Shrimp Genetics Case Dips Into Uncharted Trade Secret Realm

Trade secrets are defined as “information” not generally known that an entity makes “reasonable efforts” to keep secret. The owner also must derive economic value from that secrecy. The secrets are misappropriated if they’re acquired by someone else through improper means.
Precedent applying those principles to living things remains slim, but life-based secrecy is growing.
“We’re adapting to the fact that there’s a lot of business activity now around lifeforms,” trade secrets attorney James Pooley said.


Pooley said much of the shrimp case’s reasoning stems from Pioneer Hi-Bred’s dicta and its subsequent “mischaracterization” as a holding.
He predicted “it will take some time” before an appeals court tackles the question head on, but he called the reasoning in cases involving organisms-as-information “sort of sloppy” because they equate intangible information with tangible objects; a computer chip isn’t a trade secret, the information on it is, he said. He doesn’t think the cases are necessarily reaching the wrong results, just relying on faulty logic.
“It can matter in the law because there are certain things the law can do with tangibles that it can’t do with intangibles,” such as have them seized or destroyed, Pooley said. “If you’re trying to control the genetic information in your hybrid seed corn, you have to control the corn itself” so that the information doesn’t become accessible.


Surprisingly, 50.5% of companies that performed or funded R&D found utility patents “not at all valuable.” Some observers believe that if businesses are not filling patents, they are not disclosing inventions, which is harmful to innovation.

“This may be a result of a perception that the value of U.S. utility patents has diminished in recent years to due to erosion of patentability standards, coupled with increased cost and risk of enforcement,” James Pooley told IP CloseUp. Pooley is a trade secret expert and former Deputy Director General of WIPO and advisory board member of the Center for Intellectual Property Understanding.


The World Trade Organization last week approved a deal to loosen intellectual property protections that many policy professionals say will shatter investment and innovation incentives for drugmakers to meet the needs of major health crises. The deal was a blow to vaccine makers such as Pfizer Inc. and Moderna Inc., which fought to keep the current framework that enabled them to produce life-saving vaccines in record time.

“Anyone with a stake in preventing or responding to future crises should be concerned about the negative effect of this agreement,” said James Pooley, a former deputy director general at the United Nation’s World Intellectual Property Organization.

The IP waiver comes after nearly two years of debate and at a time when initial catalysts for a plan to spur vaccine access and production capabilities have largely been addressed—leaving many in the IP and drug spaces skeptical of the goals of the agreement beyond political gain.

“It delivers the worst possible result: coming at a time when there is an oversupply of vaccines, it is irrelevant to the current crisis; and by reducing the reliability and predictability of patent protection it makes it much harder to secure private investment in the research required to deal with the next global health crisis,” Pooley said.


The waiver indicates that patent rights include ingredients and processes necessary for the manufacture of the vaccine. Were that interpreted to include trade secrets, it could scare off investment capital, Pooley said.

“It signals that the United States is willing to play footsie with India and South Africa on this essential sort of lie, that pulling back on patent protections globally will somehow solve more problems than it creates, and that’s a delusion. And we’re buying into it,” said James Pooley, a former deputy director general at the World Intellectual Property Organization. “That itself will have a dampening effect on the willingness of companies to invest in technologies.”


According to the tentative plan, WTO members will decide whether to extend the waiver to “cover the production and distribution of COVID-19 diagnostics and therapeutics” within six months of an agreement.

McDole, however, noted that “like the vaccine manufacturers, Gilead and other therapeutic manufacturers are continuously entering into voluntary licenses to increase production and access” for Covid treatments.

The waiver, particularly from the U.S. point of view, is “the worst of both worlds,” Pooley said.

“It doesn’t solve the actual problems of vaccine availability,” and “it reinforces the idea that whenever we have some sort of global issue, let’s look at ways in which the IP system can be seen as a barrier,” he said.

DTAS (Defend Trade Secrets Act) claims now constitute almost three-quarters of those filed in suits. The DTSA, signed into law on May 11, 2016, provides litigants a private right of action in federal court for trade secret misappropriation claims.

“It’s no surprise that many plaintiffs favor the federal option, with nationwide service of process and harmonized rules,” says James Pooley, a leading trademark attorney, author and ex-Deputy Director General of WIPO. “Many still choose state court for essentially local cases, where it is generally easier to get your case to trial.

“As for the high percentage of judgments resulting in injunctions, that statistic should be understood in context of  how few cases actually get to a judgment after trial. Those that do would naturally tend to present strong facts that justify injunctive relief.”

Five years after legislation significantly improved trade secret protection in the US, Jim Pooley
tells IAM in an interview, more policymakers on Capitol Hill are advocating tough policing of
potential IP theft by Chinese entities - for good and not so good reasons

The current US Congress is still in its early days but if the first few months are anything to go by we can expect plenty of discussion and proposed legislation on the subject of IP theft and specifically on protecting their trade secrets.

Last week, Senators Grassley and Whitehouse issued the Stop Theft of Intellectual Property Act 2021. If enacted, this would see foreign nationals who engage in IP theft facing potential deportation from the US.

Another proposed bill comes from Senator Graham. He put out a news release last month about his introduction of “The Combating Chinese Purloining (CCP) of Trade Secrets Act”. Among other things, the bill would include “prohibition on applications for patent protections by US Patent and Trademark office” for foreign persons who misappropriate a trade secret.

“My legislation is designed to deter behavior, much of it from China, that results in the loss of trade secrets, intellectual property, and sensitive government research,” Graham announced.  

Senators Van Hollen and Sasse have also had their say with their “Protecting American Intellectual Property Act”, which passed the Senate late last year and, last month, was reintroduced in the new Congress. That proposes levying economic penalties on companies or individuals who have been found to have engaged in the theft of US IP. 

Whether any of these bills actually become law remains to be seen. It has only been five years since the Defend Trade Secrets Act (DTSA) was passed, handing rights owners a powerful new route to bring cases under federal law. There hasn’t been an indication yet that

this legislation hasn’t given US authorities enough powers to tackle the problem of IP theft - a message that trade secrets expert Jim Pooley reiterated in a recent interview with IAM.

“These [bills] were not generated from a sense of concern that trade secrets in general are not being sufficiently supported or that the DTSA is not working or that prosecutions under the Economic Espionage Act are somehow not hitting the mark,” Pooley remarked.

Perhaps not surprisingly, Pooley stressed that what had changed the dynamic are the geopolitical tensions between the US and the world’s most populous country. “China was a concern five years ago, now it’s an almost rabid concern on the part of a number of politicians for good reasons and not so good, in my view,” Pooley said.

“I think the elevated concern over China is largely justified but that part is more performative - that you want to be seen to be tough on China - and this is what has me worried because of the unintended consequences,” Pooley commented.

The danger, should some of the proposed legislations’ more radical ideas become law, is that it will prompt a tit-for-tat response.

“Whenever you take measures that are designed to punish and discourage behavior by a foreign country or coming from a foreign country, what you risk is that that country or other countries will enact similar legislation of their own,” Pooley stressed.

In recent years legislators on Capitol Hill have been making ever more radical suggestions around how the US could use the IP system to get tough on China’s leading tech players. In 2019 Senator Rubio even floated the idea of preventing Huawei from seeking damages in patent litigation after it emerged that the Chinese tech giant had asked Verizon to pay $1 billion in licensing royalties.

Graham’s proposal that transgressors should be prohibited from filing for US patents might raise alarm about a similarly harsh response affecting the legions of US companies that have significantly increased their Chinese patent portfolios in recent years. That may not be an appealing prospect for a business like Qualcomm which makes a huge chunk of its revenue from device makers in China. 

The risk, Pooley underlined, is that ideas around a balanced playing field and rights owners being given due process in overseas courts, which have traditionally underpinned US policy, might be undermined if the US pursues lopsided measures. 

“We want our companies that are engaged in litigation in China to be treated appropriately but what we’re risking here is that by putting up these kinds of barriers without due process we’re basically sending a contrary message,” he stated. 

Pooley, who was a key voice in the passage of the DTSA, underlined that the legislation was working largely as was hoped when it was enacted in 2016. He pointed to the large number of trade secrets cases now being filed in federal courts and to developments in the case law such as the decision in Motorola v Hytera, which found that the DTSA could apply to IP theft outside of the US.  

“At the moment we don’t need to fix the existing tool in some way to make it more effective,” Pooley insisted. “What I do think we need to do is, a little more broadly speaking around intellectual property, come up with a national strategy for innovation that will increase our competitiveness in a way that hoping additional blocking or punishment mechanisms might not.”

Pooley stressed that he is happy to see a focus on strengthening IP rights, particularly in trade secrets, but added that: “At the same time I worry that the long-term effects of these kinds of proposals may not be what we really want.” 

Patents themselves are publicly accessible, noted James Pooley, intellectual property attorney and former deputy director general of the United Nations' World Intellectual Property Organization. But trade secrets developed by Pfizer/BioNTech, Moderna and others, "cook books" of manufacturing processes such as temperature and growing conditions, have not been made public. That may ultimately be a dual problem for negotiators. Before they protect the knowledge, U.S. officials would have to ensure access to it.

Those companies would need to be persuaded to come to the bargaining table to give up such trade secrets.

“What happens when it turns out that the U.S. can’t actually deliver the information that is critically important to implementing the inventions?” Pooley asked. “This will be seen as another failure by the U.S. and other rich countries to keep their promises.”

James Pooley, member of the Center for Intellectual Property Understanding and former deputy director general of the World Intellectual Property Organization, understands the full seriousness of cyberespionage.

Pooley agrees that COVID has created a riskier environment because employees are away from their usual offices. But the problem is not entirely current, he notes, explaining that a new risk environment emerged in the last 15 to 20 years, as we moved into an information-based economy, where the asset base shifted from tangibles to intangibles.

In addition, “the imperatives for sharing information and trusting other people went up like crazy because of globalisation”, he says. Supply chains have become longer and more complex, as companies shifted to vendors abroad and therefore have to manage their operations at a distance.

During the early-1970s, “all that a company needed to do to protect its information assets was to guard the photocopier and watch who went in and out the front door, because there were no networks, no internet and records were stored on paper”, says Pooley. But, over the last decades, digitalisation coupled with globalisation has changed the playing field. Some of the most valuable assets have become intangible, opening up a whole new world to hackers.

So how does sensitive data end up in the wrong hands? Pooley argues that swathes of valuable information is lost because of employee inadvertence. In rough numbers, he says, “some 80 to 85 per cent of information loss occurs through employees, as opposed to hackers worming their way in from outside”. While organisations can spend effort and money on secure IT infrastructure, they neglect employee behaviour at their peril.

The need to train employees to protect company IP

“I see it over and over again,” says Pooley. “I get hired as an expert to critique the protection systems for companies in litigation over trade secrets, because they have to prove they took reasonable steps to prevent the things from happening.” What he sees is companies neglect to train their employees on how to identify and handle confidential data.

Meanwhile, hackers look for the weakest link in a company’s information chain, for instance when employees use the public wifi of a restaurant near their office for work purposes. He mentions the 2014 hack of Target, when the company’s heating and air conditioning contractor was used as an entry point by hackers, who exploited the vendor’s weaker system to gain access to the Target system.

“It's just astonishing to me that more companies don't pay better attention to these issues, but there we are,” says Pooley. “Maybe I'm a Cassandra, but remember, Cassandra was right.”

How can companies train their employees to be more vigilant? “Preventing bad behaviour is usually about awareness, because people want to do the right thing and they want their jobs to be preserved,” he says.

When Pooley advises companies, he begins with a high-level strategic examination of what the company’s most important information assets are, what risks or vulnerabilities they face and what mechanisms there are to reduce these risks.

“Being really attentive to where the risk points are will alert you to pay special attention to areas that are likely to be used as points of entry,” he says. Companies need to set up policies and procedures to ensure their IP is protected and training employees is a big part of that.

“I worked with one company that built a consumer product primarily manufactured in China, so there were obvious leakage risks connected to that.” As they went through the process of developing a comprehensive system to protect their IP, Pooley asked for all the senior managers of the company to get together in one room to discuss the matter. Even though this was not easy to arrange, he insisted.

Overcoming silos to reduce IP vulnerabilities

Once all senior managers came together, including the supply chain managers who talked about issues they experienced directly, sharing information triggered insights for managers across the board.

“‘Wait a minute, I don't think I've ever really looked at the non-disclosure agreement that we have with company x and when it expires.’ All of a sudden, they're seeing vulnerabilities, where they hadn't really thought about them before,” says Pooley. “No one expected the specialty arm of the organisation that dealt with all these companies in China would have something to say to the other business units, but vulnerabilities can overlap.”

Are silos and inefficient communication partly to blame for companies’ vulnerability when it comes to countering cyberthreats? Pooley argues organisations need to confront the fact that separate units within their business may have set up unnecessary walls. In reality, information flows and risks are usually shared across the business.

Part of the solution could be found through automation, he says, because automation includes behavioural analytics and insight tools that help companies monitor what exactly it is employees do on their platforms. However, using these tools always has to be balanced with individuals’ expectations of privacy.

Pooley concludes: “The message that I often give is cyberespionage is scary and ugly, and we need to do everything we can to prevent it and deal with it. But if we're not managing our employees in a smart way, it's almost like we’ve left a couple of doors open.”

Unlike other forms of intellectual property, trade secrets are rarely clearly defined anywhere before a lawsuit begins, making it critical for counsel for defendants to know what exactly was allegedly stolen. But at such an early stage in the litigation, even overbroad or ambiguous claims of trade secrets require motions seeking clarity, not pre-discovery victory, intellectual property attorney James Pooley of James Pooley PLC said.

“My impression was the real lesson of the case is ‘Don’t try to challenge the sufficiency of a trade secrets identification with an early motion for summary judgment,’” said Pooley, who focuses on trade secrets cases and practices in California, where the case originated.

ETC’s summary judgment motion “put all its marbles on a risky maneuver, when it could have made a lower risk procedural attack,” he said.


Pooley said he could see how one could worry the decision takes the decision on what constituted a viable trade secret claim out of the hands of judges and hands it to a jury. But that reading takes the decision out of its context of a pre-discovery summary judgment motion.

“I think that’s a superficial and strained reading,” Pooley said. “A fair reading is that judges decide whether you’ve rung the bell enough to go forward, juries decide whether you’ve proved the case.”

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram