Professional Documents
Culture Documents
1
PART 1
2
What are trade secrets?
Confidential information not
generally known
Derives independent economic
value, actual or potential
Gives the holder competitive
edge
Involves reasonable efforts to
maintain its secrecy
T e c h n ic a l a n d S c ie n tific In fo r m a tio n
F in a n c ia l In fo r m a tio n
Trade Secret
C o m m e r c ia l In fo r m a tio n
N e g a tiv e In fo r m a tio n
in s o m e la w s
5
• Technical and scientific information:
– Product information
• technical composition of a product (e.g. paint)
• technical data about product performance
• product design information
– Manufacture information
• manufacturing methods and processes (e.g. weaving technique,
technology for new fiber having significant tensile properties)
• production costs, refinery processes, raw materials
• specialized machinery
– Computer codes
7
• Commercial information:
– Customer list
– Business plan
– Marketing strategy
– Supplier arrangements
– Customer buying preferences and
requirements
– Consumer profiles
– Sales methods
8
• Financial information:
– Pricing information
– Price lists
9
• Negative information:
10
Example no. 1
• Decades ago, Coca-Cola decided to
keep its soft drink formula a secret
• The formula is only known to a few
people within the company
11
Example no. 2
13
• Three essential legal requirements:
14
1. The information must be secret
15
2. It must have commercial value because it’s
secret
16
3. Owner must have taken reasonable
steps to keep it secret
17
Legal rights:
• Only protection against improperly
acquiring, disclosing or using:
– People who are automatically bound by duty
of confidentiality (incl. employees)
18
• Some people cannot be stopped
from using information under
trade secret law:
19
Reverse Engineering :
20
Examples
Lycra
Zipper
21
22
Enforcement:
What can you do if someone
steals or improperly discloses
your trade secret?
23
Trade secret protection may be based on...
– Contract law
• When there is an agreement to protect the TS
– NDA/CA
• Where a confidential relationship exists
– Attorney, employee
24
– Criminal laws
» e.g. for an employee to steal trade secrets from a
company
• theft, electronic espionage, invasion of privacy, etc.
• circumvention of technical protection systems
25
Remedies
2. Monetary damages
• actual damages caused as a result of the misuse (lost profits)
• amount by which defendant unjustly benefited from the
misappropriation (unjust enrichment)
3. Seizure order
• can be obtained in civil actions to search the defendant's
premises in order to obtain the evidence to establish the theft of
trade secrets at trial
4. Precautionary impoundment
• of the articles that include misused trade secrets, or the products
based on the misuse
26
To establish violation, the owner
must be able to show :
BUSINESS STRATEGIES
TO HANDLE & PROTECT
TRADE SECRETS
29
Loss of trade secrets -
a growing problem (1)
– Corporate spies
31
Loss of trade secrets -
a growing problem (3)
33
What can be done?
10 basic protection strategies
34
1. Identify trade secrets
Considerations in determining
whether information is a TS:
– Is it known outside the company?
35
Prioritize:
37
3. Educate employees
– Prevent inadvertent disclosure
(ignorance)
– New employees :
• Brief on protection expectations early
• NDA/NCA/non-solicitation clauses
• Obligations towards former employer!
– Departing employees :
• Exit interview, letter to new employer, treat
fairly & compensate reasonably for patent
work, further limit access to data
38
– Educate and train:
• Copy of policy, intranet, periodic training & audit,
etc. Make known that disclosure of a TS may
result in termination and/or legal action
• Clear communication + repetition
39
4. Restrict access
41
WARNING
WARNING::
This
This document
document contains
contains trade
trade
secret
secret information
information of of Lien
Lien
Verbauwhede.
Verbauwhede. Unauthorized
Unauthorized
disclosure
disclosure isis strictly
strictly prohibited
prohibited
and
and may
may result
result in
in serious
serious legal
legal
consequences.
consequences.
Put markers
Password
– Access control
• authorization
• log of access: person, document reviewed
• biometric palm readers
– Surveillance of depository/company
premises
• guards, surveillance cameras
– Shredding
44
7. Maintain computer secrecy
47
10. Unsolicited submissions
– Unsolicited suggestions, inventions, ideas
– Beware, esp. if relate to ideas/inventions that
your company is presently developing
– Often: claim that unsolicited information was
stolen
PROTECTING INVENTIONS:
TRADE SECRETS
OR PATENTS?
49
Introduction
50
Choice between patent protection and
trade secret protection is a
51
Legal Considerations
52
T ra d e S e c re ts P a te n ts
n o r e g is t r a t io n c o s t s fe e s
b u t: c o s ts to k e e p s e c r e t r e g is tr a tio n + m a in te n a n c e
c a n la s t lo n g e r lim it e d in t im e
- b u t: lim ite d to e c o n o m ic life - g e n e r a lly : m a x 2 0 y
- u n c e r ta in life s p a n : le a k o u t is ir re m e d ia b le - b u t : c a n b e in v a lid e d
n o d is c lo s u r e d is c lo s u r e
- b u t: p r a c tic a l n e e d to d is c lo s e - p u b lic a tio n 1 8 m a fte r filin g
- if le a k o u t: T S lo s t - if P n o t a llo w e d : n o T S
53
T ra d e S e c re ts P a te n ts
L a r g e s u b je c t m a t t e r S u b j e c t m a t t e r li m i t e d :
P r o t e c t io n o f v ir t u a lly a n y t h in g - R e q u ir e m e n t s : n e w , n o n o b v io u s , u s e f u l
m a in t a in e d in s e c r e t b y a b u s in e s s - S c o p e : p a te n t c la im
t h a t g iv e s c o m p e t it iv e a d v a n t a g e
O n ly p r o t e c t i o n a g a in s t R ig h t t o e x c lu d e
im p r o p e r a c q u ir e m e n t /u s e m o n o p o ly t o p r e v e n t o th e r s f r o m
e x p lo it in g t h e in v e n t io n
M o r e d if f ic u lt t o e n f o r c e " P o w e r t o o l"
- s o m e c o u n t r ie s : n o la w s
- a b ilit y t o s a f e g u a r d T S d u r in g lit ig a t io n
54
Business and Marketplace
Considerations
55
1. Market life of the subject matter
56
2. Difficulty of maintaining the
subject matter secret
• Difficult/expensive to do RE?
– Secret manufacturing method or formula difficult TS
– Secret embodied in product easy (e.g. raw material) P
58
Example no. 1
• Decades ago, Coca-Cola decided to keep
its soft drink formula a secret
• The formula is only know to a few
people within the company
59
• In the past, you could not buy Coca-Cola
in India, because Indian law required that
trade secret information be disclosed
60
Examples no. 2
• Secret technique for
jeans washing
• Content of dye
mixtures
61
4. Likelihood of subject matter
being independently developed
• Complexity of invention
Source:
http://www.corporatelogo.com/articles/031feat3.html 64
• Potential long market life
• Potential many licensees
• Would be difficult to keep secret
– many licensees
– risk for reverse engineering
67
Remember...
68
Only legal protection against dishonest
acquisition/disclosure/use
69
Case Studies
• The Story of the Bridgport Loom.
• The story of NRB Textiles & Johnston
Industries.
• Motorola vs integrated circuit systems (
ICS )
• Walmart vs Amazon.com
• Color span vs sentinel imaging
70
Case Study 1 -- The Story of
the Bridgport Loom...
• 1811: James Lowell vacation in Scotland
• In fact, Lowell was a spy
• Water powered weaving machine.
Performed work done by hundreds of
artisans. Allowed British to command
world textile trade. American cotton had to
be shipped to England where it was woven
into cloth, and then resold to American
merchants.
71
Case study 2 -- The story of NRB
Textiles & Johnston Industries…
• NRB + Johnston lawsuit: Competitor paid 2 consultants (posing
as research student + Swiss investor) $500,000 for info on
customers, suppliers, and manufacturing operations of 9 textile
companies.
72
Case study 3 - Motorola vs
Integrated Circuit System
• Motorola in July 1999 , filed a lawsuit against ICS
and several managers who left Motorola while
working in its Timing solutions operation to set up a
new ICS operation.
75
As per the settlement:
• Amazon agreed to re-assign some of its
employees where their knowledge of
walmart operations would not be
used .
• Limits were also placed on the projetcs
to which walmart workers are involved
in amazon’s operations .
76
Case study 5 - Colorspan
vs Sentinel Imaging
• This dealt with a case on infringement of
trade secrets , in which color span was
awarded $ 2.2 million in damages in a 1997
judgement .
• Colorspan alleged that Sentinel had stolen
part of its market of consumables for its wide
format inkjet printers by hiring two former
colorspan employees who imparted trade
secrets and customer information.
77