Learning to Live with ‘Zero Trust’: It’s Not as Depressing as it Sounds

“Trust, but verify.”

           — President Ronald Reagan

Trust is getting a lot of attention these days. Of course, it’s always been important in the United States. We declare trust in God on our currency, Scouts have to be trustworthy, and we even seem to trust the algorithm behind cryptocurrencies. On the other hand, we worry about what feels like a decline, if not complete rupture, in social trust. For businesses that depend on controlling the confidentiality of data shared with employees and outsiders, these are perilous times. Our most important assets are stored and transmitted through digital systems that are imperfect; and that’s without accounting for the frailties of the people with access to those assets.

Information security has come a long way since I started my career in the 1970s. There were no networks to worry about then, no powerful computers in the pockets of employees. Data was transmitted on paper. You just needed to watch the front door and photocopier. Employees with their badges as markers of trust could go pretty much anywhere they wanted within the facility.

The internet was still a pipe dream when the United States and the Soviet Union began negotiating to reduce their frightening stockpiles of intermediate-range nuclear weapons. One thing we remember from those negotiations is the quote attributed to President Reagan: “Trust, but verify.” A very wise and relevant point; but he didn’t make it up. The phrase is translated from a rhyming Russian proverb – Doveryai, no proveryai – that basically means to validate everything even with a trusted person. It turns out that one of Reagan’s advisors told him that the Russians love to speak in aphorisms, and this was his favorite from a list she had provided him to memorize. And he used it often; by the time the deal was struck, Gorbachev complained that Reagan said it in every one of their meetings.

At that time, and continuing until recently, trust has been at the forefront (along with verification) of enterprise secrecy controls. We could usually take comfort in the fact that we knew who our colleagues were in the building. (Remember when we all worked together in an office?) That’s also where the data was, sitting in secure filing cabinets in locked offices. Then came the corporate digital network, and now, increasingly, our IT systems are in the cloud and our colleagues (often from their homes) are connected with the company’s data through their personal computers, tablets and smartphones. Meanwhile, the bad guys are constantly attacking our systems, looking for security vulnerabilities that will get them inside.

The Implicit Trust Zone

But we do have to get the work done, frequently accessing sensitive data to do it. So, who do we trust? In the classic digital environment, identity is established with a password: get it right and then you’ve got broad access to wander through the system (or some major portion of it). That kind of “implicit trust zone” can work pretty well in a small company where people know each other. It is less likely to suit a business with thousands of employees and many external relationships where sensitive information has to be shared.

In most enterprises, security is managed by distributing more or less permanent status to individual users who are given access based on their then-current job description. If the system is working properly, scope of access is adjusted when a person moves to a different scope of responsibilities. But even when those changes are perfectly accounted for, the individual is still given admission to a very broad array of data, much more than might be necessary for any specific task.

That approach may be reasonable when you have very limited entry points into the system and where job requirements are fairly static. But increasingly, the company’s assets are in the cloud and its networks are accessible through other points, a lot of them remote. In addition, many people work on projects that change over time, so their scope of responsibility is not static.

Enter “Zero Trust,” where nobody gets a hall pass, and every inquiry is by default treated as if it might be a breach. The idea is to bring access controls down to the lowest possible level of detail, so that identity is established in much the same way that we did decades ago: we know who the user is because the system, using AI and machine learning based on the user’s profile and past behavior, recognizes them with a high level of confidence. And, in the same way, it “knows” what resources in the system they should or shouldn’t need. It then provides just enough access to enable the task at hand. In effect, this automates risk-based decisions in ways that can be more efficient.

Losing the Dreaded VPN

You might be excused for thinking at this point: oh no, I’ve just gotten over the annoyance of dealing with two-factor authentication; the last thing I want to deal with is heavier security! Won’t this interfere with information flows and frustrate legitimate actors from getting the data they need to do their jobs? We understand, of course. But the proponents of ZTNA (zero-trust network architecture) assure us that it’s actually going to be easier to deal with. Technology deployed to reliably identify you will in fact be so seamless that you will be able to get rid of the dreaded VPN connection!

What? How is that possible, you might say. Well, look at it this way: the VPN is a door with a lock consisting of certain credentials, and hackers go for those credentials just like they do other data – and that’s because the credentials reflect “implicit trust.” When the door no longer is opened by a key but instead by an intelligent, well-informed analysis of who is there and why they want to get in, the hacker’s job just got enormously more difficult. People sitting at their desk can sometimes be fooled by spearphishing emails based on data about them scraped from social media; but you’ll almost never be able to fool the AI machine.

Indeed, technology is what’s enabling this much more sophisticated approach to IT security. It’s increasingly possible to adjust access controls dynamically to account for changes in the risk environment. The security professionals call this “adaptive access.”

Feeling better now? “Zero Trust” is not some dystopian nightmare in which we have lost all our humanity. In fact, it may make our jobs easier by automating detection and response processes that now involve humans with all their capacity for error and misjudgment. Or at least that’s what everyone seems to assume.

In any event, ZTNA is coming to a large company near you. We can be fairly sure of this because the National Institute of Standards and Technology, part of the Commerce Department and the source of the most widely adopted standard for cybersecurity management, has recently issued the NIST 800-207 Zero Trust guidelines.

Implementing Zero Trust

For many smaller companies, this is likely to be a long-term issue, as the risk environment may not indicate this sort of access control, especially within groups that value a great deal of fluid information flow and collaboration. But for larger, more complex organizations with multiple business units and product lines, the zero-trust approach may be the right direction.

As with most information security strategies, this one begins with identifying the company’s “resources”—that is, your data and where it’s located. Then you examine all of the “identities” that may need access. That part of the process is likely to be more difficult with mature organizations, because of the proliferation of user accounts. After that, you determine the circumstances under which the “identities” need to access each resource, and at that instance of interaction define levels of confidence (i.e., establish algorithms) that will permit different levels of access.

For most companies, this doesn’t mean replacing your existing framework, because most of the principles are implemented in existing systems, especially identity verification. Zero trust just takes it to a new level with a judgment about confidence in the identification, by looking at the circumstances of the access request and the device it’s coming from.

The new phrase is “never trust anyone, and verify constantly.” But remember, these are automated systems to protect sensitive data; they are not comprehensive controls on human interaction within the enterprise. Indeed, inside the corporate community, we need to foster the kind of collegiality and honest communication that support empathy, collaboration, creativity and . . . . trust.

Secretary of State George Shultz, who accompanied Reagan during his negotiations with Gorbachev, published some good advice just before his passing at age 100: “When we are at our best, we trust in each other . . . . With that bond, [we] can do big, hard things together, changing the world for the better.”

“Secrecy is the badge of fraud.”

           — Sir John Chadwick

What a strange and compelling story. Brilliant young inventor conceives revolutionary machine, raises staggering amounts from investors, is fawned over by the press for a decade, then crashes to earth on revelations of faked demonstrations and technology that doesn’t work. When I learned of the recent jury verdict, I naturally turned over in my mind how all this could have happened to such a well-meaning person as . . . . . . . . . . John Ernst Worrel Keely.

Okay, you were expecting someone else. But since you may not have heard of Mr. Keely, let me fill you in, and explain the role that secrecy played in one of the country’s most elaborate and long-running scams. I assure you that the Theranos investors wish they had boned up on Mr. Keely’s operation.

Keely came to prominence in the 1870s, a time of breathtaking technological advancement. This was the decade of the phonograph, the telephone and the electric light bulb. Opportunity was in the air, ready to be seized upon by anyone with the foresight to identify, and invest in, the next big thing. 

Some corners of theoretical science, however, had not caught up with this state of the practical art. Although we knew a lot about how electricity worked, physicists of the time still clung to the idea that all space was filled with an unidentified substance called the “ether” which was necessary for the transmission of light and electromagnetic waves. This stubborn mystery attracted Keely’s attention, and in his Philadelphia laboratory he conceived a machine that would be run by a previously unknown, but incredibly powerful, force derived from the ether and activated by the vibration of tuning forks operating on water. 

