SlideShare a Scribd company logo
1
Trade Secret Litigation
Trade secret litigation comprises of two aspects:
1. Violations of trade secret law takes places when the confidential information is
obtained through misappropriations.
Misappropriations means where someone acquires, uses and/or discloses company
trade secret without taking any permission from company in an improper
manner.
2. Violations of non disclosure agreement takes place when a party in the contract
from the breach to the agreement.
 Misappropriation in violation of a state trade secret law.
 If no written agreement exists, the plaintiff must rely upon case law.
 To protect trade secret violations, companies should require new employees who will
have access to confidential information to acknowledge in writing agreement that
accepting employment.
 If grounds for federal jurisdiction exist, the action may be brought in federal court.
 If the action also involves copyright or patent, it must be brought in federal court.
 Otherwise, the action will be brought in a state court.
 If the action is instituted in federal court, a federal court will apply state law inasmuch as
there is no general federal trade secret law.
 The UTSA provides that an action for misappropriation must be brought within three
years after misappropriation is discovered.
 In federal court, the action will be governed by the Federal Rules of Civil Procedure
relating to federal civil actions.
 These rules set the times for responding to the complaint, matters pertaining to motions
and discovery, and any other litigation related matters.
 After the complaint is filed, the defendant will respond by filing an answer, usually
denying that any breach of agreement.
 If the defendant has a cause of action to assert against the plaintiff relating to the trade
secret, it must be asserted by way of a counterclaim in the litigation so that all disputes
between the parties relating to the information can be resolved at the same time.
 The plaintiff and defendant will take depositions to obtain testimony from those who may
have information about the case.
 For example, the plaintiff may depose individuals in the defendant’s company to
determine whether they were instructed to misappropriate the plaintiff’s information.
2
 Interrogatories may be served on either party to obtain information, such as to inquire
about experts either side may intend to call.
 If the matter cannot be resolved by private agreement, it will proceed to trial.
 The trade secret owner must prove misappropriation by a preponderance of the evidence.
 Either party may request a jury trial; otherwise, a judge will render the decision.
 One of the difficult issues in trade secret litigation arises from the fact that the trade
secret sought to be protected often must be disclosed in the litigation so the judge or jury
can evaluate whether the information is sufficiently valuable.
 Similarly, the owner’s methods of protecting the information often must be disclosed so
the fact finder can determine whether the owner has taken reasonable measures to protect
the alleged trade secrets.
 Courts can fashion a variety of means to protect the information, from issuing protective
orders, to holding private hearings in the judge’s chambers, to closing the courtroom to
the public, to sealing court records.
Trade Secret Protection Programs
 Because trade secrets are legally broken and may be lost by accidently disclosure or
failure to reasonably protect.
 Companies should implement trade secret protection programs to safeguard valuable
information.
 While it is common for businesses to assume that only scientific and technical data
constitute trade secrets.
 Protection is available for a much broader range of subjects, such as customer lists,
marketing plans, hiring tactics, and other information that would be valuable to a
competitor, and that are common to many companies.
 Companies that value their trade secrets should implement trade secret protection
programs.
 Developing programs and measures to protect trade secrets is an easy way to demonstrate
to a court that an owner values its information and takes appropriate measures to maintain
its secrecy.
Physical Protection
There are a variety of tangible measures a company can implement to protect trade secrets,
including the following:
 Safeguarding information under lock and key
 Protecting the information from unauthorized access
3
 Conducting background checks of employees who will have access to key information
 “Badging” doors and entrances so access beyond the company’s reception area requires
key code or bar code access and so that employee location is monitored
 Retaining adequate security during evenings and weekends either through alarm systems
or security services, including surveillance cameras
 Ensuring tours of the company premises do not expose outsiders to valuable processes or
information.
 Marking materials with legends or stamps such as “Confidential - Trade Secret
Information”
 Monitoring activities of former employees who had access to confidential information
and monitoring trade journals for articles that may show a competitor has gained access
to company trade secrets
 Ensuring no one person has access to critical information but rather that several people
“share” parts of the information.
 Implementing inventory control systems
 Securing computers with password or encryption protection and monitoring devices to
track which employees access certain information.
 Requiring use of paper shredders for disposal of sensitive documents
 Designating a person to be responsible for trade secret information and release to others
(including the media), and for reviewing bids, proposals, marketing materials, and plans
by employees to publish articles or speak at conferences
 Implementing photocopying policies and maintaining logbooks or electronic monitoring
of copying.
 Monitoring employees’ use of e-mail and the Internet to ensure confidential information
is not being disseminated.
 Conducting exit interviews with employees to obtain return of company materials and to
remind them of their obligations not to use or disclose proprietary company information
 Using encryption technology and antivirus protection programs to protect information
stored on computers
 Educating employees on trade secrets and protection of trade secrets
 Requiring visitors to the premises to sign in and wear badges
 Ensuring information retained on computers is available only on company networks so
that access can be easily tracked
4
 Most companies will not need to implement all of the measures described.
 Courts do not require absolute secrecy or that extreme measures be taken to protect
information.
 The lab is in an unmarked building in a typical office park, and visitors must pass through
a metal detector that scans for camera phones.
Contractual Protection
 Another method of protecting trade secrets is by contract, namely, requiring those with
access to the information to agree in writing not to disclose the information to others.
 In licensing arrangements, trade secret owners should ensure the license agreements
contain sufficient protection for trade secret information.
 Employers should use noncompetition agreements to ensure former employees do not use
material gained on the job to later compete against the employer.
 Even without formal contracts, a company should include protection policies in its
employee handbooks, routinely publish reminders about confidentiality in company
newsletters and through e-mail messages, and remind employees of their duties during
their initial orientations and during exit interviews conducted when the individuals leave
the company’s employment.
 With the advent of the Internet and the increased ease of electronic communications,
employers have become concerned about the loss of trade secrets through dissemination
over the Internet.
 Thus, employers have a legitimate interest in monitoring the electronic communications
of their employees.
 Generally, employers have broad discretion to regulate the use of electronic
communications in the workplace so long as the employees have been informed that the
employer may do so.

More Related Content

What's hot

Selecting and evaluating trade mark
Selecting and evaluating trade markSelecting and evaluating trade mark
Selecting and evaluating trade mark
Rajalingam Balakrishnan
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
Prof. (Dr.) Tabrez Ahmad
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential informationAltacit Global
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
atuljaybhaye
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
David Lizerbram
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
Rajalingam Balakrishnan
 
Patent searching process & ownership rights and transfer
Patent searching process & ownership rights and transferPatent searching process & ownership rights and transfer
Patent searching process & ownership rights and transfer
Rajalingam Balakrishnan
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
Nickkisha Farrell
 
Trademark law ppt
Trademark law pptTrademark law ppt
Trademark law ppt
atuljaybhaye
 
Trade secrets
Trade secretsTrade secrets
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
Rajalingam Balakrishnan
 
International trade mark law & copy right law
International trade mark law & copy right lawInternational trade mark law & copy right law
International trade mark law & copy right law
Rajalingam Balakrishnan
 
Functions of a trademark
Functions of a trademarkFunctions of a trademark
Functions of a trademark
Prasanna R Kovath
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
atuljaybhaye
 
Industrial designs in IPR
Industrial designs in IPRIndustrial designs in IPR
Industrial designs in IPR
SaiLakshmi110
 
Protection of Trade Secrets
Protection of Trade SecretsProtection of Trade Secrets
Protection of Trade Secrets
Rajat Agrawal
 

What's hot (20)

Selecting and evaluating trade mark
Selecting and evaluating trade markSelecting and evaluating trade mark
Selecting and evaluating trade mark
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
What Is a Trade Secret?
What Is a Trade Secret?What Is a Trade Secret?
What Is a Trade Secret?
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
 
Patent searching process & ownership rights and transfer
Patent searching process & ownership rights and transferPatent searching process & ownership rights and transfer
Patent searching process & ownership rights and transfer
 
Trade Secrets Law
Trade Secrets LawTrade Secrets Law
Trade Secrets Law
 
Fundamental of copy right law
Fundamental of copy right lawFundamental of copy right law
Fundamental of copy right law
 
Foundation of patent law
Foundation of patent lawFoundation of patent law
Foundation of patent law
 
Trademark law ppt
Trademark law pptTrademark law ppt
Trademark law ppt
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
International trade mark law & copy right law
International trade mark law & copy right lawInternational trade mark law & copy right law
International trade mark law & copy right law
 
Intellectual property audits
Intellectual property auditsIntellectual property audits
Intellectual property audits
 
Functions of a trademark
Functions of a trademarkFunctions of a trademark
Functions of a trademark
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Industrial designs in IPR
Industrial designs in IPRIndustrial designs in IPR
Industrial designs in IPR
 
Protection of Trade Secrets
Protection of Trade SecretsProtection of Trade Secrets
Protection of Trade Secrets
 

Similar to Trade secret litigation

IPR UNIT 4.pptx
IPR UNIT 4.pptxIPR UNIT 4.pptx
IPR UNIT 4.pptx
Mahesh Kolloju
 
UNIT-4.pptx
UNIT-4.pptxUNIT-4.pptx
UNIT-4.pptx
GovadaDhana
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
Badra Khairiah
 
Trade secret
Trade secretTrade secret
Trade secret
Badra Khairiah
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret LienFNian
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
SecureDocs
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsLawPlus Ltd.
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
SarthakKalia1
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptx
MeleniaCabatan3
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038FNian
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
Francoise Gilbert
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimeswelcometofacebook
 
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
mohamed abd elrazek
 

Similar to Trade secret litigation (20)

IPR UNIT 4.pptx
IPR UNIT 4.pptxIPR UNIT 4.pptx
IPR UNIT 4.pptx
 
Unit 4 trade secret 1
Unit 4 trade secret 1Unit 4 trade secret 1
Unit 4 trade secret 1
 
UNIT-4.pptx
UNIT-4.pptxUNIT-4.pptx
UNIT-4.pptx
 
Introduction to trade secret
Introduction to trade secretIntroduction to trade secret
Introduction to trade secret
 
TRADE SECRET
TRADE SECRETTRADE SECRET
TRADE SECRET
 
Trade secret
Trade secretTrade secret
Trade secret
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 
Ss
SsSs
Ss
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
 
09 trade secrets
09 trade secrets09 trade secrets
09 trade secrets
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
 
Trade Secret and JVA and Other Agreements
Trade Secret and JVA and Other AgreementsTrade Secret and JVA and Other Agreements
Trade Secret and JVA and Other Agreements
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
 
RIGHT_TO_PRIVACY_OR_NOT
RIGHT_TO_PRIVACY_OR_NOTRIGHT_TO_PRIVACY_OR_NOT
RIGHT_TO_PRIVACY_OR_NOT
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptx
 
Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038Wipo Smes Mpt 06 Www 70038
Wipo Smes Mpt 06 Www 70038
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
 
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
 

More from Rajalingam Balakrishnan

Trade mark registration processes (2)
Trade mark registration processes (2)Trade mark registration processes (2)
Trade mark registration processes (2)
Rajalingam Balakrishnan
 
The rights afforded by copyright law (2)
The rights afforded by copyright law (2)The rights afforded by copyright law (2)
The rights afforded by copyright law (2)
Rajalingam Balakrishnan
 
Subject matter of copyright law
Subject matter of copyright lawSubject matter of copyright law
Subject matter of copyright law
Rajalingam Balakrishnan
 
The rights afforded by copyright law (3)
The rights afforded by copyright law (3)The rights afforded by copyright law (3)
The rights afforded by copyright law (3)
Rajalingam Balakrishnan
 
Trade mark registration processes
Trade mark registration processesTrade mark registration processes
Trade mark registration processes
Rajalingam Balakrishnan
 
The rights afforded by copyright law
The rights afforded by copyright lawThe rights afforded by copyright law
The rights afforded by copyright law
Rajalingam Balakrishnan
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
Rajalingam Balakrishnan
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
Rajalingam Balakrishnan
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
Rajalingam Balakrishnan
 

More from Rajalingam Balakrishnan (13)

Unit 4
Unit 4Unit 4
Unit 4
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
Unfair competition
Unfair competitionUnfair competition
Unfair competition
 
Trade mark registration processes (2)
Trade mark registration processes (2)Trade mark registration processes (2)
Trade mark registration processes (2)
 
The rights afforded by copyright law (2)
The rights afforded by copyright law (2)The rights afforded by copyright law (2)
The rights afforded by copyright law (2)
 
Subject matter of copyright law
Subject matter of copyright lawSubject matter of copyright law
Subject matter of copyright law
 
The rights afforded by copyright law (3)
The rights afforded by copyright law (3)The rights afforded by copyright law (3)
The rights afforded by copyright law (3)
 
Trade mark registration processes
Trade mark registration processesTrade mark registration processes
Trade mark registration processes
 
The rights afforded by copyright law
The rights afforded by copyright lawThe rights afforded by copyright law
The rights afforded by copyright law
 
New developments of trade mark law
New developments of trade mark lawNew developments of trade mark law
New developments of trade mark law
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
Introduction to intellectual property law
Introduction to intellectual property lawIntroduction to intellectual property law
Introduction to intellectual property law
 
Intellectual property audits 1
Intellectual property audits 1Intellectual property audits 1
Intellectual property audits 1
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Trade secret litigation

  • 1. 1 Trade Secret Litigation Trade secret litigation comprises of two aspects: 1. Violations of trade secret law takes places when the confidential information is obtained through misappropriations. Misappropriations means where someone acquires, uses and/or discloses company trade secret without taking any permission from company in an improper manner. 2. Violations of non disclosure agreement takes place when a party in the contract from the breach to the agreement.  Misappropriation in violation of a state trade secret law.  If no written agreement exists, the plaintiff must rely upon case law.  To protect trade secret violations, companies should require new employees who will have access to confidential information to acknowledge in writing agreement that accepting employment.  If grounds for federal jurisdiction exist, the action may be brought in federal court.  If the action also involves copyright or patent, it must be brought in federal court.  Otherwise, the action will be brought in a state court.  If the action is instituted in federal court, a federal court will apply state law inasmuch as there is no general federal trade secret law.  The UTSA provides that an action for misappropriation must be brought within three years after misappropriation is discovered.  In federal court, the action will be governed by the Federal Rules of Civil Procedure relating to federal civil actions.  These rules set the times for responding to the complaint, matters pertaining to motions and discovery, and any other litigation related matters.  After the complaint is filed, the defendant will respond by filing an answer, usually denying that any breach of agreement.  If the defendant has a cause of action to assert against the plaintiff relating to the trade secret, it must be asserted by way of a counterclaim in the litigation so that all disputes between the parties relating to the information can be resolved at the same time.  The plaintiff and defendant will take depositions to obtain testimony from those who may have information about the case.  For example, the plaintiff may depose individuals in the defendant’s company to determine whether they were instructed to misappropriate the plaintiff’s information.
  • 2. 2  Interrogatories may be served on either party to obtain information, such as to inquire about experts either side may intend to call.  If the matter cannot be resolved by private agreement, it will proceed to trial.  The trade secret owner must prove misappropriation by a preponderance of the evidence.  Either party may request a jury trial; otherwise, a judge will render the decision.  One of the difficult issues in trade secret litigation arises from the fact that the trade secret sought to be protected often must be disclosed in the litigation so the judge or jury can evaluate whether the information is sufficiently valuable.  Similarly, the owner’s methods of protecting the information often must be disclosed so the fact finder can determine whether the owner has taken reasonable measures to protect the alleged trade secrets.  Courts can fashion a variety of means to protect the information, from issuing protective orders, to holding private hearings in the judge’s chambers, to closing the courtroom to the public, to sealing court records. Trade Secret Protection Programs  Because trade secrets are legally broken and may be lost by accidently disclosure or failure to reasonably protect.  Companies should implement trade secret protection programs to safeguard valuable information.  While it is common for businesses to assume that only scientific and technical data constitute trade secrets.  Protection is available for a much broader range of subjects, such as customer lists, marketing plans, hiring tactics, and other information that would be valuable to a competitor, and that are common to many companies.  Companies that value their trade secrets should implement trade secret protection programs.  Developing programs and measures to protect trade secrets is an easy way to demonstrate to a court that an owner values its information and takes appropriate measures to maintain its secrecy. Physical Protection There are a variety of tangible measures a company can implement to protect trade secrets, including the following:  Safeguarding information under lock and key  Protecting the information from unauthorized access
  • 3. 3  Conducting background checks of employees who will have access to key information  “Badging” doors and entrances so access beyond the company’s reception area requires key code or bar code access and so that employee location is monitored  Retaining adequate security during evenings and weekends either through alarm systems or security services, including surveillance cameras  Ensuring tours of the company premises do not expose outsiders to valuable processes or information.  Marking materials with legends or stamps such as “Confidential - Trade Secret Information”  Monitoring activities of former employees who had access to confidential information and monitoring trade journals for articles that may show a competitor has gained access to company trade secrets  Ensuring no one person has access to critical information but rather that several people “share” parts of the information.  Implementing inventory control systems  Securing computers with password or encryption protection and monitoring devices to track which employees access certain information.  Requiring use of paper shredders for disposal of sensitive documents  Designating a person to be responsible for trade secret information and release to others (including the media), and for reviewing bids, proposals, marketing materials, and plans by employees to publish articles or speak at conferences  Implementing photocopying policies and maintaining logbooks or electronic monitoring of copying.  Monitoring employees’ use of e-mail and the Internet to ensure confidential information is not being disseminated.  Conducting exit interviews with employees to obtain return of company materials and to remind them of their obligations not to use or disclose proprietary company information  Using encryption technology and antivirus protection programs to protect information stored on computers  Educating employees on trade secrets and protection of trade secrets  Requiring visitors to the premises to sign in and wear badges  Ensuring information retained on computers is available only on company networks so that access can be easily tracked
  • 4. 4  Most companies will not need to implement all of the measures described.  Courts do not require absolute secrecy or that extreme measures be taken to protect information.  The lab is in an unmarked building in a typical office park, and visitors must pass through a metal detector that scans for camera phones. Contractual Protection  Another method of protecting trade secrets is by contract, namely, requiring those with access to the information to agree in writing not to disclose the information to others.  In licensing arrangements, trade secret owners should ensure the license agreements contain sufficient protection for trade secret information.  Employers should use noncompetition agreements to ensure former employees do not use material gained on the job to later compete against the employer.  Even without formal contracts, a company should include protection policies in its employee handbooks, routinely publish reminders about confidentiality in company newsletters and through e-mail messages, and remind employees of their duties during their initial orientations and during exit interviews conducted when the individuals leave the company’s employment.  With the advent of the Internet and the increased ease of electronic communications, employers have become concerned about the loss of trade secrets through dissemination over the Internet.  Thus, employers have a legitimate interest in monitoring the electronic communications of their employees.  Generally, employers have broad discretion to regulate the use of electronic communications in the workplace so long as the employees have been informed that the employer may do so.