SlideShare a Scribd company logo
1 of 35
Download to read offline
Trade Secret Theft:
Protecting the Crown Jewels
March 25, 2015
Presented by: Dan Rubinstein
Today’s eLunch Presenter
Dan Rubinstein
Litigation
Chicago, Los Angeles
drubinstein@winston.com
2
Trade Secret Theft:
Protecting the Crown Jewels
• Background on the Legal Terrain – Federal and State
• Protecting Your Trade Secrets
• Conducting a Trade Secret Theft Investigation
• Working with the FBI and Law Enforcement
• Remedies
3
Background on the Legal Terrain
Key Federal Statutes
• Computer Fraud and Abuse Act, 18 U.S.C. § 1030
• Unauthorized Access
• Civil Remedy
• Economic Espionage Act, 18 U.S.C. §§ 1831-1839
• Theft
5
Computer Fraud and Abuse Act (CFAA)
• 18 U.S.C. § 1030
• Protects information on computer systems
• Applies even if data is not a trade secret or not well-protected
6
CFAA – Elements and Remedies
• The defendant has:
• Accessed a “protected computer”
• Virtually every business computer system with Internet access
• “Without authorization” or by “exceeding such authorization as was
granted”
• Knowingly and with intent to defraud
• Furthered the intended fraud and obtained anything of value
7
CFAA – Penalties
• Criminal Penalties – 3 tiers:
• Tier 1: Simple violations punished as misdemeanors, imprisonment for not
more than one year and fine of not more than $100,000
• Tier 2: Imprisonment not more than 5 years and/or fine of not more than
$250,000
• Done for commercial advantage or private financial gain
• Offense committed in furtherance of criminal or tortious act
• Value of information exceeds $5,000
• Tier 3: For repeat offenders – imprisonment not more than 10 years and/or
fine of not more than $250,000
• Possibility of forfeiture, restitution
8
CFAA – Civil Suits
• There is a private cause of action for compensatory damages
and injunctive relief for victims of § 1030 violations, where:
• Aggregate $5,000 loss
• Physical harm or threat to public health or safety
• Damage affecting 10 or more protected computers during any 1-year period
• Must be brought within two years of the offense
9
Economic Espionage Act
• 18 U.S.C. §§ 1831-1839
• Purpose: to provide greater protection for proprietary and
economic information of corporate and governmental entities
from foreign as well as domestic theft
• Covers “trade secrets,” which the statute defines broadly to
include both tangible and intangible property
10
Trade Secreted Definition
• Information
• Not generally known
• From which the owner derives economic value from its secrecy
• Reasonable efforts have been made to protect its secrecy
• Information must have a nexus with interstate or foreign
commerce
11
Economic Espionage Act - Penalties
• Provides criminal and civil penalties for theft of trade secrets
• Enhanced penalties if intellectual property is taken with an intent
to benefit a foreign government
• Punishable by imprisonment for not more than 10 years and/or
a large fine
12
Other Claims
• National Stolen Property Act (18 U.S.C. § 2314)
• Transports, transmits, or transfers (in interstate commerce)
• Goods, wares, merchandise, securities or money, valued at $5,000 or more
• Knowing the same to have been stolen, converted, or taken by fraud
• Some state law claims complement federal civil claims
• Breach of confidentiality or non-disclosure agreements
• State trade secrets acts – e.g., Illinois Trade Secrets Act, 765 ILCS § 1065
• Breach of fiduciary duty
• Conversion
13
Protecting Your Trade Secrets
Protecting Trade Secrets
• Implement robust confidentiality agreements and IP policies
• Tiered policies based on access level
• Enforce policies (and document enforcement)
• Regular training where employees re-acknowledge the restrictions
• Limit the physical/electronic access to confidential IP
• Eliminate duplicates
• Compartmentalize sensitive information
• Restrict access to core group of employees
• Implement tiered access levels
15
Protecting Trade Secrets
• Use restrictions
• Portable devices/storage
• Private email
• Remote connectivity
• Monitoring
• Network monitoring
• Filters/screens
• Employee monitoring
16
Conducting a Trade Secret Theft Investigation
Goals of an Investigation
• Conduct a thorough, expeditious, and independent investigation
that can withstand scrutiny
• General factual resolution, legal analysis, root cause analysis,
remediation, and proportionate discipline while assessing
liability and improving internal controls
• Protect the reputation of the reporters and accused employees
and the integrity of the investigation
• Minimize business disruption
• Manage internal communications and expectations
• Recommend discipline (where necessary) with a consistent
approach
19
The Benefits of Outside Counsel
• Tested protocol for ensuring relevant materials are preserved
and interviews are properly conducted
• Investigation appears more independent and credible than a
purely internal team
• Beneficial relationship with law enforcement
• Interviewing and investigative techniques
• If allegations implicate senior management, unaffiliated counsel
is preferable
• Single-purpose interaction (maintains relationships)
20
Components of a Successful Internal Investigation
• Teamwork
• Tailored Engagement Letters
• Evidence-gathering
• Documents
• Witness interviews
• Documenting the Investigation
• Maintaining Privilege
21
Teamwork
• Investigations require effective communications between in-house
counsel, compliance officers, employees, and outside counsel
• In-house Counsel
• Facilitates communication between outside counsel and employees and assists with the
preservation and collection of documentary evidence
• Compliance Officer
• Determines the veracity of an internal allegation of wrongdoing and whether a corporate
compliance policy was violated
• Outside Investigation Counsel
• Takes the lead in gathering evidence, reviewing the facts, interviewing witnesses, and
preparing conclusions for the client
• Other internal resources: IT, Corporate Audit, Human Resources, Corporate
Secretary, Corporate Security, Finance, Brand Integrity, and others