Notice we use the word “conceive” here, just as patent lawyers would, to distinguish between having the idea and “reducing to practice” the invention. The first part can arrive quickly, in a “flash of genius” while the second part, building a device that works, can take years, or never happen at all. But part of Keely’s genius – he didn’t have a formal education – was his ability to spin the vision and to capture the imagination of his investors. And of course, to capture their money.

Introducing the “Etheric Generator”

In 1872, he invited a group of scientists, along with the press, to witness a demonstration of a rudimentary “etheric generator” that used vibrations to separate atoms of water, releasing enormous power. This effort resulted in enough eager investors to allow the Keely Motor Company to build and show off a more powerful version two years later. While he spoke of “quadrupole negative harmonics” and “etheric disintegration,” Keely blew into a tube and then poured in some tap water. As the machine started to grind and wheeze, the pressure gauge registered over 10,000 p.s.i. The press reported the reaction of one witness that, “great ropes were torn apart, iron bars broken in two or twisted out of shape, by a force which could not be determined.”

But the “force which could not be determined” was just too attractive to ignore. Technology was changing the world overnight, and if what Keely had could be scaled up, then the possibilities – and the profits – were practically limitless. The company was capitalized with over $5 million (the equivalent of more than $100 million today), from prominent investors like John Jacob Astor IV. A leading Philadelphia socialite provided Keely with a monthly salary to maintain his laboratory and his focus on perfecting his invention. 

The stockholders showed extraordinary patience. Year after year, at their annual meeting, Keely would send a report about some new development or discovery that reinforced the fundamentals but required extensive refinement. As promised delivery dates passed, Keely would provide new demonstrations, with increasingly impressive outputs from the machine. He enthused that his “etheric generator” would make other sources of power obsolete, and that a train could travel to San Francisco and back using the power generated from the “disintegration” of a single quart of water.

Throughout the more than twenty years of the company’s existence, Keely resolutely refused to share any details of how his technology worked, claiming that to reveal the secret would destroy its advantage over the competition. Although some nervous shareholders asked for an independent inspection, most were content with Keely’s explanations and accepted waiting.

Keely died in 1898, apparently without having revealed his secret to anyone. However, an investigation by The Philadelphia Press concluded that Keely’s motor had been “a delusion and deception,” and that the “mysterious force” which Keely claimed to have discovered derived from a three-ton tank of compressed air buried in the basement of his laboratory, connected to the workshop with pipes and wires hidden in the walls and in false floors. 

Hindsight Skews the Analysis

With the benefit of hindsight, it’s easy to see Keely’s investors as credulous rubes who let greed and hubris overcome their better judgment. But that’s the power of hindsight, isn’t it? Let’s say you were hanging around Palo Alto in 1998 and a couple of Stanford students named Larry and Sergey came to you saying they wanted to build an algorithm that would search information for free but bring in $100 billion a year in advertising revenue, would you have given them money to start what would become Google? Sure, you say, but that’s another application of the power of hindsight. The fact is that in real transactions like this we are stuck with trying to calculate risk without knowing all the facts.

So, if you’re an inventor with no track record to establish your credibility, or if you’re an investor who wants to ensure that the technology is “real,” how do you protect yourself? It’s understandable that the investor wants to look under the hood and poke around; and it’s just as understandable that the inventor wants to keep the secret under wraps, because if it gets out the value is destroyed. Both of these people have a legitimate interest in protecting themselves.

But that doesn’t mean that the inventor can lie. In her trial, Theranos founder Elizabeth Holmes admitted that she hid the fact that the company was not using its highly touted “finger prick” device to test patients’ blood and instead was using traditional test equipment from established companies. She tried to defend her behavior as protecting the company’s trade secrets about how it had modified that equipment. But the existence of trade secrets doesn’t allow the inventor to defraud. And it doesn’t – or shouldn’t – mean that investors have no obligation to check out the veracity of the inventor’s claims.

The Dilemma of Asymmetric Knowledge

The answer to this dilemma of asymmetric knowledge lies in finding creative ways to build trust and confidence, so that the risk on each side becomes clearer and more easily managed. In a process that I refer to as “progressive incremental disclosure,” the participants begin with no confidentiality agreement, but are open to establishing one. The inventor determines a series of “reveals” that can be expected to increase confidence in the investor, without giving away enough information to constitute a real risk to the integrity of the secret. Along the way, the inventor may demonstrate the technology in a way that shows its potential but again does not reveal the mechanism. In another step, the inventor may call on a respected third party to perform tests that can shed light on the plausibility of the innovative machine or process, without requiring access to everything about its operation.

At some point in this negotiation, trust and a willingness to accept risk may merge, leading the investor to agree to sign a nondisclosure agreement. That act may be significant, as it could interfere with the investor’s ability to deal with a competitor. But it also may not be enough. There are some innovations that are so easy to replicate that even with a nondisclosure agreement in place, not all the details will be made available. If it comes to that, at least the investor can make a decision based on having secured a lot more information than was available at the outset. And the parties will have tested their ability to rely on the trust imposed in one another.

In the end, it comes down to risk analysis, and a process of reducing risk through diligent investigation. For example, the investors in Keely Motor Company, had they looked a bit harder into Keely’s background, would have discovered that, before he became an inventor, he worked as a carnival barker.

Last year at this time, we thought we had been through the worst of it and, with the new vaccines arriving, that life would return to normal in 2021. Hahaha, how naïve we were! But take heart; some things hold steady through the storm, such as the popular sport of trade secret litigation. Unlike most patent and copyright cases, every dispute is guaranteed to unfold as a morality play—a story of good guys and bad guys.

Let’s now look back on the year when remote work dug in to become a permanent fixture, and remind ourselves of the broad sweep of trade secret law by looking at some of the more instructive and interesting opinions issued by the courts – and one inexplicable decision by our government.

Secrecy

This is where it all starts. The information has to be a secret, meaning you can’t find it on the internet. The legal expression of this simple idea requires that the information not be generally known or “readily ascertainable” – that is, easy to discover – through “proper means.” In Life Spine, Inc. v. Aegis Spine, Inc., 8 F.4th 531 (7th Cir. 2021), the trade secret consisted of the exact dimensions of a patented spinal implant device for treating degenerative disc disease. Life Spine hired Aegis as a distributor under a contract that prohibited reverse engineering and required Aegis to remain with the device through surgery. Aegis designed a copy and defended itself by arguing that the information was known through the patent and by marketing. But the diagrams in the patent did not disclose precise measurements of the component parts, and prospective customers were only allowed to inspect the device under close supervision. The court held that the measurements remained a secret.

Perhaps ironically, secrets can be lost through the process of trying to protect them in litigation, because of the requirement that court proceedings be open to the public. The law makes provision for this kind of risk, but the parties have to pay close attention to implementation. In Bader Farms v. Monsanto Co., 2021 U.S. Dist. LEXIS 16308 (ED Mo), a pretrial order called for document-by-document review of confidentiality of trial exhibits, but the plaintiff waited until after the evidence had been received to raise the issue, and sealing was denied. In a more nuanced decision in HouseCanary, Inc. v. Title Source, 622 S.W.3d 254 (Tex), the Texas Supreme Court announced two interesting holdings: first, that the Uniform Trade Secrets Act provision requiring courts to protect alleged trade secrets does not displace state procedural rules; and second, that introducing exhibits at trial without sealing is only a factor in determining whether secrecy of the information has been lost.

Reasonable Efforts

Closely related to the concept of secrecy is the requirement that the trade secret owner exercise “reasonable efforts under the circumstances” to protect the information. In effect, courts will not step in to help if the owner has failed to help itself with security measures that match the business risk. In DePuy Synthes Prods. V. Veterinary Orthopedic Implants, Inc., 990 F.3d 1364 (Fed. Cir. 2021) the issue was whether to seal a court filing that contained confidential information about the identity of a manufacturer. There was no NDA or other contract establishing confidentiality. Instead, the litigant relied on proof that it had kept that information confidential through its own internal security policies and protocols; but this was held to be insufficient. Similarly, the plaintiff in ASC Engineered Sols., LLC v. Island Industries, Inc., 2021 U.S. Dist. LEXIS 117177 (WD Tenn) tried to have the court enter summary judgment that its efforts were reasonable, citing its policies and practice to inform employees about confidentiality, and its marking of emails and documents with secrecy legends. Such evidence, the court held, could be considered but was not decisive, because what is reasonable is a question of fact, and the company’s employees had denied seeing the security policies.

