doctrine and toward the kind of evidence necessary to prove a threat.

Forty-seven states have adopted the Uniform Trade Secrets Act. The injunction provisions of the UTSA permit a court to enjoin “actual or threatened misappropriation” of a trade secret. In 1995, the Seventh Circuit decided Pepsico v. Redmond,[1] approving a temporary injunction against a senior marketing executive, who had lied about his future plans, from starting work in the same position for a direct competitor. The court explained that the UTSA allowed an injunction when the “defendant’s new employment will inevitably lead him to rely on the plaintiff’s trade secrets.” This abstract phrase, detached from the facts of the case, came to be known as the “inevitable disclosure doctrine.” And because it was assumed to mean that employees could be enjoined merely because of how much they knew, it was widely condemned within California and other jurisdictions where policy and law strongly favor of mobility of labor.

“Inevitable disclosure” as an alternative to proving “threatened misappropriation” was rejected with strident language in Whyte v. Schlage Lock.[2] But in Central Valley General Hospital v. Smith,[3] another California court considered the question that Whyte had left unanswered: what evidence would be necessary to infer a “threat” under the UTSA. It concluded that while merely knowing the secret information was not enough, courts could intervene, for example, if the defendant had previously misappropriated trade secrets, or intended to misappropriate, or had refused to return confidential materials. In other words, bad behavior could provide the necessary inference of a threat.

In other states, where courts were presented with facts similar to Pepsico — that is, where the defendant had behaved in a way that made it unlikely he could be trusted — injunctions were sometimes issued, and judges called what they were doing an application of “inevitable disclosure.” See, e.g., Barilla America Inc. v. Wright.[4] As a result, commentators gradually settled into using the phrase without closely inquiring how it was being applied, and dividing jurisdictions according to whether they embraced or rejected “inevitable disclosure,” without questioning its meaning. California and a few other states were said to have rejected the doctrine, while many others had accepted it. But even in the states where it was accepted, judges almost always applied it only in cases where there was some evidence of bad behavior. See, e.g., Bimbo Bakeries USA Inc. v. Botticella.[5]

In other words, a false conflict had been created, and the evil that the Whyte court had railed against was mostly a phantom menace. But because the received wisdom was that inevitable disclosure could restrain someone from taking a new job without any evidence to support the inference of a threat, opponents concluded that employee mobility was protected only in California or in other states that had rejected the “doctrine.” And so when the DTSA was proposed last year, using precisely the same injunction language as the UTSA, they expressed concern that it might allow federal judges sitting in those jurisdictions to ignore state court rulings and apply the inevitable disclosure doctrine to enjoin an employee from taking a new job only because they knew too much. This was true even though the DTSA was expressly non-preemptive and had added language prohibiting an injunction that would “prevent a person from accepting an offer of employment under conditions that avoid actual or threatened misappropriation.”

After the Judiciary Committee held its hearing on the DTSA in early December, we continued to hear concern that this language would not be sufficient to protect employees from “inevitable disclosure” injunctions. Stanford Professor Mark Lemley and I then suggested a different approach, one that would direct federal judges to determine the existence of a threat based on the employee’s behavior rather than on what he or she knew. In the recently approved “substitute” bill, new language proposed by Sen. Dianne Feinstein, D-Calif., prohibits any injunction against “entering into an employment relationship” and requires that “conditions placed on such employment shall be based on evidence of threatened misappropriation and not merely on the information the person knows.”

Other amendments to the DTSA have also improved it, including bringing the limitations and enhanced damages provisions into line with the UTSA, tightening up the already strict requirements for an ex parte seizure order, and creating a new and important exception to protect whistleblowers who need to disclose confidential information in order to report a crime to the authorities. But in terms of widespread impact on the greatest number of trade secret cases, the Feinstein amendment stands out, because it would establish a national standard reflecting the value of employee mobility. Rather than arguing about abstractions or labels, and without affecting any state law or policy on noncompete agreements, courts will apply the statutory language that allows injunctions against threatened misappropriation, focusing on the quality of evidence needed to prove a threat.

In the process, we may have banished the ghost of inevitable disclosure.

[1] 54 F.3d 1262 (7th Cir. 1995). [2]101 Cal. App. 4th (2002). [3]162 Cal. App. 4th 501 (2008). [4]2002 U.S. Dist. LEXIS 12773, *25-26 (S.D. Iowa 2001). [5]613 F.3d 102, 118 (3d Cir. 2010).

Last Thursday the Senate Judiciary Committee favorably voted out the Defend Trade Secrets Act (“DTSA”), which would amend the Economic Espionage Act (“EEA”) to give trade secret plaintiffs the option of filing civil claims for misappropriation directly in federal court. The vote reflected broad bipartisan support (there are now 27 cosponsors in the Senate) and followed a substantive hearing on December 2 at which I had the privilege to testify. Since that time a number of senators engaged in discussions about how to improve the legislation. The result was a series of amendments, all of which have been adopted. Because the bill is likely to proceed quickly at this point, it would be useful to describe what has changed and what those changes could mean for practitioners and companies.

The notable amendments generally fall into four categories: (1) harmonizing with existing standards under the Uniform Trade Secrets Act (“UTSA”); (2) tightening up the process for preventive seizure of secrets; (3) ensuring that injunctions do not unreasonably restrain employee mobility; and (4) providing an exception for whistleblowers who disclose confidential information in order to report a crime to the authorities. The first three of these are laid out in a “Substitute” for S.1890, and the fourth is described in a separate amendment proposed by Senators Patrick Leahy and Chuck Grassley.

Bringing the DTSA in closer alignment with familiar provisions of the UTSA, the amendments have slightly changed the definition of a trade secret. The EEA had previously required that qualifying information not be known or readily ascertainable to “the public,” while the UTSA had used the phrase “persons who can obtain economic value from its disclosure or use.” While it was never clear whether this difference would actually matter when applied in litigation, the UTSA formulation has now been adopted, so that the two laws are congruent. (Some still point to the different list of examples of protectable information in the UTSA and EEA definitions, but this has never been shown to make any difference in the broad meaning of the common basic term “information.”)

The amendments have also changed the term of the statute of limitations from five years to three. Although a number of states have designated longer periods (from four to six years), this brings the DTSA into line with the UTSA as it was originally proposed. In the same vein, the enhanced damages provision, which had allowed a punitive assessment up to three times the compensatory award, has been adjusted to match the provisions of the UTSA at twice the amount of compensatory damages.

SEIZURE PROVISIONS

The ex parte seizure provisions have been substantially tightened, providing more assurance that this remedy will not be abused. First, the bill now expressly refers to seizure as available only in “extraordinary circumstances.” Second, an ambiguity identified by Senator Whitehouse at the December hearing has been resolved by clarifying that the target of the seizure must be in “actual” possession of the trade secret and property to be seized. Third, access to the seized material is more limited: only federal law enforcement can perform the seizure, with assistance as necessary from state authorities and an independent technical expert, but the applicant is barred. And following the seizure, the court may have the material sorted by a special master who, like the technical expert, must be under confidentiality restrictions. Fourth, in issuing its order the court must direct when the seizure may be carried out, and whether force may be used to access locked areas. Finally, in a new section the bill requires the Federal Judicial Center to develop “best practices” for seizure and handling of electronically stored information.

MOVING ON FROM “INEVITABLE DISCLOSURE”

One of the most interesting and potentially impactful provisions of the amendments concerns the preservation of employee mobility. Recognizing the critical importance of preventive relief to a right that can be so easily destroyed, the UTSA has always permitted injunctions against “threatened misappropriation,” and the same language is used in the DTSA. But because the DTSA would establish a national standard, some expressed fears that the “inevitable disclosure doctrine,” which has been expressly rejected in some states, might be used by federal judges to block an employee from taking a new job. The draft bill had tried to address this concern with a proviso that no injunction could “prevent a person from accepting an offer of employment under conditions that avoid actual or threatened misappropriation,” but this did not quiet the controversy.

To understand the nature of the dispute we need to wind back the clock to 1995, when the Seventh Circuit issued its decision in Pepsico v. Redmond, 54 F.3d 1262 (7th Cir. 1995), affirming a five-month injunction against a former marketing executive who had lied about his plans to take an identical position with another company that was about to launch a directly competitive product. Although the court had emphasized the executive’s bad behavior, it also summarized that “defendant’s new employment will inevitably lead him to rely on the plaintiff’s trade secrets.” Commentators promptly wrenched this phrase from its context and warned that Pepsico could be used to justify enjoining someone from taking a job just because of what he or she knew. This is how the so-called “inevitable disclosure doctrine” was born.

Having (mis)construed Pepsico this way, it was easy for some to make it a target, raising the alarm that “inevitable disclosure” was the equivalent of a post-hoc judicially-imposed non-compete agreement. Perhaps unsurprisingly, the backlash was particularly strong in California, where employees are protected by a robust public policy against restrictive covenants. In Whyte v. Schlage Lock, 101 Cal. App. 4th (2002), an intermediate appellate court issued a blistering condemnation of the doctrine and flatly declared it unacceptable under California law. It did this in response to the plaintiff’s argument that the doctrine should be available as an “alternative” to proving “threatened misappropriation.” Just what kind of evidence might be enough to establish a threat under the UTSA was not addressed. However, that question was answered several years later in another appellate decision, Central Valley General Hospital v. Smith, 162 Cal. App. 4th 501 (2008). The court said that evidence of bad behavior, like a prior misappropriation, an intention to misappropriate, or a refusal to return confidential material, would be enough to supply the inference.

In the meantime, however, the ideological battle lines had been drawn, and the forces mustering against inevitable disclosure, reinforced by many academic and popular articles, were determined to stamp it out if possible, or at least to protect their own jurisdiction from infection. The fervor of the debate apparently distracted everyone from critically examining what “inevitable disclosure” meant, or how it was actually being applied in places that didn’t have a reflexive opposition to it. It turns out that the doctrine was almost never used as the opponents assumed, that is where the only threat indicator was how much the employee knew. In fact, in those cases judges typically explained their denials by reminding the plaintiff that if all this information had been so critically important they could have demanded that the employee sign a non-compete agreement.

Following last December’s hearing, and in the wake of continuing concerns over the relevant DTSA language, I reached out to my friend Mark Lemley, professor at Stanford Law School. Mark and I had worked together before on issues relating to California’s “high velocity” labor market, and after some discussion about what appeared to be this false conflict over the inevitable disclosure doctrine, we suggested to Senate staff that the issue could better be reframed around the kind and quality of evidence that should be required – under the UTSA or the DTSA – to prove “threatened misappropriation,” and that the inquiry should focus on the employee’s behavior, not merely on how much they knew.

Ultimately, Senator Dianne Feinstein proposed the relevant portion of the DTSA amendments, which now allows an order against threatened misappropriation, provided that it not “prevent a person from entering into an employment relationship, and that conditions placed on such employment shall be based on evidence of threatened misappropriation and not merely on the information the person knows.” (In a belt-and-suspenders approach, the DTSA also includes a directly related amendment proposed by Senator John Cornyn that the order may not “otherwise conflict with an applicable State law prohibiting restraints on the practice of a lawful profession, trade, or business.”)

The new language on threatened misappropriation has at least two very positive effects. First, it makes express the apparent consensus from the courts that “threatened” misappropriation may not be established merely by the importance of the information that someone knows. This makes sense not only as a matter of public policy but also of evidence law. Second, it relieves us from the energy-draining debate over “inevitable disclosure,” which was pretty much a straw man that people loved to punch. Courts will not have to consider whether a jurisdiction accepts or rejects this abstract “doctrine,” but instead will ask: what is the actual evidence from which we should conclude that this person (or their new employer) can’t be trusted to honor the integrity of the plaintiff’s trade secrets? Outcomes in particular cases should not be substantially different.

WHISTLEBLOWER PROTECTION

A second major amendment was offered separately by Senators Leahy and Grassley, addressing a new, and in my opinion long neglected, question: how do we assure that employees and contractors who come upon evidence of illegal activity, but who are constrained by nondisclosure agreements from communicating those facts, can safely speak to their lawyers and to law enforcement officials? One might think that this question would already have been reliably answered by now, but it hasn’t been. In a wide-ranging and thoughtful on the subject, Tailoring a Public Policy Exception to Trade Secret Protection, Professor Peter Menell of the UC Berkeley School of Law explores not only the sparse, murky, and sometimes contradictory legal authority, but also the psychology of whistleblowing and the importance of a clear “safe harbor” for those who are thinking of reporting wrongdoing. As he notes, “[t]he same routine non-disclosure agreements that are essential to safeguarding trade secrets can be and are used to chill those in the best position to reveal illegal activity.” As a practical matter, employees and contractors face a stark dilemma, where the upside is a clear conscience (and possibly a reward for uncovering fraud) but the downside can involve painful and relentless retaliation as well as personal, financial, legal, and professional risk. Insulating the whistleblower from costly trade secret exposure serves larger societal interests in law enforcement, tax compliance, and surfacing and deterring securities fraud and fraud against the government.

Yet because of the difficulty of enforcing trade secrets once they leak, companies risk potentially significant losses if employees or contractors mistakenly disclose legitimate trade secrets—i.e., those that do not reveal illegal conduct. Peter’s article provided a balanced and effective solution to this dilemma that protects whistleblowers without jeopardizing disclosure of legitimate trade secrets. The proposed safe harbor insulates whistleblowers and their counsel from trade secret liability for disclosing trade secret information in confidence to government officials or as part of a lawsuit alleging retaliation by an employer provided that the information is filed under seal. (The federal Trade Secrets Act, 18 U.S.C. § 1905, generally prohibits governmental employees from disclosing trade secrets.) The proposed statutory exception to trade secret liability provides clear assurance to potential whistleblowers that they do not violate their NDAs merely by consulting legal counsel regarding reporting allegedly illegal conduct to a responsible government official through a confidential channel. In addition, this safe harbor insulates lawyers advising potential whistleblowers about their options and serving as conduits for presenting evidence of allegedly illegal conduct to the government. The efficacy of the safe harbor is enhanced by requiring that NDAs prominently include notice of the law reporting safe harbor to ensure that those with knowledge of illegal conduct are aware of this important public policy limitation on NDAs and exercise due care with trade secrets in reporting such activity. A

fter Peter’s article appeared just as the DTSA was gaining momentum in the fall, the Senate staff reached out to him to help craft appropriate language. The Leahy/Grassley amendment provides immunity under federal or state law against any claim for violation of an individual’s nondisclosure obligations for disclosure, made in confidence, to (a) an attorney or government official, for the purpose of reporting or investigating a violation of law, or (b) a filing made under seal in a lawsuit “or other proceeding.” In order to ensure that employees (a term that also includes contractors) know about their rights, employers are required to give an appropriate notice in the nondisclosure agreement (as is often done now with state inventor statutes), although this can be a reference to the company’s separate policy document. A failure to comply with the notice provision would block any award of attorneys’ fees or enhanced damages against an employee under the DTSA. Significantly – and this point was emphasized by Senator Feinstein at the hearing on January 28 – the whistleblower protection would not extend to any otherwise improper acts by the employee, such as hacking information in violation of the Computer Fraud and Abuse Act.

CONCLUSION

The DTSA in its current form is a strong bill, meeting its original objective of giving plaintiffs access to federal courts, which are better equipped to handle cases of interstate or international misappropriation of trade secrets. In my opinion, all reasonable objections have been adequately addressed, and there are sufficient protections built in against abuse. Moreover, passage of this bill would substantially improve the environment for both plaintiffs and defendants, by making trade secret litigation more predictable, establishing a national standard for issues like “threatened misappropriation,” and striking the right balance of interests to promote responsible efforts by whistleblowers to report possible violations of law.

Last month Caterpillar was hit with a $74 million jury verdict for trade secret misappropriation in the Eastern District of Illinois. The case was filed by Miller, a UK vendor that supplied Caterpillar with "couplers," a product that allowed quick changes of tools on excavators. After Caterpillar told Miller that it was switching to use a coupler of its own design, Miller sued, claiming that Caterpillar used Miller's confidential information in the development of the product, in violation of their "Supply Agreement."

And it's that agreement that marks the most immediate lesson to be drawn from this case: confidentiality obligations lurk in many contracts that are not called "Nondisclosure Agreement." When we're working on protecting our clients from unwanted information contamination, or just trying to keep track of confidentiality obligations so they can be managed, too often we limit the conversation to NDAs as such. And while those contracts certainly need our attention, we have to remember that similar obligations often are buried in other documents.

So our first task as counsel is to make sure that managers are sensitive to the real issue: obligating the company to keep information secret comes with a very heavy set of risks. It may be helpful to think of this custodial information like a virus, which when properly contained and managed will not cause harm, but which if mishandled can quickly spread through the organization, morphing as it goes in ways that make it hard to recognize, much less extract.

With management having the right understanding of the risk environment, it then becomes a matter of setting up procedures to mitigate the risk by limiting exposure and ensuring that all confidentiality obligations are closely tracked. In practical terms, this usually means creating special protocols as part of contract management, with legal review of the specific undertakings in all agreements. That review should also produce specific advice to the relevant managers about how to avoid misuse of data and how to close down the project properly when it's concluded.

If you have strategic responsibility for intellectual property, then you may already feel the ground shifting beneath you. Patents have held sway during our professional lifetimes not only as a marker of innovation, but as the main way in which companies protect and exploit their competitive advantage. Not any more. Like an old style of dress, trade secrets are coming back into fashion and turning heads...

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram