Tag Archives: Trade Secrets

The following are a collection of posts on trade secrets. Trade secrets are essentially of two kinds. On the one hand, trade secrets may concern inventions or manufacturing processes that do not meet the patentability criteria and therefore can only be protected as trade secrets. This would be the case of customers lists or manufacturing processes that are not sufficiently inventive to be granted a patent (though they may qualify for protection as a utility model). On the other hand, trade secrets may concern inventions that would fulfill the patentability criteria and could therefore be protected by patents. In the latter case, the SME will face a choice: to patent the invention or to keep it as a trade secret.

DTSA as a Shoe Horn for Contract and Employment Law Claims

I expect that an important result of the Defend Trade Secrets Act (DTSA) will be the creation of supplemental federal jurisdiction over contract and employment disputes that are otherwise a matter of state law decided by state courts.  The majority of trade secret lawsuits also involve breach of contract and/or employment law claims – with the breach serving as the requisite ‘improper means,’

The DTSA provides federal district courts with original jurisdiction of the new federal claim of trade secret misappropriation.  Once a federal cause of action is established, the court will also “have supplemental jurisdiction over all other claims that are so related to claims in the action within such original jurisdiction that they form part of the same case or controversy under Article III of the United States Constitution.” 28 U.S.C. § 1367(a).   Where, as above, the breach of contract or employment duty wrapped into the factual tale of trade secret misappropriation then a court would likely find the supplemental jurisdiction requirements met.   The statute goes on to give district courts deference to “decline to exercise supplemental jurisdiction” in certain situation.  28 U.S.C. § 1367(c).

As we move toward more contract cases in Federal Courts, it will be interesting to see the extent that large corporations next push for federalizing of contract law.

 

Implementing and Interpreting the Defend Trade Secrets Act

By Dennis Crouch

With today’s 410-2 House vote, the Defend Trade Secrets Act (DTSA) has now passed both the House and Senate and is headed to President Obama for his expected signature.[1]  The DTSA amends the Economic Espionage Act to create a private civil cause of action for trade secret misappropriation based upon the Congressional sense that trade secret theft exists and is harmful.[2]  Trade secret misappropriation (as a civil matter) has previously been purely a matter of state law.  Although there is substantial uniformity between the states,[3] there are also a number of differences and perceived procedural weaknesses.[4]  The DTSA would not eliminate or preempt the various state trade secret rights but rather would operate as an additional layer of potential protection.[5] The law is designed to go into effect on its day of enactment and apply to any misappropriation that occurs on or after that date.

On March 10, 2017, the University of Missouri’s Center for Intellectual Property and Entrepreneurship (CIPE) along with our new Business, Entrepreneurship, and Tax Law Review (BETR) will host a symposium on Implementing and Interpreting the Defend Trade Secrets Act.  I expect that we will live-stream the event and will also publish speaker articles in BETR.  There is a lot to figure out. Contact me if you are interested in sponsorship opportunities (dcrouch@patentlyo.com).

The central provision of the DTSA will be codified as 18 U.S.C. § 1836(b) and reads:

An owner of a trade secret that is misappropriated may bring a civil action under this subsection if the trade secret is related to a product or service used in, or intended for use in, interstate or foreign commerce.

Defining Trade Secret: The DTSA broadly defines the term “trade secret” to mean “all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if—(A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the another person who can obtain economic value from the disclosure or use of the information.”  Although this definition is broad and certainly includes abstract ideas and laws of nature, it might not encompass information that is only stored in the human mind.[6]

Defining Misappropriation of a Trade Secret:  The statute also defines “misappropriation” in detail.  My rough approximation is as follows: without permission (A) obtaining a trade secret that was knowingly obtained through improper means or (B) disclosing or using a trade secret without knowing either (1) that it is a trade secret or (2) that it was obtained through improper means.  These “improper means” include “theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means.” However, misappropriation does not include “reverse engineering, independent derivation, or any other lawful means of acquisition.”  The DTSA does not otherwise include a more general fair-use or news-reporting exception.  However, the First Amendment will certainly serve as a backstop.  Further, these definitions do not include any express territorial limit – it will be very interesting to see the extent that these limits will be implied into the law.  Thus, if a U.S. company is holding trade-secrets in India that are stolen in India, could the U.S. company bring action against the Indian entity that caused the injury (presuming personal jurisdiction over the defendant)?

Remedies Civil Seizure: A key procedural benefit of the DTSA is to offer a mechanism for Civil Seizure ordered by courts and enforced by Federal, State, and/or local law enforcement as a preventive measure (akin to a temporary restraining order).

Remedies: Once misappropriation is found, the court will be authorized to grant injunctive relief as “reasonable.”  If “exceptional circumstances” render injunctive relief is “inequitable” then a court may order a reasonable royalty for the misappropriator’s continued use of the trade secret.  Depending upon how the statute is interpreted, this setup appears to create a presumption of injunctive relief – a stark difference from contemporary patent law doctrine under eBay v. MercExcange.  The statute also provides for compensatory damages for either (i): (I) “actual loss of the trade secret” and, in addition (II) “any unjust enrichment” not compensated in (I); or (ii) a reasonable royalty for the use.  Willful misappropriation can double damages.[7] In these calculations, I suspect that courts will take into account both the market-value of the trade secret as well as the “expenses for research and design and other costs of reproducing the trade secret” that were avoided by the misappropriation. The provision also includes an attorney fee shifting provision limited to cases involving bad-faith or willful-misappropriation.

Remedy against Former Employees: Most trade secret cases involve former employees moving (or starting-up) to a competitor.  A major concern raised against early versions of the bill was that the DTSA would empower employers to prevent such movement.  As amended, the bill now indicates that injunctive relief that would “prevent (or place conditions on) a person from entering into an employment relationship” must be “based on evidence of threatened misappropriation and not merely on the information the person knows.”[8]  Of course, such “threat” does not necessarily mean that the employee expressly threatened misappropriation but rather will likely be based upon circumstantial evidence regarding likelihood of misappropriation (i.e., ‘threat level’).[9]  In addition, the injunction preventing or limiting employment cannot “otherwise conflict with an applicable State law prohibiting restraints on the practice of a lawful profession, trade, or business.”  This bit appears to be directed toward giving credence to non-compete and other limits in various states. However, of key importance is that it only limits injunctive relief and does not appear to limit any cause of action against former employees.  As a consequence, this sets the likelihood of a fight between certain state employment laws that favor employee rights against the new federal trade secret law.

Whistle Blowers: Professor Peter Menell was instrumental in proposing a public policy immunity provision that is included in the DTSA.  The provision would offer immunity from liability (whistle blower protection) for confidential disclosure of a trade secret to the Government or in a Court Filing (made under seal).  The provision includes a notification requirement that employers should immediately implement.

= = = = =

Notes:

[1] Defend Trade Secrets Act of 2016, S. 1890.

[2] Although trade secret rights are thought of as a form of intellectual property, the bill is clear that the DTSA “shall not be construed to be a law pertaining to intellectual property.”  The result of this could, for example, mean that the intellectual property licensee exception in bankruptcy law would not apply to licenses of trade secret information.  See 11 U.S.C. § 365(n).  [In Bankruptcy Law, Trade Secrets are defined as a form of IP, but it is unclear to me at this point which statute would prevail.]  Because the DTSA is an amendment to the Economic Espionage Act – a criminal law – it will also be codified in Title 18 of the United States Code that is generally directed to “crimes and criminal procedure.”  Although I don’t know exactly, there may be aspects of Title 18 (such as general definitions) that will shape the interpretation of federal trade secret law.  As an example, 18 U.S.C. § 2(b) offers a “general principle” of respondeat superior that “[w]hoever willfully causes an act to be done which if directly performed by him or another would be an offense against the United States, is punishable as a principal.”

[3] Consider the popularity of the Uniform Trade Secrets Act in the various states.

[4] Jury trial should still apply to the extent it has in state cases.

[5] The Economic Espionage Act already includes a rule of construction that the statute “shall not be construed to preempt or displace any other remedies, whether civil or criminal, provided by United States Federal, State, commonwealth, possession, or territory law for the misappropriation of a trade secret, or to affect the otherwise lawful disclosure of information by any Government employee under section 552 of title 5(commonly known as the Freedom of Information Act).”  The DTSA reaffirms this principle by stating that “[n]othing in the amendments made by this section shall be construed to modify the rule of construction under section 1838 of title 18, United States Code, or to preempt any other provision of law.”  The bill provides for original jurisdiction of these trade secret cases in federal district court. However, it does not create exclusive jurisdiction – as such it would be proper for a party to bring such a claim in state court (when permitted by the state court). However, in that case, the other party may attempt to remove the case to Federal Court.  You might also query as to whether the federal claim is a ‘compulsory claim’ under the law such that if someone brings a state-law claim and loses they would later be estopped from bringing the federal claim.

[6] There may also be constitutional limitations on a company owning and controlling that information.

[7] This provision suggests by implication that misappropriation may be non-willful despite the fact that the misappropriation definition includes a mens rea element.

[8] My understanding is that Jim Pooley and Mark Lemley were instrumental in suggesting the addition of this provision that has now put the Bill in form where it is broadly supported by the politicians.

[9] Improperly obtaining a trade secret is a form of misappropriation – this creates some potential confusing situations in the interpretation of the provision.

Federal Cause of Action for Trade Secret Misappropriation

The House of Representatives has scheduled a floor vote on the Defend Trade Secrets Act (DTSA) for Wednesday April 27, 2016.  The version up for vote is identical to that passed unanimously by the Senate earlier this spring. [Schedule][S.1890].  President Obama has indicated his support as well.  Nothing is likely to deter the DTSA from passing on Wednesday.  The House Leadership is not permitting further amendments prior to the vote and no strong opposition has been voiced other than a group of law professors. States-rights activists have not suggested any reason why the traditional state-law-tort should not also be a federal cause of action.

In March 2017, Mizzou’s Center for Intellectual Property & Entrepreneurship will host a symposium on implementation and implications of the DTSA.  Proceedings will be published in the Law School’s Business, Entrepreneurship, and Tax Law Review (BETR).

DTSA Moving Forward

The House Judiciary Committee has taken the next major step toward implementation of the Defend Trade Secrets Act of 2016 (DTSA).  In an unopposed voice vote the committee has approved the text of the already-passed Senate version (S.1890). DTSA would create a federal civil remedy for trade secret misappropriation.  Next step – is passage by the full House. President Obama has indicated his support as well.

From the committee:

Trade secrets are an increasingly important form of intellectual property that have become more vulnerable to theft as a result of our globalized economy. While current federal law protects other forms of intellectual property by providing access to federal courts for aggrieved parties to seek redress, there is no federal option to do so for trade secret theft. The bipartisan Defend Trade Secrets Act seeks to change that by allowing companies to seek civil penalties in order to protect their businesses from those engaging in economic espionage. S. 1890 gives American innovators a powerful new tool which will help them compete in an ever-evolving global market.

At Mizzou, we’re planning our symposium for next academic year that will focus on implementation of the new federal cause of action.

Nationalizing Trade Secret Law

by Dennis Crouch

Defend Trade Secrets Act: The House Judiciary Committee is moving forward with the Defend Trade Secrets Act (DTSA) with a discussion of the bill (H.R. 3326) and its Senate companion (S. 1890) that was unanimously passed by the U.S. Senate.  The House and Senate versions were originally identical, but a set of amendments were added to the Senate version before its passage that both improved the language and reduced some potential negative impact of injunctive-relief associated with employee mobility. [See Pooley].  There is a strong possibility that the Senate version will be accepted by the House and passed with overwhelming majority.  Rep. Goodlatte (R-VA) is pushing the Bill through the Judiciary Committee (of which he is Chair).  Ranking Member Conyers (D-MI) is one of 155 co-sponsors of the legislation.  The Intellectual Property Owners Association (IPO) has announced its “strong support” for the bill.

Nationalizing Contract Law?: It is interesting that congress is moving forward so quickly with nationalizing the traditional state-law claim of trade secret misappropriation.  Most trade secret cases involve an underlying breach of contract between the parties.  The current bill would implicitly have courts rely upon local contract law to determine the scope of rights of the parties before then determining whether a federal claim of trade secret misappropriation exists.

 

Epic Trade Secret Case Billion Dollar Verdict

by Dennis Crouch

I expect that 2016 will be the year that Congress to creates a federal cause of action for trade secret misappropriation.  Acting in rare unanimous fashion, the Senate recently passed the Defend Trade Secret Act (DTSA) with republican leadership.  The house is expected to follow with President Obama also indicating support.  In his most recent State of the Union Address, President Obama noted that “[n]o foreign nation, no hacker, should be able to . . . steal our trade secrets.”

Meanwhile, state-law trade secret and business tort claims continue to wield power.

In Epic Systems v. Tata Group, a W.D.Wisc. jury has awarded Epic just shy of $1 billion on state-law trade-secret misappropriation, computer-fraud (trafficking in passwords under the CFAA), breach-of-contract claims, and unfair competition.  The damages included $240 million for compensatory damages and $700 million in punitive damages.

Tata Group (one of India’s largest companies) is accused of downloading documentation for hospital management software and then providing that documentation to its subsidiary Med Mantra.  This appears to be a case of exceeding authorization.  Thus, although Tata employees were permitted access the documentation, the breach came when the documentation was shared beyond what was contractually permitted.   If it collects, the verdict will more than double Epic’s annual profits.

The verdicts:

Following any post-verdict decisions, the appeal will be handled by the 7th Circuit. The damages theory of the case is tricky — it is unclear to what extent Epic should be permitted to use Wisconsin (or US) law to collect for damages either caused or felt in India.

Defend Trade Secret Act Moving Forward

by Dennis Crouch

I am always amazed how gridlock is pushed aside to implement intellectual property laws.  In a unanimous vote yesterday, the Senate passed the Defend Trade Secret Act (DTSA, S. 1890) that would create a federal cause of action for trade secret misappropriation and provides for damages and injunctive relief (including a seizure order to prevent dissemination).  Neither Senators Ted Cruz nor Bernie Sanders voted.  The identical bill H.R. 3326 is pending in the House of Representatives and includes 127 co-sponsors (mostly Republican).  President Obama has announced his support as well.

From Senator Hatch:

Trade secrets–such as customer lists, formulas, algorithms, software codes, unique designs, industrial techniques, and manufacturing processes–are an essential form of intellectual property. Other forms of intellectual property, such as patents, copyrights, and trademarks, are covered by Federal civil law. Trade secrets, by contrast, are the only form of U.S. intellectual property where the owner does not have access to a Federal civil remedy for misuse or misappropriation. As a result, billions of dollars each year are lost to trade secret theft, which stifles innovation by deterring companies from investing in research and development. Currently, the only Federal vehicle for trade secret protection is the 1996 Economic Espionage Act, which makes trade secret theft by foreign nationals a criminal offense. But this remedy criminalizes only a small subset of trade secret theft and relies on the thinly stretched resources of the Department of Justice to investigate and prosecute such offenses. . . . State laws today are perhaps even more variable in their treatment of trade secrets than they were at the time the Uniform Trade Secrets Act was proposed in 1979. This next mixed bag of differing legal regimes forces victims of trade secret theft to wade through a quagmire of procedural hurdles in order to recover their losses. . . . Put simply, State law is designed for intrastate litigation and offers limited practical recourse to victims of interstate trade secret theft–the contrast between intrastate and interstate. Maintaining the status quo is woefully insufficient to safeguard against misappropriation. U.S. companies must be able to protect their trade secrets in Federal court.

Most trade secret cases involve former employees who take knowledge with them as they move to a new venture.  The bill apparently includes minor safeguards for whistle-blowing employees and bar a court from preventing a person from moving to a new job. However, as far as I know, no employee groups have supported the Bill.

More info: 

Misappropriation is defined as “(A) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (B) disclosure or use of a trade secret of another without express or implied consent by a person who–(i) used improper means to acquire knowledge of the trade secret; (ii) at the time of disclosure or use, knew or had reason to know that the knowledge of the trade secret was–(I) derived from or through a person who had used improper means to acquire the trade secret; (II) acquired under circumstances giving rise to a duty to maintain the secrecy of the trade secret or limit the use of the trade secret; or (III) derived from or through a person who owed a duty to the person seeking relief to maintain the secrecy of the trade secret or limit the use of the trade secret; or (iii) before a material change of the position of the person, knew or had reason to know that–(I) the trade secret was a trade secret; and (II) knowledge of the trade secret had been acquired by accident or mistake.”

Improper means “(A) includes theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means; and (B) does not include reverse engineering, independent derivation, or any other lawful means of acquisition.”

 

 

Effective Date: The amendments shall apply with respect to any misappropriation of a trade secret for which any act occurs on or after the date of the enactment of this Act.

Not Intellectual Property: The new trade secrecy law “shall not be construed to be a law pertaining to intellectual property for purposes of any other Act of Congress.”  Thus, for example, the bankruptcy IP exception 365(n) would not apply to licenses of trade secret information.

Cravath’s Been Hacked: Are IP Firms a Major Target?

Cravath reported that hackers had breached the firm’s website, according to the NYT in a story here.  I’d assume it was someone who wanted to get access to key financial information in order to use it for illicit purposes.  An IP firm can, of course, possess some significant proprietary information — trade secrets, product designs, and other business information that could be of use to competitors, stock manipulators, and others.

Most firms, of course, are aware of their ethical obligations to take reasonable precautions to secure client confidences, no doubt in part because the standard of care requires it, hacks are public knowledge, and in fact the FBI issued a warning several years ago on this point.  But a Citigroup report dated almost exactly one-year ago said that lawyers still were behind the curve, and articles specific to IP firms (such as this one, calling IP firms the low-hanging fruit compared to the USPTO’s data) are out there also signaling warnings.

The Cravath incident hopefully will bring more attention to this topic and to the need some IP firms may have to act.

 

Battle over Secret Sales and Secret Commercialization under the AIA

by Dennis Crouch

Helsinn v. Dr. Reddy’s and Teva (D.N.J. 2016)

The America Invents Act of 2011 (AIA) amended the definitions of prior art under 35 U.S.C. § 102 – up for grabs in this case is whether the changes included a narrowing of the ‘on-sale bar.’  Prior to the AIA, the ‘on sale’ bar blocked patenting of inventions that had been “on sale in this country.”  Although not specific in the statute, courts interpreted the on-sale bar to include secret sales or offers-to-sell.  These typically include closed-door business-to-business and custom sales rather than retail sales.[1]  The AIA amended the statute in a number of ways – most pertinent here is addition of the ‘otherwise available to the public’ clause to Section 102(a)(1).[2]  The provision now reads:

Novelty; Prior Art.—A person shall be entitled to a patent unless—(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention; or

The question in this case is how to interpret the statutory phrase “on sale, or otherwise available to the public.”  The otherwise available to the public language suggests that the ‘on sale’ activity is also available to the public.  That reading, however, conflicts with the history of the on sale bar.  Which construction is correct?

The district court in Helsinn sided with the USPTO’s interpretation of the statute – that the AIA modified the definition of on-sale so that it now only includes publicly available sales activity.  This allowed the patentee in the case to avoid an invalidity finding based upon its own prior sales of the patented drug. On appeal, Teva offers its set of arguments to retain the old-meaning:

  1. In ordinary usage, an item is “on sale” whether sold privately or publicly.
  2. Courts have treated “on sale” as a term of art for almost two centuries for sound policy reasons grounded in the Constitution.
  3. Congress did not change the settled meaning of “on sale” by adding the phrase “otherwise available to the public.”
  4. The district court’s reading of “on sale” would render meaningless the crucial word “public” in [102(b)(1)(B)].
  5. A Committee Report and floor statements of two senators cannot accomplish what they failed to accomplish in the statute itself.
  6. The PTO’s interpretation is not entitled to deference.

[TevaSecretSaleBrief]

Professors Mark Lemley (Stanford) and Robert Merges (Berkeley) along with 39 other law professors have filed a brief in support of Teva’s arguments here – arguing that the new interpretation “would radically rewrite the law of prior art.”

The key legal question in the case is simple: did Congress mean to sweep away scores of established cases under the 1952 Act even though it reenacted language unchanged since 1870, merely because it added the phrase “or otherwise available to the public” to the list of prior art categories in the new AIA section 102? We think not. We have three primary reasons. First, the district court’s reading is inconsistent with the language and structure of the AIA. Second, it is inconsistent with Congressional intent in readopting the “on sale” and “public use” language in section 102. Finally, it would sweep away scores of cases decided over two centuries and radically rewrite a host of patent doctrines.

[TevaProfAmicusBrief] Moving forward, Helsinn’s responsive brief will be due April 21.

Of course, the issues here have been substantially debated already with commentators coming out on both sides of the debate:

= = = = =

AIA expanded the scope of prior art in a number of ways. This is one area, however, where it potentially shrunk the body of potential prior art.  Innovative entities with a robust business involving private-transactions and those who rely upon third-party manufacturers are the most likely to benefit by a changed-law.

An important policy question (that could also influence is the construction) is whether eliminating secret sales as prior art would actually allow an innovator secretly commercialize its patent for years and then subsequently obtaining patent rights.

= = = = = =

 

[1] The Federal Circuit has also include a manufacture-supply agreement. (E.g., a supplier seeking for to manufacture and supply your custom inventory).  This issue is currently being reconsidered by the Federal Circuit in the en banc case of Medicines Co. v. Hospira.

[2] The statute also eliminating the ‘in this country’ limitation for on-sale prior art and limited the one-year grace period associated with the on sale bar.

USPTO Stadium Tours (PTAB/TTAB Hearings)

The USPTO has partnered with four law schools with a “stadium tour” of both the Patent Trial & Appeal Board as well as the Trademark Trial & Appeal Board.

Here at Mizzou, we will begin at 9:00 a.m. March 1, we will host two panels that will focus on strategy issues and policy concerns, and the experience will be capped by live hearings by the Patent and Trademark Trial and Appeal Boards.  Various board members will be speaking along with other experts in the field.  Following their tradition, the Boards have asked that we not video-stream the hearing.  However, other content during the day will be streamed online.

The events are free, but we ask that you pre-register if you would also like free lunch.

= = = = =

The central importance of the Patent Trial & Appeal Board (PTAB) has risen greatly since passage of the America Invents Act of 2011 and creation of the new inter partes and post-grant review procedures. These review proceedings provide an alternative forum for third-parties (usually accused infringers) to challenge patent validity. The review trials are handled by three-member tribunals of administrative patent judges who have been appointed by the U.S. Secretary of Commerce after consideration of their training in both technology and the law. The review proceedings are now being challenged on a variety of procedural and constitutional grounds – with one case, Cuozzo v. Lee, to be heard by the U.S. Supreme Court this term.

The Trademark Trial and Appeal Board (TTAB) hears trademark challenges, including opposition proceedings and appeals. Their hearings often focus on questions of whether a mark is generic, amoral or confusingly similar to existing marks. A set of cases pending in federal courts challenge the constitutional propriety of the TTAB’s statutory authority to cancel marks that “disparage” persons, institutions, beliefs or national symbols. Like the PTAB, administrative trademark judges are appointed by the U.S. Secretary of Commerce.

WHAT YOU NEED TO KNOW ABOUT THE AMENDED DEFEND TRADE SECRETS ACT

Guest post by James Pooley.  Pooley is the former Deputy Director General of WIPO. He recently testified at the Senate Judiciary Committee in favor of the Defend Trade Secrets Act. See his earlier Patently-O guest posts . He wishes to thank Prof. Peter Menell for contributing to this post.

Last Thursday the Senate Judiciary Committee favorably voted out the Defend Trade Secrets Act (“DTSA”), which would amend the Economic Espionage Act (“EEA”) to give trade secret plaintiffs the option of filing civil claims for misappropriation directly in federal court. The vote reflected broad bipartisan support (there are now 27 cosponsors in the Senate) and followed a substantive hearing on December 2 at which I had the privilege to testify. Since that time a number of senators engaged in discussions about how to improve the legislation. The result was a series of amendments, all of which have been adopted. Because the bill is likely to proceed quickly at this point, it would be useful to describe what has changed and what those changes could mean for practitioners and companies.

The notable amendments generally fall into four categories: (1) harmonizing with existing standards under the Uniform Trade Secrets Act (“UTSA”); (2) tightening up the process for preventive seizure of secrets; (3) ensuring that injunctions do not unreasonably restrain employee mobility; and (4) providing an exception for whistleblowers who disclose confidential information in order to report a crime to the authorities. The first three of these are laid out in a “Substitute” for S.1890, and the fourth is described in a separate amendment proposed by Senators Patrick Leahy and Chuck Grassley.

HARMONIZING WITH THE UTSA

Bringing the DTSA in closer alignment with familiar provisions of the UTSA, the amendments have slightly changed the definition of a trade secret. The EEA had previously required that qualifying information not be known or readily ascertainable to “the public,” while the UTSA had used the phrase “persons who can obtain economic value from its disclosure or use.” While it was never clear whether this difference would actually matter when applied in litigation, the UTSA formulation has now been adopted, so that the two laws are congruent. (Some still point to the different list of examples of protectable information in the UTSA and EEA definitions, but this has never been shown to make any difference in the broad meaning of the common basic term “information.”)

The amendments have also changed the term of the statute of limitations from five years to three. Although a number of states have designated longer periods (from four to six years), this brings the DTSA into line with the UTSA as it was originally proposed. In the same vein, the enhanced damages provision, which had allowed a punitive assessment up to three times the compensatory award, has been adjusted to match the provisions of the UTSA at twice the amount of compensatory damages.

SEIZURE PROVISIONS

The ex parte seizure provisions have been substantially tightened, providing more assurance that this remedy will not be abused. First, the bill now expressly refers to seizure as available only in “extraordinary circumstances.” Second, an ambiguity identified by Senator Whitehouse at the December hearing has been resolved by clarifying that the target of the seizure must be in “actual” possession of the trade secret and property to be seized. Third, access to the seized material is more limited: only federal law enforcement can perform the seizure, with assistance as necessary from state authorities and an independent technical expert, but the applicant is barred. And following the seizure, the court may have the material sorted by a special master who, like the technical expert, must be under confidentiality restrictions. Fourth, in issuing its order the court must direct when the seizure may be carried out, and whether force may be used to access locked areas. Finally, in a new section the bill requires the Federal Judicial Center to develop “best practices” for seizure and handling of electronically stored information.

MOVING ON FROM “INEVITABLE DISCLOSURE”

One of the most interesting and potentially impactful provisions of the amendments concerns the preservation of employee mobility. Recognizing the critical importance of preventive relief to a right that can be so easily destroyed, the UTSA has always permitted injunctions against “threatened misappropriation,” and the same language is used in the DTSA. But because the DTSA would establish a national standard, some expressed fears that the “inevitable disclosure doctrine,” which has been expressly rejected in some states, might be used by federal judges to block an employee from taking a new job. The draft bill had tried to address this concern with a proviso that no injunction could “prevent a person from accepting an offer of employment under conditions that avoid actual or threatened misappropriation,” but this did not quiet the controversy.

To understand the nature of the dispute we need to wind back the clock to 1995, when the Seventh Circuit issued its decision in Pepsico v. Redmond, 54 F.3d 1262 (7th Cir. 1995), affirming a five-month injunction against a former marketing executive who had lied about his plans to take an identical position with another company that was about to launch a directly competitive product. Although the court had emphasized the executive’s bad behavior, it also summarized that “defendant’s new employment will inevitably lead him to rely on the plaintiff’s trade secrets.” Commentators promptly wrenched this phrase from its context and warned that Pepsico could be used to justify enjoining someone from taking a job just because of what he or she knew. This is how the so-called “inevitable disclosure doctrine” was born.

Having (mis)construed Pepsico this way, it was easy for some to make it a target, raising the alarm that “inevitable disclosure” was the equivalent of a post-hoc judicially-imposed non-compete agreement. Perhaps unsurprisingly, the backlash was particularly strong in California, where employees are protected by a robust public policy against restrictive covenants. In Whyte v. Schlage Lock, 101 Cal. App. 4th (2002), an intermediate appellate court issued a blistering condemnation of the doctrine and flatly declared it unacceptable under California law. It did this in response to the plaintiff’s argument that the doctrine should be available as an “alternative” to proving “threatened misappropriation.” Just what kind of evidence might be enough to establish a threat under the UTSA was not addressed. However, that question was answered several years later in another appellate decision, Central Valley General Hospital v. Smith, 162 Cal. App. 4th 501 (2008). The court said that evidence of bad behavior, like a prior misappropriation, an intention to misappropriate, or a refusal to return confidential material, would be enough to supply the inference.

In the meantime, however, the ideological battle lines had been drawn, and the forces mustering against inevitable disclosure, reinforced by many academic and popular articles, were determined to stamp it out if possible, or at least to protect their own jurisdiction from infection. The fervor of the debate apparently distracted everyone from critically examining what “inevitable disclosure” meant, or how it was actually being applied in places that didn’t have a reflexive opposition to it. It turns out that the doctrine was almost never used as the opponents assumed, that is where the only threat indicator was how much the employee knew. In fact, in those cases judges typically explained their denials by reminding the plaintiff that if all this information had been so critically important they could have demanded that the employee sign a non-compete agreement.

Following last December’s hearing, and in the wake of continuing concerns over the relevant DTSA language, I reached out to my friend Mark Lemley, professor at Stanford Law School. Mark and I had worked together before on issues relating to California’s “high velocity” labor market, and after some discussion about what appeared to be this false conflict over the inevitable disclosure doctrine, we suggested to Senate staff that the issue could better be reframed around the kind and quality of evidence that should be required – under the UTSA or the DTSA – to prove “threatened misappropriation,” and that the inquiry should focus on the employee’s behavior, not merely on how much they knew.

Ultimately, Senator Dianne Feinstein proposed the relevant portion of the DTSA amendments, which now allows an order against threatened misappropriation, provided that it not “prevent a person from entering into an employment relationship, and that conditions placed on such employment shall be based on evidence of threatened misappropriation and not merely on the information the person knows.” (In a belt-and-suspenders approach, the DTSA also includes a directly related amendment proposed by Senator John Cornyn that the order may not “otherwise conflict with an applicable State law prohibiting restraints on the practice of a lawful profession, trade, or business.”)

The new language on threatened misappropriation has at least two very positive effects. First, it makes express the apparent consensus from the courts that “threatened” misappropriation may not be established merely by the importance of the information that someone knows. This makes sense not only as a matter of public policy but also of evidence law. Second, it relieves us from the energy-draining debate over “inevitable disclosure,” which was pretty much a straw man that people loved to punch. Courts will not have to consider whether a jurisdiction accepts or rejects this abstract “doctrine,” but instead will ask: what is the actual evidence from which we should conclude that this person (or their new employer) can’t be trusted to honor the integrity of the plaintiff’s trade secrets? Outcomes in particular cases should not be substantially different.

WHISTLEBLOWER PROTECTION

A second major amendment was offered separately by Senators Leahy and Grassley, addressing a new, and in my opinion long neglected, question: how do we assure that employees and contractors who come upon evidence of illegal activity, but who are constrained by nondisclosure agreements from communicating those facts, can safely speak to their lawyers and to law enforcement officials? One might think that this question would already have been reliably answered by now, but it hasn’t been. In a wide-ranging and thoughtful on the subject, Tailoring a Public Policy Exception to Trade Secret Protection, Professor Peter Menell of the UC Berkeley School of Law explores not only the sparse, murky, and sometimes contradictory legal authority, but also the psychology of whistleblowing and the importance of a clear “safe harbor” for those who are thinking of reporting wrongdoing. As he notes, “[t]he same routine non-disclosure agreements that are essential to safeguarding trade secrets can be and are used to chill those in the best position to reveal illegal activity.”  As a practical matter, employees and contractors face a stark dilemma, where the upside is a clear conscience (and possibly a reward for uncovering fraud) but the downside can involve painful and relentless retaliation as well as personal, financial, legal, and professional risk. Insulating the whistleblower from costly trade secret exposure serves larger societal interests in law enforcement, tax compliance, and surfacing and deterring securities fraud and fraud against the government..

Yet because of the difficulty of enforcing trade secrets once they leak, companies risk potentially significant losses if employees or contractors mistakenly disclose legitimate trade secrets—i.e., those that do not reveal illegal conduct. Peter’s article provided a balanced and effective solution to this dilemma that protects whistleblowers without jeopardizing disclosure of legitimate trade secrets. The proposed safe harbor insulates whistleblowers and their counsel from trade secret liability for disclosing trade secret information in confidence to government officials or as part of a lawsuit alleging retaliation by an employer provided that the information is filed under seal. (The federal Trade Secrets Act, 18 U.S.C. § 1905, generally prohibits governmental employees from disclosing trade secrets.) The proposed statutory exception to trade secret liability provides clear assurance to potential whistleblowers that they do not violate their NDAs merely by consulting legal counsel regarding reporting allegedly illegal conduct to a responsible government official through a confidential channel. In addition, this safe harbor insulates lawyers advising potential whistleblowers about their options and serving as conduits for presenting evidence of allegedly illegal conduct to the government. The efficacy of the safe harbor is enhanced by requiring that NDAs prominently include notice of the law reporting safe harbor to ensure that those with knowledge of illegal conduct are aware of this important public policy limitation on NDAs and exercise due care with trade secrets in reporting such activity.

After Peter’s article appeared just as the DTSA was gaining momentum in the fall, the Senate staff reached out to him to help craft appropriate language. The Leahy/Grassley amendment provides immunity under federal or state law against any claim for violation of an individual’s nondisclosure obligations for disclosure, made in confidence, to (a) an attorney or government official, for the purpose of reporting or investigating a violation of law, or (b) a filing made under seal in a lawsuit “or other proceeding.” In order to ensure that employees (a term that also includes contractors) know about their rights, employers are required to give an appropriate notice in the nondisclosure agreement (as is often done now with state inventor statutes), although this can be a reference to the company’s separate policy document. A failure to comply with the notice provision would block any award of attorneys’ fees or enhanced damages against an employee under the DTSA. Significantly – and this point was emphasized by Senator Feinstein at the hearing on January 28 – the whistleblower protection would not extend to any otherwise improper acts by the employee, such as hacking information in violation of the Computer Fraud and Abuse Act.

CONCLUSION

The DTSA in its current form is a strong bill, meeting its original objective of giving plaintiffs access to federal courts, which are better equipped to handle cases of interstate or international misappropriation of trade secrets. In my opinion, all reasonable objections have been adequately addressed, and there are sufficient protections built in against abuse. Moreover, passage of this bill would substantially improve the environment for both plaintiffs and defendants, by making trade secret litigation more predictable, establishing a national standard for issues like “threatened misappropriation,” and striking the right balance of interests to promote responsible efforts by whistleblowers to report possible violations of law.

REPORT AND ANALYSIS OF RECENT AMENDMENTS TO S. 1890 (The Defend Trade Secrets Act 2016)

By Professor Sharon K. Sandeen, Mitchell Hamline School of Law  

The Defend Trade Secrets Act (S. 1890) passed out of the U.S. Senate Committee on the Judiciary today, but not before it was amended to address a number of concerns that were voiced by opponents over the past two years. The following is my quick analysis of the changes.  Note that there were actually two sets of amendments to the legislation. The so-called manager’s amendment (labeled “S. 1890 Substitute Amendment”) and amendments offered by Senators Leahy and Grassley (labeled “Leahy-Grassley1”). The following page and line references are to the Substitute Amendment. The Leahy-Grassley amendments are discussed thereafter.  [S.1890 Substitute Amendment][Leahy-Grassley1].

1. S. 1890 Substitute Amendment

Page 1:

The legislation is now to be known as the “Defend Trade Secrets Act of 2016” instead of “2015.”

Page 2, line 2:

“Misappropriated” added and language “aggrieved by misappropriation” deleted

Sandeen Comment: This change was apparently made in response to expressed concerns that “aggrieved” might be introducing a new concept of wrongdoing into trade secret law. Since “misappropriation” is a defined term in the DTSA (copied from the UTSA), it is better to stick with that language.

Page 2, lines 11-12:

With respect to the ex parte civil seizure remedy, the language “but only in extraordinary circumstances” was added.

Sandeen Comment: I am not sure what this language adds other than to emphasize the fact that this remedy should rarely be granted. But that begs the question: Why is the remedy needed at all if it will rarely or ever be granted? No one has ever explained to me why egregious cases that might justify such a remedy would not be championed by the U.S. Department of Justice in a criminal case. But there is a clue in later amendments to the EEA criminal provisions that give trade secret owners standing to assert secrecy concerns in such cases. (See report on new Section 3 below).

Page 2, lines 24-25:

The language “another form of equitable relief” was added to limit the circumstances under which an ex parte seizure order could be granted.

Sandeen Comment: As I understand the limitations built into the civil seizure provision, such an order is not to be granted unless other available equitable relief is inadequate. What seems to be lost in the discussion of all forms of equitable relief is that there are legal remedies available, including potential exemplary damages. Typically, equitable relief is not available when such is the case. In this regard, I wonder if “another form of equitable relief” would include a royalty injunction.

Page 4, line 5 et seq:

A new section (V) has been created (and subsequent subsections re-lettered accordingly) to highlight that “the person against whom seizure would be ordered” must have actual possession of both the trade secret and the property to be seized.

Sandeen Comment: While seemingly limiting the scope of the civil seizure remedy, this addition confirms what the opponents of DTSA were afraid of: that the civil seizure remedy can be used to seize property in addition to the actual trade secrets. While the person against whom seizure would be ordered must be shown to have either misappropriated a trade secret or conspired to misappropriate a trade secret, this language is actually much broader than it may seem on the surface. This is because the definition of misappropriation under the DTSA (and the UTSA) can apply to third-parties who were not directly involved in the initial misappropriation, provided they have the requisite (but obviously later acquired) knowledge. For instance, new employers.

Page 5, line 13:

Deletes the language “that are unrelated to the trade secret that has allegedly been misappropriated” in describing the elements of any civil seizure order.

Sandeen Comment: This was apparently intended to limit the scope of a civil seizure order, which is a good thing if it works.

Page 5, line 16 – page 6, line 11: 

Uses “prohibiting” instead of “restricting” and makes other changes to the provision concerning the required content of a civil seizure order, the most significant change being the addition of a new sub section (iv) which requires the court to “provide guidance to law enforcement officials” concerning how they are to execute the order.

Sandeen Comment: This language was undoubtedly added to address concerns that Senator Sheldon Whitehouse raised during the hearing on DTSA that was held before the U.S. Senate Committee on the Judiciary in December of 2015. His principal concern related to the use of force in the event that the person against whom seizure would be ordered was uncooperative.  

Page 7, line 13 – page 8, line 22:

The “Materials in Custody” provision was re-labeled and expanded, particularly with respect to the newly labeled sub-section “Storage Medium” and new provisions labeled “Protection of Confidentiality” and “Appointment of a Special Master.”

Sandeen Comment: The added language was undoubtedly added in an attempt to address concerns about the scope of any civil seizure order (including the very real possibility that property not relevant to the trade secret case might be seized), the handling of seized information, and the practical reality that federal court staff is ill equipped to manage such materials. Nothing in the legislation indicates who will pay for the services of a Special Master.

Page 9, line 2-15:

Deleted the language that used to allow state and local officials to execute a civil seizure order and instead specifies that a civil seizure order must be executed by federal law enforcement personnel.  State and local law enforcement personnel can be involved, but they cannot be involved in the actual seizure of property. Further, the court may allow for the use of a technical expert to assist federal law enforcement officials in executing the civil seizure order, again without specifying who will pay for the technical expert.

Sandeen Comment: These amendments address some of the concerns that have been expressed about how a civil seizure order will be executed and how it can be done without including the legitimate business information of the “person against whom civil seizure is ordered.” However, the more that efforts are made to address the concerns of critics, the more the risks of such a remedy are revealed. If this remedy will be used very infrequently as its proponents argue, Congress should ask if the marginal benefits of this remedy are worth its tremendous costs, particularly given the fact that: (1) criminal prosecution and seizure are possible in egregious cases; and (2) plaintiffs in trade secret cases have very robust legal remedies in the event of the loss of trade secrecy.

Page 11, line 6 et seq:   

The standing to file a motion for encryption has been broadened to include both parties to the litigation and “a person who claims an interest in the subject matter seized.”

Sandeen Comment: This is a positive development, but obviously it acknowledges that non-parties may be affected by a civil seizure order and be forced to hire an attorney to protect their interests.

Page 11, line 23 – page 12, line 8: 

The provisions concerning the effect of injunctions on employment were re-worked, re-lettered and expanded. First, the original language was amended so that any injunction must “be based upon evidence of threatened misappropriation and not merely on the information a person knows.” Second,   the legislation now includes language which states that an injunction cannot “otherwise conflict with an applicable State law prohibiting restraints on the practice of a lawful profession, trade, or business.”

Sandeen Comment: This is a very positive development that makes it clear that State law governing restrictive covenants, including non-compete agreements, will continue to apply as limits on the scope of injunctive relief. More specifically, it rejects the worst aspects of the inevitable disclosure doctrine which many states (most notably California) have found to be inconsistent with their laws against restrictive covenants, particularly those that restrict employee mobility. Issues of choice of law remain, of course. 

Page 13, line 9: 

The measure of potential exemplary damages has been lowered to 2 times instead of 3 times.

Sandeen Comment: This is a positive development, particularly for the proponents of the DTSA who claim that its primary purpose is greater uniformity in trade secret law. The new language is consistent with the UTSA. However, it appears that this change may have been part of a compromise since (as discussed below), the criminal penalties for a violation of the EEA have been increased.

Page 13, line 23: 

The statute of limitations has been lowered to 3 years from 5 years.

Sandeen Comment: This change also makes the statute of limitations consistent with the language of the UTSA (although some UTSA states have not adopted the statute of limitations specified in the UTSA). This is a positive development because businesses can now be more certain when threats of trade secret litigation will end. Since the statute of limitation follows the discovery rule, plaintiffs will have plenty of time to bring a lawsuit once the facts giving rise to such claims are discovered.

Page 14, line 8:

The definitions provisions of the DTSA must be read alongside the existing definition provisions of the EEA, which is where you will find the definition of a trade secret. A change from earlier versions of the legislation is that the word “public” in 18 U.S.C. §1839 (3)(B)  (the definition of a trade secret) will be substituted with “another person who can obtain economic value from the disclosure or use of the information.”

Sandeen Comment: This is another positive development that makes the definition of a trade secret under the EEA (as amended) more consistent with the language of the UTSA. Without this amendment, the EEA might be interpreted to include information that is in the public domain under state law. Not changed in the EEA to be consistent with the UTSA is the first part of the definition of a trade secret which, under the EEA, includes a litany of types of information that might qualify for trade secret misappropriation. However, this greater specificity always struck me as necessary since the EEA was initially, and will remain in part, a criminal statute.

Page 17, line 21 – Page 19, line 2:   

A new Section 3 was added titled “Trade Secret Theft Enforcement” and old Section 3 was re-labeled as Section 4. This section increases the penalties for a violation of 18 U.S.C. §1832 from $5,000,000 to the greater of $5,000,000 or 3 times the value of the stolen trade secrets to the organization, including the costs of reproducing the trade secrets. Second, it adds a new provision titled “Rights of Trade Secret Owners” that essentially allows trade secret owners to be heard in criminal court concerning the need to protect their trade secrets. Lastly, it amends 18 U.S.C. §1961 (the RICO statute) to add a violation of the EEA as a predicate act.

Sandeen Comment: At first blush, these changes seem to more directly address the concerns that motivated the proposed legislation and should have been tried first before risking the disruption of U.S. trade secret law by creating a federal civil cause of action for trade secret misappropriation. What they reveal is the concern that trade secret owners have about the effectiveness of federal criminal prosecution to stop (or punish) the most egregious cases of trade secret misappropriation. They also reflect the risks to trade secrets posed by the public nature of criminal prosecutions. Robust criminal laws are already on the books to punish those who would engage in the most egregious forms of trade secret misappropriation, but trade secret owners might be hesitant to report such crimes out of fear that their trade secrets might be lost in the process. Allowing trade secret owners to express their confidentiality concerns in a criminal court seems like a good idea. More study of the implications of the RICO provision is needed, particularly with respect to the potential for the over assertion of criminal prosecutions which was a major concern of business interests when the EEA was first adopted.

Page 22, line 23 et seq.:

The re-numbered “Sense of Congress” provision (now Section 5) added point (4) concerning the civil seizure order and Congress’ sense that the need for such a remedy should be balanced  against the risk of interrupting the business of third parties and the legitimate interests of the party accused of wrongdoing.

Sandeen Comment: While this is helpful language, it is interesting that this language is included in the “Sense of Congress” provision and not in the text of the civil seizure provision itself. While Congress is at it, I would urge it to add point (5) to the “Sense of Congress” and state that the DTSA should be interpreted and applied in a manner that is consistent with the commentary to the UTSA.

Page 23, Line 4 et seq:  

New Section 6 was added titled “Best Practices” to require the Federal Judicial Center “using existing resources” to, within two years, recommend best practices related to civil seizure orders.

Sandeen Comment: Again, this indicates that concerns about the abuse of civil seizure orders remain.

2. Leahy-Grassley Amendments

These amendments would add a section to the DTSA, in a place to be determined, titled “Immunity from Liability for Confidential Disclosure of a Trade Secret or in a Court Filing.” This new section is designed to protect whistleblowers from liability for the disclosure of trade secrets to the government and in the context of retaliation lawsuits, provided that steps are taken by the whistleblower to keep such information confidential. It also would require employers to give notice of such immunity to employees, thereby requiring an exception to confidentiality provisions.

Sandeen Comment: This is a very positive development for those who are concerned that the assertion of trade secret rights can be used to prevent the timely disclosure of information that is needed by law enforcement authorities. However, it only applies where there is an alleged violation of law and not, more broadly, in situations where threats to public health exist, for instance.  

= = = = =

[Prior Patently-O Posts on the DTSA]

Guest Post: Why we Need a Seizure Remedy in the Defend Trade Secrets Act

 

Guest post by James Pooley.  Pooley is the former Director General of WIPO. He recently testified at the Senate Judiciary Committee in favor of the Defend Trade Secrets Act. See his earlier Patently-O guest post here.

INTRODUCTION

In a recent essay published in the Washington and Lee Law Review Online,[1] Professor Eric Goldman of the Santa Clara University School of Law criticized the ex parte seizure provisions of the Defend Trade Secrets Act (“DTSA”), which is pending before Congress in identical Senate (S.1890) and House (H.R.3326)  bills. In his view, the legislation is unnecessary, unprecedented, and carries an unacceptably high risk of abuse and collateral damage.

I strongly disagree. Trade secrets face far different threats in the digital age, and having federal courts able to intervene immediately in cross-border cases is critical. In exceptional circumstances, impoundment of a secret by the court will do what this sort of remedy has always done: get the property out of the hands of someone who threatens to destroy it or flee the jurisdiction, so that the matter can be heard on notice before the harm occurs. The seizure provisions of the DTSA have been carefully constrained to prevent abuse, to minimize harm, and to discourage any but the most compelling applications.

SEIZURE PREVENTS TRADE SECRET LOSS BEFORE IT HAPPENS

Most trade secret theft can be adequately addressed with preventive orders entered after a noticed hearing. This is because most actors in these cases can be expected to follow the orders of a court, and because our legal tradition values notice and the higher quality of information that is produced by the adversarial process.

Notwithstanding that preference, as we all learned in civil procedure class, courts in extraordinary cases may act without giving notice because of an acute danger to someone or something. This has been true across the range of legal disciplines, including trade secrets, and the majority of state laws, as well as the Federal Rules, have acknowledged this by articulating the high bar that a plaintiff has to meet before any matter can be heard ex parte. While that bar is necessary to ensure the case is exceptional, the flip side of the coin is that the harm to be avoided is irreparable.

Professor Goldman argues that the DTSA will be useless against the thief who plans to hijack information over the Internet, or who is on his way to the airport with the secrets in his pocket. But these scenarios only prove the need for a federal remedy: when a trade secret owner discovers that such a thing is about to occur, he can’t waste time figuring out what some county court might do. If there is a chance that a surprise intervention by law enforcement can prevent the loss, it is a federal court that is in the best position to respond and to deliver process that works across state lines. Like a terrorist attack, we can only hope to be vigilant and discover it before the button is pushed. But when we do have that kind of information, we also should be able to deploy the most effective tools to prevent the harm. In the right circumstances, one of those tools should be law enforcement, acting under the guidance and supervision of a federal court, to take temporary possession of the trade secret. That is the focus of the DTSA seizure provisions.

EX PARTE SEIZURE FOR TRADE SECRETS IS NOT “UNPRECEDENTED”

In his essay, Professor Goldman asserts that the seizure provisions “would represent an unprecedented innovation. No state trade secret law has a trade secret-specific ex parte seizure process [that is] similar . . . .” This stretches the meaning of “unprecedented” pretty far. He gets away with it only because the second sentence is so narrowly drawn, claiming only that no state has a “trade secret-specific ” process. But that doesn’t mean that states have not used broadly applicable seizure procedures in trade secret cases. In fact they have, although they may call them by another name, such as sequestration, or attachment. Texas, for example, allows for ex parte sequestration in a variety of circumstances, and it has been applied in at least one case to software. See Glenn, Ex-Parte Seizure of Intellectual Property Goods, 9 Tex. Intell. Prop. L.J. 307 (2001) (discussing Tex. Civ. Prac. & Rem. Code §62.001, and Learn2.com, Inc. v. Bell, 2000 U.S. Dist. Lexis 14283 (N.D. Tex. July 20, 2000)).

Moreover, the UTSA itself includes § 2(a), which “authorizes mandatory injunctions requiring that a misappropriator return the fruits of misappropriation to an aggrieved person, e.g., the return of stolen blueprints or the surrender of surreptitious photographs or recordings.” Commissioners’ Comment, 14 U.L.A. at 451. While the Act doesn’t expressly authorize granting such injunctions ex parte, neither does it prohibit them. Again, the circumstances justifying issuance of an order without notice have traditionally been defined by local rules in state courts and by FRCP Rule 65 in federal courts.

Indeed, Professor Goldman acknowledges that trade secret owners “already may seek ex parte TROs, including impoundment,” under FRCP Rule 65, reinforcing this with the statement that “existing federal TRO procedures already provide for ex parte seizures for trade secret owners.” He finds this authority in the Committee Notes to the 2001 amendments, which explains that “impoundment may be ordered on an ex parte basis under subdivision (b) [of Rule 65] if the applicant makes a strong showing of the reasons why notice is likely to defeat effective relief.” While he uses this reference to argue that the DTSA seizure provisions are unnecessary, it directly contradicts his claim that they are “unprecedented.”

DTSA SEIZURE PROVISIONS ARE BUILT ON THE LANHAM ACT

Another reason why the “unprecedented” argument fails is that the DTSA seizure language was directly patterned on the Lanham Act, 15 U.S.C. §1116(d), expressly authorizing ex parte seizure and impoundment of counterfeit goods. As a condition of such an order, the statute requires that it clearly appear from specific facts sworn by the applicant that some other order would not be adequate, that the applicant is likely to succeed on the merits, that immediate and irreparable injury will occur without the order, and that the “matter to be seized” is located at a specific place. Execution of an order has to be by law enforcement, and seized materials must be held by the court in accordance with a protective order to prevent disclosure of confidential information. The plaintiff must be prohibited from publicizing the order or getting access to the defendant’s trade secrets in the course of the seizure. Finally, a hearing has to be held between ten and fifteen days later, at which the plaintiff will have the burden to demonstrate continuing justification for the order.

The DTSA imposes all of these same restrictions, but adds more. Only property “necessary to prevent propagation or dissemination of the trade secret” can be seized. This means, for example, that records and other evidence of the acts of misappropriation or misuse cannot be taken away, thereby reducing the risk of disruption to the defendant’s other business operations. In fact, the court is specifically required to order only “the narrowest seizure of property necessary” and to provide that the seizure “be conducted in a manner that . . . does not interrupt the legitimate business operations of the [defendant] that are unrelated to the trade secret that has allegedly been misappropriated.”

As with other predicate requirements, the plaintiff’s showing must “clearly” demonstrate “from specific facts” that the information is a trade secret, that the target of the seizure has the secret in their possession, and that if notice were given the target “would destroy, move, hide, or otherwise make such matter inaccessible to the court . . . .” (This latter requirement provides assurance to cloud vendors and others who might be holding information for someone accused of misappropriation.) And the merits hearing must be held no more than seven days later (not ten to fifteen as in the Lanham Act), during which time anyone affected by the order may move to modify or dissolve it.

THE RISK OF ABUSIVE SEIZURE IS LOW AND WELL MITIGATED BY DTSA

So it should be obvious – particularly to any practitioner that has tried to convince a federal judge to issue any sort of ex parte order – that getting relief under this section will be very, very difficult. And while making it hard to get is the first line of defense against abuse of any legal process, the legislation provides serious consequences in case it turns out that the plaintiff was wrong. In the first instance, the court has to require a bond adequate “for the payment of the damages that any person may be entitled to recover as a result of a wrongful or excessive seizure” or attempted seizure. But the amount of the bond is only a guarantee and “shall not limit the recovery” of damages for wrongful seizure. Those damages are expressly tied to the Lanham Act, 15 U.S.C. § 1116(d)(11), which includes lost profits, cost of materials, loss of good will, punitive damages where bad faith is shown, and attorneys fees.

In other words, the risk analysis that any litigant must do before requesting a seizure remedy is not just that it might try and fail – although in my experience that is a very likely outcome – but that if it succeeds in getting the order it may be found to have oversold its case. Federal judges are not known for suffering fools gladly, and in addition to the opportunity to impose liability for damages they have Rule 11 sanctions in their tool kit. Therefore we can reasonably assume that the vast majority of counsel will exercise good judgment in discouraging marginal applications, and that to the extent any abusive behavior occurs, appropriate consequences will be imposed, just as they have been in other areas of the law.

CONCLUSION

Professor Goldman envisions the future without giving sufficient weight to the past or present. Of course there is risk involved in this as in all other processes run by humans. The relevant questions are: how important is the goal, how serious are the risks, and what can be done — informed by our analogous experience — to mitigate those risks to an acceptable level? By any objective measure, the authors of the DTSA have done their job well, and we have reliable answers.

The goal — having a federal resource that matches the modern threat of irreparable harm to an essential industrial asset — is critically important, not just for the limited number of cases where the tool will be used, but also for those that will not mature into problems because it is there. The abstract risk of meritless, abusive applications to federal courts must of course be acknowledged, but our experience with similar procedures shows what it takes to discourage such behavior. And the measures written into the seizure provisions of the DTSA — demanding the greatest care and judicial scrutiny possible and imposing very serious consequences for getting it wrong — provide a generous margin of comfort to conclude that seizures will happen only where necessary and where properly controlled to minimize harm.

= = = =

[1] http://ssrn.com/abstract=2697361.

= = = =

Links: 

 

 

Chief Administrative Patent Judge

The USPTO needs to hire a new Chief Administrative Patent Judge — head of the Patent Trial and Appeal Board. Apply here https://www.usajobs.gov/GetJob/ViewDetails/425567200.

The Chief Administrative Patent Judge (Chief Judge) is a full voting member of the Patent Trial and Appeal Board (Board) as provided by Title 35 U.S. Code, Section 6, and is the immediate supervisor of the Deputy Chief Administrative Judge and second-line supervisor for all of the lead Administrative Patent Judges (Judges) assigned to the Board. The Director, the Deputy Director, the Commissioner for Patents, the Commissioner for Trademarks, and the several administrative patent judges (including the Chief Judge, Deputy Chief Judge, Vice Chief Judges, and Lead Judges) constitute the membership of the Board. Any three or more of these individuals may constitute a legal panel of the Board to render a decision in a patent appeal, an interference proceeding, a post grant review proceeding, an inter partes review proceeding, a derivation proceeding, or a proceeding under the Transitional Program for Covered Business Methods Patents (TPCBMP). The Board has the sole authority to hear and adjudicate patent appeals from decisions of Primary Patent Examiners. The Board also holds oral hearings when requested, and has the authority to grant rehearings.With respect to patent appeals, final decisions of the Board, if unfavorable to an applicant, may be appealed to the United States Court of Appeals for the Federal Circuit in accordance with 35 U.S.C. § 141. Alternatively, dissatisfied applicants may elect to bring a civil action in accordance with 35 U.S.C. § 145. With respect to interferences, final decisions of the Board, if unfavorable to a party, may be appealed to the United States Court of Appeals for the Federal Circuit in accordance with 35 U.S.C. § 141. Alternatively, dissatisfied parties may elect to bring a civil action in accordance with 35 U.S.C. § 146. With respect to inter partes reviews, post grant reviews, and proceedings under the TPCBMP, final decisions of the Board, if unfavorable to a party, may be appealed only to the United States Court of Appeals for the Federal Circuit in accordance with 35 U.S.C. § 141. With respect to derivation proceedings, final decisions of the Board, if unfavorable to a party, may be appealed to the United States Court of Appeals for the Federal Circuit in accordance with 35 U.S.C. § 141. Alternatively, dissatisfied parties may elect to bring a civil action in accordance with 35 U.S.C. § 146.

The Chief Judge is responsible for developing and implementing the USPTO rules associated with patent appeals, interferences, post grant reviews, inter partes reviews, derivations, and TPCBMP. … The Chief Judge is also responsible for developing and implementing the Standard Operating Procedures necessary for the internal operation of the Board. Furthermore, the Chief Judge is responsible for adjudicating petitions for the Under Secretary of Commerce for Intellectual Property and Director of the USPTO.

The Chief Judge is responsible for the oversight and management of all Board operations. This requires performing the comprehensive executive management, strategic planning, and financial functions essential to effective Board operations. The Chief Judge is also responsible for the assignment of panels of administrative patent judges to adjudicate all patent appeals and interference proceedings, on which panels the Chief Judge periodically serves. The Chief Judge further develops and implements quality, timeliness, and productivity performance standards for the Judges to appropriately address filing and backlog issues.

For qualifications, the USPTO requires senior level management and technical experience in the areas of patent law and management.  This includes both a technical degree and a law degree and must be an attorney in good-standing.

 

Trade Secret Law

The Senate Judiciary Committee moved forward with hearings on the Defend Trade Secret Act (DTSA) that would, inter alia, create a Federal cause of action for trade secret misappropriation.  The intent would not be to preempt state laws but instead to provide an additional layer of protection for trade secret owners. That said, the new law could be used to overcome limits and defenses available in some states (such as California).  Although still objectionable to some, the current bill is a toned-down version of the parallel bill from last term.  The current approach also has bipartisan support from leaders of the Judiciary Committee (Senators Grassley and Leahy).

Statements and Written Testimony from the Hearing:

Of those testifying, only Prof Sandeen called for a slowdown in the legislative approach.

 

Goldman on Ex Parte Seizures in Trade Secret law

Prof Eric Goldman has released his new article titled Ex parte Seizures and the Defend Trade Secrets Act.  The article dives into what Goldman calls the “quirky and unprecedented ex parte procedure” included within the proposed legislation that would allow “trade secret owners to obtain a seizure order.”  The ex parte portion is important — the seizure order would allow an owner to take action without giving the accused violator a chance to respond. Goldman acknowledges that the provision is much weaker than its 2014 version, but still argues that ex parte seizure is problematic:

More generally, the fact-based disputes that inevitably must be resolved in trade secret litigation make trade secrets an especially poor basis for ex parte actions. As a result, we should be nervous about the proposed seizure provision in the Defend Trade Secret Act—and all other ex parte seizure procedures in trade secret cases.

Documents:

Goldman notes that, on this particular issue, the DTSA is certainly an expansion of rights since “[n]o state trade secret law has a trade secret-specific ex parte seizure process similar to the Seizure Provision.” (To be clear, seizures go a major step beyond emergency temporary-restraining-orders).

Of course, a difference with the DTSA its national level implementation.  That difference could be relevant to the seizure provisions — since it is the federal government (not individual state governments) that have an extensive customs and homeland security regime and it is the federal government (not individual state governments) that has expertise in espionage.  In my mind, these distinctions do make some difference – until you realize that criminal espionage and foreign export of trade secret information are already covered by Federal Criminal Trade Secret laws. The DTSA is about civil law — and largely about large companies trying to control the flow of information, control former employees, and skirt restrictions in-place in California law.

I expect that before it passes that Prof. Goldman’s arguments will be heard and the Seizure provision removed — of course, that decision is well above my pay grade.

 

 

 

Guest Post: Seeing Trade Secret Law Through the Lens of Information Diffusion

On December 2, 2015 the Senate Judiciary Committee is holding hearings on whether it is time to move forward national-level trade secret protection. Those testifying include three pro-reformers, including Jim Pooley and one on the other side – Prof. Sharon Sandeen.  The following guest post comes from Prof. Sandeen and is a response to Jim Pooley’s recent Trade Secret post. – DC. 

Sharon SandeenGuest Post by Sharon K. Sandeen

As a person who has been researching, writing and speaking about trade secret law for nearly twenty-five years, I am very happy that it is finally getting the attention it deserves, both in terms of increased scholarship and legislation introduced in the U.S. Congress. Thus, I read James Pooley’s recently released article, The Myth of the Trade Secret Troll: Why We Need a Federal Civil Claim for Trade Secret Misappropriation,[1] with great interest, particularly since it provides a critique of some of the arguments that David S. Levine and I discuss in our article, Here Come the Trade Secret Trolls.[2]

In truth, Jim and my views on trade secret law do not vary much. We both believe that trade secrets are important assets and that a robust and largely uniform set of laws is needed to protect legitimate trade secrets from misappropriation. However, we do tend to see trade secret law from different perspectives. Whereas Jim, and many others who advocate for ever-stronger intellectual property rights, primarily views trade secret issues from the perspective of IP owners and the asserted need for incentives to encourage innovation and creativity, my principal perspective is through the lens of information diffusion. Consistent with the longstanding policy of the United States, including the disclosure purpose of patent law, I do not think it is possible to have the optimal amount of innovation and creativity without the diffusion of information and knowledge. Call me old-school, but I am also concerned about the use of putative IP rights for anticompetitive purposes.

The difference in perspectives manifests itself in a number of ways, raising along the way many issues that are deserving of more scholarly attention. For instance, in his recent article, Jim argues that the existing system of state trade secret laws is not uniform, thereby justifying federal legislation. While I acknowledge that various differences in state laws do exist, I believe that those differences are minor, particularly as the laws are actually applied and that differences in application are often due to the fact-specific application of the elements of a trade secret claim. We also disagree on the likely impact of a federal civil cause of action. Jim thinks it is only a modest change, whereas I think it will mark a major disruption in U.S. trade secret law because there is no existing federal jurisprudence related to civil trade secret claims.

Jim’s article does highlight two issues, in particular, that I believe need to be discussed and addressed directly; differences that arise when one looks at trade secret law from the perspective of information diffusion instead of through the eyes of trade secret owners.

The first issue concerns the purpose of trade secret laws. In addition to the traditional purpose of maintenance of business ethics, Jim correctly points out that the U.S. Supreme Court in Kewanee cited the incentive purpose, recognizing trade secret law as a supplement to the incentives provided by patent protection. However, he downplays the third purpose cited by the Supreme Court; namely, the disclosure purpose. I happen to believe that this purpose is very important with respect to the diffusion of information and knowledge in our society.

Second, and related to the disclosure purpose of trade secret law, is the fact that trade secret protection is intentionally limited. This too is a point upon which Jim and I apparently disagree since he repeats the oft-stated claim that the UTSA expanded trade secret rights. However, my research into the drafting history of the UTSA reveals a more nuanced story, one that limited the scope of trade secret protection for at least three reasons.[3] First, trade secret rights were limited out of concern that they would conflict too much with patent law, including its disclosure purpose. Trade secret rights are also weak, and therefore limited, because society benefits when trade secrets (i.e., information and knowledge) leak out. Third, trade secret protection is weak (or balanced) due to concerns that trade secret litigation can be used for anticompetitive purposes.

Jim and others can disagree with the conclusions I have drawn after my evaluation of scores of source documents, but the more important point is that we need to have an open and honest debate about the extent to which trade secret law should be used to restrict the free flow of information and knowledge that is needed for innovation, creativity, and competition. Jim, at least, is the first proponent of the federal legislation to acknowledge that one of its purposes is the desire of some companies to protect more of their inventions as trade secrets instead of pursuant to patent law. If this is a purpose of the Defend Trade Secrets Act, it is time that we have an open and honest debate about whether it is wise to drive more and more companies toward trade secret protection instead of patent protection and , thereby, locking down more and more information.

= = = = =

[1] 23 George Mason L. Rev. ___ (forthcoming 2016).

[2] 71 Wash. & Lee L. Rev. Online 230 (Jan. 21, 2015).

[3] Sharon K. Sandeen, The Evolution of Trade Secret Law and Why Courts Commit Error When They Do Not Follow the Uniform Trade Secrets Act, 33 Hamline L. Rev. 493 (2010).

THE MYTH OF THE TRADE SECRET TROLL

Why We Need a Federal Civil Claim for Trade Secret Misappropriation

Guest Post by James Pooley, former Deputy Director General of the World Intellectual Property Organization.  Pooley makes his full argument in a forthcoming George Mason Law Review article available here.

Trade secret theft has been a federal crime since 1996, covered by the Economic Espionage Act (“EEA”). But civil misappropriation claims remain limited to state court filings under common law or local variants of the Uniform Trade Secrets Act (“UTSA”). Calls for federal jurisdiction have grown with the increasing importance of information as a business asset and with the emergence of technology that makes theft of these assets almost infinitely easier. Recent examples involving international actors have galvanized the business community to request a straightforward solution: amend the EEA to provide a federal option for private claims.

Several bills were introduced in the 113th Congress to accomplish this, and to authorize provisional remedies for seizure of relevant property to prevent secret technology from being transferred out of the jurisdiction. The 2014 legislation was not acted on before Congress adjourned.  A revised version is pending now, the Defend Trade Secrets Act of 2015 (“DTSA”), reflected in identical House (H.R.3326) and Senate (S.1890) bills.

The approach of the DTSA is fairly simple: use existing language of the EEA where appropriate, such as the definition of a trade secret, and where other language is required to define the civil aspects, such as misappropriation and damages, use language taken from the UTSA. Indeed, the only meaningful departure from the UTSA is to add a section allowing ex parte seizures of the misappropriated property. But even that portion draws from established provisions of the Lanham Act, tightened up considerably from the 2014 bills in order to discourage abuse.

The DTSA has received virtually unanimous support from industry, and also enjoys unusually bipartisan political sponsorship, with 65 cosponsors in the House (45 Republican and 20 Democrat) and ten in the Senate (six Republican and four Democrat). The only organized opposition has come from a group of law professors who published an “open letter” in 2014 criticizing the previous draft legislation, and who have recently released another letter describing their concerns. Mainly, they argue that we don’t need federal legislation because state laws are uniform enough; that the seizure provisions are too broad; and that the DTSA would limit labor mobility by approving the so-called “inevitable disclosure doctrine.”

As I will explain below, on each of these points the professors are wrong, misled by incorrect assumptions or unjustified speculation. Indeed, in a recent journal article two of them have predicted that the legislation would unleash a never-seen-before class of commercial predator, the “trade secret troll,” who they claim would “roam free in a confused and unsettled environment, threatening or initiating lawsuits for the sole purpose of exacting settlement payments, just like patent trolls.”

This apocalyptic scenario is not only fanciful; it is absurd. While patents are exclusive rights that operate against the world, trade secrets provide no exclusivity and depend on a confidential relationship. The image of a “trade secret troll” may help draw attention to a political argument, but it is a myth, and deserves no serious consideration.

The reality of this legislation is simple and compelling. Giving trade secret owners the option to sue in federal court would fill a critical gap in effective enforcement of private rights against cross-border misappropriation that in the digital age has become too stealthy and quick to be dealt with predictably in state courts. The bills would accomplish this by effecting only very modest changes, relying heavily on existing laws and rules. The seizure provisions in particular are so narrowly drawn that only the most clearly aggrieved plaintiffs would risk invoking the procedure. Having no pre-emptive effect, the federal law would leave in place all relevant state laws and policies, including those relating to mobility of labor.

U.S. trade secret law emerged in the nineteenth century to accommodate the shift from agrarian and cottage production to larger-scale industry, in which the secrets of production would have to be shared with workers or with business partners. Court decisions sought to enforce the confidence placed in those who were given access to valuable information about machines, recipes and processes. At the core of every case was a confidential relationship. Protecting this trust, the courts explained, was a simple matter of enforcing morality in the marketplace.

The common law origins of trade secrets – in contrast to the federal patent statute – meant that the majority of cases were heard in state court. Even when a federal court took diversity or supplemental jurisdiction over a trade secret dispute, it applied the law of the state in which it sat. And at first there was little variation, with most states looking to the Restatement of Torts § 757 as a guide. But as industrial development continued through the middle of the twentieth century, legal foundations shifted, and the reporters of the Second Restatement dropped the subject completely.

Meanwhile, a school of thought had developed among commentators that trade secret law should be abolished altogether because it was inconsistent with, and therefore preempted by, federal patent law. This argument was famously rejected by the U.S. Supreme Court in Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470 (1974). Two important public interests, the Court explained, were served by trade secret law: the “maintenance of standards of commercial ethics and the encouragement of invention.” Without guaranteed secrecy, businesses would be left to expensive self-help security measures that would disadvantage smaller competitors and discourage dissemination of information through sharing. And as a practical matter, there was no conflict between the two systems because they operate so differently: patent law is strong, providing an exclusive right “against the world;” while trade secret rights are “far weaker,” because they do not protect against reverse engineering or independent development.

With the Second Restatement’s decision not to treat the issue, some were concerned that trade secret law would become too fractured and inconsistent for companies which had been increasingly doing business across state lines. Therefore, in 1979 the National Conference of Commissioners on Uniform State Laws issued the first of two versions of the UTSA, proposing harmonized rules on establishing and enforcing trade secret rights. Measured by adoption rates, the UTSA has been a great success, with 47 of the 50 states so far embracing it (New York is the leading holdout). However, measured by its objective of uniformity, the law has been a disappointment. Unlike the UCC, the UTSA has frequently been enacted with customized features.

A few examples will help illustrate the scope of the problem. California dropped the language requiring that a trade secret be not “readily ascertainable,” with the result that the defendant is required to specially plead that circumstance as an affirmative defense. Illinois also eliminated the “readily ascertainable” language, and it prohibits royalty injunction orders, sets a different limitations period and allows permanent injunctions. Idaho requires that computer programs carry a “copyright or other proprietary or confidential marking” to qualify for protection.  Georgia limits protection of customer lists to physical embodiments, in effect allowing employees to appropriate such information in (human) memory. South Carolina’s version of the UTSA requires a court hearing an injunction request to consider “average rate of business growth” in determining a head start period, and prescribes very particular rules for discovery of trade secret information, even for local discovery in aid of an action pending in another jurisdiction.

When Congress considered the EEA in 1996, there was some discussion of adding a civil right of action, but this was deemed impractical in view of the need for swift legislative action. In the years since its enactment, the EEA has had a mixed record of success. As reported by one veteran prosecutor, the average of about eight prosecutions per year is a “languid pace” that probably has done little to create a deterrent effect. In part this may be due to a reluctance of victims to bring cases to the prosecutor, either because of a loss of control or Fifth Amendment effects on civil claims, or it may be due to a lack of resources or interest within the various offices of the U.S. Attorneys, who have discretion whether to accept qualifying cases.

Calls for a federal trade secret law with a private right of action had already begun before the EEA was passed. After it became law, a number of scholars noted the anomaly and suggested that, because the national economy had become primarily knowledge-based, and because even with the UTSA state law was far from uniform, a federal civil law should be enacted. More recent commentary, while continuing to emphasize the drawbacks of variations in state law, also has pointed out the economic advantages of federalization, particularly for small businesses, which rely more heavily on secrecy than on patenting, as well as the procedural advantages for trade secret owners, including national service of process.

The highly-publicized cyberattacks of recent years have exposed not only the precarious security of personal financial and health information, but also the vulnerability of American corporate secrets. Thirty years ago information security consisted mainly of guarding the photocopier and watching who went in and out the front door. Now, with the Internet connected to millions of smartphones, and with electronic storage devices the size of a coin, information assets (which account for over 80% of the value of U.S. public companies) can be moved quickly and silently across state and international borders. In that context, existing procedures at the state level seem impossibly quaint. If a case in Illinois requires testimony of a witness in California, the plaintiff has to petition its home court to authorize a deposition, and then file an action in California based on the Illinois order, to secure the required subpoena. During the weeks or months of this process, the witness could easily have left the country, with the secrets in her pocket.

In other words, the time-critical nature of interstate and international misappropriation of valuable digitized data requires an immediate and sophisticated response mechanism, and neither state law nor the EEA criminal framework provides a satisfactory solution. Federal courts, however, can provide the necessary resource. First, they will be operating under a single, national standard for trade secret misappropriation and a transparent set of procedural rules, offering predictability and ease of use. Second, they will provide nationwide service of process and a unified approach to discovery, enabling quick action by trade secret owners even when confronted with actors in multiple jurisdictions. Third, as a result of their extensive experience with complex cross-border litigation involving intellectual property, they will be able to resolve ex parte matters fairly and jurisdictional issues quickly and efficiently. Fourth, their generally more predictable discovery procedures will serve the legitimate needs of trade secret plaintiffs, who typically must develop most of the facts to prove their case through defendants and third parties.

In this context, the objections raised by the law professors are not convincing. First, it is not fair to describe existing state law as “coherent,” “robust and uniform,” so that U.S. businesses already enjoy “a high level of predictability.” The rhetoric does not obscure the reality of a patchwork of differing standards and rules – in some ways more divergent than before enactment of the UTSA – that necessarily creates friction and inefficiency for companies with interstate operations.

Second, while admitting that the current language on ex parte seizure is “more limited in scope” than the 2014 legislation (for example, only property “necessary to prevent the propagation or dissemination of the trade secret” can be seized), the professors think this tightening is not enough and that the provision “may still result in significant harm.” No evidence is provided, but only speculation that mere invocation of the procedure might cause small businesses to “capitulate,” and that the “chilling effect on innovation and job growth . . . could be profound.” Again, the reality could hardly be more different. The DTSA is loaded with limitations making seizure very difficult to achieve, and with liabilities making it prohibitively expensive to be wrong in asking for it. In the unusual case where the plaintiff has no substantial basis for the claim, the defendant will simply file an opposition, the seizure will be dissolved, and the plaintiff will pay for the harm. Surely the benefits of the DTSA are worth that occasional risk.

Third, the professors assert that new language, added to the DTSA to ensure that mobility of labor is respected, embraces the so-called “inevitable disclosure doctrine,” which they view as the equivalent of a judge-made noncompetition agreement. In fact, that “doctrine” is nothing more than a method of analysis under the common-sense UTSA provision allowing injunctions against “threatened misappropriation.” This method has been applied thoughtfully in a majority of jurisdictions, resulting in a wide range of conditional remedies, and has only rarely been applied in a way that stops anyone from taking a new job.

The DTSA is sorely needed to fill a gap in remedies available to U.S. businesses that now operate in an information-based, globalized economy. This is one of those instances where federal structures are required to address a critical set of interstate and international problems. The DTSA has been carefully constructed to deter and punish abuse. Using well-established definitions and norms, it provides a choice to file a familiar claim in an effective forum. And there is absolutely no danger that enacting this statute will generate some new form of “troll” behavior to this point unknown in trade secret law.

= = = = = =

James Pooley was most recently Deputy Director General of the World Intellectual Property Organization in Geneva, where he was responsible for managing the international patent system. For 37 years before that he was a trial lawyer in California, handling primarily trade secret and patent disputes. He taught trade law and litigation as an adjunct professor at the University of California, Berkeley, and at Santa Clara University. He is the author of the treatise “Trade Secrets” (Law Journal Press, updated 2014) and a co-author of the Patent Case Management Judicial Guide (Federal Judicial Center 2009, 2015). His most recent business book is Secrets: Managing Information Assets in the Age of Cyberespionage (Verus Press 2015).  Mr. Pooley currently serves as Chairman of the Board of the National Inventors Hall of Fame.

McCarthy on the Federal Circuit as a trademark court

by Dennis Crouch

Thomas McCarthy and Dina Roumiantseva have published a new article titled: Divert All Trademark Appeals to the Federal Circuit? We Think Not.  They write:

With some regularity over the years, a proposal is made to change the Lanham Act so that appeals in all Lanham Act trademark and false advertising cases from district courts across the United States will be diverted from the regional circuit courts of appeal to the Court of Appeals for the Federal Circuit. We think it is time to discuss this proposal head on and hopefully to convince the reader that this diversion is not a good idea and should never be implemented. Advocates of this proposal claim that trademark law would benefit from the consistency that a single appeals court could provide and that the Federal Circuit has exceptional expertise in trademark law. We believe, however, that trademark law does not suffer from the kind of circuit conflict that led to the channeling of all patent appeals to the Federal Circuit in 1982. Moreover, our review of case law suggests that some regional circuits have a comparable or greater experience with trademark law. We argue that no change in the present system of trademark appeals is needed.

I see merit to the McCarthy-Roumiantseva argument.  However, I also see a major problem with the current intellectual property system is its disjointed implementation nature.  Copyright is adminstered by a branch of the Library of Congress. Patent and Trademark registration is handled by a single agency, except for state-law and FDA exclusivity issues. And, the appellate courts that hear most copyright and trademark infringement actions almost never hear any patent infringement actions – and vice versa. Trade secret is almost (but not quite) entirely state law derived. These major divides in administration and adjudication have led to a system that lacks substantial coherence across doctrinal silos and has opened the door for special interests to tweak individual portions of the law toward their favor.

PTO Rules: File Sharing and Correcting Foreign Priority Claims

By Dennis Crouch

NOTE: See final paragraph for Nov. 5 pending rule change for correcting foreign priority claims.

The USPTO has published a new Final Rule notice titled: Changes To Facilitate Applicant’s Authorization of Access to Unpublished U.S. Patent Applications by Foreign Intellectual Property Offices. This is a follow-up to the proposed rules from 2014. As its name suggests, the proposal would allow the USPTO to share otherwise secret information regarding pending-unpublished US applications with foreign patent offices, such as the EPO. A major caveat here though is that the sharing of information requires applicant authorization. The change is part of the general major shift toward worksharing and international procedural harmonization. The following comes from the notice:

[The USPTO] is revising its rules of practice to include a specific provision by which an applicant can authorize the Office … all or part of the file contents of an unpublished U.S. patent application in order to satisfy a requirement for information imposed on a counterpart application filed with the foreign IP office. … The final rule changes consolidate the specific provisions of the regulations by which applicants give the Office authority to provide a foreign IP office with access to an application in order to satisfy a requirement for information of the foreign IP office. The Office is also revising the rules of practice to indicate there is no fee for providing a foreign IP office with an electronic copy of an application-as-filed or an electronic copy of file contents pursuant to a bilateral or multilateral agreement. Additionally, along with changes to the application data sheet (ADS) form [to facilitate authorization], the final rule changes simplify the process for how applicants provide the Office with the required authorization, thereby reducing the resources applicants must expend to comply with these foreign IP office requirements, and enhance the quality of patent examination.

The change has a November 30, 2015 effective date.

In this process, the PTO is setting up a major roadblock to more complete worksharing by only sharing documents when authorized by applicants. One comment to the proposed rules focused on this issue:

Comment 4: One comment asserted that the proposed rule change is based upon the assumption that a specific authority is required from an applicant in order to send out pre-publication information to a foreign IP office where applicant has filed an application and that the Office should reconsider this assumption. The comment further asserted that once an applicant files an application in a foreign IP office, applicant inherently agrees to the rules and requirements of that foreign IP office. Accordingly, the comment suggests that the Office does not need a separate authorization to either send a priority document or pre-publication information to that foreign IP office. Therefore, the comment requested that the Office reconsider the need for any authorization for access in this circumstance. The comment stated that if the Office adopts this position, then the entire authorization section from the ADS can be removed and a filing of an application in a foreign IP office by an applicant can serve as authorization for access to send priority documents and/or pre-publication information to that foreign IP office(s).

Response: After due consideration of the comment, the Office has decided to not adopt the position expressed in the comment. The written authority requirement is in accord with 35 U.S.C. 122(a), and consistent with current Office policy, practice, and procedure regarding access. Therefore, the Office is retaining the requirement for written authority from an applicant for access to the file contents of an unpublished application.

Here, the statute properly quoted by the Patent office does require that these non-published “applications for patents shall be kept in confidence by the Patent and Trademark Office and no information concerning the same given without authority of the applicant or owner unless necessary to carry out the provisions of an Act of Congress or in such special circumstances as may be determined by the Director.”

The USPTO has also announced “Change in Practice Regarding Correction of Foreign Priority Claims.” The changes – becoming effective on November 5, 2015, will make it more difficult to correct errors in foreign priority claims. Starting this week, a correction of a foreign priority claim made outside of the one-year deadline will require a petition to accept an unintentionally delayed benefit claim.

The Leahy-Smith America Invents Act (AIA) … provides that the filing date of an earlier foreign patent application may now be the effective prior art date for subject matter disclosed in a U.S. patent or a U.S. patent application publication. Therefore, U.S. patent application publications should reflect accurate foreign priority information to minimize the burden on examiners and members of the public in assessing the effective prior art date for subject matter disclosed in such U.S. patent application publications. The USPTO will thus now require that any correction of the identification of the foreign application (by application number, country (or intellectual property authority), and filing date) in a foreign priority claim after the time period for filing a priority or benefit claim be via a petition to accept an unintentionally delayed priority claim, and once the petition is granted in a pending application, will now publish a corrected patent application publication reflecting the accurate foreign priority claim information.

So, if you have a correction to make regarding foreign priority, it is probably best to get it done in the next two days. In general, the “unintentional” standard is fairly easy to overcome, but does require sworn statements that may later open-the-door to charges of inequitable conduct if it turns out that the error was known for some time. I’ll also note here that the parallel correction of US priority already requires the petition.