Ownership

The law generally recognizes anyone in lawful possession of secret information as an “owner” and entitled to sue for misappropriation, even if they hold it under a nonexclusive license. However, as explained in Zabit v. Brandometry, LLC, 2021 U.S. Dist. LEXIS 94234 (SDNY), the claimed right to possession of the information as a remedy for fraud or another tort does not give rise to “equitable title” in the trade secret sufficient for standing. And in Bio-Rad Labs., Inc. v. ITC, 996 F.3d 1317 (Fed.Cir. 2021), it was held that an employee’s undisclosed “idea” that contributed to a later invention by his colleagues at a subsequent job did not make the employee a co-inventor and the ex-employer a co-owner of the invention. On a related issue, the U.S. Supreme Court held, in Minerva Surgical, Inc. v. Hologic, Inc., 141 S.Ct. 2298 (2021), that the patent doctrine of assignor estoppel cannot be applied to the typical assignment by employees of future inventions, because their scope is inherently unpredictable. This ruling provides comfort to companies hiring from competitors, because the doctrine had been used as leverage in some departing employee cases involving trade secret and patent claims, to prevent the new employer from contesting validity of the patent.

Identification of Secrets

One of the unique aspects of trade secret law, in comparison to other forms of intellectual property, is that the boundaries of the right are not specified in a government-issued grant. As a result, a preliminary – and usually consequential – question in every trade secret case is: what exactly is the trade secret information that’s being claimed? Usually, companies have not made an inventory of their information assets, and even if they have, the specific data involved in any given dispute is unlikely to have been described with precision before litigation begins. As a result, identification of the subject matter – and when and how to do it – has become a frequent early battleground in trade secret litigation.

This past year, two opinions from the Third Circuit have provided guidance on this critical aspect of case management. In Oakwood Labs. LLC v. Thanoo, 999 F.3d 892 (3d Cir. 2021), the defendant challenged the plaintiff’s description of its trade secrets because it did not clearly state which secrets it claimed that the defendant had misappropriated. This argument was rejected as an “effort to blend together the identification-of-a-trade-secret element and the misappropriation element, when “only discovery will reveal exactly what the defendants are up to.” Mallet & Co. v. Lacayo, 2021 U.S. App. LEXIS 30894 (3d Cir.) involved technology for commercial baking release agents (that is, things like oil that keep bread from sticking to the pan). The District Court, apparently impressed by strong evidence of misappropriation by a departing employee, had issued a preliminary injunction prohibiting use of thirteen broad categories of the plaintiff’s “protected materials,” including internal discussions of “actual major problems,” “supply source for product ingredients,” “pricing and volume data,” and “information about [plaintiff’s] equipment.” The Court of Appeals reversed, finding that this lack of specificity prevented any meaningful review of whether the plaintiff was likely to prevail on the merits.

NDA Risks

Many trade secret disputes are caused by what we might call “NDA negligence,” either because the parties treat confidentiality agreements as mere forms instead of contracts, or because they don’t pay attention to some specific obligation or limitation of the NDA until it’s too late to fix. Two cases from this year illustrate the point. In EMC Outdoor, LLC v. Stuart, 2021 U.S. Dist. LEXIS 63438 (ED Pa), the defendant ex-employee had individually negotiated a provision in her nondisclosure agreement making the confidentiality provisions applicable post-employment only if she resigned. Because she was fired from the position, the court held, the contract language made it impossible to state a claim for misappropriation. Summary judgment was entered for the defendant. And in Bladeroom Group., Ltd. v. Emerson Elec. Co., 11 F.4th 1010 (9th Cir. 2021), parties to a potential merger had signed an NDA with a proviso that the agreement would terminate in two years, even though other aspects of the contract could be read to suggest continuing confidentiality. The District Court had prevented defendant from arguing that the two-year limit controlled because it was contrary to the parties’ intent and would lead to an absurd result. The Court of Appeals responded that it would be absurd to ignore the plain language of the proviso, and reversed a $60 million verdict.

Misappropriation

Because those who misappropriate trade secrets would like to keep their actions, well, secret, it’s often difficult to find direct evidence of theft, and plaintiffs must prove their case with circumstantial evidence. Also, misappropriation by direct copying is rare, and so liability is usually established by demonstrating “indirect use” of the purloined information. In Oakwood Labs. LLC v. Thanoo, 999 F.3d 892 (3d Cir. 2021), the court held that indirect use can be inferred from the timing of a competitive hire, coupled with deception in the employee’s departure, the new employer’s lack of experience in the relevant technology, unusually low financial investment, and unusually rapid success. In contrast, merely retaining a former employer’s confidential documents, without any proof of use, will normally be insufficient to state a claim for misappropriation. In Zurich Am. Life Ins. Co. v. Nagel, 2021 U.S. Dist. LEXIS 89781 (SDNY), the court held this remained true even when the employee deliberately kept the documents as leverage for settlement of other claims against the employer.

Remedies

Assuming misappropriation has occurred or is threatened, the question becomes what to do about it. If the plaintiff succeeds in securing a preliminary injunction, does that stop accrual of damages? No, said the court in ResMan, LLC v. Karya Prop. Mgmt., LLC, 2021 U.S. Dist. LEXIS 145462 (ED Tex); an injunction prohibiting use or disclosure of trade secrets does not break the chain of causation regarding defendant’s continuing benefit from the misappropriation. Oakwood Labs. LLC v. Thanoo, 999 F.3d 892 (3d Cir. 2021) considered the common situation in which the defendant has not yet launched a competing product, holding that harm is established merely by the act of misappropriation, because the plaintiff “has lost the exclusive use of trade secret information, which is a real and redressable harm.” And if it turns out that harm can’t be proved in any compensable way, explained the court in Elations Systems, Inc. v. Fenn Bridge LLC, 2021 Cal. App. LEXIS 975, the trial court should not dismiss the claim, but should instead award nominal damages.

Computer Fraud and Abuse Act

Sometimes in committing trade secret theft, a defendant gains unauthorized access to information stored on a computer system. If so, then a (criminal and/or civil) violation of the CFAA, 18 U.S.C. §1030, can be alleged along with the misappropriation. But what if the defendant was authorized to have access, but used it for an improper purpose? The circuit courts were split on that question until the decision in Van Buren v. United States, 141 S.Ct. 1648 (2021). A police sergeant had agreed to use his patrol-car computer to retrieve license plate information for a private party. Reversing his conviction, the Supreme Court explained that if the CFAA “criminalizes every violation of a computer-use policy, then millions of otherwise law-abiding citizens are criminals.”

A Diplomatic Flub with a Bright Side

Back in the mid-1990s, the U.S. government fought hard to get the World Trade Organization (WTO) to adopt global standards for IP protection, resulting in the Agreement on Trade-Related Aspects of Intellectual Property (TRIPS). It wasn’t just about registered IP rights; TRIPS Article 39 also required member states to provide legal protection for “undisclosed information.” Its structure and content closely followed the Uniform Trade Secrets Act, and ever since has been the basic reference pattern for the trade secret laws of many foreign countries.

In response to the COVID pandemic, a group of developing countries – led by India, with its large generic pharmaceutical industry – proposed that WTO “suspend” selected parts of TRIPS, including Article 39, ostensibly to enable more effective global access to vaccines. In May 2021, the Biden Administration surprised the international community when it joined in supporting the Indian proposal, apparently unaware of the central importance of secret know-how to the manufacture of vaccines by U.S. companies. In effect, the intended waiver would force a transfer of privately-owned technology that under normal (i.e., voluntary) circumstances requires many months of collaborative effort, with no plausible near-term effect on the distribution of vaccines to the developing world. The government is now engaged in finding a face-saving way out of the corner it has painted itself into. However, the diplomatic debacle has at least drawn worldwide attention to the role that secrecy plays in incentivizing the development of new therapies; and as we face the prospect of future pandemics, this new appreciation for the benefits of trade secret law should benefit all of us.

“It is non-poisonous.”

           — 1931 advertisement for Listerine®

Question: how do you make money from a secret formula for a product that smells and tastes horrible and that no one wants? Answer: you make everyone believe they have a medical problem that only this stuff can solve.

