SlideShare a Scribd company logo
1 of 41
Download to read offline
Strategies to Maintain and Enforce your Trade Secrets 
David Enzminger, Sheryl Falk & John Keville
© 2014 Winston & Strawn LLP 
Today’s eLunch Presenters 
David Enzminger Silicon Valley Managing Partner denzminger@winston.com SV: (650) 858-6580 LA: (213) 615-1780 
John Keville 
Houston Office Managing Partner 
jkeville@winston.com 
(713) 651-2659 
Sheryl Falk 
Of Counsel Houston 
sfalk@winston.com 
713-651-2615
© 2014 Winston & Strawn LLP 
Presentation Agenda 
• 
Trade Secret Basics and Risk 
• 
What Protections are Available? 
• 
Kicking Off the Internal investigation 
• 
Making the Case: What Evidence Do You Need? 
• 
Taking Steps to Protect your Trade Secrets 
3
© 2014 Winston & Strawn LLP 
Trade Secret Protection: The Basics 
4 
A trade secret is: 
• 
a formula, pattern, physical device, idea, process, or compilation of information 
• 
not generally known or reasonably ascertainable 
• 
which can give a business an economic advantage over competitors 
Examples of Potential Trade Secrets 
• 
A formula or chemical composition 
• 
Survey methods used by professional pollsters 
• 
a new invention for which a patent application has not been filed 
• 
marketing strategies 
• 
computer algorithms
© 2014 Winston & Strawn LLP 
Trade Secret Theft By the Numbers 
5 
 
$300 Billion economic loss from trade secret theft 
 
59% of trade secret litigations are related to employees or former employees 
 
65% of insiders had accepted positions with a competitor 
 
50% steal data within a month of leaving 
 
54% used a network-email, a remote network access channel, or network file transfer
© 2014 Winston & Strawn LLP 
Federal Cases 
1950-2007 
2008 
Formulas 
4% (12) 
9% (11) 
Technical information and know-how 
46% (126) 
35% (42) 
Software or computer programs 
11% (29) 
10% (12) 
Customer Lists 
32% (86) 
31% (38) 
Internal business information 
31% (84) 
35% (42) 
External business information 
2% (5) 
1% (1) 
"Combination" trade secrets 
2% (5) 
1% (1) 
"Negative" trade secrets 
1% (2) 
0 
Other or unknown 
5% (14) 
9% (11) 
State Cases 
1995-2009 
Formulas 
5% (16) 
Technical information and know-how 
27% (98) 
Software or computer programs 
6% (23) 
Customer lists 
52% (187) 
Internal business information 
42% (150) 
External business information 
3% (10) 
“Combination” trade secrets 
0% (0) 
“Negative” trade secrets 
0% (0) 
Other or unknown 
6% (23) 
Source: David S. Almeling et al., A Statistical Analysis of Trade Secret Litigation in State Courts, 47 GONZ. L. REV. 57 (2011) 
Trade Secret Theft By the Numbers
© 2014 Winston & Strawn LLP 
What Protections Are Available?
© 2014 Winston & Strawn LLP 
Key Differences Between Patents and Trade Secrets 
8 
Patent 
Trade Secrets 
Applicable Law 
Federal Statute 
State Law 
Requirements 
Invention and application to the USPTO 
Information is created, kept secret, and has independent economic value due to being secret 
Exclusivity 
Yes 
No 
Reverse Engineering 
Not Permitted 
Complete defense if properly acquired 
Official Grant from Government 
Yes 
No 
Novelty 
Required 
Cannot be generally known or readily ascertainable 
Obviousness 
Must be nonobvious 
Cannot be generally known or readily ascertainable 
Duration 
Generally 20 years from application filing 
No express limitation
© 2014 Winston & Strawn LLP 
Uniform Trade Secret Act Varies By State 
 
Generally Provides a Uniform Law for the Protection of Trade Secrets 
• 
The UTSA “shall be applied and construed to effect its general purpose to make uniform the law with respect to the subject of [the UTSA] among the states enacting it.” 
 
UTSA Is Not Identical In All States 
 
Which State Law Governs Can be Important 
• 
Choice of Law Provisions in Nondisclosure Agreements and Covenants Not to Compete 
9
© 2014 Winston & Strawn LLP 
 
UTSA Definition § 1(4) 
Information, including a formula, pattern, compilation, program, device, method, technique, or process that: 
(i) 
derives independent economic value, actual or potential from not being generally known to, and not being readily ascertainable by proper means by other persons who can obtain economic value from its disclosure or use, and 
(ii) 
is the subject of efforts that are reasonable under the circumstances to maintain its secrecy 
Three Requirements: 
(1)Secret Information 
(2)Independent Economic Value 
(3)Reasonable Efforts to Maintain Secrecy 
What is a Trade Secret? 
10
© 2014 Winston & Strawn LLP 
 
Individual States Provide the Law for the Civil Enforcement and Protection of Trade Secrets 
 
47 States and the District of Columbia Have Adopted Broadly the Uniform Trade Secret Act (UTSA) 
 
Not adopted in NY, NC, or MA 
Basis for Civil Protection of Trade Secret Law 
11
© 2014 Winston & Strawn LLP 
Trade Secret Protection 
12 
 
To bring Trade Secret Litigation, you must: 
 
Establish a Trade Secret 
(1) 
secrecy 
(2) 
independent economic value 
(3) 
reasonable efforts to maintain secrecy 
 
Prove Misappropriation 
 
Allege damages and/or right to Injunctive Relief
© 2014 Winston & Strawn LLP 
 
The key part of a trade secret is secrecy 
 
Information that is generally known or readily available by independent investigation is not “secret” 
 
However, secrecy need not be absolute 
 
Only “a substantial element of secrecy must exist, so that except by the use of improper means, there would be difficulty in acquiring the information.” 
− 
For example, there is no surrender of secrecy where information disclosed with an expectation that information remain secret 
− 
NDAs, fiduciary relationships, employment agreements, confidentiality notices, etc. 
Requirement of Secrecy: How Secret? 
13
© 2014 Winston & Strawn LLP 
 
Under Examined Aspect of the UTSA 
 
Courts and Plaintiffs Often Ignore 
 
But it is a Requirement! 
 
Not Any Value – But Economic Value “Due to its Secrecy” 
 
UTSA Requirements Greater Than Traditionally Required at Common Law 
 
If Defendant, Do NOT Ignore! 
Requirement of Economic Value 
14
© 2014 Winston & Strawn LLP 
Requirement of “Reasonable Efforts” 
 
“LAW” 
− 
Must be Reasonable “Under the Circumstances” 
− 
Failure to do Anything Precludes Protection 
 
Practical Realities 
− 
The Worse Defendant’s Conduct, the Less the Requirement 
− 
Closer the Relationship, the Less the Requirement 
− 
Efforts Do Not Always Match the Risk 
15
© 2014 Winston & Strawn LLP 
• 
UTSA Definition §1(2) 
Misappropriation means: (i) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (ii) disclosure or use of a trade secret of another without express or implied consent by a person who (A) used improper means to acquire knowledge of the trade secret; or (B) at the time of disclosure or use, knew or had reason to know that his knowledge of the trade secret was (I) derived from or through a person who had utilized improper means to acquire it; (II) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or (III) derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or (C) before a material change of his [or her] position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake. 
Includes Actual or Threatened Misappropriation 
1. 
Wrongful Acquisition, 
2. 
Wrongful Disclosure, or 
3. 
Wrongful Use 
What is Misappropriation? 
16
© 2014 Winston & Strawn LLP 
• 
UTSA § 3. Damages 
(a) Except to the extent that a material and prejudicial change of position prior to acquiring knowledge or reason to know of misappropriation renders a monetary recovery inequitable, a complainant is entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropriation and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. In lieu of damages measured by any other methods, the damages caused by misappropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator’s unauthorized disclosure or use of a trade secret. (b) If willful and malicious misappropriation exists, the court may award exemplary damages in the amount not exceeding twice any award made under subsection (a). 
Monetary Damages 
1. 
Damages 
2. 
Disgorgement of Unjust Gains 
3. 
In Some Cases, a Reasonable Royalty 
4. 
Potential Punitive Damages 
Remedies: Damages Under The UTSA 
17
© 2014 Winston & Strawn LLP 
• 
UTSA § 2. Injunctive Relief 
(a) Actual or threatened misappropriation may be enjoined. Upon application to the court an injunction shall be terminated when the trade secret has ceased to exist, but the injunction may be continued for an additional reasonable period of time in order to eliminate commercial advantage that otherwise would be derived from the misappropriation. (b) In exceptional circumstances, an injunction may condition future use upon payment of a reasonable royalty for no longer than the period of time for which use could have been prohibited. Exceptional circumstances include, but are not limited to, a material and prejudicial change of position prior to acquiring knowledge or reason to know of misappropriation that renders a prohibitive injunction inequitable. (c) In appropriate circumstances, affirmative acts to protect a trade secret may be compelled by court order. 
Generally: Injunctive Relief to Prevent Future Misappropriation and to Remove “Lead Time Advantage” 
Remedies: Injunctive Relief Under The UTSA 
18
© 2014 Winston & Strawn LLP 
Inevitable Disclosure 
Majority Rule: 
• 
A limited duration injunction in many jurisdictions where an employee with significant trade secret knowledge departs for a competitor to perform the same or substantially similar job. 
• 
- PepsiCo v. Redmond, 54 F.3d 1262 (7th Cir. 1995) 
Minority (California): 
• 
Inevitable disclosure doctrine expressly rejected in California, which instead requires more evidence of actual or threatened misappropriation than a reliance on the knowledge of the employee and the scope of the employees next job. 
• 
- Whyte v. Schlage Lock, Co. 101 Cal. App. 4th 1443 (2002)
© 2014 Winston & Strawn LLP 
• 
UTSA § 4. Attorney’s Fees 
If (i) a claim of misappropriation is made in bad faith, (ii) a motion to terminate an injunction is made or resisted in bad faith, or (iii) willful and malicious misappropriation exists, the court may award reasonable attorney’s fees to the prevailing party. 
Summary: Attorney’s Fees Potentially Available to Prevailing Plaintiff or Defendant (Bad Faith Conduct) 
Remedies: Attorney’s Fees Under The UTSA 
20
© 2014 Winston & Strawn LLP 
Future Developments in Trade Secret Law 
 
Pending Legislation for Federal Trade Secret Law 
 
S.2267 (introduced April 29, 2014) 
 
H.R. 5233 (introduced July 29, 2014) 
 
Amends Economic Espionage Act to provide for civil cause of action: 
 
Based on Uniform Trade Secrets Act 
 
Concurrent Jurisdiction State/Federal 
 
Provide ex parte seizure provisions not found in UTSA adopted by 47 states 
 
Five year statute of limitation 
 
Necessary? 
 
