litigation webinar series: insights - fish & richardson · pdf filelitigation webinar...

40
February 19, 2014 Litigation Webinar Series: INSIGHTS Our take on litigation and trial developments across the U.S. Thomas Frongillo Principal, Fish & Richardson William Mateja Principal, Fish & Richardson Responding to Trade Secret Theft (and How to Guard Against It): Perspectives of Former Federal Prosecutors David Cowen Partner, G-C Partners

Upload: vuongtuyen

Post on 06-Mar-2018

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

February 19, 2014

Litigation Webinar Series: INSIGHTSOur take on litigation and trial developments across the U.S.

Thomas FrongilloPrincipal, Fish & Richardson

William MatejaPrincipal, Fish & Richardson

Responding to Trade Secret Theft (and How to Guard Against It):

Perspectives of Former Federal Prosecutors

David CowenPartner, G-C Partners

Page 2: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

INSIGHTS Litigation Webinar Series

• Monthly 3rd Wednesday at 1pm ET Key Developments & Trends

• Housekeeping CLE Contact: [email protected] Questions Materials: fishlitigationblog.com/webinars

• Next webinar – March 19th

• #fishwebinar

Overview

2

Next in SeriesWednesday, March 19th1:00 p.m. EST  |  Webinar

Protecting and Defending Intellectual Property and 

Technology: A Delaware Court of Chancery Webinar

Page 3: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Special Guest: David CowenMr. Cowen has more than sixteen years experience in the areas of computer integration, architecture, assessment, programming, forensic analysis, and investigation. He currently holds the Certified Information Systems Security Professional certification from (ISC)^2 and is trained in proper forensics practices by the High Tech Crime Investigators Association and ASR Data and Guidance Software, among others. His experience spans a variety of environments ranging from high security military installations to large and small private sector companies.  Mr. Cowen has testified in a number of cases over the years, some of which resulted in multi‐million dollar verdicts.

To learn more about Mr. Cowen, please visit http://www.g‐cpartners.com/assets/cv_cowen.pdf.

Page 4: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

The Problem of Trade Secret Theft

4

“TRADE SECRET THEFT THREATENSAMERICAN BUSINESSES, UNDERMINESNATIONAL SECURITY, AND PLACES THESECURITY OF THE U.S. ECONOMY IN

JEOPARDY.”  2013 “Administration Strategy on Mitigating 

the Theft of U.S. Trade Secrets”

“THE ANNUAL LOSSES [DUE TOINTERNATIONAL THEFT] ARE LIKELY TOBE COMPARABLE TO THE CURRENTANNUAL LEVEL OF U.S. EXPORTS TO

ASIA—OVER $300 BILLION.” 2013 “Report of the Commission on the Theft of American Intellectual Property” 

Page 5: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Three Common Scenarios: The Victim Scenario.  The Company is a victim of trade secret theft and is 

facing the loss of its confidential information.  Could involve the acts of current or former employees working with third‐parties.

The Improper Possession Scenario.  The Company discovers that it employs a rogue employee who has stolen a Competitor’s trade secrets, leaving the Company in constructive possession of confidential trade secrets.  

The Alleged Perpetrator Scenario.  The Company itself is an alleged wrongdoer in DOJ investigation or prosecution through some act or failure to act that lead to the theft of another party’s trade secrets.

Typical Trade Secret Theft Situations

5

Page 6: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Best Design Corporation manufactures sophisticated widgets. Just OK Manufacturing is Best Design’s major competitor.  Recently, a high‐level Best Design sales manager, Ann Foyer, resigned to take a more senior managerial position with Just OK.  Upon leaving, Foyer turned in her Best Design laptop to the IT department. Best Design’s IT department routinely does an analysis of departing employees’ company‐issued computers to inspect for inappropriate conduct or material.

A Best Design assistant general counsel gets a frantic call from the head of IT. IT details how Foyer, during the month leading up to her departure, e‐mailed to her personal g‐mail account nearly one hundred e‐mails attaching confidential Best Design sales e‐mails. IT also describes how Foyer downloaded huge amounts of data to at least two external hard drives and two thumb drives only days before she left Best Design. Finally, IT notes that it looks like Just OK employees were e‐mailing Foyer at her Best Design e‐mail account with regard to the previously described Foyer g‐mails and that it appears Foyer forwarded the g‐mails containing Best Design sales e‐mails on to Just OK employees prior to her departure from Best Design.

Hypothetical

6

Page 7: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

On the other hand, a Just OK assistant general counsel receives a telephone call from a senior Just OK sales executive who now works with Ann Foyer. This sales executive is concerned about information that Foyer gave to a third‐party lending institution that Just OK is working with to facilitate Just OK customers borrowing money to purchase Just OK widgets. It is apparent that this information came from Best Design and is, in the sales executive’s estimation, extremely confidential and proprietary. Hours later, the Just OK assistant general counsel learns that Foyer is e‐mailing proprietary Best Design information to members of her sales team for use in trying to lure Best Design customers to Just OK. 

Hypothetical

7

#fishwebinar

Page 8: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Whether a victim of theft or a party in possession, it is essential to conduct a fulsome forensic investigation to make sure you accurately understand the scope of the theft, including what has been taken and who might have received it.  

• Every forensic investigation requires a plan of action.  Identify persons and sources of data to search, including e‐mail and computers or network files.  Consider that data is often transmitted via external storage devices, such as thumb drives or portable hard drives.  

• Consider hiring forensic consultant with past experience in trade secret cases.  A consultant with past experience can transition easier into the role of testifying expert.

• Be sure to identify additional sources of potential evidence.  Your initial forensic investigation will be the foundation for later civil discovery or, in a criminal case, grand jury subpoenas.

Initial Steps: The Forensic Investigation

8

Page 9: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Typical Signs of Employee Theft Attempts to access data or requests for data not normally used in                       

the scope of employee’s job; Large transfers of data to a thumb‐drive or a hard drive; Heightened e‐mail traffic from the employee’s work e‐mail account to a 

personal (gmail, hotmail, etc.); and The deletion of large numbers of files or particular e‐mail folders.

• Typical Signs of External Theft Large amounts of data being seen being transmitted out; Administrative accounts being accessed at odd hours and from unfamiliar 

internet addresses; and Knowledge of internal or confidential data by potential clients or customers, 

which may have been stolen by a competitor and shared in the bidding process.

Initial Steps: Tracking the Theft

9

Page 10: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Whether a victim of the theft or a party that finds itself in possession of confidential information, it is vital that you preserve data in a manner that will allow you to rely on it in a court of law.  Here are three key steps to take:

• Keep a record of any investigation.  You may later be asked why you took steps you did on certain dates, especially if you attempt to rely on findings from an internal investigation.  

• Maintain a chain of custody for any computers, hard drives, or other storage devices that are examined.  You will eventually be required to show where they came from and how they were preserved from any tampering.  

• Manage communications to preserve privilege.  When possible use attorneys to communicate advice directly to experts or agents you retain, but be careful if you intend to use them as testifying experts.  In some states, if an attorney’s communication formed part of a testifying expert’s opinion, it can be fair game notwithstanding the privilege.  

Initial Steps: Preserving Evidence

10

Page 11: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Take proactive steps to limit harm. Whether you took reasonable steps to prevent harm could factor into the damages you are owed.

• Prevent additional loss of confidential information. This could include taking action to suspend or terminate an employee’s access to the system or to strengthen network controls to prevent outside access.

• Provide notice to any corporations or entities in possession of trade secrets.  This is not limited to just the actual perpetrators of the theft, but also may require carefully handling “innocent” third parties who might have received materials without knowing they were stolen and could function as potential witnesses.  

• Seek an appropriate TRO or injunction.  Before going into court, make sure that you have enough ducks in a row to support the order.

• Consider making a criminal referral.  As noted, this may move the matter somewhat out of your control.

Specific Steps as a Victim

11

#fishwebinar

Page 12: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Take affirmative action to prevent to prevent any trade secrets from being used.  A quick, effective response can limit any claim for damages down the line and will make the your stance on the theft clear to any prosecutor.

• Gain control of any rogue agents.  This may require a quick decision to suspend employees, limit their access to additional material, and/or monitor their activities.  

• Be wary of interviewing employees with potential liability without sufficient safeguards in place. Ensure that appropriate “Upjohn warnings” are given and consider providing independent counsel as needed.

• Carefully consider the ramifications of the Fifth Amendment. Unlike criminal suits, the Fifth Amendment often can be used to support an inference in a civil suit, even if invoked by your employees.  

• Return or preserve data – DON’T JUST DELETE.  This can save you from a spoliation instruction down the line or a potential obstruction charge.  

• Consider a disclosure to the “victim.” It is essential, however, to ensure that any communications are handled through official channels and are carefully crafted.  

• Consider Self‐reporting to the government.  This could result in declination, non‐prosecution or deferred prosecution; however, information you provide may be discoverable in a civil suit.

Specific Steps as a Possessor

12

Page 13: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• The Economic Espionage Act of 1996, 18 U.S.C. § 1831 18 U.S.C. 1831 – Economic Espionage 18 U.S.C. 1832 – Theft of Trade Secrets

• Computer Fraud and Abuse Act of 1986, 18 USC § 1030 1030a(4) – fraudulent unauthorized access 1030a(5) – causing damage 1030a(6) – trafficking in passwords

Relevant Criminal Laws

13

Page 14: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Creates criminal liability for trade secret theft, which previously was available indirectly and only in limited situations:

Unauthorized disclosure of government information

Interstate transportation of stolen property

Mail and wire fraud

• The EEA was passed “against a backdrop of increasing threats to corporate security and a rising tide of international and domestic economic espionage.”   United States v. Hsu, 155 F.3d 189, 194 (3d Cir. 1998)

• KEY TAKEAWAY – The EEA’s two primary and related objectives are to protect national and economic security.

Background of the Economic Espionage Act

14

Page 15: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• The Act  is codified at 18 U.S.C. §§ 1831‐39

• It criminalizes two types of trade secret theft: Foreign government‐sponsored theft (§ 1831(a))

Commercial trade secret theft (§ 1832(a))

Structure of the EEA

15

#fishwebinar

Page 16: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Defendant knowingly misappropriated information(or conspired or attempted to do so)

• Defendant knew or believed the information was proprietary, and had no claim to it

• Information misappropriated was a trade secret (unless conspiracy or attempt is charged)

• Defendant intended to convert the trade secret to the economic benefit of anyone other than the rightful owner

• Defendant knew or intended that the offense would injure the trade secret owner

• Trade secret was related to product or service used or intended for use in interstate or foreign commerce

Commercial Trade Secret Theft: § 1832(a)

16

Page 17: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• The elements of economic espionage are the same as the elements of commercial trade secret theft, with the following exceptions: The government must prove that the defendant intended that the 

offense would benefit a foreign government, foreign instrumentality or foreign agent

The government does not need to prove that the defendant intended to injure the owner 

The government does not need to prove that the defendant intended to confer an economic benefit to anyone other than the owner

The law applies to any trade secret, regardless of connection to interstate or foreign commerce

Economic Espionage: § 1831(a)

17

Page 18: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• EEA’s definition of trade secret is based, in part, on the definition in the Uniform Trade Secrets Act (§ 1893(3)).

• Trade secret need only possess “minimal novelty.”• Includes all types of information, regardless of how stored 

or maintained, provided: Information must not be publicly ascertainable through proper means; Owner has taken reasonable measures to keep information secret; and Information has independent economic value.

Defining Trade Secrets

18

Page 19: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Defining Trade Secrets

19

Types Of Information:

• Business• Scientific• Technical• Economic• Engineering

Forms Of Information:

• Patterns• Plans• Compilations• Program devices• Formulas• Designs• Prototypes• Methods• Techniques• Processes• Procedures• Codes

Information Can Be:

• Tangible• Intangible• Stored• Electronic• Graphic• Photographic• Written

#fishwebinar

Page 20: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Notable Victims of Trade Secret Theft

20

Page 21: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Processes, methods and formulas 

for an anti‐cancer drug (Taxol)

• Biological strains and plasmids

• Cost information unavailable to the public, confidential business plans and customer lists

• Measurements, metallurgical specifications and engineering drawing to produce an aircraft brake assembly

• Microsoft Windows source code

• Goldman Sachs high‐frequency trading source code

• Coca‐Cola documents and product samples

• Boeing documents related to the Space Shuttle

• Photographs of tire‐assembly machine

“Trade Secrets” from EEA Prosecutions

21

Page 22: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Theft 

• Copying

• Duplicating

• Sketching 

• Drawing 

• Photographing 

• Downloading

• Altering

• Destroying

• Communicating

• Photocopying

• Replicating

• Transmitting

• Delivering

• Sending

• Mailing

Misappropriation Covers a Broad Range of Acts:

22

Page 23: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• EEA contains specific provisions authorizing protective orders: Before charges are filed:  protective order may be necessary to discuss 

case with third parties;

After charges are filed but before trial:  protective order to ensure that trade secrets are used solely for preparation of defense and are not divulged to third parties;

During public trial:  protective order may be necessary to govern trade secret evidence during trial.

• Closing the courtroom:  DOJ permits closing courtroom only if approved by Deputy Attorney General.

• In United States v. Aleynikov (alleged theft of Goldman Sachs’s proprietary source code), courtroom was closed 7 times in intervals of no more than 20 minutes.

Confidentiality And Protective Orders

23

• KEY TAKEAWAY: If you pursue a parallel civil case for damages or seek a Temporary Restraining Order, be sure that you take the proper steps to seal court records and proceedings.

Page 24: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Theft of Trade Secrets Clarification Act of 2012: Amends specific language in EEA in response to Second Circuit’s ruling in 

United States v. Aleynikov, which limited EEA's reach.

In Aleynikov, Second Circuit vacated former Goldman Sachs computer programmer’s conviction for copying company’s high‐frequency trading business source code on home computer.

Court determined that the source code was used internally by Goldman Sachs and was not related to products that the company sells in interstate or foreign commerce, as required by EEA.

Ruling jeopardized government's ability to prosecute theft of internal trading systems or other internal financial instruments under EEA. 

EEA now applies to trade secrets related to "a product or service used in or intended for use" in commerce.

• Foreign and Economic Espionage Penalty Enhancement Act of 2012: Increases penalties for violations of Section 1831 (economic espionage).

24

Recent Amendments to the EEA

Page 25: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Economic Espionage: 15 years’ imprisonment $5 million fine for individual No more than the greater $10 million fine for organization or  three times the value 

of stolen trade secret • Commercial Trade Secret Theft:

10 years’ imprisonment  $250,000 fine or twice the monetary gain or loss for individual $5 million fine for organization

• Attempt or Conspiracy Same penalties

• Civil And Criminal Forfeiture: Property used to commit or facilitate the violation Proceeds of violation or property derived from proceeds

• Restitution To Victims

Criminal Penalties

25

#fishwebinar

Page 26: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• The federal government’s main tool to prosecute hackers dating                back to the 1980s, this statute packs hefty sentences of up to five               years per offense even for first time offenders.

• § 1030 includes broader provisions, however, and protects computers affecting interstate or foreign commerce and criminalizes anyone who:  (4) “knowingly and with intent to defraud, accesses a protected computer without 

authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value . . . [other than] the use of the computer”;

(5) accesses a computer without “authorization” thereby “causing damage or loss”;

(6) trafficks in passwords.

o 1030(g) creates a civil cause of action, but damages may be limited to ‘loss’ from the harm the intruder directly inflicts and the costs the victim incurs in investigating and preventing future incursions (not business losses) (Nexans Wires S.A. v. Sark‐USA, Inc., 319 F.Supp.2d 468, 477 (S.D.N.Y. 2004))

The Computer Fraud and Abuse Act

26

Page 27: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Federal prosecutors often bring related charges in tandem with Trade Secret Theft prosecutions, including: Interstate Transportation of Stolen Property; Mail and Wire Fraud; National Stolen Property Act.

• Analogous state criminal charges also may be brought.

Other Potential Charges

27

Page 28: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Government’s Ability To Obtain Evidence: DOJ has superior ability to investigate by using grand jury subpoenas, search warrants, wiretaps, and immunity orders.

• Great sanctions for wrongdoing: Including criminal fines and possible jail sentences, as well as the public stigma.

• Impact On Parallel Civil Litigation: After company files civil lawsuit alleging trade secret misappropriation, federal criminal investigation may result in a stay of civil proceedings and witnesses may assert Fifth Amendment privilege against self‐incrimination.

• Impact On Defendant Company:   If alleged theft is committed by publicly traded company, it will need to disclose to SEC that it is under criminal investigation by DOJ.

• KEY TAKEAWAY – Threat of a Criminal Referral Cannot Be Used As Leverage In To Settle Civil Dispute: In most jurisdictions, there is an ethical prohibition from using the criminal process as leverage to settle a civil dispute and it smacks of extortion. A handy starting point for some basic guidance are the ABA Model Rules – particularly opinion letter 92‐363 Use of Threats of Prosecution in Connection with a Civil Matter (1992). 

Criminal Referral Considerations

28

Page 29: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Working with law enforcement requires actually working with law enforcement. An attorney or client who is unwilling to sacrifice any part of the civil process may be better served by not involving the government or seeking a criminal referral. 

• Delay can be deadly. By the time the civil case is resolved, prosecutors may have missed out on a chance to execute a search warrant or issue a subpoena that would capture evidence and statutes of limitations may expire. Also, delaying until after a civil verdict could create the unseemly impression of piling on.  

• Never reach out to the government until in possession of the evidence needed to support a case. Even a great case can fail to catch on if a bad impression is made because the law or the facts are jumbled.  

• Contact the right prosecutor or agency.  Look at priorities of federal enforcement in official announcements.  Consider what cases a state or federal office has experience prosecuting. 

Making the Referral Count

29

Page 30: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Follow a plan of communication.   Begin with a telephone call and a request for an in‐person meeting.  

That can be followed‐up by a letter that sets out the law and facts with background materials.  

Consider requesting a friendly grand jury subpoena seeking the documents prior to producing them.  One issue that commonly comes up is what to do if a protective order protects the documents in the civil case.  The best practice when there is a civil protective order in place is to approach the court that issued the protective order before turning over records.

• Be careful with privilege. Instead of simply forwarding privileged material or work product, consider providing the government with a letter that summarizes the facts only and omits attorney impressions. A selective waiver agreement may also be useful, but may not be binding on third parties. See, In re Pacific Pictures Corp., 679 F.3d 1121, 1127 (9th Cir. 2012). 

Making Contact

30

#fishwebinar

Page 31: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Defending an Investigation/Prosecution

31

• Lack Of Intent To Convert A Trade Secret Defendant intended to use only publicly available information

Defendant intended to use only general skills or knowledge acquired throughout defendant’s career

• Information Not A Trade Secret: Owner failed to take “reasonable measures to protect secrecy”

Information not secreto Disclosure through patent and copyright process

o Disclosure through industry publications or conferences

o Disclosure to licensees, vendors, third parties

o Disclosure through Internet postings

• Independent Development Without Access To Victim’s Trade Secrets• Reverse Engineering

Page 32: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Adopt clear, simple “Trade Secret Protection Policy” with mandatory compliance rule.

• Provide training to ensure that employees understand:  (1) trade secret protection is critical to company’s success, (2) their role in protecting trade secrets, (3) company’s vigilance in this arena, and (4) need to respect equally other companies’ proprietary info.

• Implement well‐maintained network that restricts use and access to sensitive                                  company data, including by employees with no need to access the data

• Treat trade secret protection as a corporate issue (reportable to CEO, BOD) and not just a legal, HR, or IT responsibility.

• Maintain close, continuing ties to law enforcement.

• Employ confidentiality agreements when disclosing/receiving confidential info and policies to ensure that confidentiality agreements are kept.

• Mandate Reps and Warranties that cover 3rd party’s ownership of and right to disclose any info when contracting with consultants or other 3rd parties. 

• Require employees to report any suspected leak of company’s proprietary info or acquisition (w/o agreement) of another company’s info—and promptly investigate.

Prevent Theft Now

32

Page 33: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Enforcement Trends

33

Page 34: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• Beginning in 2008, The White House, Congress, DOJ and other federal agencies have made intellectual property investigations and prosecutions a top priority.

• In October 2008, Congress enacted the Prioritizing Resources and Organization for Intellectual Property Act (“PRO IP Act”).

• Purposes of PRO IP Act: Protect growth of national economy; Promote creativity, research and innovation; Preserve national and economic security.

• PRO IP Act’s changes to prior IP law: Strengthened civil and criminal IP enforcement; Required coordination of federal IP efforts; Provided funding and resources of DOJ’s IP programs.

• Key Features of PRO IP Act: Established position of Intellectual Property Enforcement Coordinator in Executive Office of 

President (“IPEC”); IPEC responsible for developing and implementing a Joint Strategic Plan; Required FBI to assign several full‐time agents dedicated to computer crimes and IP enforcement.

The PRO IP Act

34

#fishwebinar

Page 35: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• In 2010, DOJ re‐established the Task Force on Intellectual Property.

• Task Force’s focus is on protecting US companies from international theft of intellectual property.

• In 2010, FBI and DOJ announced the launch of 66 cases involving theft of trade secrets and economic espionage.

• Also in 2010, DOJ announced an increase in number of EEA prosecutions and vowed to make EEA prosecutions a national priority.

• In 2012, FBI reported that it had 460 pending intellectual property rights investigations, including 106 for trade secret theft.

• Other major investigations included copyright infringement (207), trademark infringement (49) and counterfeiting (98).

DOJ’s New Enforcement Initiative

35

Page 36: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

• In June, 2013, IPEC issued 2013 Joint Strategic Plan on Intellectual Property Enforcement.

• Joint Strategic Plan noted that “new trade secret cases are up 39 percent.”

• Key Administration recommendation to Congress was “bolstered criminal penalties for economic espionage.”

• Administration also directed the US Sentencing Commission to consider increasing the offense levels for trade secrets crimes.

• Joint Strategic Plan highlighted a recent amendment to EEA that closed a loophole by broadening scope of interstate/foreign commerce element.

Joint Strategic Plan 2013

36

Page 37: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Questions?

37

Page 38: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

INSIGHTS Litigation Webinar Series

Mark your calendar!Wednesday, March 19Protecting and Defending Intellectual Property and Technology: A Delaware Court of Chancery Webinar

fishlitigationblog.com/webinars

Upcoming trade secrets webinars – April 16 and October 15

Page 39: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

Thank You!

Thomas FrongilloPrincipal, Fish & Richardson(617) 521‐[email protected]

William MatejaPrincipal, Fish & Richardson(214) 760‐[email protected]

Please send your NY CLE forms or questions about the webinar to Ellen at [email protected].

A replay of the webinar will be available for viewing at http://fishlitigationblog.com. 

David CowenPartner, G‐C Partners

Page 40: Litigation Webinar Series: INSIGHTS - Fish & Richardson · PDF fileLitigation Webinar Series: INSIGHTS ... deferred prosecution; ... • KEY TAKEAWAY –The EEA’s two primary and

40

© Copyright 2014 Fish & Richardson P.C. These materials may be considered advertising for legal services under the laws and rules of professional conduct of the jurisdictions in which we practice. The material contained in this presentation has been gathered by the lawyers at Fish & Richardson P.C. for informational purposes only, is not intended to be legal advice and does not establish an attorney‐client relationship. Legal advice of any nature should be sought from legal counsel. Unsolicited e‐mails and information sent to Fish & Richardson P.C. will not be considered confidential and do not create an attorney‐client relationship with Fish & Richardson P.C. or any of our attorneys. Furthermore, these communications and materials may be disclosed to others and may not receive a response. If you are not already a client of Fish & Richardson P.C., do not include any confidential information in this message. For more information about Fish & Richardson P.C. and our practices, please visit www.fr.com.

#1 Patent Litigation Firm (Corporate Counsel, 2004–2013)