Back in 1879, Joseph Lawrence, a St. Louis doctor, was experimenting with surgical disinfectants. This was a new thing. In the 1860s, a British surgeon named Joseph Lister was the first to perform surgery antiseptically, using carbolic acid as a disinfectant. Inspired by Lister, Lawrence came up with a compound of alcohol and essential oils that seemed to kill whatever bugs it touched. To honor Lister (and presumably to take advantage of his fame), Lawrence named the concoction “Listerine.”

He tried to sell it to dentists but wasn’t getting traction. In 1881, he ran into a local pharmacist, Jordan Lambert, who acquired the secret formula in return for royalties on future sales. Apparently not fully thinking through what “future” meant, Lambert signed a contract that guaranteed payment to Lawrence (and his heirs and successors) $20 for each 144 bottles sold. The contract consisted of two sentences with a total of 127 words.

Later, they agreed to reduce the royalty to $6, and then converted it to ounces, to account for different sized containers. But Lawrence wasn’t earning much on the royalties anyway, because Listerine sales remained sluggish. Even when Lambert took the product directly to the public in 1914, it just didn’t catch on. Maybe it was the foul smell (“like an old shoe”) or the taste (“like petrol”). The company tried promoting various applications besides mouthwash, including as a treatment for dandruff and gonorrhea (don’t ask). They even brought out (very briefly) a Listerine cigarette.

Marketing With Fear

It was Lambert’s son, Gerald, following him as president in 1923, who came up with the idea that would make Listerine the world’s most popular mouthwash – and also make Lawrence’s family rich. If only people could realize that they had a medical condition, they would be willing to use something that tasted awful to fix it. So, Gerald coined the term “halitosis” – from the Latin word for breath and the Greek suffix “osis” which implies some form of disease.

The company spent millions on an aggressive marketing campaign – the equivalent of constant Super Bowl ads – to convince people that “halitosis” was a very serious social problem with a simple, medical solution: Listerine. The ads were early examples of fear-based marketing, usually featuring attractive people who were failing in their personal and professional relationships because of bad breath. Leveraging social anxiety, the ads promised that “your closest friends won’t tell you” and that “they talk about you behind your back.” And worst of all, “you yourself rarely know when you have halitosis.” (You can check out some of the ads here and here.) And if you have something that sounds as serious as halitosis, you need strong medicine, with a real “medicine” taste. A later tag line became “It’s the taste people hate – twice a day.” Advertising professionals now refer to Lambert’s campaign approvingly as a metaphor: using fear to sell a product is called a “halitosis appeal.”

Whatever you think of the social value of fear-based advertising, or about the direct line from there to today’s fear-based social media journalism, it certainly works. For Lambert, the results were astonishing: in the space of five years annual sales of Listerine increased from $115,000 to $8 million (today, U.S. sales exceed $650 million). But all the success attracted other attention to the product, and someone was able to reverse engineer it. The previously-secret formula was published in 1931, leaving the trademark, supported by all that advertising, as the foundation for continued success.

If the Secret Is Lost, Should Royalties Continue?

By 1955, when Lambert merged with another company to become Warner-Lambert, Lawrence’s heirs had pulled in a total of $22 million (think of all those actual silver dollars) and continued to be paid $1.5 million a year, even though the property right that Lambert had originally bargained for – a trade secret formula – had effectively disappeared. Figuring that 70 years was more than enough, Warner-Lambert filed a case in New York federal court, asking for a declaration that it could stop paying royalties for something that no longer had any value. It argued that the contract was “indefinite in time” and so should be subject to the rule requiring that a reasonable time limit be inferred. That time, it said, had passed, especially given how much the company had spent on advertising to build the brand.

In its ruling, the court rejected this argument, noting that the promise to pay royalties actually depended on a condition that Warner-Lambert controlled: the continuing sale of Listerine. Just stop selling it, the court explained, and you can stop paying the royalties. The parties to the original contract had to know that there was a risk of disclosure of the secret, and they could have provided for some consequence. Inserting one later would be to rewrite the deal.

As for Warner-Lambert’s huge investment in building the value of its trademark, the judge pointed out that those advertisements promoted the “unique, indeed, almost magical qualities of the formula;” and in any event the company was still benefiting from the “head start” that it had gained in the market, “which has proved of incalculable value through the years.”

Since then, Listerine has continued to sell the terrible-tasting “original” formula, with great success. Perhaps that’s because people still fear “halitosis” and assume that it has to hurt if you’re going to get better. Or perhaps it’s that after 140 years we’ve managed to acquire a taste for it. Just like Australians love Vegemite and Norwegians adore rakfisk. (Don’t know about Norway’s smelly fish? Check it out here). Anyway, everyone seems to be happy, not least the heirs of Dr. Lawrence and those who have bought from them small fractional interests in the continuing royalty stream. Last year, an investor paid $561,000 for just one of those.

The Lessons of Listerine

So, what is this supposed to teach us?  I thought you’d be too distracted by the story to ask. There are actually several good takeaways here.

First, when you’re dealing with trade secrets, the contract matters a lot. Unlike patents, by which the government gives you a limited-time monopoly, trade secrets are by their nature non-exclusionary. So, for the most part (there are some exceptions, which we’ll discuss another time) people and companies are free to draft their contracts as they wish. And that means that those involved have to be sure they read them carefully and understand their implications.

Second, contracts don’t have to be pages long for them to work as intended. This was one of the shortest I’ve seen, and it’s still going strong after almost a century and a half. Lawyers sometimes worry more about the risk of leaving things out than they do about whether everyone understands how the document allocates risk. As the Warner-Lambert case shows, appreciating the risk can be very consequential.

Third, the value of a secret is not entirely about its continued secrecy. Especially in fast-moving sectors, trade secrets can provide what the judge referred to as a “head start,” or what today we call a “first mover advantage.” Where getting access to the secret allows the recipient to capture market share, it may not matter what its lifespan may turn out to be.

Fourth – and this one is important – intellectual property strategy isn’t necessarily about choosing one kind of IP over another, but using them in complementary ways. We’ve already looked at that issue in relation to patents and trade secrets. The Listerine case highlights this same principle regarding trademarks and branding. And it isn’t unique. The 1980s blockbuster sweetener Nutra-Sweet was originally protected by a combination of patents and secret process technology that allowed the company to produce the generic material, aspartame, more cheaply than any competitor. And then to reinforce its dominance, it pressured the makers of Coke and Pepsi to place its trademark on their soda cans – a triumph of brand leverage.

Back in 1881, Lawrence and Lambert probably had no idea about the scope (sorry about that) of commercial possibilities for Listerine. But they managed to strike a deal that benefited both of them and, ultimately, the public. Remember, Listerine is not only “non-poisonous,” but according to other ad copy from 1948, “even the strong odor of fish yields to it.” Somebody please ship a case to Norway.

“Risk management is about people and processes and not about models and technology.”

           — Trevor Levine

Have you ever shopped for something dangerous? Back in the 1950s, my mother wanted to buy a pressure cooker to make dinner faster (and use cheaper cuts of meat). That wasn’t an easy decision, because the early models had a reputation for occasionally exploding (there was no Consumer Product Safety Commission then). My father, a self-taught steam engineer, was skeptical that a kitchen appliance could safely contain double the normal atmospheric pressure. But Mom did her homework, researching what the problems were (usually a single pressure valve prone to clogging) and finding cookers with redundant pressure relief systems. It worked for years, and no one went to the hospital.

Companies shopping to buy other companies, or to acquire a license to their technology, also entertain risk. That’s because in the process of interviewing potential targets they can become exposed to highly valuable trade secrets. If any particular transaction doesn’t go forward, but the shopper implements similar technology, the disappointed seller may file a lawsuit claiming misappropriation.

Potential acquirors have ways to protect themselves, including sometimes insisting on contracts that deny a confidential relationship, or that allow them to “retain in unaided memory” any information they learn from the transaction. But most of the time these transactions are based on a traditional nondisclosure agreement, in which the prospective purchaser or licensee agrees to use the target’s confidential information only for the purpose of assessing the potential deal. This can put the recipient company in a very awkward position, unsure of its ability to effectively compete if the deal goes off the rails.

Antitrust and Gun Jumping

One way that acquisitive companies have tried to reduce this risk is through the use of “clean teams.” The term was adopted from a closely related situation of potential mergers between established competitors, where antitrust regulations prohibit pre-acquisition coordination (something called “gun jumping,” which to me sounds even more dangerous than pressure cookers). This led to the hiring of consulting firms to receive confidential business information from both sides and assess it independently, reporting to each side only “cleansed,” generic observations about the wisdom of the deal.

Clean Teams operated in “Clean Rooms,” a term itself borrowed from the semiconductor industry, where you have to put on a bunny suit to enter the highly purified environment of a manufacturing facility. The common idea here is to prevent any sort of unwanted exposure or contamination. For the traditional “clean team,” their formal independence and professionalism seemed to satisfy the regulators, while allowing informed advice to the participants.

This idea also can work when trying to maintain control of trade secrets. A prospective purchaser can arrange for an independent, trusted third party to have access to the target’s technology and business plans, reporting out only their conclusions about potential value of the deal. In theory at least this can substantially reduce the risk of disputes if the transaction is abandoned.

But not all “clean teams” are made up of external actors. Frequently companies decide to populate them with some of their own staff, either because inserting a consulting firm in the process would be too unwieldy or expensive, or because they want advice that is informed with a full understanding of the potential fit of the target or its technology. The decision to form the group in whole or in part from in-house resources is often influenced by those who want to be a part of the process.

The Tension of Make vs. Buy

Many of these potential acquisitions or “licensing in” of technology are driven by an unresolved question: should we develop this ourselves or get it from outside? Those within the organization who are inclined to acquire might be part of the sales function, which puts a premium on getting the functionality out to the market quickly. In opposition might be those in R&D or engineering who believe they can do this as well or better themselves. In an effort to respond to these “make vs. buy” tensions, or just to get more granular feedback on the value of the transaction, management will sometimes include insiders in the group who are exposed to the target’s confidential information.

This due diligence team formed with insiders can, in the abstract, be a “clean team,” in the sense that they can be effectively walled off from others doing internal development. In practice, however, they may find it difficult to respect the barriers established to prevent data contamination. Curious colleagues ask probing questions about the target. The risk becomes more apparent and acute when one considers that misappropriation of trade secrets does not require copying or other direct use, but can result from any knowledge that substantially influences the development of a product or process.

And it gets worse, because when the company launches its competitive product, and the jilted target brings a claim, the defense requires proving a negative: despite appearances, our internal work was not at all affected by the exposure of one or two engineers to the other company’s secrets. As many courts have pointed out, misappropriation is almost always proved by circumstantial evidence, and participation in due diligence, followed soon after by marketing of a similar product, can be a bad look.

The operational consequences can be serious. In one case, a potential acquiror gave its outside patent counsel a copy of the target’s confidential patent application, which the lawyer used to inform his own filing, resulting in a $116 million jury verdict. In another case, the diligence team was secretly working on the possible acquisition of a competitor of the target, so the court prohibited that transaction from going forward. In a third case, the potential buyer claimed independent development of its product by a third company, but it turned out that the developer had been visited by a member of the diligence team.

Keeping the Transaction Clean

Preventing these kinds of disasters is not terribly complicated. First, it pays not to think of any internal team as reliably “clean,” even if they have the best of intentions. Second, the confidentiality agreement with the target can be negotiated in ways that reduce risk, such as including recitals that the acquiror is actively engaged in competitive development, limiting the scope of protectable information, or terminating restrictions after a period of time. Third, if a true “clean team” is not sufficient and some level of contamination has to be accepted, the company can effectively insulate itself by outsourcing an independent reverse engineering project based on a high level, functional specification. See my earlier post “The Art of Reverse Engineering,” here.

Thoughtful, multilayered efforts are most effective at reducing risks of otherwise dangerous activity. Take my Mom, for example. Even though she found a cooker with a separate release mechanism, she always took the time to thoroughly clean the primary pressure valve. Creating robust structures is important, but process implementation is critical.

“It is impossible to unsign a contract, so do all your thinking before you sign.”

           — Warren Buffett

You may remember 2014 as the year when we all discovered a plague of noncompete agreements threatening our economy. No? Let me help you.

In June that year, the New York Times published an expose of sorts relating the story of a 19-year-old summer camp counselor who couldn’t get hired by a certain camp because the year before she signed a contract with another camp that blocked her from working for any nearby competitor. Noncompete contracts, the article suggested, had previously been reserved for high level corporate executives, and suddenly (and “increasingly”) they were being foisted on rank and file employees engaged in event planning, investment management, and even yoga instruction. A follow-on piece in the Times confirmed the emerging crisis by revealing that the Jimmy John’s fast food chain had forced noncompete clauses on all its sandwich makers (acknowledging, however, that there was no evidence that the company had ever tried to enforce the contracts).

The inspiration for this concern may have come from a then-recent book published by Orly Lobel, a California law professor, called Talent Wants to be Free. She argued not only the unsurprising point suggested by the title, but also that it was actually in the interest of businesses to release departing employees from all restrictions, because in some organic way that would redound to the companies’ benefit. Unfortunately, as I reported in a review at the time, this hypothesis was unsupported by any serious evidence.

A Surging Concern About Unfair Contracts

Nevertheless, the anecdotes about preventing low-level employees from competing caught the attention of other journalists and academics, as well as politicians. Some of those stories were compelling, especially when the employee had no idea that a noncompete would be required until they showed up the first day on the job. A movement to reform the law began to grow. Massachusetts, which for years had resisted tamping down on noncompete agreements, radically amended its law to prohibit them for lower salaried employees, and to require notice to the employee at least 14 days in advance of starting work. Other states have joined in. According to the leading blog on employee contracts, just through the first six months of this year there were 66 bills filed in 25 states.

The federal government has also entered the ring. On July 9, President Biden issued an executive order designed to increase competition in the national economy. Among many other directives to government agencies, he commanded the Federal Trade Commission to examine what action it might take to rein in the negative effects of employee noncompete agreements (a responsive letter crafted by Russell Beck and signed by dozens of practitioners, including myself, has urged caution on the issue).

Why doesn’t everyone see this as a form of social crisis? After all, it looks like a new example of corporate overreach in an economy that has already discounted almost to irrelevance the dignity of work. But in fact, businesses have been using noncompete agreements for more than a century, subject to strict limitations imposed by state law. California, North Dakota and Oklahoma have long refused to enforce them at all. And in the rest of the country, they are enforced only when a judge agrees that they are reasonable in time, subject matter and geography.

Balancing Legitimate Interests

There’s no doubt that restricting an employee’s ability to leave and compete can impose serious costs on the individual. And although studies show that it’s impossible to measure any loss of innovative capacity or output, it’s probably safe to assume that some situations prevent competition that might benefit the community. But that doesn’t necessarily mean that the competition would be fair.

In the digital economy, more and more employees have to be trusted with sensitive information in order for the enterprise to succeed in an increasingly competitive environment. To maintain that success a company has to be able to protect its information assets from flowing out the door to the competition. In the U.S. we enjoy robust laws, at both the state and federal level, that are designed to reduce that risk by providing remedies for trade secret misappropriation.

But companies often don’t – and can’t – know when a former employee is using what they know to benefit their new employer. Surveys show that a large percentage of employees, perhaps a majority, are so unsure of their secrecy obligations that they are willing to use sensitive information at the next job. And even if the left-behind company suspects foul play, trade secret litigation can be messy, unpredictable and expensive. It’s certainly not the most efficient way to resolve misunderstandings. So, from the company’s point of view, simply preventing the risk for a limited time with a noncompete clause can seem very attractive. This is especially true for smaller companies whose trade secrets consist of information about customers, in other words the sort of goodwill built up over time that sustains the business.

For the employee, of course the constraints of a noncompete will feel like a blunt weapon, prohibiting not only trade secret theft but also preventing fair competition. And it’s entirely legitimate for a community – say, a state like California – to decide that the obvious individual costs and the possible detriment to the collective economy are not worth preserving the private interests of individual employers. Indeed, some have pointed to the astonishing success of Silicon Valley as proof that the broad social benefits of “knowledge spillovers” from free movement of labor vastly outweigh the private losses from those spillovers.

Unfortunately, the empirical evidence so far doesn’t permit a firm conclusion on that larger point. But it’s clear enough that noncompete agreements have been abused to some extent. States – and perhaps the federal government – will likely continue to press for reforms, especially for categories of employees who are not practically in a position to cause a company damage when they leave.

Using Noncompete Agreements Sensibly

In the meantime, what’s a business to do? First, you should consider whether noncompete agreements are right for the culture of your company. Do you really need them to protect yourself? What might be the cost in decreased trust and increased resentment among a workforce that expects to enjoy career flexibility? Consider imposing these restrictions only on those senior employees who have access to your most sensitive information. Be prepared to consider relaxing or eliminating constraints in special situations where taking a bit of calculated risk might help establish or improve an important relationship.

Second, whatever you decide to do about noncompete agreements, don’t depend on them as the primary way to protect your trade secrets. Be sure that you have established a comprehensive information security program, including continuous training and robust enforcement. The most reliable way to reduce the risk that you might lose control of your secrets is through active management, not passive dependence on post-employment restrictions.

Third, if you do use noncompete agreements, watch out for changes in state laws that might affect you. If any meaningful reforms emerge from the federal government, you will certainly hear about them. In any event, pay attention and be ready to adjust so that you comply with any new standards.

Outrage over imposition of restrictive contracts on teenage camp counselors or sandwich makers is understandable, but it can lead to careless thinking. Not all employee restraints are unreasonable. We expect that the workplace should provide not only a job but also the opportunity for learning and advancement. In the information economy, that often leads to greater exposure to secrets. And preserving those secrets sustains competitive advantage and creates more jobs.

“Some circumstantial evidence is very strong, as when you find a trout in the milk.”

           — Henry David Thoreau

I know that some of you want to dive right into how Thoreau came up with that sardonic and mystifying line. We’ll get there, but let’s start with my high school. I was terrible at math in general, but loved geometry and solving problems about things that you could see or easily imagine. At university, I satisfied my math requirement with a course in logic, which similarly relied on deductive reasoning. And finally, in law school, the reverse engineering of human behavior was fully and elegantly explained in Evidence class, where Judge Weinstein (a beloved jurist in the Eastern District of New York who recently passed away) taught us about the difference between direct and circumstantial evidence.

The job of the trial lawyer starts with figuring out what happened and collecting evidence to use in telling a compelling story to a judge or jury. Direct evidence takes you immediately to the fact you’re trying to prove and is most commonly seen in eyewitness testimony. Betty saw John shoot the gun at Phil, who collapsed on the floor. That’s direct evidence that John murdered Phil. But if Betty had been outside the bar, heard an argument and then a gunshot before entering and seeing John holding a smoking gun, that’s indirect, or circumstantial, evidence of the murder.

People generally think that direct evidence through eyewitnesses must be better than any kind of indirect evidence. They are wrong. Eyewitness testimony in particular is known to be fallible, whether due to bias, or perhaps to a limited capacity to observe. Who can ever forget the scene in My Cousin Vinny (one of the greatest lawyer movies of all time) in which Joe Pesci, playing a brash but inexperienced New York lawyer, successfully cross-examines the sweet old lady who had identified his clients as the perpetrators of a convenience store robbery and murder? If you have forgotten, take a moment to watch it here.

Weighing Circumstantial Evidence

Perhaps the popular preference for eyewitnesses, and the general discounting of “mere circumstantial” evidence, is what Thoreau had in mind when he wrote that line about the trout in 1850. He never explained it, so there’s no direct evidence of what inspired him. But the circumstances are persuasive, as there had been a public scandal the year before, centered on dairy farmers accused of adding water to their milk in order to increase profits.

The quote shines a light on how some indirect evidence can be so convincing, because the inference it calls for – someone poured water from a stream into the milk – is so much more plausible than the only other explanation—that the trout somehow swam into the milk can.

But it’s not typical that a set of facts offers only one logical conclusion. And our search for explanations – especially when we are intent that others accept our interpretation – can be fraught with risk. In these more typical situations, the basic facts are few, but they form the predicate from which we want our audience to reach a conclusion. We see this phenomenon regrettably often in today’s sharply divided political culture, in which a factoid here or there is pumped up with assumption and conjecture to demonstrate the malevolence of some public official. That’s the danger with circumstantial arguments: the mosaic image may have some pieces that represent known facts, but the connections among them are actually obscure.

Sometimes I wonder if the ancient Greeks were playing jokes on us by suggesting that the constellation Canis Minor, which basically comprises two stars, represents a celestial dog. Or that Ursa Major is a bear, instead of a (pretty obvious) big dipper with a lot of other stars scattered around. Scorpius, on the other hand, has enough stars in the right positions that you don’t have to squint too much to imagine the stinging arachnid.

It’s Not the Facts, But How You Connect Them

Here’s the point: known facts are like stars in the sky, or dots on a page. You can connect them in various ways to construct a picture. But the one you see, or that you want to see, may not be the only picture that can be made with those dots, especially if there aren’t many of them or they’re far apart. In fact, there may be another way to link them that produces something entirely different, or even contrary to your interpretation.

In the realm of trade secret disputes, there are special challenges in trying to sort out the truth because one side knows the facts and the other doesn’t. As one court famously put it, in Greenberg v Croydon Plastics Co., Inc., 378 F. Supp. 806 (E.D. Pa.1974):

Plaintiffs in trade secret cases, who must prove by a fair preponderance of the evidence disclosure to third parties and use of the trade secret by the third parties, are confronted with an extraordinarily difficult task. Misappropriation and misuse can rarely be proved by convincing direct evidence. In most cases plaintiffs must construct a web of perhaps ambiguous circumstantial evidence from which the trier of fact may draw inferences which convince him that it is more probable than not that what plaintiffs allege happened did in fact take place. Against this often delicate construct of circumstantial evidence there frequently must be balanced defendants and defendants’ witnesses who directly deny everything.

Don’t Misconstrue Your Way to Catastrophe

Imagine the common case in which a company has just seen a highly-placed, trusted employee depart for a competitor. A casual remark to a colleague morphs into a threat, and attempts by the employee to clean up her computer on the way out are interpreted as theft. A senior manager, intent on promoting a reason for the departure that doesn’t involve his management style, urges immediate action, and a lawsuit is filed. Crafted like a press release but with more adjectives, the complaint invites the court – and the public – to see the former employee as a thief.

Let’s freeze the action for a moment and look at what has just happened. The former employer can justify its behavior as a rational response to the facts as it knows them. After all, trade secret misappropriation rarely happens in broad daylight, and the complaint is properly based on reasonable suspicion. But although suspicion is enough to permit a lawsuit, it may not be the prudent thing to do. As I have frequently argued, trade secret cases more so than other commercial disputes may be driven by fear, anger and resentment. And those emotions can profoundly affect how otherwise reasonable actors connect the dots to reach a conclusion.

Naturally, this tendency for inference to align with emotion can distort the view of either side. Just as the company may perceive malicious intent due to a few selected circumstances, sometimes innocent explanations offered by the defendant are really excuses wrapped in justification. But it’s because the former employer at the outset knows relatively little about what actually happened that we need to exercise caution and investigate carefully, so as not to mislead ourselves into thinking that the only option is to launch an attack.

When confronted with an emerging story where we don’t have, and maybe can’t have, all the facts, it behooves us to slow down and consider carefully the inferences we are drawing from what we do know. If we believe we’re seeing a trout in the milk, it may be helpful to rub our eyes and take another look.

“Never mistake activity for achievement.”

           — Coach John Wooden

We’ve all seen him when driving by the strip mall. Trying to focus on the traffic, our eyes are diverted by “Tube Man,” a 10-foot tall hollow, collapsible stick figure with a fan at the bottom, adjusted so that the body repeatedly folds and then jumps upright, with arms whipping around in a constant frenzy, trying to grab our attention. And that’s the point. Tube Man accomplishes nothing except to demand that we look at what he’s doing.