22
Well-Tailored Engagement Letters
• Must tailor engagement to the task at hand
• Describe:
• Goals and scope of the investigation
• Anticipated costs involved
• Client’s expectation from outside investigation counsel at the end of the
investigation
• Key language in the engagement letter or memo to file stating
that outside counsel will be conducting an investigation so that
counsel “can develop the factual information necessary to
render legal advice”
23
Document Collection
• Before interviewing witnesses, need an understanding of
relevant documentary evidence
• In-house counsel plays key role
• Identifies document custodians and helps to define a targeted search
• Distributes document preservation memo
• Avoid obstruction of justice allegations
24
Witness Interviews
• Schedule in manner to minimize collusion
• Conduct in private area where employee feels comfortable
• Administer an UpJohn warning
• Two-person interview teams
• Request interviewee to bring relevant documents in possession
• Document the interview
25
Documenting the Investigation
• All written communications re: the investigation must include the
caption, “Attorney-Client Communication, Attorney Work Product”
• Write interview memos
• Always document that UpJohn was given and acknowledged
• Include who was present, as well as location and time of interview
• Include the following disclaimer:
• This memorandum contains attorney thoughts and mental impressions. The information provided
herein is organized by topic and is not in chronological order. The memorandum is not a verbatim
transcript or witness statement and it is expected that this memorandum will be treated as
privileged and confidential attorney work product. This memorandum is not for distribution
• Details, details, details
26
Maintaining Privilege
• Maintaining attorney-client privilege over the investigation is paramount
• Interviews conducted, forensic audit analysis, digital forensic examinations,
and respective documentation by non-attorneys must be done at the
direction of counsel to keep the privilege intact
• Discuss with non-attorneys so that all team members are clear
• Helps to avoid potential disputes, and provides flexibility, about whether
privileged information should be disclosed in response to requests from the
government, regulators, or private litigants
27
Concluding an Investigation
• Better is the enemy of good
• Exhaust all reasonable measures in fact-gathering process
• Closing Report
• Likely reviewed by members of the board, General Counsel, CEO, and C-
suite executives, and possibly government regulators or law enforcement
• Review past precedent to ensure recommended remediation
and discipline (if any) is appropriate
• Consult with in-house counsel prior to communicating findings
to relevant stakeholders
28
Working with the FBI and Law Enforcement
Whether to Make a Federal Criminal Referral
• Referral is “letting the lion out of the cage”
• Publicity risk (USAO press release, media attention)
• Potential privilege waiver by disclosing work product created
during the investigation
• Lerman v. Turner, 2011 WL 62124 (N.D. Ill. 2011) (requiring an attorney who
had conducted the internal investigation to turn over a memo summarizing
certain employee interviews when the attorney had already disclosed to the
government an investigation report that included summaries of other
employee interviews)
• SEC v. Berry, No. 07-04431, 2011 WL 825742 (N.D. Cal. Mar. 7, 2011)
(ordering production of 5 witness interview memos, substance of which had
ben disclosed to the government orally; though no waiver with respect to
counsel’s notes on basis that waiver as to final product does not waive
privilege as to drafts)
30
Benefits of a Criminal Referral
• Creates an atmosphere where employees know that trade
secrets are highly valued by the company
• Law enforcement bring investigative tools and resources
(subpoenas, search warrants, wire-taps, arrests)
• Recent examples
• Chicago-based financial firm:
• Twenty-three-count superseding indictment against two former employees, alleging scheme to
defraud, theft of trade secrets, violation of the CFAA, and obstruction of justice
• Internal investigation into anomalies on an employee’s user account uncovered use of virtual
machines and transferring of company files via removable storage devices
• Both employees eventually pleaded guilty – one received 3 years in prison followed by three
years supervised release, and the other received 3 years’ probation
• Both defendants were ordered to pay restitution for the cost of its internal investigation -
$759,649.55
31
Benefits of a Criminal Referral (cont’d)
• Examples (cont’d)
• CME:
• The USAO indicted a former software engineer for CME Group, Inc. for allegedly downloading
and removing computer source code and other proprietary information while also pursuing
business plans to improve an electronic trading exchange in China. The stolen code was
estimated to cost $2.1 million
• The employee pleaded guilty to two counts of trade secrets theft and was sentenced to four
years of probation
• Valspar (David Lee)
• A former Valspar Corp. chemist used his access to Valspar’s secure internal computer network
to steal roughly 160 secret formulas for paints and coatings to use at his new job with a
competitor. He also took raw materials information, chemical formulas and calculations, sales
and cost data, product research, marketing data, internal memos, and other materials
• He pleaded guilty to stealing trade secrets worth approximately $20 million. He received 15
months in federal prison. Also ordered to pay $31,000 to reimburse Valspar for the cost of
its internal investigation
32
Remedies for Trade Secret Theft
Trade Secret Theft – Remedies
• Return of stolen property
• Restitution: Repayment of money spent on investigation
• Civil remedies
• Enhances perception of company’s protection of trade secrets
34
Questions?
Today’s eLunch Presenter
Dan Rubinstein
Litigation
Chicago, Los Angeles
drubinstein@winston.com
37

More Related Content

What's hot

Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Annual Ethics Update 2018
Annual Ethics Update 2018Annual Ethics Update 2018
Annual Ethics Update 2018Kevin O'Shea
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
3rd party considerations Under GDPR and Privacy Laws
3rd party considerations Under GDPR and Privacy Laws3rd party considerations Under GDPR and Privacy Laws
3rd party considerations Under GDPR and Privacy LawsJoe Orlando
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Canadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and OverviewCanadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and OverviewResilient Systems
 
Amberhawk - Law Enforcement Parts of the Data Protection Bill
Amberhawk - Law Enforcement Parts of the Data Protection BillAmberhawk - Law Enforcement Parts of the Data Protection Bill
Amberhawk - Law Enforcement Parts of the Data Protection BilltechUK
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality KelbySchwender
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsBenjamin Ang
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations Swarupa Rani Sahu
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017CloudWATCH Consortium
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360DataStax
 

What's hot (20)

POPI_Overview_E
POPI_Overview_EPOPI_Overview_E
POPI_Overview_E
 
POPI_Overview_E
POPI_Overview_EPOPI_Overview_E
POPI_Overview_E
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Annual Ethics Update 2018
Annual Ethics Update 2018Annual Ethics Update 2018
Annual Ethics Update 2018
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
3rd party considerations Under GDPR and Privacy Laws
3rd party considerations Under GDPR and Privacy Laws3rd party considerations Under GDPR and Privacy Laws
3rd party considerations Under GDPR and Privacy Laws
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Canadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and OverviewCanadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and Overview
 
Amberhawk - Law Enforcement Parts of the Data Protection Bill
Amberhawk - Law Enforcement Parts of the Data Protection BillAmberhawk - Law Enforcement Parts of the Data Protection Bill
Amberhawk - Law Enforcement Parts of the Data Protection Bill
 
MAIA Panel Big Event
MAIA Panel Big EventMAIA Panel Big Event
MAIA Panel Big Event
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360GDPR: The Catalyst for Customer 360
GDPR: The Catalyst for Customer 360
 

Similar to Trade Secret Theft – Protecting the Crown Jewels

Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Ethisphere
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationParsons Behle & Latimer
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
Theft of Trade Secrets Best Practices
Theft of Trade Secrets Best PracticesTheft of Trade Secrets Best Practices
Theft of Trade Secrets Best Practiceslarrylieb
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 
Employment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start UpsEmployment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start UpsParsons Behle & Latimer
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Schellman & Company
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Capturing & Protecting Your Company's Intellectual Property
Capturing & Protecting Your Company's Intellectual PropertyCapturing & Protecting Your Company's Intellectual Property
Capturing & Protecting Your Company's Intellectual PropertyParsons Behle & Latimer
 
I Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsI Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsFinancial Poise
 

Similar to Trade Secret Theft – Protecting the Crown Jewels (20)

Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal Investigation
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
Sexual Harassment Investigations
Sexual Harassment InvestigationsSexual Harassment Investigations
Sexual Harassment Investigations
 
Theft of Trade Secrets Best Practices
Theft of Trade Secrets Best PracticesTheft of Trade Secrets Best Practices
Theft of Trade Secrets Best Practices
 
BoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptxBoyarMiller ACC Oct 11 2022 Presentation.pptx
BoyarMiller ACC Oct 11 2022 Presentation.pptx
 
Sexual Harassment Investigations
Sexual Harassment InvestigationsSexual Harassment Investigations
Sexual Harassment Investigations
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Employment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start UpsEmployment Basics for Small Businesses and Start Ups
Employment Basics for Small Businesses and Start Ups
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Capturing & Protecting Your Company's Intellectual Property
Capturing & Protecting Your Company's Intellectual PropertyCapturing & Protecting Your Company's Intellectual Property
Capturing & Protecting Your Company's Intellectual Property
 
I Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace InvestigationsI Know What You Did Last Summer: Workplace Investigations
I Know What You Did Last Summer: Workplace Investigations
 

More from Winston & Strawn LLP

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesWinston & Strawn LLP
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaWinston & Strawn LLP
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsWinston & Strawn LLP
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceWinston & Strawn LLP
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Winston & Strawn LLP
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansWinston & Strawn LLP
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Winston & Strawn LLP
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceWinston & Strawn LLP
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions ProgramWinston & Strawn LLP
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Winston & Strawn LLP
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Winston & Strawn LLP
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesWinston & Strawn LLP
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsWinston & Strawn LLP
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBWinston & Strawn LLP
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...Winston & Strawn LLP
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...Winston & Strawn LLP
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareWinston & Strawn LLP
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...Winston & Strawn LLP
 

More from Winston & Strawn LLP (20)

The Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law LandminesThe Nordic Sessions: Avoiding Employment Law Landmines
The Nordic Sessions: Avoiding Employment Law Landmines
 
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland ChinaLatest Developments Regarding Arbitration in Hong Kong and Mainland China
Latest Developments Regarding Arbitration in Hong Kong and Mainland China
 
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial InstitutionsRecent Trends in Regulatory Actions Impacting Banks and Financial Institutions
Recent Trends in Regulatory Actions Impacting Banks and Financial Institutions
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Maximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) GuidanceMaximizing Deductions in Light of the Section 162(m) Guidance
Maximizing Deductions in Light of the Section 162(m) Guidance
 
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
Regulators on the Move – Recent Treasury and Comptroller Actions: How They Af...
 
IRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement PlansIRS and DOL Audit Issues for Retirement Plans
IRS and DOL Audit Issues for Retirement Plans
 
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
Solutions to Section 301 Tariffs on Products from China—Managing the Shock of...
 
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) ComplianceBest Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
Best Practices for Anti-Bribery and Anti-Corruption (ABAC) Compliance
 
International Transactions Program
International Transactions ProgramInternational Transactions Program
International Transactions Program
 
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
Recent Legislation Impacting Dodd-Frank Requirements: What Financial Institut...
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
Cryptocurrency Crackdown: What You Need to Know about Enhanced IRS/Government...
 
Sanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical DevicesSanctions & Export Controls: Focus on Medical Devices
Sanctions & Export Controls: Focus on Medical Devices
 
The Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and ImplicationsThe Equal Rights Amendment: Legal Issues and Implications
The Equal Rights Amendment: Legal Issues and Implications
 
Under New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRBUnder New Management: What to Expect from a Trump NLRB
Under New Management: What to Expect from a Trump NLRB
 
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
2018 Hot Topics for Health & Welfare Plans, Fringe Benefits, and Withholding ...
 
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
The Real Deal Webinar Series: Delaware Law Developments/Recent Judicial Decis...
 
GDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To PrepareGDPR is Coming, Five Things You Can Do Now To Prepare
GDPR is Coming, Five Things You Can Do Now To Prepare
 
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
The Real Deal Webinar Series: Practical Advice from a Former Chief Compliance...
 

Recently uploaded

1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in SalesMelvinPernez2
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxgurcharnsinghlecengl
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its historyprasannamurthy6
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 

Recently uploaded (20)

1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its history
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 

Trade Secret Theft – Protecting the Crown Jewels

  • 1. Trade Secret Theft: Protecting the Crown Jewels March 25, 2015 Presented by: Dan Rubinstein
  • 2. Today’s eLunch Presenter Dan Rubinstein Litigation Chicago, Los Angeles drubinstein@winston.com 2
  • 3. Trade Secret Theft: Protecting the Crown Jewels • Background on the Legal Terrain – Federal and State • Protecting Your Trade Secrets • Conducting a Trade Secret Theft Investigation • Working with the FBI and Law Enforcement • Remedies 3
  • 4. Background on the Legal Terrain
  • 5. Key Federal Statutes • Computer Fraud and Abuse Act, 18 U.S.C. § 1030 • Unauthorized Access • Civil Remedy • Economic Espionage Act, 18 U.S.C. §§ 1831-1839 • Theft 5
  • 6. Computer Fraud and Abuse Act (CFAA) • 18 U.S.C. § 1030 • Protects information on computer systems • Applies even if data is not a trade secret or not well-protected 6
  • 7. CFAA – Elements and Remedies • The defendant has: • Accessed a “protected computer” • Virtually every business computer system with Internet access • “Without authorization” or by “exceeding such authorization as was granted” • Knowingly and with intent to defraud • Furthered the intended fraud and obtained anything of value 7
  • 8. CFAA – Penalties • Criminal Penalties – 3 tiers: • Tier 1: Simple violations punished as misdemeanors, imprisonment for not more than one year and fine of not more than $100,000 • Tier 2: Imprisonment not more than 5 years and/or fine of not more than $250,000 • Done for commercial advantage or private financial gain • Offense committed in furtherance of criminal or tortious act • Value of information exceeds $5,000 • Tier 3: For repeat offenders – imprisonment not more than 10 years and/or fine of not more than $250,000 • Possibility of forfeiture, restitution 8
  • 9. CFAA – Civil Suits • There is a private cause of action for compensatory damages and injunctive relief for victims of § 1030 violations, where: • Aggregate $5,000 loss • Physical harm or threat to public health or safety • Damage affecting 10 or more protected computers during any 1-year period • Must be brought within two years of the offense 9
  • 10. Economic Espionage Act • 18 U.S.C. §§ 1831-1839 • Purpose: to provide greater protection for proprietary and economic information of corporate and governmental entities from foreign as well as domestic theft • Covers “trade secrets,” which the statute defines broadly to include both tangible and intangible property 10
  • 11. Trade Secreted Definition • Information • Not generally known • From which the owner derives economic value from its secrecy • Reasonable efforts have been made to protect its secrecy • Information must have a nexus with interstate or foreign commerce 11
  • 12. Economic Espionage Act - Penalties • Provides criminal and civil penalties for theft of trade secrets • Enhanced penalties if intellectual property is taken with an intent to benefit a foreign government • Punishable by imprisonment for not more than 10 years and/or a large fine 12
  • 13. Other Claims • National Stolen Property Act (18 U.S.C. § 2314) • Transports, transmits, or transfers (in interstate commerce) • Goods, wares, merchandise, securities or money, valued at $5,000 or more • Knowing the same to have been stolen, converted, or taken by fraud • Some state law claims complement federal civil claims • Breach of confidentiality or non-disclosure agreements • State trade secrets acts – e.g., Illinois Trade Secrets Act, 765 ILCS § 1065 • Breach of fiduciary duty • Conversion 13
  • 15. Protecting Trade Secrets • Implement robust confidentiality agreements and IP policies • Tiered policies based on access level • Enforce policies (and document enforcement) • Regular training where employees re-acknowledge the restrictions • Limit the physical/electronic access to confidential IP • Eliminate duplicates • Compartmentalize sensitive information • Restrict access to core group of employees • Implement tiered access levels 15
  • 16. Protecting Trade Secrets • Use restrictions • Portable devices/storage • Private email • Remote connectivity • Monitoring • Network monitoring • Filters/screens • Employee monitoring 16
  • 17. Conducting a Trade Secret Theft Investigation
  • 18. Goals of an Investigation • Conduct a thorough, expeditious, and independent investigation that can withstand scrutiny • General factual resolution, legal analysis, root cause analysis, remediation, and proportionate discipline while assessing liability and improving internal controls • Protect the reputation of the reporters and accused employees and the integrity of the investigation • Minimize business disruption • Manage internal communications and expectations • Recommend discipline (where necessary) with a consistent approach 19
  • 19. The Benefits of Outside Counsel • Tested protocol for ensuring relevant materials are preserved and interviews are properly conducted • Investigation appears more independent and credible than a purely internal team • Beneficial relationship with law enforcement • Interviewing and investigative techniques • If allegations implicate senior management, unaffiliated counsel is preferable • Single-purpose interaction (maintains relationships) 20
  • 20. Components of a Successful Internal Investigation • Teamwork • Tailored Engagement Letters • Evidence-gathering • Documents • Witness interviews • Documenting the Investigation • Maintaining Privilege 21
  • 21. Teamwork • Investigations require effective communications between in-house counsel, compliance officers, employees, and outside counsel • In-house Counsel • Facilitates communication between outside counsel and employees and assists with the preservation and collection of documentary evidence • Compliance Officer • Determines the veracity of an internal allegation of wrongdoing and whether a corporate compliance policy was violated • Outside Investigation Counsel • Takes the lead in gathering evidence, reviewing the facts, interviewing witnesses, and preparing conclusions for the client • Other internal resources: IT, Corporate Audit, Human Resources, Corporate Secretary, Corporate Security, Finance, Brand Integrity, and others 22
  • 22. Well-Tailored Engagement Letters • Must tailor engagement to the task at hand • Describe: • Goals and scope of the investigation • Anticipated costs involved • Client’s expectation from outside investigation counsel at the end of the investigation • Key language in the engagement letter or memo to file stating that outside counsel will be conducting an investigation so that counsel “can develop the factual information necessary to render legal advice” 23
  • 23. Document Collection • Before interviewing witnesses, need an understanding of relevant documentary evidence • In-house counsel plays key role • Identifies document custodians and helps to define a targeted search • Distributes document preservation memo • Avoid obstruction of justice allegations 24
  • 24. Witness Interviews • Schedule in manner to minimize collusion • Conduct in private area where employee feels comfortable • Administer an UpJohn warning • Two-person interview teams • Request interviewee to bring relevant documents in possession • Document the interview 25
  • 25. Documenting the Investigation • All written communications re: the investigation must include the caption, “Attorney-Client Communication, Attorney Work Product” • Write interview memos • Always document that UpJohn was given and acknowledged • Include who was present, as well as location and time of interview • Include the following disclaimer: • This memorandum contains attorney thoughts and mental impressions. The information provided herein is organized by topic and is not in chronological order. The memorandum is not a verbatim transcript or witness statement and it is expected that this memorandum will be treated as privileged and confidential attorney work product. This memorandum is not for distribution • Details, details, details 26
  • 26. Maintaining Privilege • Maintaining attorney-client privilege over the investigation is paramount • Interviews conducted, forensic audit analysis, digital forensic examinations, and respective documentation by non-attorneys must be done at the direction of counsel to keep the privilege intact • Discuss with non-attorneys so that all team members are clear • Helps to avoid potential disputes, and provides flexibility, about whether privileged information should be disclosed in response to requests from the government, regulators, or private litigants 27
  • 27. Concluding an Investigation • Better is the enemy of good • Exhaust all reasonable measures in fact-gathering process • Closing Report • Likely reviewed by members of the board, General Counsel, CEO, and C- suite executives, and possibly government regulators or law enforcement • Review past precedent to ensure recommended remediation and discipline (if any) is appropriate • Consult with in-house counsel prior to communicating findings to relevant stakeholders 28
  • 28. Working with the FBI and Law Enforcement
  • 29. Whether to Make a Federal Criminal Referral • Referral is “letting the lion out of the cage” • Publicity risk (USAO press release, media attention) • Potential privilege waiver by disclosing work product created during the investigation • Lerman v. Turner, 2011 WL 62124 (N.D. Ill. 2011) (requiring an attorney who had conducted the internal investigation to turn over a memo summarizing certain employee interviews when the attorney had already disclosed to the government an investigation report that included summaries of other employee interviews) • SEC v. Berry, No. 07-04431, 2011 WL 825742 (N.D. Cal. Mar. 7, 2011) (ordering production of 5 witness interview memos, substance of which had ben disclosed to the government orally; though no waiver with respect to counsel’s notes on basis that waiver as to final product does not waive privilege as to drafts) 30
  • 30. Benefits of a Criminal Referral • Creates an atmosphere where employees know that trade secrets are highly valued by the company • Law enforcement bring investigative tools and resources (subpoenas, search warrants, wire-taps, arrests) • Recent examples • Chicago-based financial firm: • Twenty-three-count superseding indictment against two former employees, alleging scheme to defraud, theft of trade secrets, violation of the CFAA, and obstruction of justice • Internal investigation into anomalies on an employee’s user account uncovered use of virtual machines and transferring of company files via removable storage devices • Both employees eventually pleaded guilty – one received 3 years in prison followed by three years supervised release, and the other received 3 years’ probation • Both defendants were ordered to pay restitution for the cost of its internal investigation - $759,649.55 31
  • 31. Benefits of a Criminal Referral (cont’d) • Examples (cont’d) • CME: • The USAO indicted a former software engineer for CME Group, Inc. for allegedly downloading and removing computer source code and other proprietary information while also pursuing business plans to improve an electronic trading exchange in China. The stolen code was estimated to cost $2.1 million • The employee pleaded guilty to two counts of trade secrets theft and was sentenced to four years of probation • Valspar (David Lee) • A former Valspar Corp. chemist used his access to Valspar’s secure internal computer network to steal roughly 160 secret formulas for paints and coatings to use at his new job with a competitor. He also took raw materials information, chemical formulas and calculations, sales and cost data, product research, marketing data, internal memos, and other materials • He pleaded guilty to stealing trade secrets worth approximately $20 million. He received 15 months in federal prison. Also ordered to pay $31,000 to reimburse Valspar for the cost of its internal investigation 32
  • 32. Remedies for Trade Secret Theft
  • 33. Trade Secret Theft – Remedies • Return of stolen property • Restitution: Repayment of money spent on investigation • Civil remedies • Enhances perception of company’s protection of trade secrets 34
  • 35. Today’s eLunch Presenter Dan Rubinstein Litigation Chicago, Los Angeles drubinstein@winston.com 37