State laws are remarkably uniform 
 
Federal jurisdiction is frequently invoked with diversity jurisdiction or pendent jurisdiction (Computer Fraud and Abuse Act)
© 2014 Winston & Strawn LLP 
Future Developments in Trade Secret Law 
 
Continued Federal Prosecution 
• 
“The Department of Justice has made investigation and prosecution of corporate and state sponsored trade secret theft a top priority.” 
Administration Strategy on Mitigating the Theft of U.S. Trade Secrets, February 2014
© 2014 Winston & Strawn LLP 
Kicking Off the Internal Investigation
© 2014 Winston & Strawn LLP 
Investigation Triggers 
25 
 
Suspicious Departures 
 
Multiple resignations within a group 
 
Employee leaving to work for competitor 
 
Employee not willing to divulge next employer 
 
Employee leaving for start-up company in same field 
 
Exposure to highly sensitive information 
 
Refusal to account for all company assets 
 
Frequent use of external USB devices 
 
Forwarding documents to external email address 
 
Copying documents to unapproved cloud storage services 
 
Use of external VPN services to hide activities 
 
New company with former employees announces competing product in suspiciously short time 
 
Improper customer contacts
© 2014 Winston & Strawn LLP 
The Internal Investigation –Preserving Evidence 
Secure and Forensically Preserve Evidence 
 
Obtain Forensic Copy of Relevant Evidence 
− 
Hard Drives, Email Archives, Server data, On-line storage 
 
Suspend Process Driven Deletions for Custodians 
 
Chain of Custody to document 26 
What are the Dangers of “do it yourself” collections? 
 
Inferior Tools, Training or Methods 
 
Attorney Mistakes 
 
If not correctly done, can erase evidence 
 
Spoliation and Tampering Claims
© 2014 Winston & Strawn LLP 
What Evidence Can You Get Through Forensic Analysis? 
• 
Manner and extent of a user’s theft of proprietary data 
• 
USB connections 
• 
Email 
• 
On-Line storage uploads 
• 
Communications with Competitor/Co- Conspirators 
• 
Calendar appointments/Contacts 
• 
Internet usage and online research 
• 
Timing and extent of file deletion or anti- forensics (wiping software)
© 2014 Winston & Strawn LLP 
Key questions to Answer = Key Dates 
28 
During Employment 
•When was resignation given 
•What devices were returned on departure 
•What was last day of employment 
After departure 
•Start date at new employer 
•What systems did they have access during this time 
On litigation filed 
•When was preservation letter sent 
•When was first notice given 
•What was suit served on defendant 
Spoliation 
Benefit to employer 
Intent and scope of theft
© 2014 Winston & Strawn LLP 
Case Lessons: What Evidence Do You Need?
© 2014 Winston & Strawn LLP 
Case Study 1 
30 
Investigation Triggers: 
•Two high level employees leave at same time 
•Exit interviews – no current plans 
•IT finds the returned computers have nothing – not even an operating system 
•Investigation starts 
•Their product looks like our product
© 2014 Winston & Strawn LLP 
Case Study 1: Compelled Production of Home Computers 
31 
Deleted emails showed the defendants had stolen confidential company information by emailing it to personal email accounts
© 2014 Winston & Strawn LLP 32 
Case Study 1: Home Computers Proved Spoliation 
Fragments in unallocated space showed why their work computers had no operating system
© 2014 Winston & Strawn LLP 33 
Case Study 1: Home Computers Proved Spoliation 
Disk logs showed that defendants tried to destroy evidence on home computers and USB devices 
The Court was convinced there was spoliation, and instructed the jury accordingly. 
2010-01-24 11:59:58 -0600: Disk Utility started. 2010-01-24 12:00:24 -0600: Preparing to zero disk : Secret Backup 2010-01-24 12:00:24 -0600: Passes : 0 2010-01-24 12:02:18 -0600: Preparing to erase : Secret Backup 2010-01-24 12:02:18 -0600: Partition Scheme: GUID Partition Table 2010-01-24 12:02:18 -0600: 1 volume will be erased 2010-01-24 12:02:18 -0600: Name : Secret Backup 2010-01-24 12:02:18 -0600: Size : 639.79 GB 2010-01-24 12:02:18 -0600: Filesystem : Mac OS Extended (Journaled) 2010-01-24 12:02:18 -0600: Unmounting disk 2010-01-24 12:02:18 -0600: Erasing 2010-01-24 12:02:58 -0600: Initialized /dev/rdisk1s2 as a 596 GB HFS Plus volume with a 49152k journal 2010-01-24 12:02:58 -0600: Mounting disk 2010-01-24 12:02:59 -0600: Could not mount disk1s2 with name Secret Backup after erase 2010-01-24 12:02:59 -0600: Erase complete.
© 2014 Winston & Strawn LLP 
Employee interviews with Competitor 
My Passport #1 Copies data and later returns to Company 
2/2 
Employee signs Competitor offer letter 
2/11-12 
Copies >15,000 files to My Passport #2 
3/11 
3 Devices last attached 
to Company Computer 
3/15 
My Passport #2 attached to iMac 
3/22 
My Passport 
#2 
Copied data using missing computer 
3/30 
__/__ 
Seagate 
5/13 
Accessed data from Seagate on Competitor computer 
6/10 
TRO Entered 
Placed majority of documents in recycle bin in Company 
computer 
Runs Ccleaner 9 times on Company computer 
Ran Ccleaner on Competitor Computer 
Seagate 
1/10 
1/21 
2/15 
3/9-11 
5/30 
Installs Ccleaner on Competitor computer 
Competitor’s Computer 
Case Study 2: Build the case with forensics
© 2014 Winston & Strawn LLP 
Case Study 3: Not all evidence is forensic 
35
© 2014 Winston & Strawn LLP 
Case Studies Take Aways 
36 
1. 
Act quickly to investigate suspicious activity or resignations 
2. 
Build the case before filing 
• 
Don’t count on discovery without a hook 
• 
If they stole your trade secrets, they will likely lie and destroy evidence 
3. 
Pursue aggressive discovery based upon pre-filing foundation
© 2014 Winston & Strawn LLP 
Can I get my opponent’s hard drive? 
Your chances are stronger if you establish need. 
• 
Show non-compliance with discovery 
• 
Show evidence of missing USB devices 
• 
Show destruction of other evidence 
• 
Show no alternate method to obtain data 
• 
Possibly suggest a neutral expert 
• 
Argue truth and justice (especially in trade secret cases) 
Case Studies Take Aways
© 2014 Winston & Strawn LLP 
Taking Steps to Protect Your Trade Secrets
© 2014 Winston & Strawn LLP 
Tips to Protect Trade Secrets 
• 
Understand Portfolio of Confidential Data 
• 
Restrict Access to Trade Secret Information/Databases 
• 
Use Confidentiality Labels 
• 
Require Every Employee to Sign Confidentiality Agreements 
• 
Limit information provided to Outsiders 
• 
Use Exit Interviews for departing employees 
• 
Consider Pro-active investigation for employees who meet investigation triggers 
39
© 2014 Winston & Strawn LLP 
Tips for Securing your data from External Threats 
1. 
Protect your most sensitive data 
• 
Encrypt your sensitive data 
• 
Tokenization 
• 
Data loss prevention systems 
2. 
Use Effective Password Management 
3. 
Consider multi-factor authentication 
4. 
Enforce lock out policies 
5. 
Keep good logs 
6. 
Look for suspicious activity 
7. 
Have a plan to respond quickly
© 2014 Winston & Strawn LLP 
Questions?
© 2014 Winston & Strawn LLP 
Thank You. 
David Enzminger Silicon Valley Managing Partner denzminger@winston.com SV: (650) 858-6580 LA: (213) 615-1780 
John Keville Houston Office Managing Partner jkeville@winston.com (713) 651-2659 
Sheryl Falk Of Counsel Houston sfalk@winston.com 713-651-2615

More Related Content

What's hot

Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...Ethisphere
 
Legal Shield Plan Information
Legal Shield Plan InformationLegal Shield Plan Information
Legal Shield Plan Informationpfcarter
 
Ethics at the Intersection of Law Practice and Technology
Ethics at the Intersection of Law Practice and TechnologyEthics at the Intersection of Law Practice and Technology
Ethics at the Intersection of Law Practice and TechnologyDowney Law Group LLC
 
2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...
2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...
2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...Quarles & Brady
 
Asia Counsel Insights 1 July 2015
Asia Counsel Insights 1 July 2015Asia Counsel Insights 1 July 2015
Asia Counsel Insights 1 July 2015ACVaccount
 
Uk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 FinalUk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 FinalMayer Brown LLP
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 

What's hot (8)

Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
 
Legal Shield Plan Information
Legal Shield Plan InformationLegal Shield Plan Information
Legal Shield Plan Information
 
Ethics at the Intersection of Law Practice and Technology
Ethics at the Intersection of Law Practice and TechnologyEthics at the Intersection of Law Practice and Technology
Ethics at the Intersection of Law Practice and Technology
 
2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...
2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...
2019 Insurance Law Series: Insurance Coverage for Business Torts & Related Cl...
 
Asia Counsel Insights 1 July 2015
Asia Counsel Insights 1 July 2015Asia Counsel Insights 1 July 2015
Asia Counsel Insights 1 July 2015
 
Uk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 FinalUk Anti Bribery Act Slideshow 0211 Final
Uk Anti Bribery Act Slideshow 0211 Final
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
GI Industrial Special Risk Policy
GI Industrial Special Risk PolicyGI Industrial Special Risk Policy
GI Industrial Special Risk Policy
 

Similar to Strategies to Maintain and Enforce your Trade Secrets

USA Insider Trading Law: Recent Developments
USA Insider Trading Law: Recent DevelopmentsUSA Insider Trading Law: Recent Developments
USA Insider Trading Law: Recent DevelopmentsStephen Bainbridge
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
 
Hey that's my client! Protecting client lists and confidential information wh...
Hey that's my client! Protecting client lists and confidential information wh...Hey that's my client! Protecting client lists and confidential information wh...
Hey that's my client! Protecting client lists and confidential information wh...Mike Fourcher
 
October 17, 2005 - Third Quarter Press Release
October 17, 2005 - Third Quarter Press ReleaseOctober 17, 2005 - Third Quarter Press Release
October 17, 2005 - Third Quarter Press ReleaseQuarterlyEarningsReports
 
Ccs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.boseCcs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.boseShankar Bose Sbose1958
 
Social Media Finding Your Voice
Social Media   Finding Your VoiceSocial Media   Finding Your Voice
Social Media Finding Your VoiceIan Farmer
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryHNI Risk Services
 
Cayman Islands Data Protection Law - Bell Rock Group
Cayman Islands Data Protection Law - Bell Rock GroupCayman Islands Data Protection Law - Bell Rock Group
Cayman Islands Data Protection Law - Bell Rock GroupBell Rock Group
 
Protect your clients from fraud - CPA's
Protect your clients from fraud - CPA'sProtect your clients from fraud - CPA's
Protect your clients from fraud - CPA'stwhiteman
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 

Similar to Strategies to Maintain and Enforce your Trade Secrets (20)

USA Insider Trading Law: Recent Developments
USA Insider Trading Law: Recent DevelopmentsUSA Insider Trading Law: Recent Developments
USA Insider Trading Law: Recent Developments
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...
 
Hey that's my client! Protecting client lists and confidential information wh...
Hey that's my client! Protecting client lists and confidential information wh...Hey that's my client! Protecting client lists and confidential information wh...
Hey that's my client! Protecting client lists and confidential information wh...
 
October 17, 2005 - Third Quarter Press Release
October 17, 2005 - Third Quarter Press ReleaseOctober 17, 2005 - Third Quarter Press Release
October 17, 2005 - Third Quarter Press Release
 
Ccs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.boseCcs conduct rules.do and donot.vigilance aspect.bose
Ccs conduct rules.do and donot.vigilance aspect.bose
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
 
Defend Trade Secrets Act of 2016
Defend Trade Secrets Act of 2016Defend Trade Secrets Act of 2016
Defend Trade Secrets Act of 2016
 
Cyprus international Trusts
Cyprus international TrustsCyprus international Trusts
Cyprus international Trusts
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
 
Social Media Finding Your Voice
Social Media   Finding Your VoiceSocial Media   Finding Your Voice
Social Media Finding Your Voice
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Cyprus International Trusts
Cyprus International TrustsCyprus International Trusts
Cyprus International Trusts
 
20070930 Google 10 Q
20070930 Google 10 Q20070930 Google 10 Q
20070930 Google 10 Q
 
Cayman Islands Data Protection Law - Bell Rock Group
Cayman Islands Data Protection Law - Bell Rock GroupCayman Islands Data Protection Law - Bell Rock Group
Cayman Islands Data Protection Law - Bell Rock Group
 
Protect your clients from fraud - CPA's
Protect your clients from fraud - CPA'sProtect your clients from fraud - CPA's
Protect your clients from fraud - CPA's
 
Recent developments in whistleblower law (9 30-15)
Recent developments in whistleblower law (9 30-15)Recent developments in whistleblower law (9 30-15)
Recent developments in whistleblower law (9 30-15)
 
Unit 4 trade secret 1
Unit 4 trade secret 1Unit 4 trade secret 1
Unit 4 trade secret 1
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Insider
InsiderInsider
Insider
 

More from Winston & Strawn LLP

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesWinston & Strawn LLP
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaWinston & Strawn LLP
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsWinston & Strawn LLP
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceWinston & Strawn LLP
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Winston & Strawn LLP
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansWinston & Strawn LLP
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Winston & Strawn LLP
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceWinston & Strawn LLP
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions ProgramWinston & Strawn LLP
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Winston & Strawn LLP
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Winston & Strawn LLP
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesWinston & Strawn LLP
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsWinston & Strawn LLP
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBWinston & Strawn LLP
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...Winston & Strawn LLP
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...Winston & Strawn LLP
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareWinston & Strawn LLP
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...Winston & Strawn LLP
 

More from Winston & Strawn LLP (20)

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law Landmines
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) Guidance
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement Plans
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions Program
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical Devices
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and Implications
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRB
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
 

Recently uploaded

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 

Recently uploaded (20)

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 

Strategies to Maintain and Enforce your Trade Secrets

  • 1. Strategies to Maintain and Enforce your Trade Secrets David Enzminger, Sheryl Falk & John Keville
  • 2. © 2014 Winston & Strawn LLP Today’s eLunch Presenters David Enzminger Silicon Valley Managing Partner denzminger@winston.com SV: (650) 858-6580 LA: (213) 615-1780 John Keville Houston Office Managing Partner jkeville@winston.com (713) 651-2659 Sheryl Falk Of Counsel Houston sfalk@winston.com 713-651-2615
  • 3. © 2014 Winston & Strawn LLP Presentation Agenda • Trade Secret Basics and Risk • What Protections are Available? • Kicking Off the Internal investigation • Making the Case: What Evidence Do You Need? • Taking Steps to Protect your Trade Secrets 3
  • 4. © 2014 Winston & Strawn LLP Trade Secret Protection: The Basics 4 A trade secret is: • a formula, pattern, physical device, idea, process, or compilation of information • not generally known or reasonably ascertainable • which can give a business an economic advantage over competitors Examples of Potential Trade Secrets • A formula or chemical composition • Survey methods used by professional pollsters • a new invention for which a patent application has not been filed • marketing strategies • computer algorithms
  • 5. © 2014 Winston & Strawn LLP Trade Secret Theft By the Numbers 5  $300 Billion economic loss from trade secret theft  59% of trade secret litigations are related to employees or former employees  65% of insiders had accepted positions with a competitor  50% steal data within a month of leaving  54% used a network-email, a remote network access channel, or network file transfer
  • 6. © 2014 Winston & Strawn LLP Federal Cases 1950-2007 2008 Formulas 4% (12) 9% (11) Technical information and know-how 46% (126) 35% (42) Software or computer programs 11% (29) 10% (12) Customer Lists 32% (86) 31% (38) Internal business information 31% (84) 35% (42) External business information 2% (5) 1% (1) "Combination" trade secrets 2% (5) 1% (1) "Negative" trade secrets 1% (2) 0 Other or unknown 5% (14) 9% (11) State Cases 1995-2009 Formulas 5% (16) Technical information and know-how 27% (98) Software or computer programs 6% (23) Customer lists 52% (187) Internal business information 42% (150) External business information 3% (10) “Combination” trade secrets 0% (0) “Negative” trade secrets 0% (0) Other or unknown 6% (23) Source: David S. Almeling et al., A Statistical Analysis of Trade Secret Litigation in State Courts, 47 GONZ. L. REV. 57 (2011) Trade Secret Theft By the Numbers
  • 7. © 2014 Winston & Strawn LLP What Protections Are Available?
  • 8. © 2014 Winston & Strawn LLP Key Differences Between Patents and Trade Secrets 8 Patent Trade Secrets Applicable Law Federal Statute State Law Requirements Invention and application to the USPTO Information is created, kept secret, and has independent economic value due to being secret Exclusivity Yes No Reverse Engineering Not Permitted Complete defense if properly acquired Official Grant from Government Yes No Novelty Required Cannot be generally known or readily ascertainable Obviousness Must be nonobvious Cannot be generally known or readily ascertainable Duration Generally 20 years from application filing No express limitation
  • 9. © 2014 Winston & Strawn LLP Uniform Trade Secret Act Varies By State  Generally Provides a Uniform Law for the Protection of Trade Secrets • The UTSA “shall be applied and construed to effect its general purpose to make uniform the law with respect to the subject of [the UTSA] among the states enacting it.”  UTSA Is Not Identical In All States  Which State Law Governs Can be Important • Choice of Law Provisions in Nondisclosure Agreements and Covenants Not to Compete 9
  • 10. © 2014 Winston & Strawn LLP  UTSA Definition § 1(4) Information, including a formula, pattern, compilation, program, device, method, technique, or process that: (i) derives independent economic value, actual or potential from not being generally known to, and not being readily ascertainable by proper means by other persons who can obtain economic value from its disclosure or use, and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy Three Requirements: (1)Secret Information (2)Independent Economic Value (3)Reasonable Efforts to Maintain Secrecy What is a Trade Secret? 10
  • 11. © 2014 Winston & Strawn LLP  Individual States Provide the Law for the Civil Enforcement and Protection of Trade Secrets  47 States and the District of Columbia Have Adopted Broadly the Uniform Trade Secret Act (UTSA)  Not adopted in NY, NC, or MA Basis for Civil Protection of Trade Secret Law 11
  • 12. © 2014 Winston & Strawn LLP Trade Secret Protection 12  To bring Trade Secret Litigation, you must:  Establish a Trade Secret (1) secrecy (2) independent economic value (3) reasonable efforts to maintain secrecy  Prove Misappropriation  Allege damages and/or right to Injunctive Relief
  • 13. © 2014 Winston & Strawn LLP  The key part of a trade secret is secrecy  Information that is generally known or readily available by independent investigation is not “secret”  However, secrecy need not be absolute  Only “a substantial element of secrecy must exist, so that except by the use of improper means, there would be difficulty in acquiring the information.” − For example, there is no surrender of secrecy where information disclosed with an expectation that information remain secret − NDAs, fiduciary relationships, employment agreements, confidentiality notices, etc. Requirement of Secrecy: How Secret? 13
  • 14. © 2014 Winston & Strawn LLP  Under Examined Aspect of the UTSA  Courts and Plaintiffs Often Ignore  But it is a Requirement!  Not Any Value – But Economic Value “Due to its Secrecy”  UTSA Requirements Greater Than Traditionally Required at Common Law  If Defendant, Do NOT Ignore! Requirement of Economic Value 14
  • 15. © 2014 Winston & Strawn LLP Requirement of “Reasonable Efforts”  “LAW” − Must be Reasonable “Under the Circumstances” − Failure to do Anything Precludes Protection  Practical Realities − The Worse Defendant’s Conduct, the Less the Requirement − Closer the Relationship, the Less the Requirement − Efforts Do Not Always Match the Risk 15
  • 16. © 2014 Winston & Strawn LLP • UTSA Definition §1(2) Misappropriation means: (i) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (ii) disclosure or use of a trade secret of another without express or implied consent by a person who (A) used improper means to acquire knowledge of the trade secret; or (B) at the time of disclosure or use, knew or had reason to know that his knowledge of the trade secret was (I) derived from or through a person who had utilized improper means to acquire it; (II) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or (III) derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or (C) before a material change of his [or her] position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake. Includes Actual or Threatened Misappropriation 1. Wrongful Acquisition, 2. Wrongful Disclosure, or 3. Wrongful Use What is Misappropriation? 16
  • 17. © 2014 Winston & Strawn LLP • UTSA § 3. Damages (a) Except to the extent that a material and prejudicial change of position prior to acquiring knowledge or reason to know of misappropriation renders a monetary recovery inequitable, a complainant is entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropriation and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. In lieu of damages measured by any other methods, the damages caused by misappropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator’s unauthorized disclosure or use of a trade secret. (b) If willful and malicious misappropriation exists, the court may award exemplary damages in the amount not exceeding twice any award made under subsection (a). Monetary Damages 1. Damages 2. Disgorgement of Unjust Gains 3. In Some Cases, a Reasonable Royalty 4. Potential Punitive Damages Remedies: Damages Under The UTSA 17
  • 18. © 2014 Winston & Strawn LLP • UTSA § 2. Injunctive Relief (a) Actual or threatened misappropriation may be enjoined. Upon application to the court an injunction shall be terminated when the trade secret has ceased to exist, but the injunction may be continued for an additional reasonable period of time in order to eliminate commercial advantage that otherwise would be derived from the misappropriation. (b) In exceptional circumstances, an injunction may condition future use upon payment of a reasonable royalty for no longer than the period of time for which use could have been prohibited. Exceptional circumstances include, but are not limited to, a material and prejudicial change of position prior to acquiring knowledge or reason to know of misappropriation that renders a prohibitive injunction inequitable. (c) In appropriate circumstances, affirmative acts to protect a trade secret may be compelled by court order. Generally: Injunctive Relief to Prevent Future Misappropriation and to Remove “Lead Time Advantage” Remedies: Injunctive Relief Under The UTSA 18
  • 19. © 2014 Winston & Strawn LLP Inevitable Disclosure Majority Rule: • A limited duration injunction in many jurisdictions where an employee with significant trade secret knowledge departs for a competitor to perform the same or substantially similar job. • - PepsiCo v. Redmond, 54 F.3d 1262 (7th Cir. 1995) Minority (California): • Inevitable disclosure doctrine expressly rejected in California, which instead requires more evidence of actual or threatened misappropriation than a reliance on the knowledge of the employee and the scope of the employees next job. • - Whyte v. Schlage Lock, Co. 101 Cal. App. 4th 1443 (2002)
  • 20. © 2014 Winston & Strawn LLP • UTSA § 4. Attorney’s Fees If (i) a claim of misappropriation is made in bad faith, (ii) a motion to terminate an injunction is made or resisted in bad faith, or (iii) willful and malicious misappropriation exists, the court may award reasonable attorney’s fees to the prevailing party. Summary: Attorney’s Fees Potentially Available to Prevailing Plaintiff or Defendant (Bad Faith Conduct) Remedies: Attorney’s Fees Under The UTSA 20
  • 21. © 2014 Winston & Strawn LLP Future Developments in Trade Secret Law  Pending Legislation for Federal Trade Secret Law  S.2267 (introduced April 29, 2014)  H.R. 5233 (introduced July 29, 2014)  Amends Economic Espionage Act to provide for civil cause of action:  Based on Uniform Trade Secrets Act  Concurrent Jurisdiction State/Federal  Provide ex parte seizure provisions not found in UTSA adopted by 47 states  Five year statute of limitation  Necessary?  State laws are remarkably uniform  Federal jurisdiction is frequently invoked with diversity jurisdiction or pendent jurisdiction (Computer Fraud and Abuse Act)
  • 22. © 2014 Winston & Strawn LLP Future Developments in Trade Secret Law  Continued Federal Prosecution • “The Department of Justice has made investigation and prosecution of corporate and state sponsored trade secret theft a top priority.” Administration Strategy on Mitigating the Theft of U.S. Trade Secrets, February 2014
  • 23. © 2014 Winston & Strawn LLP Kicking Off the Internal Investigation
  • 24. © 2014 Winston & Strawn LLP Investigation Triggers 25  Suspicious Departures  Multiple resignations within a group  Employee leaving to work for competitor  Employee not willing to divulge next employer  Employee leaving for start-up company in same field  Exposure to highly sensitive information  Refusal to account for all company assets  Frequent use of external USB devices  Forwarding documents to external email address  Copying documents to unapproved cloud storage services  Use of external VPN services to hide activities  New company with former employees announces competing product in suspiciously short time  Improper customer contacts
  • 25. © 2014 Winston & Strawn LLP The Internal Investigation –Preserving Evidence Secure and Forensically Preserve Evidence  Obtain Forensic Copy of Relevant Evidence − Hard Drives, Email Archives, Server data, On-line storage  Suspend Process Driven Deletions for Custodians  Chain of Custody to document 26 What are the Dangers of “do it yourself” collections?  Inferior Tools, Training or Methods  Attorney Mistakes  If not correctly done, can erase evidence  Spoliation and Tampering Claims
  • 26. © 2014 Winston & Strawn LLP What Evidence Can You Get Through Forensic Analysis? • Manner and extent of a user’s theft of proprietary data • USB connections • Email • On-Line storage uploads • Communications with Competitor/Co- Conspirators • Calendar appointments/Contacts • Internet usage and online research • Timing and extent of file deletion or anti- forensics (wiping software)
  • 27. © 2014 Winston & Strawn LLP Key questions to Answer = Key Dates 28 During Employment •When was resignation given •What devices were returned on departure •What was last day of employment After departure •Start date at new employer •What systems did they have access during this time On litigation filed •When was preservation letter sent •When was first notice given •What was suit served on defendant Spoliation Benefit to employer Intent and scope of theft
  • 28. © 2014 Winston & Strawn LLP Case Lessons: What Evidence Do You Need?
  • 29. © 2014 Winston & Strawn LLP Case Study 1 30 Investigation Triggers: •Two high level employees leave at same time •Exit interviews – no current plans •IT finds the returned computers have nothing – not even an operating system •Investigation starts •Their product looks like our product
  • 30. © 2014 Winston & Strawn LLP Case Study 1: Compelled Production of Home Computers 31 Deleted emails showed the defendants had stolen confidential company information by emailing it to personal email accounts
  • 31. © 2014 Winston & Strawn LLP 32 Case Study 1: Home Computers Proved Spoliation Fragments in unallocated space showed why their work computers had no operating system
  • 32. © 2014 Winston & Strawn LLP 33 Case Study 1: Home Computers Proved Spoliation Disk logs showed that defendants tried to destroy evidence on home computers and USB devices The Court was convinced there was spoliation, and instructed the jury accordingly. 2010-01-24 11:59:58 -0600: Disk Utility started. 2010-01-24 12:00:24 -0600: Preparing to zero disk : Secret Backup 2010-01-24 12:00:24 -0600: Passes : 0 2010-01-24 12:02:18 -0600: Preparing to erase : Secret Backup 2010-01-24 12:02:18 -0600: Partition Scheme: GUID Partition Table 2010-01-24 12:02:18 -0600: 1 volume will be erased 2010-01-24 12:02:18 -0600: Name : Secret Backup 2010-01-24 12:02:18 -0600: Size : 639.79 GB 2010-01-24 12:02:18 -0600: Filesystem : Mac OS Extended (Journaled) 2010-01-24 12:02:18 -0600: Unmounting disk 2010-01-24 12:02:18 -0600: Erasing 2010-01-24 12:02:58 -0600: Initialized /dev/rdisk1s2 as a 596 GB HFS Plus volume with a 49152k journal 2010-01-24 12:02:58 -0600: Mounting disk 2010-01-24 12:02:59 -0600: Could not mount disk1s2 with name Secret Backup after erase 2010-01-24 12:02:59 -0600: Erase complete.
  • 33. © 2014 Winston & Strawn LLP Employee interviews with Competitor My Passport #1 Copies data and later returns to Company 2/2 Employee signs Competitor offer letter 2/11-12 Copies >15,000 files to My Passport #2 3/11 3 Devices last attached to Company Computer 3/15 My Passport #2 attached to iMac 3/22 My Passport #2 Copied data using missing computer 3/30 __/__ Seagate 5/13 Accessed data from Seagate on Competitor computer 6/10 TRO Entered Placed majority of documents in recycle bin in Company computer Runs Ccleaner 9 times on Company computer Ran Ccleaner on Competitor Computer Seagate 1/10 1/21 2/15 3/9-11 5/30 Installs Ccleaner on Competitor computer Competitor’s Computer Case Study 2: Build the case with forensics
  • 34. © 2014 Winston & Strawn LLP Case Study 3: Not all evidence is forensic 35
  • 35. © 2014 Winston & Strawn LLP Case Studies Take Aways 36 1. Act quickly to investigate suspicious activity or resignations 2. Build the case before filing • Don’t count on discovery without a hook • If they stole your trade secrets, they will likely lie and destroy evidence 3. Pursue aggressive discovery based upon pre-filing foundation
  • 36. © 2014 Winston & Strawn LLP Can I get my opponent’s hard drive? Your chances are stronger if you establish need. • Show non-compliance with discovery • Show evidence of missing USB devices • Show destruction of other evidence • Show no alternate method to obtain data • Possibly suggest a neutral expert • Argue truth and justice (especially in trade secret cases) Case Studies Take Aways
  • 37. © 2014 Winston & Strawn LLP Taking Steps to Protect Your Trade Secrets
  • 38. © 2014 Winston & Strawn LLP Tips to Protect Trade Secrets • Understand Portfolio of Confidential Data • Restrict Access to Trade Secret Information/Databases • Use Confidentiality Labels • Require Every Employee to Sign Confidentiality Agreements • Limit information provided to Outsiders • Use Exit Interviews for departing employees • Consider Pro-active investigation for employees who meet investigation triggers 39
  • 39. © 2014 Winston & Strawn LLP Tips for Securing your data from External Threats 1. Protect your most sensitive data • Encrypt your sensitive data • Tokenization • Data loss prevention systems 2. Use Effective Password Management 3. Consider multi-factor authentication 4. Enforce lock out policies 5. Keep good logs 6. Look for suspicious activity 7. Have a plan to respond quickly
  • 40. © 2014 Winston & Strawn LLP Questions?
  • 41. © 2014 Winston & Strawn LLP Thank You. David Enzminger Silicon Valley Managing Partner denzminger@winston.com SV: (650) 858-6580 LA: (213) 615-1780 John Keville Houston Office Managing Partner jkeville@winston.com (713) 651-2659 Sheryl Falk Of Counsel Houston sfalk@winston.com 713-651-2615