I was led to Tube Man by a search for “flailing,” a word that seemed an apt label for a spate of new legislation introduced by politicians climbing on top of each other to showcase their zealous antipathy to China. More on that in a minute; but first let’s consider what “flailing” means. It’s a pretty interesting word, and it makes a perfect metaphor.

The original use of “flail” was as a noun, derivative of the Latin flagellum, to describe a threshing tool made of a handle with a “free-swinging stick” loosely attached to the end. The idea was to just wave the thing around and it would end up knocking the grains off the stalk. It didn’t much matter exactly how you moved, so long as you did it with a lot of energy. Now we use machines for threshing, and most of us are not farmers; but we have kept the word, to describe “aimless or ineffectual efforts.”

And that, in my view, describes very well the recent rush of legislative attempts to punish China. That is not to say that China is our best friend. We are in serious competition, and it’s obvious that our leading position in some critical technologies has been targeted. That “giant sucking sound” you hear in the direction of China may be some cutting-edge secrets being displaced. We should be deeply concerned. We need a thoughtful, long-term strategy to respond.

Posturing Instead of Progress

Instead, what’s happening looks more like theater. Here’s the playbill. Early this year, Senator Chris Van Hollen (D-MD) re-introduced the “Protecting American Intellectual Property Act of 2021,” which had passed the Senate in December. It would require the President to impose trade sanctions on “foreign persons” engaging in “significant theft” of U.S. trade secrets, including freezing property and banning visas of individuals and putting companies on the “Entities List” (which makes it hard to do business in the United States). It did not include any path for appeal to the courts.

In April, Senator Lindsey Graham (R-SC) proposed “The Combating Chinese Purloining (CCP) of Trade Secrets Act.” (In his press release he included that parenthetical in the title, presumably to draw attention to the clever word choice that matched the acronym for the Chinese Communist Party.) This bill would have increased jail time for trade secret theft from five to 20 years, and companies found to have participated in or benefited from such theft would be barred from applying for any U.S. patents (any patents, not just related ones). It would also have denied visas to Chinese nationals wanting to pursue graduate studies in certain technical fields.

In May, Senator Chuck Grassley (R-IA) introduced the “Stop Theft of Intellectual Property Act of 2021,” which would bar admission to the United States (or deport them, if already here) of anyone who violates or evades export control laws or commits trade secret misappropriation.

Many aspects of these proposals came together earlier this month, when the Senate passed, with a large bipartisan majority, the “United States Innovation and Competition Act.” Weighing in at 2,376 pages, the omnibus measure contained other bills that were directed at increased government investment in cutting-edge technologies: the “Endless Frontier Act” and the “Strategic Competition Act.” But plenty of room was left for the “Meeting the China Challenge Act of 2021,” which followed the approach of the Van Hollen bill, only with a longer list of sanctions and a requirement that the President must choose at least five from the list (I’m not making that up.)

Separately from this massive omnibus bill, Senators John Cornyn (R-TX) and Chris Coons (D-DE) introduced legislation to create a new committee within the International Trade Commission with the power to perform a very quick (30 days) investigation and then block imports into the country that “contain, were produced using, benefit from, or use any trade secret acquired through improper means or misappropriation by a foreign agent or foreign instrumentality.” Lest we wonder what specific countries the authors had in mind, they inelegantly named the bill the “Stopping and Excluding Chinese Rip-offs and Exports of the United States Trade Secrets Act.”

Room on the Bandwagon

Even state politicians are jumping on the bandwagon. In the last few weeks, the Florida legislature passed by unanimous vote the “Combating Corporate Espionage in Florida Act,” which makes trafficking in trade secrets a serious felony, with enhancements if it is for the benefit of a foreign government. While lawyers express concern about how the risk of false accusations will discourage labor mobility and harm the economy, Florida’s governor announced his support for the law as a “major pushback against China” in response to its alleged coverup of the origins of the COVID-19 pandemic, as well as to its “infiltration” of universities and companies to steal trade secrets.

Back in 1998, I was part of a delegation of officials, scholars and industry representatives that visited China to help celebrate the opening of its Intellectual Property Training Center in Beijing. The facility was very impressive, and we were told that 600 people a month were receiving instruction in how to work with the country’s new IP systems. This was in the run-up to China’s bid to join the new World Trade Organization (WTO), and I can remember some in the U.S. group who were skeptical that all this activity was just for show, and that China didn’t really intend to make IP a priority.

As it turned out, not only did China join the WTO but it also built a world-class legal and administrative framework for IP rights. Nevertheless, a lot remains to be done, and special challenges persist, particularly in securing even-handed treatment of foreign companies that want to do business in China. Concerns about economic espionage and forced transfer of know-how are legitimate and need to be addressed. It seemed that we were on our way to dealing with a number of these issues through the negotiations that led to the Phase One Agreement early in 2000.

Sticking to Our Commitments

But at the multilateral level – that is, at the WTO, where sovereign countries are supposed to meet, iron out trade problems, and actually sue one another through a carefully negotiated dispute resolution process – the United States has more or less walked away. We have also withdrawn from the one regional trade agreement, the Trans Pacific Partnership (TPP), that we had proposed in order to offset China’s growing economic power in Asia. Simply put, we are not engaging with China.

Some commentators in and outside government suggest that the rise of China will necessarily lead to a “decoupling” of the world’s two largest economies, and that this is appropriate, given China’s anti-democratic approach to governance. But before we allow things to slip that far, we should consider very carefully how the world has benefited from increased trade in the years before tariffs were imposed, and the value of working within institutions like the WTO and agreements like the TPP.

Passing laws that can impose new trade sanctions, freeze property, and even deny companies access to our patent office might help us feel as though we’re solving a serious problem. But we could be creating more problems, as other countries like China watch what we’re up to and pass similar laws targeting U.S. businesses.

Addressing serious issues of IP theft should not lead us into our own corners where we vent and issue pronouncements, making political points with strong rhetoric. To actually achieve progress, we need to engage directly with China, ensuring that it keeps its commitments to respect IP rights and provide fair enforcement. Nothing less than global prosperity is at stake.

The Biden administration recently announced its support for a proposal before the World Trade Organization that would suspend the intellectual property protections on Covid-19 vaccines as guaranteed by the landmark TRIPS Agreement, a global trade pact that took effect in 1995.

The decision has sparked furious debate, with supporters arguing that the decision will speed the vaccine rollout in developing countries. The reality, however, is that even if enacted, the IP waiver will have zero short-term impact—but could inflict serious, long-term harm on global economic growth. The myopic nature of the Biden administration’s announcement cannot be overstated.

Even if WTO officials decide to waive IP protections at their June meeting, it’ll simply kickstart months of legal negotiations over precisely which drug formulas and technical know-how are undeserving of IP protections. And it’s unthinkable that the Biden administration, or Congress for that matter, would actually force American companies to hand over their most cutting-edge—and closely guarded—secrets.

As a result, the inevitable foot-dragging will cause enormous resentment in developing countries. And that’s the real threat of the waiver—precisely because it won’t accomplish either of its short-term goals of improving vaccine access and facilitating tech transfers from rich countries to developing ones. It’ll strengthen calls for more extreme, anti-IP measures down the road.

Experts overwhelmingly agree that waiving IP protections alone won’t increase vaccine production. That’s because making a shot is far more complicated than just following a recipe, and two of the most effective vaccines are based on cutting-edge discoveries using messenger RNA.

As Moderna Chief Executive Stephane Bancel said on a recent earnings call, “This is a new technology. You cannot go hire people who know how to make the mRNA. Those people don’t exist. And then even if all those things were available, whoever wants to do mRNA vaccines will have to, you know, buy the machine, invent the manufacturing process, invent creation processes and ethical processes, and then they will have to go run a clinical trial, get the data, get the product approved and scale manufacturing. This doesn’t happen in six or 12 or 18 months.”

Anthony Fauci, the president’s chief medical adviser, has echoed that sentiment and emphasized the need for immediate solutions. “Going back and forth, consuming time and lawyers in a legal argument about waivers—that is not the endgame,” he said. “People are dying around the world and we have to get vaccines into their arms in the fastest and most efficient way possible.

Those claiming the waiver poses an immediate, rather than long-term, threat to IP rights also misunderstand what the waiver will—and won’t—do.

The waiver petition itself is more akin to a statement of principle than an actual legal document. In fact, it’s only a few pages long.

As the Office of the United States Trade Representative has said, “Text-based negotiations at the WTO will take time given the consensus-based nature of the institution and the complexity of the issues involved.” The WTO director-general predicts negotiations will last until early December.

That’s a lot of wasted time and effort. The U.S. Trade Representative would be far better off spending the next six months breaking down real trade barriers and helping export our surplus vaccine doses and vaccine ingredients to countries in need.

When this waiver inevitably fails to boost production, supporters won’t meekly back off. No, they will step up their haranguing of the United States for having failed to deliver on its supposed promise. There will be lots of yelling and recrimination, and what the Biden administration surely intended as a relatively toothless show of solidarity will instead end up being seen as just another rich country head fake.

That’s a problem for all of us who deeply care about the state of global IP policy, because the damage will be worse and longer-lasting than a diplomatic donnybrook. The United States worked for many years to ratify TRIPS, and since then has been pushing back on the populist anti-IP agenda and trying to convince the rest of the world that robust IP regimes can deliver economic development over the long run. Now much of that work will be undone in the process of this chaotic, and ultimately fruitless, waiver discussion.

“Be careful what you ask for because you just might get it.” 

           — Anonymous

All the fuss surrounding the proposal by India and South Africa to suspend the TRIPS Agreement to help them produce vaccines to fight COVID-19 has obscured some critical truths. In spite of the rallying cry “Patents versus People,” it’s not really about patents. And merely lifting TRIPS obligations will do nothing to address the current suffering of the world’s poorer populations. In fact, it would hamper efforts to secure global distribution of vaccines, as well as cause real harm in the long term.

The Biden Administration has embraced the proposal in principle and has received plaudits for what many see as a humanitarian and diplomatic breakthrough: choosing people over patents. So how could something that looks so right be so wrong?

First, we have to understand what the TRIPS Agreement is and isn’t. Stay with me here. I know that treaties can be boring, but this one is more important than you may realize.

Since their introduction in 15th century Venice, patents have been strictly territorial, a grant of rights that stops at the country’s border. Indeed, if you found some invention being used in another country, you could bring it back home and get a patent even though you weren’t an inventor at all. We didn’t care much about what was going on next door, just what would benefit the local economy.

Beginning in the late 19th century, as global commerce got seriously underway, a spate of treaties made it easier to claim inventions – and other intellectual property – in multiple countries. For patents, the high-water mark of this business-driven improvement came in 1978 with the Patent Cooperation Treaty (PCT), which bound all signatory countries to accept the priority date of an invention filed in another member country, so long as it was presented within 30 months. This is one of those international treaties that actually works in a practical way to speed the spread of innovation around the world.

But still, patents and other IP protections are decided under national laws, and variations from one country to the next in the scope of rights – especially in enforcement – continued to cause a lot of inefficiency for companies trying to build global markets. So back in the early 1990s, when we all thought tariffs were bad and globalization was good, when everyone seemed to believe that a rising tide of cross-border commerce would lift all national economies, the United States led an effort to establish the agreement that would come to be known as TRIPS, for Trade-Related Aspects of Intellectual Property Rights.

Protection and Ownership

Here’s the thing to remember about TRIPS: it only creates obligations of governments to pass laws supporting intellectual property rights of various kinds: patents, copyrights, designs, trademarks, and trade secrets. It doesn’t affect the private ownership of those rights. That’s an important distinction, especially for trade secrets (or “undisclosed information” as it’s called in TRIPS), because unlike the other “registered” rights, it doesn’t depend on a government grant. It just requires a legal system that enforces confidentiality.

The provisions of TRIPS were not new for industrialized countries. But for the developing world the agreement represented a tradeoff: adopt our framework for protecting IP (including our own, like drug patents), and you’ll get the benefit of increased wealth and productivity that comes with joining the club we’re going to call the World Trade Organization.

What seemed to sell this deal was the expectation that “technology transfer” from industrial north to agricultural, extractive south would happen as a result. Remember that phrase “technology transfer,” because it’s at the hidden heart of the current waiver proposal. You see, published patents are available for anyone to read and learn from, and developing countries still have the option to compel licenses from patent owners if needed to address serious domestic needs, including pandemics. But patents are only a part of most stories of technology transfer, because in order to actually build the factory and produce the goods, you need to know more than what’s in the patents.

When I managed the PCT in Geneva, I heard a lot about this from developing country delegates to WIPO. They expressed great disappointment in how TRIPS seemed to be a “bait and switch” scam, in which the promised benefit never materialized. Patents are fine, but that doesn’t tell you how to adjust the dials on the machines to get the best outcomes. They thought they would be getting all that “know-how,” too.

For some traditional pharmaceuticals, this lack of know-how may not be a showstopper. The patent claims may describe a particular small molecule that provides a certain therapeutic effect. If you already know how to make pills, then manufacturing it can sometimes be relatively straightforward. Sometimes, but not always.

Moreover, biopharma generally, and mRNA vaccine technology in particular, are quite different from traditional drugs. Developing a process to reliably produce these medications at scale is astonishingly difficult and depends on years of experimentation involving cell growth times, temperatures, and other variables. That body of knowledge represents the trade secrets of the developers. It is enormously valuable, and not just for making COVID-19 vaccines. Creating other therapeutics based on the mRNA platform would be much easier and quicker with the benefit of knowing what tends to work and what doesn’t.

The Importance of the Entire Pharmaceutical Cookbook

So, this is why a temporary waiver of TRIPS—which would suspend national obligations to enforce IP rights—can’t possibly help countries like India get more vaccines to its citizens. The know-how required to manufacture at scale is owned by the companies like Pfizer and Moderna that are producing doses in record volumes. To effect the demanded “technology transfer,” governments would have to secure the agreement of those companies not just to hand over their entire “cookbook” but also to send qualified scientists and technicians to spend time at the foreign facilities, basically consulting on how to implement the secret processes to produce a safe vaccine. And even if that transfer happened tomorrow, getting to the point of actually manufacturing in volume would take more than a year.

Not only would the TRIPS waiver not produce the results the proponents want, it would likely reduce the current level of international distribution of vaccines, by interfering with access to the limited supplies of required ingredients. In fact, this supply chain disruption was recently cited by none other than the government of India in pushing back against popular demands for a compulsory license on Gilead’s Remdesivir and other COVID-19 treatments, noting that the “main constraint” was not intellectual property rights but preventing competition for scarce “raw materials and other essential inputs.”

TRIPS Ironies Abound

But there’s more. A waiver would result in even greater harm over the long haul. Drugs typically are not discovered by governments. Instead, we rely on the private sector to respond to new diseases. It seems deeply ironic that while our IP system succeeded in incentivizing the development of a new vaccine only months after the SARS CoV-2 virus appeared, we would now be considering suspending that system. Congratulations and thank you! Now, hand over your trade secrets!

Another irony relates to the fact that these companies have not been producing all the vaccine on their own. Instead, they planned ahead and established collaborative relationships with other manufacturers, leading to quick and effective voluntary technology transfers through licensing. Those who clamor for a waiver seem to ignore that robust, reliable trade secret laws enable such transactions. It may seem counterintuitive, but it’s well established that enforceable secrecy leads to more dissemination of technology, not less. Indeed, without it there would be hoarding of know-how, slowing production of vital medications and other innovations.

It takes more than $1 billion to engage in the risky business of producing a new drug. The willingness of shareholders to invest that kind of money requires a predictable IP system, one in which rights are not imperiled just because some people mistakenly believe those rights are in the way of achieving some laudable goal. Broadly removing IP protections is something governments can do, but they can only do it once, because the next time there may be no innovations available to claw back. Without reliable incentives, private industry simply won’t be able to prepare us for the next pandemic.

Trying to suspend IP rights clearly will not solve the problem and, indeed, risks making it worse. Instead, the international community – including the United States – should focus on diplomatic solutions to the immediate problem by lifting export controls by rich countries and forcing more equitable distribution of the available supplies of vaccines.

For decades, the United States has been vigorously promoting the value to society of a strong, globally harmonized IP system. The success of Operation Warp Speed has demonstrated the value of that system. This is no time to see what it might be like without one.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram