Trade Secret Management and the Fear of Missing Something

“An approximate answer to the right problem is worth a good deal more than an exact answer to an approximate problem.”

           — John Tukey

As I was participating in a recent conference of trade secret nerds (yes, we often refer to ourselves that way), I found myself thinking about the Titanic. More specifically, about the legend of the missing binoculars. It seems that on that tragic night in 1912 the lookout was unable to find a pair of binoculars that he thought had been stowed in the crow’s nest. According to the story, they were in a locked box in the quarters of the former second officer, who had been transferred to another ship just before departure (lucky guy) and apparently took the key with him. In the immediate aftermath of the sinking, no one considered that the lack of binoculars had anything at all to do with the ship’s failure to steer clear of the iceberg. It was pitch dark, and the obvious cause was excessive speed. The official report didn’t even mention binoculars. But during the later inquest, the lookout testified about his futile search, and the “but for the binoculars” legend was born.

Whether to ‘List’ Your Trade Secrets

Why did this come to mind sitting in a meeting about trade secret management? We were debating a classic question: should a company create a “list” of its secrets, so that it can sensibly manage them and be ready if it has to go to court to protect them? The transactional lawyers in the group said yes, but many of the litigators were opposed. They worried that if a company committed to a list, it might later need to file an action to enforce a secret that wasn’t on the list and lose the case as a result. Like the binoculars, something that initially seemed fairly insignificant might become critical in a new context.

Proving trade secrets often requires focus on the impression that you’re giving the judge or jury about what information really matters to you. Ideally, the owner offers compelling evidence that this specific design, or code, or process makes a big difference to the success of the company. But if you had failed to put this on the “list,” it’s hard to avoid the argument that you didn’t care enough about it, or it just wasn’t all that important. However, as we’ll see it doesn’t necessarily have to end up that way; a lot depends on how you go about “listing” what you have.

At our meeting, the argument boiled down to a contest of competing perfections. The corporate lawyers wanted to maximize the company’s ability to manage an asset that is as valuable as it is evanescent, so were willing to take some risk on a later dispute if in return the business could more effectively supervise its secrets. The litigators wanted to maximize flexibility to “adjust” the company’s claimed secrets to later circumstances, without worrying about a previous catalog that may have missed something now considered to be important.

There’s No One Right Answer

Both sides in this debate were right and wrong. Yes, the law requires that a company trying to enforce its trade secret rights demonstrate that it has engaged in “reasonable efforts” to keep them secret; and knowing what they are is an obvious first step in that process. But the law requires only that the business act reasonably, not flawlessly. Similarly, in litigation where you have strong proof of theft, the jury is not likely to be too distracted by the fact that you didn’t perfectly categorize all the secrets that you can now prove have value.

Of course, it certainly helps to show that you have always taken seriously the need to protect the information that gives your business a competitive edge. The judge or jury tends to equate the actual value of your secrets with the relative effort that you have put into caring for them. But that doesn’t mean you have to inventory each and every bit of data. That’s a fool’s errand. Because trade secrets are so granular and pervasive throughout the enterprise, and because they – and their value – are always changing, you would have to be updating the list daily, and you would never get it totally right.

There is a simpler way to identify your information assets, one that doesn’t take inordinate resources or risk losing a lawsuit. It recognizes that there is no one “best practice,” but only a range of practice that is “reasonable under the circumstances” for your business. As that phrase suggests, there are multiple potentially relevant factors.

A Lot Depends on the Nature of the Business

For example, if you run a small business that is relatively predictable, such as a restaurant or an insurance agency, you already have an appreciation for the secrets you need to protect, whether recipes or customer lists. And you know that the main risk you face is with employees who may be tempted to walk off with them. Having that in mind, your efforts will be focused on limiting access, perhaps with some training to help the workforce understand why those things are sensitive.

At what might be the other extreme, if yours is a startup tech company with a mission to disrupt a market, you will be creating and discarding ideas and data as you quickly grow. Your dataset of valuable information is necessarily dynamic (as are the risks it faces). In that environment, trying to stop and get a useful handle on what your most important secrets are can be very difficult; everything is moving too fast.

But that doesn’t mean you should just throw up your hands and forget about trying to understand the nature of your competitive advantage. You may not have (yet) discovered something discrete on the order of the blockbuster drug molecule or the perfect search algorithm; but even in the early stages you learn a lot about what works and what doesn’t. You develop an idea of what the ideal feature set for your upcoming product might be. You begin to understand what it is that your customer base would love to have, if only you could deliver it to them.

Would you want your competitors to have access to all that information? Of course not. But if you don’t pause from time to time to think about what it is, then you won’t be in a position to actively manage it, to protect it and use it to increase enterprise value. Remember, the “it” we’re talking about here is the essence of what distinguishes your company, or will distinguish it going forward. What could be more important?

You Don’t Need to Boil the Ocean

The point is that you don’t have to boil the ocean to know what you have at a sensible level of detail. For many companies, it will be enough to identify the categories of information that are (or will be) your “crown jewels,” recorded and briefly described on a spreadsheet that is regularly updated. Other companies wanting to impose more discipline on the process may opt to use a trade secret management tool such as Tangibly. Whatever sort of system you adopt, its description or user notes should include the caveat that it is intended as a guide for management, and should not be seen as comprehensive or exhaustive. By doing that, and also describing your secrets in broad terms, you will decrease the risk that something omitted becomes a problem.

On the positive side, you will have given yourself a solid basis for effective management of your information assets by assigning appropriate risk levels and considering mitigation measures. And you will be much more prepared for transactions like acquisitions or licenses, and also able to respond immediately with litigation when your rights are threatened.

At least you won’t be frantically searching for the keys to the binoculars case.

“Three may keep a secret, if two of them are dead.”

           — Benjamin Franklin

It used to be so simple. For centuries, China was able to maintain its monopoly on silk production just by killing anyone who tried to leave the country with knowledge of its secrets. Thirteenth century Venice showered benefits on the Murano glassmakers but also prohibited them from leaving the island. Augustus the Strong preserved the secrets of Meissen porcelain by setting up a workshop in one of his remote castles and basically imprisoning the artisans there. A similar containment strategy was employed by England to protect its preeminent position in textile manufacturing. With the Exportation of Machinery Act of 1774, Parliament decreed that neither “Implements used in the Manufacture of Cloth” nor “Descriptions” thereof could be exported. Although this was presumed to apply to skilled workers with such knowledge in their heads, the law did not stop one ambitious young apprentice, Samuel Slater, from slipping out to find his fortune in the colonies by applying what he knew, seeding the U.S. industrial revolution.

The Apprenticeship Contract

It helps to remember that Slater’s behavior challenged not only the law against exportation of technology, but also the system of apprenticeships that had developed in England since the sixteenth century. The 1563 Statute of Apprentices (also called the “Statute of Artificers,” referring to skilled workers who produce goods by hand) made an apprenticeship compulsory for anyone who wanted to enter a trade. This was no summer internship, but typically required a seven-year commitment to learning at the foot of a master in the trade, who in addition to training would also provide room and board. Although the apprenticeship “indenture” was similar in many ways to the general contract of indenture by which workers pledged themselves for a set period in return for some benefit such as a piece of land, its focus was instead on training. Indeed, many middle-class families would pay a hefty fee for their 14-year-old son (there were relatively few female apprentices) to learn from a well-regarded master.

Apprenticeship indenture contracts tended to constrain the young worker in ways that their modern counterparts would likely find unacceptable. The apprentice had to “gladly obey” the master’s commands, forego “Cards, Dice or any other unlawful Game” and avoid “Ale-Houses, Taverns and Play-Houses” (that is, theaters). But we also see in them some of the same restrictive covenants that are common in modern employment agreements. The apprentice had to “keep the said Master’s Secrets,” and in many cases agree not to compete with the master for seven more years after expiration of the apprenticeship (the English Statute of Monopolies of 1623 set the term of a patent at 14 years; coincidence?)

When Slater traveled to New England, he was responding to an advertised market need for skilled artisans. In the same year that Britain barred the export of textile technology, its colonies had begun to offer bounties for textile workers willing to emigrate. Pennsylvania’s was first, at £100, and following independence most states offered amounts up to £500. In effect, these were the signing bonuses of the nascent industrial revolution. Fast forward to today, when very skilled artificial intelligence professionals can command salaries of as much as $900,000. In an economy fueled by the expanding horizons of innovation, money talks and talent walks.

Noncompete vs. Nondisclosure

The recruiting side of this process comes with its own challenges and risks around contamination with information belonging to others, a subject we have examined before. But for the moment, let’s focus on how business gets employees to respect and protect the integrity of the company’s own data assets. Here, we need to distinguish between two types of restrictive agreements: (1) prohibiting competition for a period after the employment ends (a “noncompete”) and (2) prohibiting use or disclosure of the employer’s trade secrets (a “confidentiality” or “nondisclosure” contract).

Noncompete agreements have always been controversial to some extent. Employers like them because they avoid messy litigation over whether the employee has breached confidentiality; a noncompete eliminates the risk as a practical matter. But it is a blunt instrument, preventing fair as well as unfair competition. At a macro level, a few states, notably including California, long ago decided that noncompetes are anathema in an open economy. Some people point to the extraordinary story of Silicon Valley to argue the wisdom of this policy. Indeed, Minnesota has just jumped on board, and a growing number of other states have limited noncompetes to high-earning executives.

In contrast, employee confidentiality agreements have almost universally been embraced by courts, even though they usually operate in perpetuity to restrain use or disclosure of information. This is mainly because even without a contract, the common law recognized a duty of confidentiality by all employees to respect the trust implied by having access to secrets. In that context, the contract is not necessary to create the obligation, although it certainly is helpful, because it provides evidence of the confidential relationship and notice to the employee. As a result, employee confidentiality agreements are ubiquitous in most industries.

Protecting Labor Mobility

But establishing a relationship of confidence isn’t the same as enforcing one, and in a society that values the free movement of labor there can be some real tension between the employer’s interest in ensuring exclusive control over its trade secrets and the employee’s interest in moving to another job, even one that is directly competitive. We resolve that tension in part through rules that guarantee all employees the right to use their accumulated skills and general knowledge as they move on. In effect, they have a growing “tool kit” to take with them. But increasingly, legislatures and government agencies have expressed policies that more clearly support labor mobility.

In the negotiations that led to the federal Defend Trade Secrets Act of 2016 (DTSA), a provision was inserted that restricted the ability of judges to issue injunctions against departing employees. Courts may not prevent someone from accepting a job, and any restrictions they impose on what an employee can do must be based on evidence that misappropriation is likely, but “not merely on the information the person knows.” Technically, the statute does not limit the applicability of confidentiality agreements, but it can make more challenging the company’s attempt to enforce them in ways that are effective to protect secrets.

More recently, the Federal Trade Commission has proposed a rule that would ban noncompetes nationally but would also apply to any employee confidentiality agreement “written so broadly that it effectively precludes the worker from working in the same field.” We examined that proposal when it emerged some months ago, and while it may not ever issue as an enforceable regulation, it rhymes with much of the effort at the state level to rein in noncompetes.

When a Confidentiality Contract Looks Like a Noncompete

Whatever position you might take on noncompetes as such, a troubling dimension of this debate is the use of the same broad brush to paint confidentiality agreements as threatening to employee mobility. And it’s not just government that is pressing this position; the courts have also joined. In a 2020 case from the First Circuit Court of Appeals, TLS Management v. Rodriguez-Toledo, the lower court had ruled for the employer, a tax advisor, against a former employee who it claimed had been using its proprietary techniques in violation of his confidentiality agreement. The appellate court reversed, explaining that “overly broad nondisclosure agreements, while not specifically prohibiting an employee from entering into competition with the former employer, raise the same policy concerns about restraining competition as noncompete clauses where, as here, they have the effect of preventing the defendant from competing with the plaintiff.”

This willingness to analyze nondisclosure agreements as if they were noncompete contracts presents a serious conundrum for businesses. Imposing nondisclosure agreements on employees is a key feature of most companies’ information security programs; indeed, the law’s requirement that the employer engage in “reasonable efforts” to protect its trade secrets often starts with looking at where such agreements are in place. If you don’t have them, you risk losing your rights. And when you create them, you can’t know exactly what information the employee will be exposed to over the years of employment. As a result, the definition of “confidential information” in the contract necessarily will be very broad, with the details to be filled in by on-the-job training and experience.

How to Avoid the Problem

So, what is the employer supposed to do? First, avoid trying to claim that everything the employee learns on the job belongs to the company. The language of the contract in TLS Management was so expansive that it arguably swept up information that was generally known, making the employee radioactive in terms of litigation risk. As a test, make sure to read the agreement in a way that ensures there is a path forward for the honest worker who just wants to get another job. Second, accept that there is no way in the modern world to make yourself whole for having released into the market someone whom you have endowed with the skillset to compete with you. Get over that annoyance. And third, focus on the risks to your specific secrets by engaging in a meaningful exit process. More on that here.

We’re not in the 18th century anymore. Ultimately, talent will break free to pursue new opportunities, and that, together with hackers and heavy-handed regulators, represents the modern business environment. But take heart: litigation (a modern form of capital punishment) is not the only answer. Almost all concerns about protecting trade secrets can be solved with better management.

James Pooley, frequently serving as a lead counsel in trade secret disputes, was an expert witness for Dril-Quip. He says that this case sends an important message to companies that they should think carefully about their strategies when looking to protect key innovations.

Pooley told the courts that while FMC favoured a patenting strategy as a whole, and had “some infrastructure in place” to secure that type of IP protection, he could not recognise a clear strategy for protecting trade secrets. He believes it may be the case that, because FMC was aiming to rely ultimately on patenting, it failed to “carefully police whether the patent applications were stamped confidential”.

FMC was selling large pieces of equipment that went out to the market where they could be viewed, examined and reverse engineered easily, meaning that pursuing patent protection was an understandable choice, Pooley says. But along the way, some significant mistakes were made in protecting its innovation.


In the case, the court heard FMC had opened up its engineering database “to everybody, instead of partitioning it for those who needed to have access to confidential information”, Pooley explained. All FMC engineers had remote access to TeamCenter, where many of those documents Murphy was working on were stored.

Pooley argues that “neither FMC's code of business conduct nor anything else at the company prohibited FMC's employees from copying confidential company documents onto an external drive” and that large companies would not make “engineering documents containing trade secrets available to every engineer in the company”.

Pooley believes that the case sends a strong message to the industry that the requirement for “reasonable efforts” is a very serious one. “It requires focus on the trade secrets that you are trying to protect as opposed to general security issues, such as having a very good IT system, requirements for using passwords, having a front desk and so on,” he told IAM. “When you go to the court to protect your special information because it has extremely high value, the courts would expect you to have behaved in a way that reflects that high value.”


Pooley told the court that soon after the chief engineer left, FMC tightened up its safeguarding measures, introducing more focused procedures and policies around trade secret protection. This included new practices to label trade secrets “highly confidential” or “highest level of sensitivity” and ban remote access to such information. 

But as a saying goes, that’s like closing the stable door after the horse has bolted, Pooley mused.

“In suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved . . . .”

           — 7th Amendment to U.S. Constitution

You always remember your first jury trial. Mine happened almost 50 years ago, and I still vividly recall sitting with the partner to work on the “instructions” that the judge would be giving. He explained to me that the jury would be told what the statutes said (this was a contract case), and they would be responsible for deciding the facts that determined their verdict. As it turned out, we didn’t win, and that was the end of it. Although an appeal was possible, overturning a jury verdict is very hard to do.

And that’s as it should be. Respect for the jury as an institution, coupled with a logical focus on efficiency, long ago – long before we coined the term “crowdsourcing” – led to rules that defer to the wisdom of the jury. If the trial judge made a serious error that likely affected the outcome, a new trial can be ordered. But only rarely do we allow judges to reverse what the jury did and give judgment to the other side. That would require scouring the record, going through all the exhibits and all the testimony, to conclude that there was “a complete absence of evidence supporting the verdict.” Judges are not allowed to substitute their assessment of credibility when they do this, but have to interpret all the evidence in a way that is most favorable to the jury’s decision. Only if they do that, and are still convinced that the facts are so “overwhelming” that no reasonable person could have come out as the jury did, can the trial judge (or an appeals court) reverse the result.

The Second Circuit in Syntel v. Trizetto

That’s why I was surprised to see the recent opinion in Syntel v. Trizetto, a trade secret case that made its way to the Second Circuit Court of Appeals following a jury trial in New York federal court in October 2020. Syntel, a software developer, had sued Trizetto under a contract for improving software tools used in the healthcare industry. Trizetto filed a counterclaim accusing Syntel of misusing its access to Trizetto secrets to go into competition with it.

Trizetto based its claim on the Defend Trade Secrets Act (DTSA), which since 2016 has allowed trade secret owners to sue in federal court. Before that time, claims for misappropriation mainly happened in state courts under the so-called Uniform Trade Secrets Act (UTSA). I say “so-called” because over the years since the UTSA was proposed as a model, individual states have tinkered with the language so much that Congress decided a federal law was needed to provide consistency. But one aspect of the DTSA and UTSA match perfectly: how damages are calculated.

Disgorgement of a Defendant’s Avoided Costs

Because the twin policies behind trade secret law, according to the U.S. Supreme Court, are the “maintenance of standards of commercial ethics and the encouragement of invention,” damage awards tend to be generous to ensure that the victim is fully compensated and that the perpetrator does not retain any benefit from the misappropriation. Specifically, a plaintiff is entitled to recover damages for its “actual loss” and an amount representing the defendant’s “unjust enrichment,” so long as there’s no double counting. For a lot of reasons, it’s often difficult to show actual loss, and so plaintiffs tend to rely more on “disgorgement” of the defendant’s benefit. And usually that benefit is calculated as the defendant’s “avoided costs” from not having to do its own research and experimentation to discover the secret on its own.

Trizetto in fact had evidence of actual loss, in the form of some business that Syntel was able to grab, amounting to $8.5 million. But the calculation of Syntel’s avoided costs, based on what it had cost Trizetto to develop the secret information in the first place, was almost $285 million. That was the number submitted to the jury, and it ruled for Trizetto and also awarded punitive damages because it found that Syntel’s misappropriation was “willful and malicious.” After the trial, Syntel challenged the verdict, but the trial judge, applying the traditional standard favoring jury verdicts, denied Syntel’s motion. (The jury had also awarded damages for copyright infringement, but that was not challenged).

Switching the Standard of Review

However, on appeal to the Second Circuit, the judgment was vacated. Applying the deferential standard of review, the court began by confirming that Trizetto had proven the existence of legitimate trade secrets, and that Syntel had no right under the contract to use that information in competition with Trizetto. But although it acknowledged that the “amount of recoverable damages is a question of fact,” it switched its analysis to “de novo” (i.e., fresh eyes) review on the “legal question” of whether it was proper “in this specific case” to allow recovery of avoided costs under the DTSA.

You would be excused for thinking that this was a pretty straightforward question. After all, the statute is expressed in the conjunctive: the plaintiff can recover its loss “and” any amount of unjust enrichment that is not already accounted for in the loss calculation. Indeed, at least two other circuit courts, applying identical language from the UTSA, had ruled that way: Epic Systems v. Tata Consultancy (Seventh Circuit) and PPG Industries v. Jiangsu (Third Circuit). Ultimately, the Second Circuit panel said it disagreed with those cases.

Misinterpreting the DTSA

Instead, the court adopted a false premise: that the DTSA provision on unjust enrichment is designed to provide compensation to victims “whose injuries are not adequately addressed by lost profits” by making “trade secret holders whole.” There is nothing in the text of the statute or in the history of its enactment that supports that assumption; instead, the obvious goal is simply to make sure that the thief doesn’t get to hold on to any benefit from the wrongful act. This twist of the statutory purpose provided the setup for wandering even further from the statute, to consider the Restatement (Third) of Unfair Competition, a publication of the American Law Institute which purports to describe the common law on a variety of subjects, including trade secrets. It is what lawyers call a “secondary reference,” in contrast to the statute itself, which is primary.

Turning to the Restatement for an understanding of the common law of trade secret damages, the court zeroed in on § 45(2), which suggests that, in addition to the basic approach of awarding the greater of plaintiff’s loss or defendant’s gain, a judge should engage in a “comparative appraisal of all the factors of the case,” including the “degree of certainty” with which the plaintiff has established its damages case, and “the relative adequacy to the plaintiff of other remedies.” We should pause here to emphasize that none of this is part of the UTSA or DTSA, but represents the consensus view of a largely self-selected group of scholars and practitioners about the state of the “common” (i.e., non-statutory) law. But the Second Circuit tried to link it together in passing with a footnote saying only that “these common law principles are consistent with the language and the structure of the DTSA.” Of course, “consistent with” means just that they are not obviously conflicting, not that the common law principles can be inferred from the language of the statute; they can’t be.

Requiring a ‘Comparative Appraisal’ of Remedies

Having given itself permission to review the question with zero deference to the verdict, the appellate court engaged in what it viewed as the “comparative appraisal” suggested by the Restatement. It focused its attention on the “adequacy to [Trizetto] of other remedies” and in particular the permanent injunction that the trial judge had entered, prohibiting Syntel from using or disclosing the trade secrets. Such remedies “work as a powerful tonic to reduce the harm a trade secret holder suffers beyond its lost business.” Indeed, if you focused only on avoided costs without the (undefined) “comparative appraisal,” the court said, you risk making “awards that are more punitive than compensatory.” So, let’s pause again briefly to observe that the court has by now conflated two separate statutory damage calculations by linking both of them to harm to the plaintiff; and it seems to have revealed its real underlying concern: that a $245 million damage award seems very excessive (and therefore “punitive”) against someone who’s already been enjoined from further use and in favor of someone who hasn’t actually lost much. (Indeed, the court offered, Trizetto’s software “is worth even more today than it was when the misappropriation occurred.”)

As you may be able to tell by now, this logical legerdemain by the Second Circuit has me pretty disappointed. Even more so because they try to have it both ways, by issuing a broad ruling that avoided cost unjust enrichment damages must somehow be tethered to proof of loss to the plaintiff, and by repeating (seven times by my count) the suggestion that its holding is limited to “the particular facts” of this case. It seems a disservice not only to the litigants, but also to the rest of us who care about this area of the law, to engage in such labyrinthian reasoning to attack an award that one believes is excessive in light of the injunction.

What Can Be Done to Resolve the Conflict?

If we think trade secret law on avoided cost damages is too loose as it is written, then we should go back to Congress to make it work better for the industries it is designed to serve, rather than conjure a gloss on the existing statute using a “restatement of the common law.” If we’re going to sharpen the point, we should take the opportunity to clarify and reinforce that harm to the victim is different than benefit to the defendant, and that “avoided cost” is not just about money, but about not having to take the risk that your own development effort will fail entirely. The “value” of a stolen trade secret to the misappropriator is at least in the knowledge that it works.

As an alternative to returning to Congress, perhaps there are ways to honestly interpret the existing law to help provide better guidance to juries. Sitting down to write instructions that cleanly separate issues of law and fact will help us prepare our trials and improve predictability of outcomes. As I learned a long time ago, juries will do the right thing if you give them the right information.

James Pooley, a trade secrets expert and attorney who has represented companies including Adobe, GE, and Qualcomm, said the high-profile (and high dollar value) nature of the Apple case is part of the reason issues like talent poaching are being explored so thoroughly.

“Cases like this have many dimensions,” Pooley said. “You get treated to a number of different issues that wouldn’t necessarily come up in cases where people couldn’t afford to turn over every rock and assert every possible argument.”

For Pooley, the Apple case illustrates an age-old Silicon Valley adage.

“There’s the story of the small-time innovator, Masimo, versus Apple, which has an innovation factory,” Pooley said. And in that David and Goliath scenario, the question, he said, becomes, “Who is the innovator?”

James Pooley, an independent attorney in San Francisco, says people don’t fully understand the capabilities of the technology yet.

But he points out that this is by no means the first time that businesses have had to consider new technologies when refining their trade secrets strategies.

“When I first started out, there were no networks or internet. The only thing you needed to do to make sure your information was protected was watch who walked out the front door and guard the photocopier. The environment since then has changed dramatically,” Pooley notes.

He adds that there are now almost “infinite” ways for employees and others trusted with confidential details to communicate them externally.

“To the extent that generative AI encourages more communication, I suppose you might say it presents another dimension of risk for control over company data. But it’s not at the same scale as some of the changes we’ve seen in the past.”

“Think different”

           — Apple 1997 ad campaign for the Mac

The story seems to unfold the same way every time, whether the actor is a high-level departing employee or a customer or business partner. When sharing confidential information in a long-term relationship results in the release of a similar product by the recipient, the reaction is a claim of theft, laced with accusations of treachery and betrayal. And the response is equally strong: “no, I did this on my own”; in legal terms, “I engaged in ‘independent development.’”

Strictly speaking, this means that the development of the new product was accomplished “independently” of the information shared in the confidential relationship. As a practical matter, this can be difficult to prove. Once you have been exposed to the secret process or design, or other related information, how do you demonstrate that your work was entirely your own?

This is a particular conundrum for companies that are looking to expand their business through acquisitions, or who respond to inquiries from an innovator interested in some sort of relationship to co-develop a new technology. A recent article in the Wall Street Journal reported on cases where Apple met with startups to look at technology related to the iPhone or Apple Watch, and the legal battles resulting from Apple’s decision to pursue those projects on its own.

The Residuals Clause’

One way that a large organization can try to protect itself from these claims is to insert a “residuals clause” into the agreement with the smaller company. Alongside the usual promises of confidentiality and limited use of shared information it inserts a significant exception for information “retained in the unaided” (i.e., human) memory of the individuals who were exposed to it. If that strikes you as a significant carve-out, you’re right. In effect, by entering into an agreement with a residuals clause, you’re granting a license to the other side to use whatever they remember from the transaction.

As a result, the residuals clause is frequently refused, and the process goes forward with a more or less standard NDA in which each side agrees to maintain information in confidence and to use it only to assess the proposed deal. The receiving company may reduce its risk to some extent by declaring in the agreement that it is engaged in its own related research. But even with that sort of disclaimer, there will be exposure to information that makes it a challenge later to demonstrate truly independent development.

An exposure like this doesn’t only happen in the case of potential acquisitions or licenses. Confidential information can be shared in connection with purchase of a commercial product, in which the terms of sale include protection for the seller’s designs. The same might apply to enterprise software, in which the customer is not given access to underlying code, but is exposed to information about how the tool works, usually accompanied by a promise not to reverse engineer it. And of course sensitive information sometimes arrives in the head of an engineer hired from a competitor.

However it occurs, the “information infection” operates more or less automatically to constrain the recipient’s freedom in some way. That constraint can be measured by the risk that there will be some sort of claim, and by the robustness of the evidence that the recipient did not in fact use the information it received in confidence.

Misappropriation Does Not Require Copying

The key word here is “use.” To assert a claim of trade secret misappropriation, you don’t have to show copying. The law imposes liability if the later development was influenced, or just accelerated in some way, by access to confidential information. This includes using knowledge of the blind alleys already explored by the originator who invested in research to determine what doesn’t work, or what works less well. These so-called “negative secrets” can be very valuable as a “head start” toward success. Recall that Thomas Edison, in relating his effort to invent a long-lasting filament for the light bulb, said “I haven’t failed; I’ve found 10,000 ways that won’t work.”

In a dispute over breach of confidentiality, the plaintiff always has the “burden of proof,” in the sense that it has to convince the judge or jury that its secrets were misappropriated. But as a practical matter, if the defendant had trusted access and later sold a similar product, all eyes will be on the defendant, who better have a good story to tell.

That story, as we noted at the beginning, is one of “independent development.” But how does the accused convince a (potentially skeptical) audience that there was no breach of trust, that the development was “clean?”

Here, the gold standard is the “clean room” form of reverse engineering, in which you start with publicly available information about a product, or a set of basic specifications for a desired product, and you hand that over to an outside team of developers who have never been exposed to the secret information. Of course, you have to be certain that all the participants are clean, and that the information you give them to start with was not derived from the trade secret. But if you can pull that off, then you should win.

 ‘Clean Room’ May Not Be Practical

The problem is that a true “clean room” is often impractical for a number of reasons. There may not be enough time, or enough budget. The people with the right skills and experience may not be available when needed. Or the extent of exposure may have been so limited that the risk is viewed as acceptable.

Indeed, assessing the risk is key to most attempts at independent development. The company that is exposed to sensitive data has to recognize that the issue is not clean-cut, but depends on thoughtful risk management, beginning at the point when the relationship is established and the information received. Anticipating the practical burden of proving independent development, the recipient will focus on ways to preserve its options in the event of a claim.

This effort begins with the originating transaction. If the company is entering into a confidential relationship, the contract should be drafted in a way that makes it clear to the other side that if things don’t work out the recipient will be forging ahead on its own. Provisions for specific marking of all confidential information (and prompt written confirmation of verbal disclosures) will help reduce the risk of misunderstanding about what the protected information consists of.

For recruiting exposure, the hiring company should make clear its policy on respecting others’ IP, and should consider establishing protocols to guide the behavior of new recruits and their new colleagues. In exceptional cases, the company may want to provide access to independent counsel to provide the individual with specific, confidential guidance.

All this front-loaded action may not help much without follow-up to ensure that exposure is carefully managed and that good records are kept of how the company has complied with its obligations.

Structuring the Independent Development Effort

This brings us back to the question of how to structure a development path when there has been some exposure to someone else’s trade secrets. The answer begins with recognizing that it doesn’t necessarily require a hermetically sealed “clean room.” It is possible to create your own product or service “independently” using one or more of the people who had access to sensitive data. For obvious reasons you should limit their participation to what is necessary under the circumstances. But the law only punishes a misuse that is “substantial,” and depending on the context, you may be able to convince a court that any influence from exposure to confidential information was negligible.

The key to success lies in understanding the risk of future litigation and preserving the evidence of your work. This becomes critical as context for a judge or jury to see that your development effort was robust and honest, and that you didn’t cut corners by avoiding the research or experimentation that was already done by others. To show that what you did was “independent” of what you learned from someone else, you should frame your plans accordingly. Begin by thinking different.

Trade secret expert James Pooley believes the leak could represent a “major crisis” for the social media platform and suggests that the drastic loss of staff could be a factor.

“For a software-based company like Twitter, publication of any significant part of its source code represents a major crisis,” he tells WIPR.

“That said, it’s difficult to discern the impact when we don’t yet know what portions of the code were posted, what significance they have to the functioning or security of the platform, and how long they were available on GitHub.”

He adds: “We don’t know who might have grabbed a copy of the code during the months that it was there. In any event, the theft implies some level of failure of the company’s information security programme.

“How was it that someone was able to get access to exfiltrate the information? Why was it not discovered sooner? A reasonable assumption is that the rapid contraction in Twitter’s workforce, with so many experienced people being made redundant or resigning, caused the company’s security controls to degrade.

“One can only hope that, in addition to its effort to find the culprit, Twitter also focuses on assessing the cause of this breach and shoring up its procedures and oversight.”

There may be broader implications, too, according to Pooley.

“Although a partial or temporary disclosure of confidential information will not necessarily destroy its status as a trade secret, an extreme breakdown like this could support an argument that Twitter has lost trade secret protection for some or all of its source code because it has failed to engage in ‘reasonable steps’ to protect it, as required under TRIPS Article 39 and related national laws.”

It was a hot August afternoon in 1984, and I had just finished testifying to the California Senate committee considering a new law, the Uniform Trade Secrets Act (UTSA). I had been sent to Sacramento to support this legislation, which was supposed to provide a “uniform” standard among the states. But some lawyers from the State Bar were pushing for changes that I thought might cause problems. One of these was to remove the requirement that a trade secret owner prove the information was not “readily ascertainable.”

If you’re still reading, well done! You’ve demonstrated your intellectual curiosity. Please keep going; I promise this will not be a dry, academic rant about something that can’t possibly matter to you. Instead, this is a story about the unintended consequences of casual law-making and the ways that courts can amplify those effects without really understanding what they’re doing.

For 150 years before that day in Sacramento, trade secret law had emerged organically from the opinions of individual judges explaining their decisions. This is what we call the “common law,” and it happened at the state level. As a result, the rules about trade secrets varied quite a bit depending on where you lived. This was inconvenient for companies that operated across state lines. So, in an effort to create a national standard, the UTSA was proposed in 1979.

Trying to Harmonize State Trade Secret Law

The flaw in this plan was that the model statute had to be adopted in each individual state, and each legislature was free to fiddle with the language. Quite a few of them did that, and one of them was California. This is what brought me to Sacramento, to try to convince the Senate that there was real value in keeping the statute exactly as it was proposed, to get the benefit of a truly common interstate framework.

Naturally, a key part of the UTSA was to define what could be claimed as a trade secret. It required the owner to prove that the information was not “generally known” or “readily ascertainable by proper means.” In other words, you couldn’t assert a secret if the information was already out in the public domain, or if it could be figured out so quickly that its value from secrecy was trivial. On the other hand, if it would be very difficult or take a long time to “reverse engineer” the information (that is, take it apart or study it to see how it worked), you could assert a right against anyone who had not actually done that reverse engineering in a fair way.

This approach made a lot of sense, and it distilled the rules as they had been developed at common law over the decades. However, the California State Bar representatives opposed the “readily ascertainable” provision. They had seen a decision from an Indiana court applying the new UTSA in that state, where the judge had decided that an insurance company couldn’t protect a customer list because the information could have been easily collected from the individual policyholders. They feared that this interpretation (which as it turned out was not followed by other courts) might be applied in California.

Negotiating a Compromise on ‘Readily Ascertainable’

I tried to convince the Senators that the Indiana case was an outlier, and that we needed the original language of the UTSA in order to discourage frivolous trade secret claims. However – and this is where I learned an important lesson about legislatures – the Senators were not interested in this “fine point,” and they proposed that we go upstairs and find a room to discuss coming to an agreement. Less than two hours later we returned with a deal. The plaintiff would not have to prove that the information was “readily ascertainable,” but the issue was preserved as an “affirmative defense,” meaning that a defendant could assert it to avoid liability. I wrote out the compromise language on a tablet (the paper kind that we had back then) and it was adopted as the official comments to the statute:

The phrase “and not being readily ascertainable by proper means by” was included in this section as originally proposed by the National Conference of Commissioners on Uniform State Laws. It was removed from the section in favor of the phrase “the public or to.” This change was made because the original language was viewed as ambiguous in the definition of a trade secret. However, the assertion that a matter is readily ascertainable by proper means remains available as a defense to a claim of misappropriation.

By this time we had lived the adage that “laws are like sausages; it is better not to see them being made.” (The quote is often attributed, unreliably, to Otto von Bismarck). But the story gets more tangled after passage of the UTSA, when the courts got hold of it. While the legislature didn’t seem to care much about the language in the statute, the courts – rather, some of them – really put it through the meat grinder.

Derailing the Statute with ‘Dictum’

At first it seemed there would be no problem implementing the law. The only change we had made was to shift the burden of proof, so that it was the defendant who would have to prove that something was readily ascertainable, instead of the plaintiff having to prove the negative. It never seemed remotely possible that a court would graft on to the statute an additional requirement to prove not only that the information was “ascertainable” but also that the defendant had in fact ascertained it before the dispute arose.

We should pause here and establish two things. First, a point of English morphology: the suffix “-able” implies possibility. Indeed, dictionaries define ascertainable as “possible to find out” or “capable of being determined.” In contrast, there is no dictionary anywhere that defines “ascertainable” as “having been determined.” That would be nonsensical.

Second, a point of law: you can defend a trade secret claim by proving that you discovered the information through proper reverse engineering, but not by arguing that you “could have” reverse engineered. That is because reverse engineering is hard work. But if getting to the “secret” takes only a trivial effort, that is what we call “readily ascertainable,” and the law will not bother with it, even if you took it, because you “could have” quickly discovered it.

In the first California appellate case to address this portion of the UTSA, American Paper & Packaging Prods., Inc. v. Kirganthe court denied protection for customer information that, while not generally known to the public, was “readily ascertainable” by others familiar with the business, through a process that “was neither sophisticated, difficult, nor particularly time-consuming.” A few years later another case, ABBA Rubber v. Seaquist, reversed a trade secret injunction for procedural reasons, and that should have been the end of it. But the opinion went on to provide “guidance . . . in the event that any further injunctions” might be considered.

Again, we need to pause for a very brief but important lesson in the law. There is a big difference between what a court says that is necessary to its ruling (the “holding”) and other, more or less gratuitous, observations it might make (the “dictum”). The holding is entitled to respect and sometimes deference; while the dictum is not supposed to matter. This is something you learn in the first few weeks of law school.

Well, the ABBA Rubber court went into dictum in a big way, offering its free advice that “whether a fact is ‘readily ascertainable’ is not part of the definition of a trade secret,” but relates only to an “absence of misappropriation.” Therefore, the court concluded, to take advantage of this exception, the defendant would have to prove not just that the information was ascertainable, but that it had actually been ascertained.

Ignoring State Law in Federal Courts

The court was basically making this up, but because it was just “dictum” it shouldn’t get any respect from other courts; right? Wrong. The federal courts, beginning with the august Ninth Circuit Court of Appeals in Imax Corp. v. Cinema Technologies, embraced the decision uncritically, ignoring both the earlier American Paper case as well as ABBA Rubber’s fractured logic. And once the mistake took root in Imax, it was repeated in several later (unpublished) opinions from the federal district court in Los Angeles: Medtronic Minimed, Inc. v. Nova Biomedical Corp., Extreme Reach, Inc. v. Spotgenie Partners, LLCChartwell Staffing Services v. Atlantic Solutions Group, Inc., and Masimo Corp. v. Apple Inc.

Pausing again for another clarifying point: in the United States we have parallel court systems, state and federal. Federal courts can make judgments about state law, but they are supposed to interpret it by following the rulings of the state’s appellate courts.

Here, the federal courts mostly cited each other, making some really big mistakes along the way. They generally ignored the California Judicial Council form jury instruction which describes the correct application of the “readily ascertainable” defense. They dismissed the American Paper case as having been decided before the UTSA, which was forehead-slapping wrong. And they ignored other California appellate court decisions that were consistent with American Paper, including Morlife, Inc. v. PerrySyngenta Crop Protection, Inc. v. Helliker, and San Jose Construction, Inc. v. S.B.C.C. In fact, the federal judge in Masimo was so intent on waving away San Jose Construction that he incorrectly (and ironically) characterized its holding as dictum, while embracing the ABBA Rubber progeny borne of dictum.

What are the lessons to be drawn here? First, don’t accept as gospel what might appear as “settled law” in judicial opinions. Instead, if the announced rule seems odd, follow it upstream to its source, looking for the place where the process took a wrong turn. Second, as between state and federal courts, look first to the former for interpretation of state law. And third, studies show that the vast majority of direct personal impact on citizens comes from state legislation, not federal. Maybe we should pay less attention to what happens (or doesn’t) in Congress and focus more on what is going on in our state capitols.

It’s getting pretty rough out there for employers who want to control their employees’ behavior. Think back to March 2020, when the pandemic was just beginning and we took a look at this new phenomenon of widespread remote work. We imagined managers wistfully recalling the Renaissance, when artisans could be imprisoned, or even threatened with death, to make sure they didn’t breach confidence. Well, in modern times at least, companies can use noncompete agreements with departing employees to avoid messy and unpredictable litigation over trade secrets.

Maybe not for long. As we learned last month, the FTC is on the warpath about noncompetes, and it may not be long before the entire country is forced to emulate California and just do without. Whatever happens with the FTC proposal, it’s pretty clear that noncompetes are also under attack by the states, where new laws limit their effectiveness.

So, it’s probably wise to at least prepare ourselves for a world in which noncompete agreements, at least for the rank and file, are forbidden. Welcome to sunny California, where we’ve been living under that regime since 1872, thanks to a statute that prohibits contracts “by which anyone is restrained from engaging in a lawful profession, trade, or business of any kind.” When you can’t prevent staff from jumping to the competition, what does a business have to do to maintain control over its trade secrets?

The Downside of Noncompetes

We’ll get to that, but first let’s console ourselves with the recognition that maybe life without noncompetes wouldn’t be so bad. First, noncompete agreements are not a perfect solution for protecting a company’s confidential information. Where they are allowed, courts often limit coverage to what is “reasonable” in duration, geography and subject matter, to the minimum required to protect the company’s interest. And some courts require the employer to continue to pay salary during the noncompete period, while the former employee prepares plans to open a competing business the day that the restriction expires.

Second, noncompete agreements can introduce resentment and contention into the company’s relationship with its workforce. This can have the perverse effect of increasing risk to confidential information, as employees search for workarounds to evade legal restraints. Third, administering a system in which these agreements have varying effect in individual states or foreign countries can be a nightmare for the HR department. And fourth, too-heavy reliance on noncompetes can lead the company to neglect the important task of managing the confidential relationship (more on that below).

In California, we don’t have to worry about those issues, and some would say that the state has done pretty well, creating the world’s fourth largest economy, largely resulting from innovation produced by Silicon Valley. True, there is general recognition that a lot of valuable information is compromised through the free movement of high-level managers and engineers (the euphemism applied to that loss is “spillover effects”). Still, the general assumption is that the resulting information flows provide a rising tide that lifts all boats. Lest we forget, California also leads the nation in trade secret litigation, which should come as no surprise – take away noncompete agreements and a lawsuit may be your only ultimate tool.

The Overbroad NDA as a Noncompete

Well, at least we can rely on the old standby of the employee non-disclosure agreement (NDA), or Confidentiality Agreement. Sorry, but I have a bit of bad news on that front. As we know, the FTC has proposed a “functional test” for banning NDAs that are the equivalent of a noncompete because the effect is to block the employee’s ability to find competitive employment. But the FTC didn’t pluck this idea out of thin air, and even if its proposed rule never becomes law, we’re still going to have to deal with the risk that a “garden variety” confidentiality agreement could be struck down, or even made the basis of a claim that the company is engaged in unfair competition.

How can this be? Employee NDAs are built on the noncontroversial assumption that the law already implies an obligation of confidentiality when an employee is entrusted with sensitive information. The contract simply reinforces that notion, providing notice and helping to demonstrate that the company has exercised “reasonable efforts” to protect its trade secrets, a required showing in any lawsuit to enforce its rights.

The problem stems from how companies define the information that employees are required to maintain in confidence after they leave. Naturally, these definitions are a bit broad and vague, because at the outset of the relationship it’s impossible to know exactly what secrets the employee will be exposed to. But some companies (rather, their lawyers) have decided that it’s a good idea to expand the scope of the NDA in ways that actually do have much of the effect of a noncompete. Two cases illustrate the riskiness of this approach.

In the first one, TLS Management v. Rodriguez, the employee worked for a tax planning and consulting firm, leaving to engage in his own tax practice. The employer sued to enforce his NDA, which covered “all information . . . regarding TLS business methods . . . any other information provided to” the employee, and “any other information” he might learn during employment. The only exception was for information disclosed by TLS to the general public. The court struck down the agreement because it extended to the employee’s “general knowledge” and other information that was publicly available.

More recently, a California appellate court, in Brown v. TGS Management, reversed an arbitrator’s decision enforcing an employee NDA that similarly defined “confidential information” to include anything “used or usable in, or originated, developed or acquired for use in, or about or relating to” the employer’s business. The exceptions provided in the contract were so narrow (for example, information previously known to the employee “as evidenced by Employee’s written records”) that the court saw them as proof that the NDA was designed to block legitimate competition.

Drafting the NDA with Clarity

What should companies do to preserve the utility of confidentiality agreements and avoid their being interpreted as noncompetes? First, look carefully at the definition of covered “Confidential Information” and make sure coverage is directed at information of the company or its customers that deserves the label because it provides some sort of commercial advantage. Second, clarify the definition with exceptions that acknowledge the employee’s control over their own skill and general knowledge. Third, include language that allows a judge, when enforcing the agreement, to adjust its restrictions as necessary to make it reasonable (sometimes called “blue penciling”).

But these mechanics of drafting the NDA are only a part of the effort. While they may be necessary to avoid reclassification as a noncompete, they are not sufficient to establish and maintain control over your trade secrets. Having the new employee sign a restrictive contract is just an initial step in managing the relationship for clarity and understanding about confidentiality.

Managing a Relationship of Trust

Whatever is in your contract, you will be entrusting this individual, perhaps over many years, with access to some of your most competitively sensitive information. The contract alone can’t bear the weight of that continuing responsibility when the employee leaves. The perfect NDA will not help you much if by that time you have not communicated well and frequently what that sensitive information is, and how you expect your employees to behave to protect it.

In between the contract at onboarding and the exit interview at departure is where the trust-building happens. Although “Confidential Information” can’t be defined with specificity in the NDA, the company can, through thoughtful training and guidance, help the employee to understand what sort of secrets are most important to the business. That understanding, consistently reinforced, becomes the foundation for a “culture of confidentiality” in which employees who leave are prepared to do what’s right, rather than argue over the wording of their NDA.

We can find surveys showing employees willing to share their employer’s confidential information – but this usually results from misunderstanding and mixed signals, not malicious intent. So, the ultimate solution to reduce risk to a company’s information assets is in nurturing the relationships it forms with those who have access. If you can’t use noncompete agreements, you also can’t file a trade secret misappropriation lawsuit against every departing employee. Your primary protection comes instead from their clear appreciation of the trust that has been placed in them.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram