SlideShare a Scribd company logo
1 of 45
Trade Secret Theft
in the Digital Age
Houston Young Lawyers Association
Cyber Evidence, Kasi Chadwick, Alejandra Hamilton
What we will
Cover…
PAGE
Overview
• Legal authority for forensic examinations
• The life of a forensic examination and the best practices
for completing a forensic examination
• Drafting considerations
3
Trade Secret Cases in 2017
PAGE 5
PAGE
What is an Electronic Forensic Examination?
• Electronic forensic examinations can be used to
review the contents of an individual’s:
 Computer;
 Cell phone;
 Cloud-based e-mail system (Hotmail; Gmail);
 USB device; or
 Generally any medium upon which data is stored.
• Generally, an inventory of the content of the
target device, called a file listing, is provided to
the requesting party.
6
PAGE
What is an Electronic Forensic Examination?
• Three types of electronic forensic examinations
– Examination of devices in your possession
– Agreed examination of devices outside of your
possession
– Court-ordered examinations
7
Legal Basis
PAGE
In re Weekley Homes, L.P.
• Alleged discovery abuse  Trial court ordered a forensic
protocol
• In re Weekley Protocol:
 Four forensic experts identified.
 Experts to take an evidentiary image of the hard drives in
question using “procedures that is generally acceptable as
forensically sound.”
 From the images, experts would search for deleted emails from
the relevant year using specified search terms.
 Owner of data then had opportunity to review the responsive
data.
 Responsive data was to be provided to requesting party.
• Responding party sought mandamus relief.
9
PAGE
• Supreme Court concluded the trial court abused its
discretion.
• Made this finding because the requesting party’s
“conclusory statements that the deleted emails it
seeks ‘must exist’ and that deleted emails are in
some cases recoverable is not enough to justify the
highly intrusive method of discovery the trial court
ordered…”
• In order to obtain a court-ordered forensic protocol,
more must be shown.
• Case-by-case analysis.
10
In re Weekley Homes, L.P.
PAGE
In re Weekley Homes, L.P. - Dicta
• The Supreme Court contrasted their decision with In
re Honza, 242 S.W.3d 578, 583 (Tex. App.—Waco 2008).
• The Supreme Court distinguished In re Weekley from
Honza:
 Honza sought forensic review to obtain the
metadata for a document. No question of
document’s existence.
 There was a direct relationship between the hard
drives sought and the plaintiff’s claims.
 There was extensive testimony as to the forensic
expert’s experience and qualifications prior to
granting the forensic review.
11
PAGE
In re Weekley Homes, L.P. – Legal Standard
• Per Rule 196.4 of the Texas Rules of Civil Procedure:
• Employing Rule 196.4, the In re Weekley outlined the
legal standard for a court-ordered electronic forensic
examination sought to remedy an alleged discovery
abuse.
12
Selecting Your Forensic
Expert
PAGE
Selecting Your Forensic Expert
• Selecting a qualified forensic expert is critical.
 Qualified and experienced forensic experts help ensure
proper collections and processing of data.
 In the world of forensics, there are many way to skin
the cat.
 Using an inexperienced expert can cause omissions of
critical evidence—and in some cases—destruction of
the evidence altogether.
• Per In re Weekley, your expert’s credentials are
important in obtaining a court-ordered forensic
protocol.
14
PAGE
• Involve forensic expert as early in process as
possible.
– Protocols put in place without expertise often create
unrealistic expectations with respect to the practical
limits of forensic analysis.
– You can't order an examiner to fly.
• Clear delineation of examiner's ethical responsibilities
is essential. Obligations to Court and opposing party
should be made manifest, where applicable, to avoid
inherent conflicts.
15
Selecting Your Forensic Expert
PAGE
Selecting Your Forensic Examiner
• No affiliation guarantees competency. Look closely at
the examiner, not the company.
• Referrals from colleagues helpful.
• Know what licensure requirements apply to the
examiner.
• Examiners should be experienced in writing
intelligible reports.
16
What is an Electronic
Forensic Protocol
PAGE
What is an Electronic Forensic Protocol?
• An electronic forensic protocol is a set of procedures
through which the harvesting, review, and
(sometimes) the destruction of electronic content is
conducted.
• Used to examine devices outside of your possession
• Agreed forensic protocols can be drafted pursuant
Rule 11 of the Texas Rules of Civil Procedure and/or in
conjunction with injunctive relief.
• Alternatively, court-ordered forensic discovery can be
issued—generally to remedy discovery abuses.
18
PAGE 19
• Be careful when
seeking to deploy a
found or form protocol.
• Each case presents
unique considerations
for forensic
assessment.
• Each requires a
protocol tailored to the
needs, sources, parties
and risks attendant to
the matter.
What are we Examining?
PAGE
What are we Examining?
• The easy targets:
 Computers (personal and company devices)
 External storage devices
• The more complex:
 Cell phones
 Cloud-based storage systems (e.g. cloud-based e-mail
accounts, DropBox)
21
PAGE
What are we Examining?
• Where is the target
information kept?
• While forensic
examinations of cell
phones and cloud-
based accounts do not
normally produce
reviewable documents,
these extractions can
provide important clues
to the rest of the puzzle.
22
What will be Pulled from the
Target Devices?
PAGE
What will be Pulled from the Target Devices?
• Question: What is the universe of data to be
extracted?
• Will the forensic expert be harvesting:
 Active files (e.g. .docs, .pdfs, .xls)
 Deleted file identification
 Device connection log
 Internet artifacts
24
Additional Front-End
Considerations
PAGE
Additional Considerations to be Decided Before
Execution
• Who will hold the devices while the protocol is
executed?
 For how long will the devices be sequestered?
 How will the devices be kept secure?
• How will the forensic images be maintained?
• Deletion after protocol complete?
• Confidentiality? AEO?
26
PAGE
Additional Considerations to be Decided Before
Execution
• Consider an iterative process to keep the case
moving forward.
– A few key issues examined first, then a few more.
Don't boil the ocean.
• Address whether the examiner can assess the
integrity of the evidence. If the digital books have
been cooked (e.g., drives swapped, wrong machine
supplied, drive wiping seen, etc.), can the examiner
address this as a threshold matter?
27
Harvesting the Data
PAGE
Harvesting the Data from the Target Devices
• After the protocol is executed by the parties, the
forensic expert’s work comes into play.
• Selecting the right expert is critical.
 There are a number of tools forensic experts can use.
The forensic expert’s expertise is important.
• Example: Different data extraction programs work
best on different devices.
 Incorrect collection methods or incorrect tools can
destroy critical metadata (e.g. creation date, last
accessed date).
29
Data Review
PAGE
Review of Target Information
• Most experts generate
reports containing the
target information.
• Information in reports
from the file listings
• File listings and
extractions are
generally produced in
.xls format.
31
PAGE
What are we Reviewing?
• Files
– Names
– Sizes
– Creation dates
– Last accessed dates
– Last modified dates
– Whether files are deleted
and
– Whether a file is
overwritten
• Web Information
– Browser history
– Web bookmarks
– Cookie history
• Mobile Devices
– Call logs
– Text messages
– SMS messages
– Applications
– Contacts
32
With the careful review of a listing or extraction, the
expert can see:
Additional Notes
PAGE
Spoliation
• Because a file listing can show the life and death of a
file, improperly preserved evidence can present
significant problems to a responding party.
• Whether a deleted file is recoverable dictates the
degree of any spoliation implications.
• Many times, spoliation happens inadvertently.
– Especially in more protracted litigation, paralegals can help monitor a
case’s activity to help their lawyers.
34
PAGE
International Collections
• Because we are searching for electronically
misappropriated information, it is common for target
devices to be located in different countries.
• International Collections
 Kits
 On-site collections
• Compliance with international laws
 EU laws are different.
 Sometimes, if the information is personal in nature, the
information belongs to the employee, even if the
information is located on the employer’s devices.
 There are exceptions.
35
PAGE
Defend Trade Secret Act of 2016
• The DTSA was signed into law by President Obama on May
11, 2016.
• The DTSA creates a “civil seizure” mechanism to collect
and sequester electronic storage devices believed to
contain a stolen trade secret soon after filing suit.
• The DTSA—and the “best practices” expected to be
created under the DTSA—may have implications on how
forensic discovery is conducted in the future.
36
Drafting Considerations for
Employee Related Agreements
under the DTSA
PAGE
The DTSA Notice Requirement
• The DTSA, like the Texas Uniform Trade Secret Act,
allows for recovery of exemplary damages and
attorney fees.
• As a condition to recovery of such remedies, the
DTSA imposes a duty on the employer to notify all
“employees” of the immunity and anti-retaliation
protection provisions of the DTSA in any contract or
agreement that protects or governs the use or
disclosure of trade secrets or other confidential
information entered into, or updated, after May 11,
2016 .
38
PAGE
Who is an Employee under the DTSA?
• The term “employee” under the DTSA is broadly
defined to include traditional W-2 employees and “any
individual performing work as a contractor or
consultant for the employer.”
• As a result, employers are required to incorporate the
DTSA notice language in all contracts and agreements
with employees, independent contractors,
consultants and any other vendors who are granted
access to or help develop the employer’s confidential
information and trade secrets.
39
PAGE
What Types of Contracts are Covered?
• The DTSA notice provisions apply to any contract or
agreement that governs the use of trade secrets or
other confidential information.
• Examples of these types of agreements are:
• Offer Letters or Employment Agreements
• Restrictive Covenant Agreements
• Confidentiality and Propriety Rights Agreements
• Independent Contractor or Consultant Agreements
• Separation and Release of Claims Agreements
• Technology/Invention Assignment Agreements
• Work-for-Hire Agreements
40
PAGE
What Type of Notice is Required?
The notice must provide the immunity and anti-
retaliation protection provisions of the DTSA, as seen in
the example below:
41
PAGE
Is there an Alternative to the Notice Requirement?
• Employers can comply with the notice requirement by
updating their form agreements to include a cross-
reference to a written policy provided to the
employee, contractor or consultant that sets forth the
employer’s reporting policy for a suspected violation
of law.
• To fully comply, the written policy must contain the
immunity and anti-retaliation protection provisions
provided for under the DTSA.
42
PAGE
Consequences of Non-Compliance
• There is no statutory penalty for failing to provide
notice.
• Failure to comply with the notice requirement will
result in a forfeiture of the ability to recover
exemplary damages and attorneys fees in an action
for misappropriate under the DTSA.
• Employer may recover exemplary damages and
attorney fees under the Texas Uniform Trade Secret
Act.
43
Additional Resources
PAGE
Questions?
Kasi Chadwick
BoyarMiller
kchadwick@boyarmiller.com
Alejandra Hamilton
Boyar Miller
ahamilton@boyarmiller.com
David Brown and Paul brown
CyberEvidence
david.brown@cyberevidence.com
paul.brown@cyberevidence.com
45

More Related Content

What's hot

Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 

What's hot (19)

File000116
File000116File000116
File000116
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Ediscovery model order
Ediscovery model orderEdiscovery model order
Ediscovery model order
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
File000162
File000162File000162
File000162
 
CHFI
CHFICHFI
CHFI
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Through a Router Darkly - Remote Investigation of Internet Censorship
Through a Router Darkly - Remote Investigation of Internet CensorshipThrough a Router Darkly - Remote Investigation of Internet Censorship
Through a Router Darkly - Remote Investigation of Internet Censorship
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
CS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VCS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT V
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
CTIN EDiscovery
CTIN EDiscoveryCTIN EDiscovery
CTIN EDiscovery
 
Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26Computer Assisted Review and Reasonable Solutions under Rule26
Computer Assisted Review and Reasonable Solutions under Rule26
 

Similar to Trade Secret Theft in the Digital Age

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 

Similar to Trade Secret Theft in the Digital Age (20)

Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Systemising advice
Systemising adviceSystemising advice
Systemising advice
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 

More from BoyarMiller

More from BoyarMiller (20)

Key Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI WorldKey Takeaways: The Future of Houston in an AI World
Key Takeaways: The Future of Houston in an AI World
 
Women's Event Takeaways
Women's Event TakeawaysWomen's Event Takeaways
Women's Event Takeaways
 
2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide2022 Breakfast Forum eGuide
2022 Breakfast Forum eGuide
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptx
 
Information & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and EmployeesInformation & Insights For Entrepreneurs and Employees
Information & Insights For Entrepreneurs and Employees
 
Six ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguideSix ways to_avoid_litigation_eguide
Six ways to_avoid_litigation_eguide
 
Acc oct 22 2019 presentation
Acc oct 22 2019 presentationAcc oct 22 2019 presentation
Acc oct 22 2019 presentation
 
Acc oct 8 2019 presentation
Acc oct 8 2019 presentationAcc oct 8 2019 presentation
Acc oct 8 2019 presentation
 
ALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of LeasesALTTA: Unlocking the Key Aspects of Leases
ALTTA: Unlocking the Key Aspects of Leases
 
BoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBookBoyarMiller's State of the Capital Markets eBook
BoyarMiller's State of the Capital Markets eBook
 
2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs2019 Information & Insights For Entrepreneurs
2019 Information & Insights For Entrepreneurs
 
BoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of EmploymentBoyarMiller - A Law to Think About - The Lifecycle of Employment
BoyarMiller - A Law to Think About - The Lifecycle of Employment
 
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
BoyarMiller Breakfast Forum: Perspectives on the Energy Industry 2019
 
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
BoyarMiller Breakfast Forum: The Houston Commercial Real Estate Markets – Wha...
 
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation""Treacherous Terms – Drafting Contracts to Avoid Litigation"
"Treacherous Terms – Drafting Contracts to Avoid Litigation"
 
BoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appealBoyarMiller: Pro bono in the trial courts and on appeal
BoyarMiller: Pro bono in the trial courts and on appeal
 
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
BoyarMiller Breakfast Forum: The Current State of the Capital Markets 2018
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
 
BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018BoyarMiller Perspectives on the Energy Industry 2018
BoyarMiller Perspectives on the Energy Industry 2018
 
#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World#unplug? Legal and Ethical Challenges in Employment in an Online World
#unplug? Legal and Ethical Challenges in Employment in an Online World
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
yulianti213969
 

Recently uploaded (20)

Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
 

Trade Secret Theft in the Digital Age

  • 1. Trade Secret Theft in the Digital Age Houston Young Lawyers Association Cyber Evidence, Kasi Chadwick, Alejandra Hamilton
  • 3. PAGE Overview • Legal authority for forensic examinations • The life of a forensic examination and the best practices for completing a forensic examination • Drafting considerations 3
  • 6. PAGE What is an Electronic Forensic Examination? • Electronic forensic examinations can be used to review the contents of an individual’s:  Computer;  Cell phone;  Cloud-based e-mail system (Hotmail; Gmail);  USB device; or  Generally any medium upon which data is stored. • Generally, an inventory of the content of the target device, called a file listing, is provided to the requesting party. 6
  • 7. PAGE What is an Electronic Forensic Examination? • Three types of electronic forensic examinations – Examination of devices in your possession – Agreed examination of devices outside of your possession – Court-ordered examinations 7
  • 9. PAGE In re Weekley Homes, L.P. • Alleged discovery abuse  Trial court ordered a forensic protocol • In re Weekley Protocol:  Four forensic experts identified.  Experts to take an evidentiary image of the hard drives in question using “procedures that is generally acceptable as forensically sound.”  From the images, experts would search for deleted emails from the relevant year using specified search terms.  Owner of data then had opportunity to review the responsive data.  Responsive data was to be provided to requesting party. • Responding party sought mandamus relief. 9
  • 10. PAGE • Supreme Court concluded the trial court abused its discretion. • Made this finding because the requesting party’s “conclusory statements that the deleted emails it seeks ‘must exist’ and that deleted emails are in some cases recoverable is not enough to justify the highly intrusive method of discovery the trial court ordered…” • In order to obtain a court-ordered forensic protocol, more must be shown. • Case-by-case analysis. 10 In re Weekley Homes, L.P.
  • 11. PAGE In re Weekley Homes, L.P. - Dicta • The Supreme Court contrasted their decision with In re Honza, 242 S.W.3d 578, 583 (Tex. App.—Waco 2008). • The Supreme Court distinguished In re Weekley from Honza:  Honza sought forensic review to obtain the metadata for a document. No question of document’s existence.  There was a direct relationship between the hard drives sought and the plaintiff’s claims.  There was extensive testimony as to the forensic expert’s experience and qualifications prior to granting the forensic review. 11
  • 12. PAGE In re Weekley Homes, L.P. – Legal Standard • Per Rule 196.4 of the Texas Rules of Civil Procedure: • Employing Rule 196.4, the In re Weekley outlined the legal standard for a court-ordered electronic forensic examination sought to remedy an alleged discovery abuse. 12
  • 14. PAGE Selecting Your Forensic Expert • Selecting a qualified forensic expert is critical.  Qualified and experienced forensic experts help ensure proper collections and processing of data.  In the world of forensics, there are many way to skin the cat.  Using an inexperienced expert can cause omissions of critical evidence—and in some cases—destruction of the evidence altogether. • Per In re Weekley, your expert’s credentials are important in obtaining a court-ordered forensic protocol. 14
  • 15. PAGE • Involve forensic expert as early in process as possible. – Protocols put in place without expertise often create unrealistic expectations with respect to the practical limits of forensic analysis. – You can't order an examiner to fly. • Clear delineation of examiner's ethical responsibilities is essential. Obligations to Court and opposing party should be made manifest, where applicable, to avoid inherent conflicts. 15 Selecting Your Forensic Expert
  • 16. PAGE Selecting Your Forensic Examiner • No affiliation guarantees competency. Look closely at the examiner, not the company. • Referrals from colleagues helpful. • Know what licensure requirements apply to the examiner. • Examiners should be experienced in writing intelligible reports. 16
  • 17. What is an Electronic Forensic Protocol
  • 18. PAGE What is an Electronic Forensic Protocol? • An electronic forensic protocol is a set of procedures through which the harvesting, review, and (sometimes) the destruction of electronic content is conducted. • Used to examine devices outside of your possession • Agreed forensic protocols can be drafted pursuant Rule 11 of the Texas Rules of Civil Procedure and/or in conjunction with injunctive relief. • Alternatively, court-ordered forensic discovery can be issued—generally to remedy discovery abuses. 18
  • 19. PAGE 19 • Be careful when seeking to deploy a found or form protocol. • Each case presents unique considerations for forensic assessment. • Each requires a protocol tailored to the needs, sources, parties and risks attendant to the matter.
  • 20. What are we Examining?
  • 21. PAGE What are we Examining? • The easy targets:  Computers (personal and company devices)  External storage devices • The more complex:  Cell phones  Cloud-based storage systems (e.g. cloud-based e-mail accounts, DropBox) 21
  • 22. PAGE What are we Examining? • Where is the target information kept? • While forensic examinations of cell phones and cloud- based accounts do not normally produce reviewable documents, these extractions can provide important clues to the rest of the puzzle. 22
  • 23. What will be Pulled from the Target Devices?
  • 24. PAGE What will be Pulled from the Target Devices? • Question: What is the universe of data to be extracted? • Will the forensic expert be harvesting:  Active files (e.g. .docs, .pdfs, .xls)  Deleted file identification  Device connection log  Internet artifacts 24
  • 26. PAGE Additional Considerations to be Decided Before Execution • Who will hold the devices while the protocol is executed?  For how long will the devices be sequestered?  How will the devices be kept secure? • How will the forensic images be maintained? • Deletion after protocol complete? • Confidentiality? AEO? 26
  • 27. PAGE Additional Considerations to be Decided Before Execution • Consider an iterative process to keep the case moving forward. – A few key issues examined first, then a few more. Don't boil the ocean. • Address whether the examiner can assess the integrity of the evidence. If the digital books have been cooked (e.g., drives swapped, wrong machine supplied, drive wiping seen, etc.), can the examiner address this as a threshold matter? 27
  • 29. PAGE Harvesting the Data from the Target Devices • After the protocol is executed by the parties, the forensic expert’s work comes into play. • Selecting the right expert is critical.  There are a number of tools forensic experts can use. The forensic expert’s expertise is important. • Example: Different data extraction programs work best on different devices.  Incorrect collection methods or incorrect tools can destroy critical metadata (e.g. creation date, last accessed date). 29
  • 31. PAGE Review of Target Information • Most experts generate reports containing the target information. • Information in reports from the file listings • File listings and extractions are generally produced in .xls format. 31
  • 32. PAGE What are we Reviewing? • Files – Names – Sizes – Creation dates – Last accessed dates – Last modified dates – Whether files are deleted and – Whether a file is overwritten • Web Information – Browser history – Web bookmarks – Cookie history • Mobile Devices – Call logs – Text messages – SMS messages – Applications – Contacts 32 With the careful review of a listing or extraction, the expert can see:
  • 34. PAGE Spoliation • Because a file listing can show the life and death of a file, improperly preserved evidence can present significant problems to a responding party. • Whether a deleted file is recoverable dictates the degree of any spoliation implications. • Many times, spoliation happens inadvertently. – Especially in more protracted litigation, paralegals can help monitor a case’s activity to help their lawyers. 34
  • 35. PAGE International Collections • Because we are searching for electronically misappropriated information, it is common for target devices to be located in different countries. • International Collections  Kits  On-site collections • Compliance with international laws  EU laws are different.  Sometimes, if the information is personal in nature, the information belongs to the employee, even if the information is located on the employer’s devices.  There are exceptions. 35
  • 36. PAGE Defend Trade Secret Act of 2016 • The DTSA was signed into law by President Obama on May 11, 2016. • The DTSA creates a “civil seizure” mechanism to collect and sequester electronic storage devices believed to contain a stolen trade secret soon after filing suit. • The DTSA—and the “best practices” expected to be created under the DTSA—may have implications on how forensic discovery is conducted in the future. 36
  • 37. Drafting Considerations for Employee Related Agreements under the DTSA
  • 38. PAGE The DTSA Notice Requirement • The DTSA, like the Texas Uniform Trade Secret Act, allows for recovery of exemplary damages and attorney fees. • As a condition to recovery of such remedies, the DTSA imposes a duty on the employer to notify all “employees” of the immunity and anti-retaliation protection provisions of the DTSA in any contract or agreement that protects or governs the use or disclosure of trade secrets or other confidential information entered into, or updated, after May 11, 2016 . 38
  • 39. PAGE Who is an Employee under the DTSA? • The term “employee” under the DTSA is broadly defined to include traditional W-2 employees and “any individual performing work as a contractor or consultant for the employer.” • As a result, employers are required to incorporate the DTSA notice language in all contracts and agreements with employees, independent contractors, consultants and any other vendors who are granted access to or help develop the employer’s confidential information and trade secrets. 39
  • 40. PAGE What Types of Contracts are Covered? • The DTSA notice provisions apply to any contract or agreement that governs the use of trade secrets or other confidential information. • Examples of these types of agreements are: • Offer Letters or Employment Agreements • Restrictive Covenant Agreements • Confidentiality and Propriety Rights Agreements • Independent Contractor or Consultant Agreements • Separation and Release of Claims Agreements • Technology/Invention Assignment Agreements • Work-for-Hire Agreements 40
  • 41. PAGE What Type of Notice is Required? The notice must provide the immunity and anti- retaliation protection provisions of the DTSA, as seen in the example below: 41
  • 42. PAGE Is there an Alternative to the Notice Requirement? • Employers can comply with the notice requirement by updating their form agreements to include a cross- reference to a written policy provided to the employee, contractor or consultant that sets forth the employer’s reporting policy for a suspected violation of law. • To fully comply, the written policy must contain the immunity and anti-retaliation protection provisions provided for under the DTSA. 42
  • 43. PAGE Consequences of Non-Compliance • There is no statutory penalty for failing to provide notice. • Failure to comply with the notice requirement will result in a forfeiture of the ability to recover exemplary damages and attorneys fees in an action for misappropriate under the DTSA. • Employer may recover exemplary damages and attorney fees under the Texas Uniform Trade Secret Act. 43
  • 45. PAGE Questions? Kasi Chadwick BoyarMiller kchadwick@boyarmiller.com Alejandra Hamilton Boyar Miller ahamilton@boyarmiller.com David Brown and Paul brown CyberEvidence david.brown@cyberevidence.com paul.brown@cyberevidence.com 45