PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

136
PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE LAW OF TRADE SECRETS by Professor Michael J. Hutter Albany Law School Albany, New York

Transcript of PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

Page 1: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE LAW OF TRADE SECRETS

by

Professor Michael J. Hutter Albany Law School Albany, New York

Page 2: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …
Page 3: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

PROTECTING CORPORATE

CONFIDENTIAL INFORMATION:

THE LAW OF TRADE SECRETS

MICHAEL J. HUTTER

Professor of Law

Albany Law School

80 New Scotland Avenue

Albany, NY 12208

(518) 445-2360

[email protected]

Special Counsel

Powers & Santola, LLP

39 North Pearl Street

Albany, NY 12207

(518) 465-5995

[email protected]

November 2012

Page 4: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …
Page 5: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1

Part One

The Law of Trade Secrets Misappropriation

I. INTRODUCTION

A. What Is Trade Secrets Misappropriation Law?

1. The law of trade secrets misappropriation seeks to protect a

firm’s secrets or an entrepreneur’s interest in information or technology that

the firm or entrepreneur has created and developed which is both

confidential and commercially valuable.

2. This law protects such valuable assets as “trade secrets” under

certain circumstances against unauthorized acquisition, use, or disclosure by

others, i.e., misappropriation, even though such assets are neither patented or

copyrighted nor patentable or copyrightable.

B. Source

1. The law of trade secrets misappropriation is not created by

federal legislation.

2. It is, and has developed as, a creation of state law since its

emergence in the middle of the nineteenth century. (See, Rockelshaus v.

Monsanto Co., 467 U.S. 986, 1001 [1984]).

Page 6: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

2

3. The early law of trade secrets misappropriation developed

primarily through the judiciary under the common law of the states. In order

to clarify a confusing body of law, the First Restatement of Torts, published

in 1939, defined “trade secret” and its rules of liability. Courts throughout

the United States adopted the Restatement’s view of the law. (See,

Restatement (First) of Torts §757 [1939]; see also, William B. Barton, A

Study in the Law of Trade Secrets, 13 U. Cin. L. Rev. 507, 515-518

[1939][defining trade secrets by today’s concept, scope and limitations]). In

1995, the new Restatement (Third) of Unfair Competition was issued and

Sections 39-45 address trade secrets and their misappropriation. These

sections largely track the Restatement (First) of Torts and the UTSA,

accepting the UTSA’s desirable changes from the common law.

4. Today, the Uniform Trade Secrets Act, as adopted in 47 states,

the District of Columbia and the U.S. Virgin Islands, has supplanted the

common law as the primary source for protecting trade secrets by its

proscription of trade secrets misappropriation.

5. New York has not adopted the UTSA. A legislative proposal to

adopt it with several modifications to accommodate longstanding New York

practices was passed by the Senate in 2004 but was rejected in the

Page 7: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

3

Assembly, primarily due to opposition from NYSTLA. New York’s

common law of trade secrets has followed the lead of the First Restatement.

C. Uniform Trade Secrets Act (UTSA)

1. In February 1968, the Executive Committee of the National

Conference of Commissioners on Uniform State Laws authorized the

appointment of a Special Committee on Uniform Trade Secrets Protection

Act. In August 1979, the Committee promulgated the Uniform Trade

Secrets Act and recommended its adoption by the states. The American Bar

Association endorsed it in 1980. In 1985, the Act was amended to clarify

ambiguous provisions and to strengthen its remedial framework.

2. The UTSA was promulgated to replace the existing common

law of the states with uniform statutory framework. Three arguments in

support were advanced. One justification is that many states do not possess

an extensive body of decisional law relating to trade secrets. A second

rationale is that even in jurisdictions with numerous precedents, the case law

does not clearly set forth the parameters of trade secrets protection and the

appropriate remedies for misappropriation of a trade secret. Finally, the

omission of Section 757 from the Restatement (Second) of Torts is cited as

evidence of a need for codification.

Page 8: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

4

3. Like common law, the UTSA provides in essence that liability

for trade secrets misappropriation requires proof of the existence of a trade

secret and the acquisition of the trade secret by a party by improper conduct

or wrongful means. However, the UTSA makes several desirable changes

from the common law.

D. Criminal Statutes

1. On the federal side, the Economic Espionage Act of 1996 (18

U.S.C.A. §§1831-1839) makes the misappropriation of trade secrets a

federal crime. The statute’s substantive treatment of trade secrets is

consistent with the Restatements and the UTSA.

2. Many states have enacted statutes criminalizing the theft of

trade secrets, or include trade secrets within the scope of general larceny

crimes.

II. CHOICE OF LAW

A. Generally

1. The applicable state law in light of the variations in the UTSA

as adopted and non-UTSA states is an important concern.

2. The vast majority of jurisdictions apply the conflict rules for

tort actions to determine the trade secrets misappropriation law to be applied

Page 9: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

5

to a pending action. (See, Jager, Trade Secrets Law [2007 rev.] §4:8

[collecting cases]).

(a) Some states follow the traditional lex loci delicti rule -

the law of the locus of the injury. (See, e.g., J.E. Rhoads & Sons, Inc. v.

Ammeraal, Inc., 1988 WL 32012 [Del. Super. Ct.]; Fireworks Spectacular,

Inc. v. Premier Pyrotechnics, Inc., 147 F.Supp.2d 1057 [D. Kan. 2001]).

(b) Other states have abandoned the traditional rule in favor

of an “interest analysis” approach, e.g., apply the law of the state which has

the most significant relationship with the parties. (See, e.g., Softel, Inc. v.

Dragon Medical and Scientific Communications, Inc., 118 F.3d 955 [2d Cir.

1997][applying New York law]; Texas Tanks, Inc. v. Owens-Corning

Fiberglass Corp., 99 F.3d 734 [5th

Cir. 1997][applying Texas law]).

B. Federal Courts

1. Pursuant to Klaxon Co. v. Stentor Elec. Mfg. Co. (313 U.S. 487

[1997]), federal courts sitting in diversity cases must follow the conflict of

laws rules of the state in which they sit.

2. When the action has been transferred to a federal court from

another federal court where venue was proper, that court must apply the

conflict of laws rules of the transferring court. (See, e.g., VanDusen v.

Barrack, 376 U.S. 612 [1964]).

Page 10: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

6

C. Federal Circuit Court of Appeals

1. When an appeal in a patent infringement action with a pendent

trade secret misappropriation claim is taken to the Federal Circuit Court of

Appeals, that court has held that it will defer to the law of the regional

circuit in which the district sits with respect to non-patent claims. (See, e.g.,

Oddzon Prods., Inc. v. Just Toys, Inc., 122 F.3d 1396 [Fed. Cir. 1997]).

III. PREEMPTION

A. Federal

1. In Kewannee Oil Co. v. Bicron Corp. (416 U.S. 470 [1974]),

the Supreme Court considered the issue of preemption of state trade secret

laws by either the patent and copyright clause of the federal constitution or

the patent statutory scheme and held that: “Neither complete nor partial

preemption of state trade secret law is justified.”

2. Trade secrets misappropriation law is not preempted by the

federal copyright act as trade secret rights are not “equivalent” to copyright

protection and have an “extra element” proof requirement. (See, e.g.,

Computer Assoc. Intl., Inc. v. Altai, Inc., 982 F.2d 693 [2d Cir. 1992];

Boeing Co. v. Sierracin Corp., 108 Wash.2d 38, 738 P.2d 665 [1987]; see

generally, Jager, Trade Secrets Law [2007 rev.] §10.6 [collecting cases]).

Page 11: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

7

B. UTSA

1. §7(a), consistent with a purpose in enacting the act to “make

uniform the law with respect to” trade secrets and to preclude inconsistent

theories of relief for the same wrong, eliminates other causes of action where

the underlying wrong is the misappropriation of a trade secret, as defined in

§1. Thus, a cause of action claimed to be based only on a the common law

or unjust enrichment or unfair competition or breach of fiduciary duty, or

seeking an accounting where the underlying wrong was the misappropriation

of trade secrets, is preempted. (See, e.g., Composite Marine Propellers, Inc.

v. Van Der Woude, 962 F.2d 1263 [7th

Cir. 1992][applying Illinois law];

Allegiance Healthcare Corp. v. Coleman, 232 F.Supp.2d 1329 [S.D. Fla.

2002][applying Florida law]; Nora Beverages, Inc. v. Perrier Group of

America, 164 F.3d 736 [2d Cir. 1998][applying Connecticut law]).

2. However, under §2(b) to the extent that a cause of action exists

which is not dependent on a trade secret that cause of action continues to

exist, even thought it may involve a trade secret. In other words, where

more than a mere misappropriation of a trade secret is involved, that claim is

not preempted. Such claims would include breach of a fiduciary duty in

recruiting other employees of the former employee to work for a new

company, not dependent upon the misappropriation of a trade secret (see,

Page 12: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

8

e.g., Labor Ready, Inc. v. Williams Staffing, LLC, 149 F.Supp.2d 398 [N.D.

Ill. 2001]); inducing the breach of a nondisclosure covenant (see, e.g., IDX

Systems Corp. v. Epic Systems Corp., 285 F.3d 581 [7th

Cir. 2002][applying

Wisconsin law]); and diversion of corporate opportunities. (see, e.g., Hecny

Trans., Inc. v. Chu, 430 F.3d 402 [7th

Cir. 2005][applying Illinois law]).

3. One distinct split has occurred. One line of cases holds that §7

does not preempt civil claims based on information that fails to qualify as a

trade secret, stating that until it is determined whether the allegedly

misappropriate information constitutes a trade secret, the question of

preemption cannot be addressed. (See, e.g., Burbank Grease Services, Inc.

v. Sokoloswki, 294 Wisc.2d 274, 717 N.W.2d 781 [2006]; Cenveo Corp. v.

Slater, 2007 W.L. 527720 at *3 [E.D. Pa.]). Another line of cases holds that

determining whether the allegedly misappropriated information constitutes a

trade secret is irrelevant for preemption purposes because the UTSA

preempts all claims based upon the unauthorized use of information, even if

the information does not meet the statutory definition of a trade secret. (See,

e.g., Ethypharm S.A. France v. Bentley Pharmaceuticals, Inc., 388

F.Supp.2d 426, 433 [D. Del. 2005]; Mortgage Specialists, Inc. v. Davey, IV,

904 A.2d 652, 664 [N.H. 2006]; Chatterbox, LLC v. Pulsar Elec., LLC, 2007

Page 13: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

9

W.L. 1388183 [D. Idaho]; Patriot Homes, Inc. v. Forest River Housing, Inc.,

489 F.Supp.2d 865 [N.D. Ind. 2007]).

Part Two

Definition of Trade Secret

I. INTRODUCTION

A. Elements of a Trade Secret Under UTSA

1. §1(4) sets forth three elements as the basis of the trade secret

definition. They are: first, a trade secret must be information: second, it

must have actual or potential independent economic value based on its

secrecy; and third, reasonable efforts have been maintained to protect its

secrecy.

2. The existence of a trade secret ordinarily is a question of fact.

(See Nilssen v. Motorola, Inc., 963 F.Supp. 664, 675 [N.D.Ill.1997]

[applying Illinois law]; see also Penalty Kick Mgm’t Ltd. V. Coca Cola Co.,

318 F.3d 1284, 1291 [11th

Cir.2003] [applying Georgia law]; Pate v. Nat’l

Fund Raisinf Consultants, Inc., 20 F.3d 341, 344 [8th Cir. 1994] [applying

Colorado law]; Chevron U.S.A. Inc. v. Roxen Serv., Inc., 813 F2d 26, 29 [2d

Cir. 1987] [applying New York law].

Page 14: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

10

B. Restatement of Torts Approach

1. The Restatement of Torts (1939) suggests that in deciding

whether a trade secret exists in accordance with its definition several factors

should be considered: “(a) the extent to which the information is known

outside of [the] business; (b) the extent to which it is known by employees

and others involved in [the] business; (c) the extent of measures taken by [the

business] to guard the secrecy of the information; (d) the value of the

information to [the business] and its competitors; (e) the amount of effort or

money expended by [the business] in developing the information; (f) the

ease or difficulty with which the information could be properly acquired or

duplicated by others.”

2. These factors are sometimes useful in UTSA jurisdictions in

determining whether a trade secret exists. (See, Learning Curve Toys, Inc. v.

Playwood Toys, Inc., 342 F.3d 714, 722-730 [7th

Cir. 2003]).

3. The courts do not construe the foregoing factors as a six-part

test in which the absence of evidence on any single factor necessarily

precludes a finding of trade secret protection. Instead they interpret the

common law factors as instructive guidelines for ascertaining whether a

trade secret exists under the UTSA.

Page 15: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

11

II. PROTECTIBLE SUBJECT MATTER

A. Generally

1. §1(4) closely follows the common law and the Restatement of

Torts definition with notable changes. The Restatement of Torts definition

tacitly recognized that a trade secret is information. Although the

Restatement provides examples of categories of information that are

protectible, the addition of the words “including but not limited to” indicates

the examples are not intended to be exclusive. Additionally, while the

Restatement of Torts lists “formula, pattern, device or compilation of

information”, subdivision 4 adds “data, program, method and technique” to

the list. This is done to accommodate modern technology, (e.g., “data” and

“program”) as recognized by the courts. “Methods” and “techniques” are

added to insure that the concept of “know-how,” recognized in several cases

as knowledge gained by an employee during employment, is protectible

information. “Technical and non-technical” is added as a preface to ensure

that the common law treatment of non-technical information as protectible

subject matter continues.

2. Under this definition almost any information used in the

conduct of one’s business may be protected as a trade secret. This

information may be technical or non-technical in nature. Thus, formulas,

Page 16: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

12

manufacturing techniques and product specifications, customer lists and

information, and information relating to merchandising, costs and pricing,

are all protectible subject matter. Computer technology, whether it relates to

hardware or software, and whether copyrightable or patentable, may also be

protectible as a trade secret.

3. Although a wide variety of business information can qualify as

protectible subject matter, the skills and efficiency which an employee

develops through his or her work or general knowledge are not considered

protectible subject matter which belongs to his or her employer. (See, SI

Handling Systems Inc. v. Heisley, 753 F.2d 1244 [3d Cir. 1985]; L.M.

Rabinowitz & Co. v. Dasher, 82 N.Y.S.2d 431, 439 [N.Y. Sup. Ct. 1948]).

Merrill Lynch v. E.F. Hutton & Co. (403 F.Supp. 336 [E.D. Mich. 1975])

illustrates the difficulty that will sometimes be present in distinguishing

between knowledge which belongs to a firm and that which belongs to its

employees.

4. Abstract ideas or general principles which are not embodied in

a specific form are also not protectible subject matter. (See, Matalese v.

Moore-McCormack Lines, Inc., 158 F.2d 631 [2d Cir. 1946]; Daktronics,

Inc. v. McAfee, 599 S.W.2d 358 [S.D. 1999]).

Page 17: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

13

B. Use

1. Unlike the common law and the Restatement of Torts, the

UTSA recognizes that information does not need to be in continuous use to

be protectible. (See, Portfolio-Scope, Inc. v. I-Flex Solutions, 473 F.Supp.

252 [D. Mass. 2007][applying common law rule]). Thus, information

concerning a single event which has passed, or short-lived information or

information that has not yet been put to use, can be protectible. Such

information can certainly be valuable, and there is no reason to exclude it

categorically from protection simply because it is not in “continuous use.”

2. Similarly, “negative know-how,” (i.e., knowing what not to do)

is potentially protectible. Cases that hold that such types of information do

not constitute protectible trade secret subject matter have been rejected by

the UTSA.

C. Examples

1. Technology Related Information (See, e.g., Kewanee Oil Co. v.

Bicron Corp., 416 U.S. 470 [1974][manufacturing process]; Syntex

Ophthalmics, Inc. v. Novicky, 214 U.S.P.Q. 272 [N.D. Ill. 1982], affd., 701

F.2d 677 [7th

Cir. 1983][same]; Coca-Cola Bottling Co. v. Coca Cola Co.,

107 F.R.D. 288 [D. Del. 1985][formula]; Hickory Specialties, Inc. v. B & L

Labs, Inc., 592 S.W.2d 583 [Tenn. 1979][temperature, moisture and air

Page 18: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

14

parameters]; Boeing Co. v. Sierracin Corp., 108 Wash.2d 38, 738 P.2d 665

[1987][manufacturing plans and specifications]; S.I. Handling Systems, Inc.

v. Heisley, 753 F.2d 1244 [3d Cir. 1985][production/manufacturing

“tolerances”]).

2. Design Drawings (See, e.g., Mike’s Train House, Inc. v. Lionel,

LLC, 472 F.2d 398 [6th

Cir. 2006]; Fosso Precision, Inc. v. I.B.M., 673 F.2d

1045 [9th

Cir. 1982]).

3. Production Machinery (See, e.g., Anaconda Co. v. Metric Tool

& Die Co., 485 F.Supp. 410 [E.D. Pa. 1980]; Uncle B’s Bakery, Inc. v.

O’Rourke, 920 F.Supp. 1405 [N.D. Iowa 1996][bagels]).

4. Customer Identity (See, generally, Anno., 28 A.L.R.3d 7

[thorough collection of cases]).

5. Customer Information (Contact Person, Needs, Preferences,

Financial, Renewal Dates, Pricing, etc.) (See, e.g., Panther Sys. II Ltd. V.

Panther Computer Sys., Inc., 783 F.Supp. 53 [E.D. N.Y. 1991]; Ecolab, Inc,

v. Paolo, 753 F.Supp. 1100 [E.D. N.Y. 1991]; Kovarik v. Am. Family Ins.

Group, 108 F.3d 962 [8th

Cir. 1996]).

6. Company Product and Financial Information (See, e.g., Amer.

Bldg. Maintenance Co. v. Acme Prop. Services, Inc., 515 F.Supp.2d 298

[N.D. N.Y. 2007][negotiable profit margin; pricing and billing practices;

Page 19: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

15

strengths and weaknesses of product; customization methodology; sales

support services]; Roton Barrier, Inc. v. Stanley Works, 79 F.3d 1112 [Fed.

Cir. 1996][Rich, J.][financial information relating to manufacturing

process]; LeJeune v. Coin Acceptors, Inc., 381 Md. 288, 849 A.2d 451

[2004][budgeting software, strategic marketing plan for special markets,

pricing and cost information, service pricing information]; Western

Electroplating Co. v. Hennes, 180 Cal. App.2d 442, 4 Cal. Rptr. 434

[1960][marketing studies]).

7. Miscellaneous (See, e.g., Learning Curve Toys, Inc. v.

Playwood Toys, Inc., 342 F.3d 714 [7th

Cir. 2003][concept for noise-

producing toy railroad truck]).

III. ECONOMIC VALUE

A. Generally

1. The second definitional element is that to be protectible the

information must have “economic value, actual or potential.” Such value is

derived from the information “not being generally known to, and not being

readily ascertainable by proper means by, other persons who can obtain

economic value from its disclosure or use.”

2. By focusing on this element, UTSA does not require any

showing of novelty to establish value.

Page 20: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

16

3. It should also be noted that potential value will suffice. This is

consistent with the information element, which does not impose any use

requirement.

B. Secrecy

1. Under this definition, the information must derive its value

from being secret. Information generally known in the industry cannot be

protected as a trade secret.

2. Only relative secrecy, not absolute secrecy, is required. Thus,

confidential disclosures to employees, licensees, etc., do not destroy the

element of secrecy.

3. Claims of secrecy will be defeated by a showing that a

competitor of the alleged trade secret’s owner had previously used the

matter in question in its business, that the alleged misappropriator had

already been using the information, that the information had been widely

circulated before the alleged misappropriation, or that the information can be

readily obtained from public sources.

4. Information which is “readily ascertainable” through reverse

engineering or inspection cannot meet the secrecy element. (See, e.g.,

Roboserve, Ltd. V. Tom’s Foods, Inc., 940 F.2d 1441 [11th

Cir. 1991];

Permagrain Prods. V. U.S. Mat & Rubber, 489 F.Supp. 108 [E.D. Pa. 1980];

Page 21: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

17

Flotec Inc. v. Southern Reseearch, Inc., 16 F.Supp.2d 992 [S.D. Ind. 1998]).

Whether the information is “readily ascertainable” depends on the extent of

the effort required. (See, e.g., Gates Rubber co. v. Bando Chem. Indus., Ltd.,

9 F.3d 823 [10th

Cir. 1993]; Hollingsworth Solderless Terminal Co. v.

Turley, 622 F.2d 1324 [9th

Cir. 1980]; Dicks v. Jenson, 768 A.2d 1279 [Vt.

2001][customer information]; Am. Printing Converters, Inc. v. JES Label

and Tape, Inc. 477 N.Y.S.2d 660 [App. Div. 1984][customer information]).

(a) Expert testimony on this issue would be admissible. (See,

Learning Curve Toys, Inc. v. Playwood Toys, Inc., 342 F.3d 714 [7th

Cir.

2003]).

5. The case law consistently holds that the fact that part, or even

eventually all, of the separate or individual components of a trade secret are

matters in the public domain or of public knowledge does not prohibit a

claim of trade secret. (See, BBA Nonwovens Simpsonville, Inc. v.

Superiorware Nonwovens, LLC, 303 F.3d 1332, 1339 [Fed. Cir.

2002][applying South Carolina law]; Capital Asset Research Corp. v.

Finnegan, 160 F.3d 683 [11th

Cir. 1998][applying Georgia law]). Thus, as

stated by the Second Circuit: “A trade secret can exist in a combination of

characteristics and components, each of which, by itself, is in the public

domain, but the unified process, design and operation of which, in unique

Page 22: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

18

combination, affords a competitive advantage and is a protectable secret.”

(Imperial Chem. Indus. v. Natl. Distillers, 342 F.2d 737, 742 [2d cir. 1965]).

(a) Expert testimony on this issue is admissible. (See, BBA

Nonwovens, supra).

IV. REASONABLE PRECAUTIONS

A. Generally

1. The third definitional element requires the trade secret owner to

take reasonable precaution to prevent disclosure in order to have a

protectible trade secret.

2. The case law does not provide any bright line rule as to what

efforts must be taken to show “reasonableness.” The owner does not have to

take every conceivable precaution. (See, E.I. duPont deNemours & Co., Inc.

v. Christopher, 431 F.2d 1012 [5th

Cir. 1970]). Although there is no

mandated checklist of minimally acceptable precautions, the courts will look

askance upon measures that are obviously insufficient. Thus, the owner must

at a minimum make satisfactory efforts to identify the subject matter, notify

others that it regards the subject matter as proprietary and protect against

reasonably foreseeable means of obtaining the trade secret.

3. Ultimately, courts determine the issue of reasonableness on a

case-by-case basis, considering the efforts taken and the costs, benefits, and

Page 23: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

19

practicalities of the circumstances. (See, e.g., Rockwell Graphic Sys., Inc. v.

DEV Indus., Inc., 925 F.2d 174 [7th

Cir. 1991]; Tax Track Systems Corp. v.

New Investor World, Inc., 478 F.3d 783 [7th

Cir. 2007]).

(a) Expert testimony on the issue of reasonableness is

admissible. (See, Wyeth v. Natural Biologics, Inc., 2003 WL 22282371 *5

[D. Minn.], affd., 395 F.3d 897 [8th

Cir. 2005]).

4. In Rockwell (925 F.2d 174, supra), the court rejected a “trade

secret misuse” rule whereby a firm would forfeit trade secret protection if it

marked as “secret” documents that do not in fact contain trade secrets.

B. Case Law Examples

1. Rockwell (925 F.2d 174, supra [fact issue as to whether printing

press manufacturer took reasonable precautions to protect its trade secrets in

its piece part drawings used to manufacture replacement parts precluded

summary judgment in action against competitor for misappropriation of

trade secrets; manufacturer kept drawings in vault, employed security guards

and contracted with vendors who used drawings to manufacture replacement

parts to maintain confidentiality of drawings]).

2. Wyeth (395 F.3d 897, supra [based on the lack of repeated

losses of confidential information regarding the “Brandon Process” and

Wyeth’s use of physical security, limited access to confidential information,

Page 24: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

20

employee training, document control, and oral and written understandings of

confidentiality, the court concluded that Wyeth subjected the “Brandon

Process” to efforts that are reasonable under the circumstances to maintain

its secrecy]).

3. Storage Technology v. Cisco Sys., Inc. (2003 WL 22231544 [D.

Minn][firm did not use reasonable efforts to protect alleged trade secret

because plaintiff “used general employee- confidentiality agreements” that

are insufficient to satisfy the statutory requirement” of reasonable efforts,”

did not mark documents as confidential, stored documents on unsecured

“back up discs left behind by departing employees and did not inform

departing employee of confidentially requirements]).

4. Hildreth Mfg., Inc. v. Semco, Inc. (151 Ohio App.3d 693, 785

N.E.2d 774 [2003][firm did not exercise reasonable efforts when employees

were not required to sign non-disclosure agreements, there were no

instructions given to shred confidential information, documents were not

marked as confidential when they left the facility, there were public tours of

the building, one of which included one of the firm’s competitors]).

5. In Re Bass (113 S.W.2d 735 [Tex. Sup. Ct. 2003][firm

exercised reasonable efforts to protect secrecy of seismic data when, among

Page 25: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

21

other things, data “were kept in a secured, climate regulated vault that was

accessible only to those who knew the combination”]).

Part Three

Misappropriation

I. INTRODUCTION

A. Generally

1. Under §1, misappropriation of a trade secret must be

established before liability is imposed.

2. §1(2) specifies the instances in which misappropriation will be

present. §1(1) defines “improper means” which definition is integral to

§1(2)’s specified instances.

B. Presence of Misappropriation

1. To prove a misappropriation, the trade secret owner must show

that the alleged misappropriator (a) acquired the trade secret knowing or

having reason to know it was acquired by “improper means”; or (b) used or

disclosed the trade secret without consent and used “improper means” to

acquire the “trade secret”; or (c) acquired the trade secret from a third person

rather than from the owner of the trade secret and knew of or should have

known that the trade secret was either obtained by the third person by

“improper means” or the third person was under a duty to keep it secret.

Page 26: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

22

2. As to “improper means”, the specification of “theft,” “bribery,”

“misrepresentation,” “espionage” or “inducement of a breach of a duty to

maintain secrecy” follows the cases that recognized such independently

tortuous or criminal conduct as “improper.” The “breach of duty to maintain

secrecy” follows the cases that predicate an “improper” finding on such

conduct. The term “other means” following espionage through electronics,

give the courts the flexibility to condemn devious forms of obtaining trade

secrets, which fall sort of proper means such as independent development or

reverse engineering.

3. In essence, §1 provides that misappropriation will be present,

e.g., improper means present, when one who stands in neither a fiduciary nor

confidential relationship to the trade secret owner acquires a secret by means

that are “improper,” e.g., wrongful taking; and one uses for his or her own

purposes a trade secret revealed under an obligation not to use it, e.g.,

unauthorized use. (See, generally, Pooley, Trade Secrets [2008 ed.] §§6:01-

6:03).

4. The UTSA closely tracks the common law.

C. Acquisition by “Accident or Mistake”

1. Under §1, misappropriation may be present with respect to a

person who uses or discloses a trade secret acquired through accident or

Page 27: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

23

mistake. In such a situation, misappropriation will be established only if the

person knows or has reason to know that the information was a trade secret

and that such actual or constructive knowledge of the trade secret was

acquired by accident or mistake; that the alleged misappropriator’s actual or

constructive knowledge occurred before there is any material change in the

alleged misappropriator’s position.

2. Misappropriation will be defeated if the accident or mistake

was due to a failure by the trade secret owner to employ reasonable efforts to

maintain secrecy.

D. Acquisition by “Memory”

1. It is important to note that the employer does not lose his

protection when the former employee reconstructs secret technical

information from memory. Thus, in A.H. Emry Co. v. Marcan Products

Corp. (268 F.Supp. 289 [S.D. N.Y. 1967], affd. 389 F.2d 11 [2d Cir. 1968]),

plaintiff charged that a former employee, Mills, had memorized its trade

secrets regarding the design, construction, and manufacture of a hydraulic

load cell, and then disclosed them to the defendant company. The trial court

ruled that “it is as much a breach of confidence of an employee to reproduce

his employer’s drawings from memory as to copy them directly.” (268

F.Supp. at 300). On appeal, the Second Circuit affirmed, holding “that the

Page 28: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

24

information contained in its parts drawings, which had been reproduced

from memory by [the draftsmen] for the use of the defendants, constituted

protectable [sic] secrets.” (389 F.2d at 15). Similarly, in Sperry Rand Corp.

v. Rothlein (241 F.Supp. 549 [D. Conn. 1964]), the defendants were charged

with trade secret misappropriation. Their defense was that the trade secrets

had been copied from memory. To this defense the court responded: “It

may be and if so, it was a remarkable display of memory, for numerous

measurements were in thousandths of an inch. But it does not matter

whether a copy of a Sperry drawing came out in a defendant’s hand or in his

head. His duty of fidelity to his employer remains the same.” (Id. at 563).

Finally, in Jet Spray Cooler, Inc. v. Crampton (361 Mass. 835, 282 N.E.2d

921 [1972]), the Supreme Judicial Court of Massachusetts held that even

though no list or paper was taken, the former employee would be enjoined

from disclosure if the information which he gained through his employment

and retained in his memory is confidential in nature.

2. In Manuel v. Convergys Corp. (430 F.3d 1132 [11th

Cir. 2005]),

the Eleventh Circuit, applying Georgia law, held that the Georgia Trade

Secret Act did not prohibit former employees from using or disclosing

knowledge of trade secrets that they retained in their minds in the absence of

any allegation that the employee had actual possession of tangible trade

Page 29: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

25

secrets, i.e., documents or computer files. (See, Sausser and Payne, “When

Are Otherwise Protectable Trade Secrets Not Shielded?”, Business Torts

Journal [ABA Section of Litigation, Business Torts Litigation Committee],

Vol. 13, Spring 2006, p. 13 [discussing implications of decision]).

3. Pre-UTSA cases reached conflicting results when the

memorized trade secret was a customer list. (Compare, Blake, “Employees

Agreements Not to Compete”, 73 Harv. L. Rev. 625, 655-657 [1960] with

“Developments in the Laws Competitive ‘Torts,” 77 Harv. L. Rev. 888, 955-

957 [1964]).

II. IMPROPER MEANS

A. Wrongful Taking

1. §1’s definition of improper means leaves much room for

labeling a challenged acquisition as “improper.” As stated by the Fifth

Circuit: “Improper will always be a word of many nuances, determined by

time, place and circumstances.” (E.I. duPont deNemours & Co. v.

Christopher, 431 F.2d 1012, 1017 [5th

Cir. 1970]).

2. The fact or claim that the alleged misappropriator had only

followed generally accepted standards of commercial morality is not

necessarily determinative of a conclusion that “proper” means were used.

As stated by the Fifth Circuit in rejecting such a claim: “In taking this

Page 30: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

26

position we realize that industrial espionage of the sort here perpetrated has

become a popular sport in some segments of our industrial community.

However, our devotion to free wheeling industrial competition must not

force us into accepting the law of the jungle as the standard of morality

expected in our commercial relations.” (E.I. duPont, 431 F.2d at 1016).

Expressed differently, “The market must not deviate from our mores.” (Id. at

1017 [emphasis added]).

3. A working rule of thumb is that the UTSA definition embraces

acquisition by any method other than independent development, reverse

engineering, or disclosure by the owner, whether or not that method violates

specific legal prohibitions. Judge Posner would go even further arguing that

improper encompasses any means that cannot be shown to be inventive or

independently productive. (See, Rockwell Graphic Sys., Inc. v. DEV Indus.,

Inc., 925 F.2d 174, 178 [7th

Cir. 1991]).

4. Notable examples include:

(a) Theft (See, Solo Cup Co. v. Paper Machinery Corp., 240

F.Supp. 126 [E.D. Wisc. 1965], rev’d in part on other grounds, 359 F.2d

754 [7th

Cir. 1966]; LeJeune v. Coin Acceptors, Inc., 849 A.2d 451 [Md.

2004][copying of files to a CD]; AGES Corp., L.P. v. Raytheon Aircraft Co.,

22 F.Supp.2d 1310 [M.D. Ala. 1998]).

Page 31: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

27

(b) Breaking and Entering (See, Morton v. Rogers, 20 Ariz.

App. 581, 514 P.2d 752 [1973]; Otis Elevator Co. v. Intelligent Systems,

Inc., 1990 WL 269219 [Conn. Super. Ct.]; Advanced Powers Sys., Inc. v. Hi-

Tech Sys., Inc., 1992 WL 97826 [E.D. Pa.]).

(c) Computer Hacking (See, e.g., Physicians Interactive v.

Lathian Sys., Inc., 2003 WL 230182 [E.D. Pa.]; Four Seasons Hotels &

Resorts B. v. Consorcio Barr, S.A., 267 F.Supp.2d 1268 [S.D. Fla. 2003];

Technicon Data Sys. Corp. v. Curtis 1000, Inc., 224 U.S.P.Q. 286 [Del. Ch.

1984]).

(d) Bribery (See, University Computing Co. v. Lykes-

Youngstown Corp., 504 F.2d 518 [5th

Cir. 1974]).

(e) False Identity or Representations (See, College

Watercolor Group, Inc. v. William H. Newbeuer, Inc., 468 Pa. 103, 360 A.2d

200 [1976]; Continental Data Systems, Inc. v. Exxon Corp., 638 F.Supp. 432

[E.D. Pa. 1986]; Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772

[5th

Cir. 1999]; Bloom v. Hennepin County, 783 F.Supp. 418, 439 [D. Minn.

1992]).

(f) Removed from Trash (See, Tennant Co. v. Advance

Machine Co., 355 N.W.2d 720 [Minn. App. 1984]; Drill Parts & Serv. Co.

v. Joy Manu. Co., 439 So.2d 43 [Ala. 1983]).

Page 32: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

28

(g) Cultivation of Personal Relationship (See, e.g., Chanay v.

Chittenden, 115 Ariz. 32, 563 P.2d 287 [1977]).

B. Unauthorized Use

1. Under this prong of misappropriation, the breach of the

obligation not to use the trade secret can arise from an express agreement or

implied agreement not to use or disclose the trade secret.

2. As to the latter, it will arise from the existence of a confidential

relationship, arising prior to or concurrent with disclosure of a trade secret,

which imposes an absolute (as opposed to relative) duty not to use or

disclose the secret. Whether or not such a confidential relationship exists

will, in turn, depend upon an analysis of the facts and circumstances of each

individual case. When the facts show that a disclosure was made in order to

further particular relationship, confidentiality will be implied.

3. A confidential relationship can be found:

(a) Employer-Employee

(b) Licensor-Licensee and Prospective (See, e.g., Hyde Corp

v. Huffines, 158 Tex. 566, 314 S.W.2d 763 [1958]; Schreyer v. Caseo Prods.

Corp., 190 F.2d 971 [2d Cir. 1951]).

Page 33: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

29

(c) Owner of Business-Potential Buyer (See, e.g., Phillips v.

Frey, 20 F.3d 623 [5th Cir. 1994]; H.E. Bott Grocery Co. v. Moody’s Quality

Meats, Inc., 951 S.W.2d 33 [Tex. Ct. App. 1997]).

(d) Manufacturer-Independent Contractor (See, e.g., Kamin

v. Kuhnau, 232 Or. 139, 374 P.2d 912 [1962]).

(e) Submission of Bid (See, e.g., Nucor Corp. v. Tennessee

Forging Steel Serv., Inc., 476 F.2d 386 [8th Cir. 1973]).

III. PROOF OF ACQUISITION AND USE

A. Generally

1. Proof of acquisition and use of the trade secret by the alleged

misappropriator can be a “difficult task.” (Greenberg v. Croydon Plastics

Co., 378 F.Supp. 806, 814 [E.D. Pa. 1974]).

2. Direct and/or circumstantial evidence can be utilized.

B. Direct Evidence

1. E-mails or voice-mails can be a source of direct evidence. (See,

WSJ, 8/10/05, p. 3, col. 4 [reporting trade secret misappropriation action

brought against its former employee, proof showed that his assistants who

stayed downloaded many of his client files and an e-mail was discovered

which read in part “We ARE in business!!!” “David, you sent this to me at

my KF e-mail. PLEASE be careful.”]; Jasmine Networks, Inc. v. Marvell

Page 34: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

30

Semiconductor, Inc., 117 Ca. App. 4th

794, 12 Cal. Rptr.3d

[2004][conversation “inadvertently” left on plaintiff’s voice-mail system

among defendant’s employees discussing plans to misappropriate plaintiff’s

trade secrets when they called plaintiff and left a message to have him call

them, but then failed to hang-up the speakerphone]).

C. Circumstantial Evidence

1. In the absence of direct evidence, plaintiff may rely upon

circumstantial evidence. Such evidence must be more than just mere

exposure to the allegedly misappropriated trade secret or rest upon surmise.

(See, Penalty Kick Management Ltd. v. Coca Cola Co., 318 F.3d 1284,

1293-1294 [11th

Cir. 2003]; United Rentals (North America), Inc. v. Keizer,

355 F.3d 399, 412-413 [6th

Cir. 2004]; Stratienko v. Cordis Corp., 429 F.3d

592, 594-601 [6th

Cir. 2005][“Sufficient circumstantial evidence of use in

trade secret cases must demonstrate that (1) the misappropriating party had

access to the secret and (2) the secret and the defendant’s design share

similar features.”]).

2. It has been observed that “circumstantial evidence is not

trumped by direct evidence, when the direct evidence consists of denials by

E*Trade personnel and Everypath personnel that anyone from E*Trade

disclosed any protected Ajaxo information to Everypath.” (Ajaxo Inc. v.

Page 35: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

31

E*Trade Group, Inc., 135 Ca. App. 4th

21, 50, 37 Cal. Rptr. 4th

221, 243

[2005]).

3. Probative circumstantial evidence includes:

(a) “Similarity” of defendant’s product to plaintiff’s product

embodying the allegedly misappropriated trade secret can establish

misappropriation, especially in conjunction with other facts. (See, e.g.,

Wyeth v. Natural Biologics, Inc., 395 F.3d 897, 900 [7th

Cir. 2005][“Natural

Biologics financial motives for copying the “Brandon Process”, Saveraid’s

[defendant employee] questionable ability to develop an extraction process

identical to the Brandon Process, the similarity between the Brandon Process

and Natural Biologic’s process, and the absence of a credible record of how

Natural Biologics developed its extraction process, support the district

court’s conclusion that Natural Biologics acquired Wyeth’s trade secret

through improper means.”]; Smith v. Dravo Corp, 203 F.2d 369, 377 [7th

Cir. 1953]).

(b) Employee with access to trade secrets joins competing

firm and shortly afterwards that firm begins manufacture of a product that

resembles the trade secret can establish misappropriation. (See, e.g., B.F.

Goodrich Co. v. Wohlgemuth, 117 Ohio App. 493, 192 N.E.2d 99 [1963]).

Page 36: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

32

(c) Alleged misappropriator’s denial of capability to

manufacture item and no interest in developing such item on its own made

during license negotiations which gave it access to trade secret support

finding of misappropriation when misappropriator developed the item can

establish misappropriation. (See, e.g., Roton Bassier, Inc. v. Stanley Works,

79 F.3d 1112, 1119 [Fed. Cir. 1996]).

(d) Marked shift in business strategy to use a new ingredient

in its product, the subject of trade secret information conveyed in

discussions supports finding of misappropriation. (See, e.g., Cargill, Inc. v.

Sears Petroleum, 388 F.Supp.2d 37, 54 [N.D. N.Y. 2005]).

(e) Spoliation of evidence can support finding of

misappropriation. (See, e.g., Liebert Corp. v. Mazur, 357 Ill. App.3d 265,

285-286, 827 N.E.2d 909, 928-929 [2005] [“Whether Mazur successfully

made CD copies of the price books is a key issue in this case, and, for some

unexplained reason, he deleted the application log which would have

decisively answered the question. Because Mazur destroyed this crucial

piece of evidence, we presume it would have showed he successfully copied

the price books onto a CD.”]).

Page 37: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

33

(f) IT expert review of log files, downloading of files,

number and type of documents accessed and/or deleted by employee before

departure can be used to establish misappropriation.

IV. PERMISSIBLE ACQUISITION

A. Generally

1. The comment to §1 specifically identified the following means

as legally permissible ways in which a firm can learn or otherwise acquire

another firm’s trade secret: independent invention; reverse engineering;

discovery under a license from the owner of the trade secret; “observation of

the item in public use or on public display”; “obtaining the trade secret from

published literature.”

2. In essence, a claim by a defendant that it properly learned or

acquired the trade secret plaintiff contends was misappropriated by

defendant is a denial of misappropriation and is not an affirmative defense.

(Perritt, Trade Secrets [2004 rev.], § pp. 238-239).

3. Thus, plaintiff bears the burden initially of showing

misappropriation of its trade secret; and when that burden is met, the burden

of production is shifted to defendant to establish that he learned of or

acquired the trade secret through permissible means. However, the ultimate

burden of persuasion remains on the plaintiff to prove that the defendant did

Page 38: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

34

not arrive at the trade secret through permissible means. (See, Moore v.

Kulicke & Soffa Indus., Inc., 318 F.3d 561 [3d Cir. 2003]).

(a) In Moore, the Court approved the following jury charge:

“If you find that the plaintiff has proven by a fair preponderance of the

evidence that the defendant used the plaintiff’s trade secret, and that the

defendant did not arrive at the relevant wire bonding technique through

independent invention, then you should find in favor of the plaintiff. On the

other hand, if you determine that the wire bonding technique used by the

defendant was developed through defendant’s own independent efforts and

invention, then you must find in favor of the defendant.”

B. Independent Development

1. Independent development of the trade secret in issue by the

defendant means there is no misappropriation. (See, e.g., Glaxo v.

Novopharm Ltd., 931 F.Supp. 1280, 1304-1305 [E.D. N.C. 1996];

Minnesota Mining & Mfg. Co. v. Tech Tape Corp., 23 Misc.2d 671, 679

[N.Y. Sup. Ct. 1959]).

2. In addition to proof showing in fact the independent

development (Penalty Kick Management Ltd. v. Coca Cola Co., 318 F.3d

1284, 1293 [11th

Cir. 2003]), other proof may be sufficient, or at least

constitute compelling corroborative evidence. Thus, proof that defendant’s

Page 39: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

35

employees who developed the trade secret never had access to the allegedly

misappropriated trade secret may suffice. (See, Downy v. General Foods

Corp., 31 N.Y.2d 56, 334 N.Y.S.2d 874 [1972]). Also helpful would be

proof that experimentation prior to the time the alleged misappropriation

occurred led to the development of the trade secret. (Greenberg v. Croydon

Plastics Co., 378 F.Supp. 806 [E.D. Pa. 1974]).

C. Reverse Engineering

1. A party may “reverse engineer” a product in order to learn the

trade secret involved with it. This refers to the process by which one

analyses another’s product in order to determine its nature or specific

content. For example, in a situation where Y purchases X’s product and by

working with and analyzing the product ascertains the process by which the

product was manufactured, X cannot preclude Y from using this process

even though this process otherwise meets the prerequisites of a trade secret.

(See generally, Pooley, Trade Secrets [2008 rev.] §5:02). While treating

reverse engineering as a lawful means has been questioned (Perritt, Trade

Secrets [2d ed.] 7-48), it is well established as permissible. As noted: “[T]he

legitimacy of reverse engineering should be viewed not as an undesirable

aspect of trade secret law, but as an indispensable element of that law

without which it would be wholly displaced.” (Pooley, supra, at §5:02[1]).

Page 40: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

36

2. It is also important to note that reverse engineering is

permissible “so long as the means used to get the information necessary to

reverse engineer is in the public domain, and not through [a] confidential

relationship with the maker or owner of the product.” (Kadan Inc. v. Seeley

Machine, Inc., 244 F.Supp.2d 19, 38 [N.D. N.Y. 2003]). But the mere fact

that the employee may know where to get that information because of their

former employment does not lead to the conclusion that the reverse

engineering was improper as to hold otherwise “would effectively eviscerate

any benefit reverse engineering would provide . . ., forestall healthy notions

of commercial competitiveness, and heavily contribute to an inert

marketplace where products can only be developed and sold under an

impenetrable cloak of originality.” (Id.; see also, DSC Commc’ns Corp. v.

Pulse Commc’ns, Inc., 976 F.Supp. 359, 365 [E.D. Va. 1997][downloading

program from telephone switching card to determine memory locations to

implement “lock-out” against competing cards so that product could be

reverse engineered was not “improper means”]).

D. Publicly Available Literature

1. The trade secret may also be ascertained through publicly

available literature. (See, Ashland Mgmt. Inc. v. Janien, 82 N.Y.2d 395, 407

Page 41: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

37

[1993][stating that the alleged secret information could be reproduced based

on plaintiff’s public disclosures]).

Part Four

Remedies

I. INTRODUCTION

A. Available Remedies

1. Under the UTSA the remedies available for the

misappropriation of a trade secret include equitable and monetary relief.

2. From the standpoint of the trade secret owner, injunctive relief

restraining future use and disclosure of a misappropriated trade secret is

especially desirable. Such relief protects against additional harm to the

owner of the trade secret from further unauthorized use or disclosure of the

trade secret, and permits the court to fashion the relief so as to deprive the

misappropriator of any further benefit from its misappropriation.

3. In appropriate cases, a court may authorize and permit both.

B. Attorney’s Fees

1. The UTSA also authorizes an award of attorney’s fees to the

prevailing party in a trade secret misappropriation action.

Page 42: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

38

2. Permitting an award of attorney’s fees to the prevailing party is

contrary to the so-called “American Rule” that parties in a lawsuit are

responsible for their own attorney’s fees, regardless of whether they prevail.

II. EQUITABLE RELIEF

A. Injunctive Relief

1. Under §2, actual or threatened misappropriation may be

enjoined as long as the trade secret exists. While issuance of injunctive

relief is discretionary, it is ordinarily granted once misappropriation is

shown. (See, Richardson v. Suzuki Motor Co., 868 F.2d 1266, 1247 [Fed.

Cir. 1989][“[A] misappropriation has no authorization of right to continue to

reap the benefits of its wrongful acts.”]).

2. A permanent injunction against the use or disclosure of the

misappropriated trade secret may be issued as apart of the final judgment.

As in other actions, the prerequisites are a showing of irreparable harm in

the absence of such relief and the inadequacy of a remedy at law.

3. The issuance of an injunction to prevent the misappropriation of

a trade secret does not hinge on the plaintiff proving that the defendants used

a trade secret. The threat of misappropriation of a trade secret is sufficient to

allow the trial court to enjoin future use. (See, Dexxon Digital Storage, Inc.

Page 43: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

39

v. Haenszel, 161 Ohio App.3d 747, 832 N.E.2d 62 [2005]); LeJeune v. Coin

Acceptors, Inc., 849 A.2d 451 [Md. 2004]).

4. A maxim of equity is that relief will not be given to a plaintiff

who does not have clean hands. In Merrill Lynch v. Callahan (265

F.Supp.2d 440 [D. Vt. 2003]), this maxim was invoked to bar relief to the

plaintiff who sought preliminary injunctive relief enjoining client solicitation

against former employees who resigned from employment and began

employment with a competitor, alleging the employees retained a client list

in violation of the UTSA. The court refused to issue injunctive relief citing

plaintiff’s unclean hands. It noted: “By seeking to halt such solicitation,

Merrill Lynch seeks to enjoin the same behavior in which it engages as a

matter of company policy.” (Id. at 444). The “same behavior” was

solicitation of former clients from memory.

5. The trade secret owner may obtain preliminary injunctive relief

to enjoin either actual or threatened misappropriation during the pendency of

its trade secret misappropriation action. As in other actions, such relief may

be granted upon a showing of a likelihood of success on the merits;

irreparable harm absent the injunction; and that a balancing of the equities

favors the issuance of the injunction.

Page 44: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

40

6. The injunction must be drafted with sufficient specificity to

provide the misappropriator fair notice of what conduct is prohibited.

B. Duration of Injunction

1. §2 also provides a standard for the duration of injunctions.

Under its provisions, the injunction shall be vacated once the trade secret

ceases to exist, except where continuation is necessary to eliminate any

commercial advantage that a misappropriator might obtain through its

misappropriation. This provision works to deprive the misappropriator of

any head start gained over other competitors due to the misappropriation.

Thus, under this subdivision, a court which permanently enjoined use and

disclosure would have to terminate such injunction upon proof that the

misappropriated trade secret is no longer secret, except where continuation

was needed to eliminate an improper lead time advantage.

(a) The mere possibility of successful reverse engineering

shall not provide a basis for termination of the injunction. (See, Pooley,

Trade Secrets [2008 rev.] §2.03, n. 36).

(b) The misappropriator cannot base its request for

termination of the injunction on its own improper publication of the trade

secret. (See, Syuntex Opthalmics, Inc. v. Novicky, 214 U.S.P.Q. 272, 279

[N.D. Ill. 1982], affd., 701 F.2d 677 [7th

Cir. 1983]).

Page 45: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

41

2. Recent cases include: MicroStrategy, Inc. v. Business Objects,

S.A., 369 F.Supp.2d 725 [E.D. Va. 2005][competitor found to have

misappropriated trade secrets failed to make showing that secrets no longer

had economic value, or were no longer subject of efforts to preserve their

secrecy, as required to vacate under Virginia law permanent injunction

barring their use by competitor]; Fireworks Spectacular, Inc. v. Premier

Pyrotechnics, Inc., 107 F.Supp.2d 1307 [D. Kan. 2000][under Kansas law,

fireworks seller’s customer lists were still trade secrets, which competitor

could be enjoined from misappropriating, even though seller had mistakenly

included lists in notice of injunction it sent to customers; customers knew

that disclosure was mistake which they were not entitled to make use of, and

thus lists continued to provide seller with some commercial advantage as

they did prior to disclosure]).

C. Payment of Royalty

1. Where an injunction would be unreasonable or inequitable, i.e.,

“exceptional circumstances”, §2(b) authorizes a court to condition further

use on the payment of a reasonable royalty during the time an injunction

would otherwise have been appropriate.

2. The comment to §2(b) states that such exceptional

circumstances include situations where an overriding public interest exists

Page 46: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

42

and situations where a person relies upon a trade secret, which is obtained in

good faith, without reason to know it was misappropriated. As with an

injunction prohibiting future use, a royalty order injunction is generally

allowed when the defendant has obtained a competitive advantage and the

injunction will last for the duration of that competitive advantage.

D. Other Equitable Relief

1. Under §2(c), a court may order additional measures as part of

its equitable relief. Such relief can include the surrendering of physical

embodiments of the trade secret; assignment of a patent or patent application

on the trade secret; and perhaps the destruction of products made through

use of the trade secret.

III. INEVITABLE DISCLOSURE

A. Generally

1. In PepsiCo, Inc. v. Redmond (54 F.3d 1262 [7th

Cir. 1995]), an

injunction was issued which prohibited a former employee for a period of

six months from working with his former employer’s competitor

notwithstanding the absence of proof that the employee intended to use or

disclose his former employer’s trade secrets and the absence of a covenant

not to compete. This ruling has come to be known as the “inevitable

Page 47: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

43

disclosure” rule. (See generally, Shilling, The Inevitable Disclosure

Doctrine - A Necessary and Precise Tool for Trade Secret Law, 11 Bus.

Torts Journal [ABA Litigation Section, Business Torts Litigation

Committee], Vol. 11, No. 2, p. 1 [2004]; Katchmark, Remedies Under The

Inevitable Disclosure Doctrine, Bus. Torts Journal [ABA Litigation Section,

Business Torts Litigation Committee], Vol. 14, No. 2 [2006]).

2. The rule is rooted in the fact that once employees have

knowledge of their employer’s trade secrets, it is almost impossible to

compartmentalize that knowledge and avoid using it when they go to work

with a new employer on a similar job in the same industry.

3. While the rule has been followed in several jurisdictions, many

other jurisdictions have rejected it. (See, Shilling, supra; Kathmark, supra;

Jager, Trade Secrets Law [2007 rev.] §3.43; Pooley, Trade Secrets [2008

rev.] §7.02[2][b][ii]).

(a) The rule is disfavored in New York based primarily on

New York’s strong public policy against restrictive non-competition

agreements. (See, Colonize.com, Inc. v. Perlow, 2003 WL 24256576 at *6

[N.D. N.Y. 2003]). Federal courts in New York also have exemplified a

reluctance to use the doctrine to grant injunctive relief (see, Earthweb, Inc.

Page 48: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

44

v. Schlack 71 F.Supp.2d 299, 310 [S.D. N.Y. 1999], affd, 2000 WL 1093320

[2d Cir. May 18, 2000][“[I]n its purest form, the inevitable disclosure

doctrine treads an exceedingly narrow path through judicially disfavored

territory.”]), and have applied the doctrine only where other evidence of

actual misappropriation of trade secrets exists. (see also, Colonize.com,

supra; Earthweb, at 310, supra).

(b) The existence of the rule in California is unclear. (See,

Bourns, Inc. v. Raychem Corp., 331 F.3d 704, 708 [9th Cir. 2003]; Bayer

Corp. v. Roche Molecular Sys. Inc., 72 F.Supp.2d 1111, 1119-1120 [N.D.

Cal. 1999][predicting that the California Supreme Court would not adopt the

rule because of California’s long-standing statutory scheme invalidating

covenants not to compete]).

4. Where the rule has been applied, the courts have considered the

following factors: (1) whether the former and new employers are direct

competitors; (2) whether the employee’s new job is identical to the old one;

(3) whether the trade secret it clearly established; and (4) whether the trade

secret is highly valuable to both employers. (See, Shilling, at p. 17, supra).

Page 49: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

45

5. Recent decisions include:

(a) Aero Fulfillment Services, Inc. v. Tartar (2007 WL 120695

[Ohio App.]) where the rule was not invoked. The former employee was in

possession of a marketing study prepared by plaintiff, his former employer

who went to work for a competitor, Wilde, Inc.. The court refused to enjoin

the new employment. It noted, inter alia, that plaintiff filed for injunctive

relief three months after the action was filed and ten months after the

employee left his employment, and that the alleged trade secret was a

general marketing study about customer preferences in the industry as a

whole and not product based.

(b) In Proctor & Gamble v. Stoneham (140 Ohio App.3d

260, 747 N.E.2d 268 [2000]), the court upheld an injunction enjoining the

employee from working for his new employer. In so holding, it noted that

the employee worked at P & G’s haircare division; he was familiar with

product-specific market research results, financial data related to the costs

and profits of the products, and the technological developments in existing

new products; he left P & G to work for Alberto-Culver, a direct competitor;

Alberto-Culver competed in the same markets, and it products competed

directly with P & G’s haircare products; and he was in charge of that exact

Page 50: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

46

product line at his new employer. As the Aero court observed: “The

Stoneham decision was product-driven. Therein we noted that through the

years Stoneham had acquired extensive product-specific knowledge. He

knew, among other things, the product areas in which P & G would expand

or reduce its business; product-sensitive information concerning which types

of advertising were most successful; which line of products would optimize

profit; the products that sold best in the foreign markets; information

concerning development of new haircare products; which products were

closest to market and when and where they would be launched; the strengths

and weaknesses of the products; the strengths and weaknesses of the

company’s scientific backup for its claims about the products; the price for

the new products, and the targeted profits; which products would be

relaunched; the perceived weaknesses of the relaunched products; the

changes made or to be made in the products, and the anticipated costs of

relaunch. We note that this information was tangible, highly technical, and

specific. In Stoneham, the likelihood of irreparable harm was immediately

apparent and concrete.”

(c) In LeJeune v. Coin Acceptor, Inc. (381 Md. 288, 849

A.2d 451 [2004]), the Maryland Court of Appeals refused to adopt the

inevitable disclosure rule. After an exhaustive review of the conflicting

Page 51: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

47

decisions, the Court was of the view that the rule operated to impermissibly

to create and after-the-fact covenant not to compete. Notably, the Court

made this ruling upon a record that showed the employer, after announcing

he was resigning and joining employer’s principal competitor in currency

acceptance machine industry, told his supervisor he would be in a “unique”

position with competitor, thereby suggesting he might use employer’s

confidential information in his new employment; the employee, after

copying employer’s confidential information onto compact disk (CD), made

a backup copy on a second CD; and competitor, during job interview, twice

reminded employee not to disclose employer’s confidential information

suggested employee had displayed some propensity to disclose trade secrets.

IV. MONETARY RELIEF

A. Generally

1. §3(a) provides for the recovery of compensatory damages by

the trade secret owner. As with injunctive relief, such damages are available

for the period during which the trade secret was entitled to protection and

not in the public domain, plus the period during which the misappropriator

retained a competitive advantage form its misappropriation.

Page 52: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

48

2. Under §3(a), damages may be measured by the trade secret

owner’s actual losses and the misappropriator’s unjust enrichment, to the

extent these two measures do not overlap. Both measures of damages may

incorporate a “reasonable royalty” standard, e.g., the amount the owner

would have reasonably charged as a royalty for the use of the trade secret.

3. The trial court is charged with permitting recovery on

whichever method affords the owner the greatest recovery, provided an

adequate foundation for use of that method is established.

4. A review of the case law leads “to the conclusion that every

case requires a flexible and imaginative approach to the problem of

damages.” (Jager, Trade Secrets Law [2007 rev.] §7:20).

B. Loss to Owner

1. Ordinarily, the principal element of the owner’s loss will be the

amount of profits lost as a result of loss of business attributable to the

misappropriation. The normal principles of causation certainly apply. Like

injunctive relief, the time period is only for the period in which the matter

misappropriated is entitled to trade secret protection, plus the additional

period, if any, in which a misappropriation retains an advantage because of

the misappropriation.

Page 53: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

49

(a) Loss of revenue can be shown by a general decline in

sales or a disruption of business “growth” after the misappropriation

occurred and the misappropriator entered the market. (See, Restatement

(Third) of Unfair Competition, §45, 219 F.3d 734, 741-742 [8th Cir. 2000]).

(b) Price erosion, i.e., reduction of price of owner’s

product/service in response to misappropriator’s entry into mark, is

recoverable. (Raton Barrier, Inc. v. Stanley Works, 79 F.3d 1112, 1120-1121

[Fed. Cir. 1996 [Rich, J.]; Mangren Research & Development Corp. v. Nat.

Chem. Co., 87 F.3d 937, 945 [7th Cir. 1996]).

(c) In determining profits the “direct costing” or “differential

accounting” method is used under which method the deductible costs of

production of the product/service using the misappropriated trade secret

relate only to items which directly increase the cost of production or sale.

(See, Carter Products, Inc. v. Colgate Palmolive, Co., 214 F.Supp. 383, 400-

401 [D. Md. 1963], citing Restatement (First) of Torts, §748, com. (i)

[1939]).

2. Lost profits on sales or products/services that the purchaser

would make in conjunction with the purchase of the product/service

Page 54: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

50

incorporating the misappropriated trade secret. (See, Sperry Rand Corp. v.

A-T-O, Inc., 447 F.2d 1387, 1394 [4th

Cir. 1971]).

3. Recoverable losses include the cost of efforts to minimize the

consequences of the misappropriation. (See, Dozor Agency v. Rosenberg,

218 A.2d 583, 585-586 [Pa. 1966]).

(a) Recent decisions include: World Wide Prosthetic Supply,

Inc. v. Mitulsky (251 Wis.2d 45, 640 N.W.2d 764 [2002][recovery of lost

business attributable to the misappropriator’s distribution of a defective

product incorporating the trade secret which resulted in lost confidence by

potential customers of owner’s product upheld]); Eagle Group, Inc. v. Pullen

(114 Wash. App. 409, 58 P.3d 292 [2002][jury instruction allowing award

for damages attributable to the “reasonable value of business opportunities

with reasonable probability to be lost in the future” proper]); Home Pride

Foods, Inc. v. Johnson (634 N.W.2d 774 [Neb. 2001][award based on

evidence of plaintiff’s gross profit margin and assumption of 25% net profit

held to be “clearly erroneous” as no evidence was provided that would allow

a calculation of the net profit]); Ed Nowogroski Inc. v. Rucker (944 P.2d

1093, 1098 [1997][trial court calculated damages award as five times

commissions based on expert testimony that some customers would have

Page 55: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

51

stopped doing business with plaintiff because of personal relationships with

defendants, thereby reducing the economic effect of the misappropriation]).

C. Unjust Enrichment

1. The measure of damages allows the owner to recover the

misappropriator’s profits or the sums or expenditures saved as a

consequence of the misappropriation or other benefits the misappropriator

ahs obtained by way of the misappropriation.

2. While the owner has the burden of establishing the

misappropriator’s sales, the defendant has the burden of establishing any

portion of the sales not attributable to the trade secret and any expenses to be

deducted in determining net profits.

3. Where defendant’s primary benefit derived from the

misappropriation is the saving of costs and time in getting its product into

the marker, courts have used a “standard of comparison” measure whereby

the defendant’s gain is measured by comparing defendant’s actual costs with

the cots that the defendant would have incurred to achieve the same result

without the use of the misappropriated trade secret. (See, Restatement

(Third) of Unfair Competition, §45, com. f).

Page 56: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

52

(a) Under this approach, consideration must be given to the

cost and likelihood of defendant acquiring the trade secret by lawful means.

(Id.).

(b) Relevant would be the cost incurred by plaintiff in

developing the trade secret. (Id.).

4. Recent decisions include: Children’s Broadcasting Corp. v.

The Walt Disney Corp. (357 F.3d 860, 864-867 [8th

Cir.

2004][misappropriation permitted and defendant’s accelerated entry into

children’s radio as established by expert testimony and defendant’s own

documents]; Bourn, Inc. v. Raychem Corp. (331 F.3d 704 [9th

Cir.

2003][upholding award of $9 million upon evidence that misappropriator

saved three years of development by its misappropriation]); Salisbury

Laboratories, Inc. v. Merieux Laboratories, Inc. (908 F.2d 706 [11th

Cir.

1990][damages award included the savings, $1 million, in research,

developing and marketing its product that misappropriator enjoyed as a

result of the misappropriation]).

D. Reasonable Royalty

1. A reasonable royalty is the amount which the trier of fact

estimates that a party would be willing to pay and the owner would be

Page 57: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

53

willing to accept for use of the trade secret. In calculating what a fair

licensing price would have been had the parties agreed, the courts approving

this method have stated that the factfinder should consider such variables as

“foreseeable changes in the parties’ competitive [positions]; the price [] past

purchasers or licensees may have paid; the total value of the secret to the

[owner], including the [owner’s] development costs and the importance of

the secret to the [owner’s] business; the nature and extent of the use the

[misappropriator] intended for the secret; and … whatever other unique

factors [present] in the particular case…, such as the ready availability of

alternative processes”, that may have affected the parties’ agreement.

(University Computing Co. v. Lykes-Youngstown Corp., 504 F.2d 518, 539

[5th

Cir 1974]; see also Evans v. General Motors Corp., 34 Conn.L.Rptr.

425, 2003 WL 21040255 [Conn.Supr.Ct. 2003]).

2. “As in patent cases, the analysis posits a “hypothetical

negotiation” in which the trade secret owner is willing, albeit reluctantly, to

grant an interest in the secret.” (Pooley, Trade Secrets [2008 rev.] ¶7.03).

3. The reasonable royalty alternative measure of damages should

be distinguished from a royalty order injunction that is permissible under

§2(b). As stated in the Comment to UTSA a “royalty order injunction is

appropriate only in exceptional circumstances; … a reasonable royalty

Page 58: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

54

measure of damages is a general option. Because damages are awarded for a

misappropriator’s past conduct and a royalty order injunction regulates a

misappropriator’s future conduct, both remedies cannot be awarded for the

same conduct. If a royalty order injunction is appropriate because of a

person’s material and prejudicial change of position prior to having reason to

know that a trade secret has been acquired from a misappropriator, damages

… should not also be awarded for past conduct that occurred prior to notice

[or reason to know] that a misappropriated trade secret has been acquired.”

4. Recent decisions include: Mid-Michigan Computer Sys. v.

Marc Glassman, Inc. (416 F.3d 505 [6th

Cir. 2005][court upheld reasonable

royalty award of $2 million given provision for liquidated damages of $2

million in parties’ agreement governing unauthorized use of plaintiff-

licensor’s source code]); Linkco., Inc. v. Fujitsu Ltd. (232 F.Supp.2d 182

[S.D. N.Y. 2002] [thorough and thoughtful decision discussing the evidence

relevant to a reasonable royalty]); Alcatel USA, Inc. v. Cisco Systems, Inc.

(239 F.Supp.2d 660 [ED Tex. 2002][upon review of record, court found no

evidence from which a trier of facts could make a “reasonable royalty”

award]); O2 Micro Intl. Ltd. v. Monolithic Power Sys., Inc. (399 F.Supp.2d

1064, 1077-1078 [ND Cal. 2005][“reasonable royalty’ was found to be a

one-time payment of $900,000 and under the facts such payment did not

Page 59: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

55

face misappropriation to pay for use of the trade secret after it became

public]); Learning Curve Toys, Inc. v. Playwood Toys, Inc. (342 F.3d 714

[7th

Cir. 2003][jury award of 80% reasonable royalty was appropriate

compensation for plaintiff’s idea of a “clickety-clack” sound for toy train on

a wooden track, even though the idea required only a dollar’s worth of

materials and took less than 30 minutes to develop]).

E. Punitive Damages

1. §3(b) authorizes the court - not a jury - to award “exemplary”

damages where “willful and malicious misappropriation exists”, but caps the

amount of such damages at twice the amount of compensatory damages

awarded under §3(a).

2. Since the UTSA makes no distinction between a tort-based or

contract-based for trade secret misappropriation, punitive or exemplary

damages should always be considered.

3. In essence, the court will award punitive or exemplary damages

when they are satisfied the misappropriation was made intentionally and in

bad faith. (Jager, Trade Secrets Law [2007 rev] §7.24 [collecting cases]).

4. Recent decisions include: Mangren Research & Dev. Corp. v.

National Chem. Co. (87 F.3d 937 [7th

Cir. 1996][“last laugh belongs to

plaintiff” as court found award was supported by the evidence]); Learning

Page 60: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

56

Curve Corp. v. Playwood Toys, Inc. (342 F.3d 714 [7th

Cir. 2003][award

upheld with court noting that evidence could be found to support intentional

misappropriation because, inter alia, misappropriator attempted to conceal

the misappropriation by creating false evidence of prior independent

development]); Injection Research Specialists, Inc. v. Polaris Indus. (168

F.3d 1320 [Fed.Cir. 1998][$10 million award upheld]); McFarland v. Brier

(760 A.2d 605 [R.I. 2002][court held trial court erred in applying standard of

“willfulness, recklessness or wickedness…as amounts to criminality” and

under “less demanding” UTSA standard punitive damages should have been

awarded]); Children’s Broadcasting Corp. v. The Walt Disney Co. (357 F.3d

860 [8th

Cir. 2004][trial court did not abuse its discretion in denying an

award of punitive damages]).

F. Attorneys’ Fees

1. §4 authorizes an award of reasonable attorney’s fees to the

prevailing party in three situations: (1) a claim of misappropriation is made

in bad faith; (2) a motion to terminate an injunction is made or resisted in

bad faith; or (3) willful or malicious misappropriation is established. No cap

on the amount recoverable is set forth. The section further states alternative

grounds for “bad faith” to be present: (1) the claim or defense or motion

was made or continued or resisted solely to harass or maliciously injure

Page 61: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

57

another or to prolong the litigation; or (2) the claim or defense or motion

was made or continued or resisted with no reasonable basis in fact or law

and could not be supported by a good faith argument for extension,

modification or reversal of existing law. “Willful or malicious”

misappropriation is present in the same circumstances that punitive damages

may be awarded.

2. In Tax Track Systems Corp. v. New Investor World, Inc. (478

F.3d 783 [7th

Cir. 2007]), the court in a breach of confidentiality agreement

action construed a provision in the agreement allowing attorneys’ fees to the

“prevailing party” to permit an award to the defendant where defendant

defeated all of plaintiff’s claims, which predominated in the litigation, and

received judgment in its favor dismissing entire action against it. Although

defendant lost on its counterclaims that were worth over one million dollars,

counterclaims were “defensive” in that defendant brought its counterclaims

only because they were compulsory.

3. Cases addressing claims for attorneys’ fees are collected in

Pooley, Trade Secrets (2008 rev.) §7.03[4]; Jager, Trade Secrets Law (2007

rev.) §7.27.

Page 62: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

58

G. Expert Testimony

1. The effective presentation of damages evidence will generally

involve the presentation of expert testimony. Such testimony is governed by

the applicable expert opinion evidence rules.

2. Attorneys must be careful in advancing expert testimony. (See,

e.g., O2 Micro Intl Ltd. v. Monolithic Power Systems, Inc., 399 F.Supp.2d

1064, 1076-1077 [N.D.Cal. 2005][expert testified to value of trade secrets as

a whole; as jury found misappropriation of some but not all of the claimed

trade secrets, jury award of damages must be set aside]; Children’s

Broadcasting Corp. v. The Walt Disney Co., 245 F.3d 1008 [8th Cir.

2001][expert testimony should have been excluded as it did not take into

account lawful competition], 357 F.3d 860 [8th

Cir. 2004][upon appeal from

retrial][expert testimony regarding defendant’s accidental entry was found to

be relevant and reliable]; Micro Strategy, Inc. v. Business Objects, 429 F.3d

1344 [Fed.Cir. 2005][expert testimony properly excluded as it failed to take

into consideration the market forces that affected the owner’s losses]).

Page 63: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

59

Part Five

Miscellaneous Covenant Matters

I. CONVENANT NOT TO COMPETE

A. Generally

1. A covenant-not-to-compete is a contractual provision which

prohibits an employee from working for a competing company upon the

employee’s termination of employment.

2. Unless a court accepts the “inevitable disclosure” doctrine, merely

working for a competitor under a prohibition not to disclose a trade secret of

the ex-employer does not require the enjoining of the competitive

employment.

3. It generally makes sense to require all employees who have access

to and knowledge of trade secrets to enter into a covenant-not-to-compete.

4. The enforceability of a covenant-not-to-compete turns upon a

consideration of several factors, with the overriding concern being that of

reasonableness.

5. While the common law governs the enforceability of covenants-

not-to-compete in most states, several states have enacted legislation which

codifies the common law, revises the common law or rejects the common

Page 64: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

60

law and makes enforceability difficult. (See, Malsberger, Covenants-Not-

To-Compete: State By State Comparison [ABA] [collecting statutes]).

B. Protectible Interest

1. The first aspect of reasonableness requires an examination into the

issue of whether there is a real need for the covenant.

2. As a general proposition, courts will find a protectible interest

present only in the following situations: (1) employer has trade secrets to

which the employee had access; (2) employee developed close relations with

customers or clients; or (3) where the employee’s services are deemed

special, unique or extraordinary. (See, generally, Malsberger, supra).

3. Drafting Suggestion

(a) The covenant should specify the general nature of the

interest sought to be protected.

C. Scope Of The Competitive Restriction

1. Territorial

(a) Reasonableness of the territorial restriction depends not so

much on the geographical size of the territory as on the reasonableness of the

restriction in view of the facts and circumstances of the case.

(b) If a business is statewide or worldwide, a statewide or

worldwide or no geographic restriction at all may be appropriate. (See,

Page 65: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

61

Business Intelligence Services, Inc. v. Hudson, 580 F. Supp. 1068 [SD NY

1984][worldwide]; Jay’s Custom Stringing v. Yu, 2001 WL 761067 [SD NY

2001] [“anywhere on earth”]!).

(c) Where the clientele is drawn from a narrow area, a

territorial restriction reflecting that area will be enforced. (See, Borne Chem.

Co. v. Dictrow, 85 AD2d 646 [2d Dep’t 1981] [150 mile radius of New York

City]).

(d) Drafting Suggestion

(i) The covenant should be drafted to cover an area

which is supportable in light of the employer’s need for protection.

2. Time

(a) The permissible length of time of the covenant will

depend upon the interest that the employer is seeking to protect.

(b) A good rule of thumb is that the time restriction should

correspond to the useful life of the trade secret, or, in the case of

customer/client relationships and unique services, the amount of time it

would take to develop and train a new employee to perform the job. (See,

Malsberger, supra).

Page 66: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

62

(c) Drafting Suggestion

(i) The drafter must always have a factual foundation to

support the time restriction.

3. Activity

(a) The activity restriction must be similar to the nature of the

activities that the employee was engaged in during the course of the

employment. (See, Malsberger, supra).

(b) Drafting Suggestion

(i) The drafter should ensure that the convenant

encompass activities in which there is a reasonable or realistic probability

that competition from the employee will be harmful to the ex-employer’s

legitimate interests.

4. Overall

(a) Each restriction should be drafted with the other

restrictions in mind. Many times one may reduce the need or temper the

extent of another one.

(b) While some courts, but not all, will utilize a “blue pencil”

rule in judicially limiting an overbroad restriction (See, BDO Seidman v.

Hirschberg, 93 NY2d 382 [1998] [discussing the rule and cases]), the drafter

should not draft an obviously overbroad restriction for an in terrorem effect.

Page 67: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

63

D. Suggested Provisions For Inclusion

1. Choice of Law

(a) Include a provision specifying the state law that will

govern the enforceability of the covenant when litigation is commenced.

(b) Most courts will uphold a choice of law clause so long as

there is some connection between the chosen state and the parties. (See,

IBM v. Bajork, 191 F3d 1033 [9th

Cir. 1999]; Elizabeth Grady Face First v.

Escavish, 321 F. Supp. 420 [D. Conn. 2004]).

(c) Where the covenant sought to be enforced offends the

public policy of the forum state, however, courts will not apply the specified

law under which the covenant would be enforceable. (See, Scott v. Snelling

& Snelling, 732 F. Supp. 1034 [ND Cal. 1990]; Enron Capital v. Pokalsky,

490 SE2d 136 [Ga. 1997]).

2. Arbitration

(a) Where public policy would not be violated, inclusion of

an arbitration clause may be advisable.

3. Cause Of Termination

(a) Inclusion of a clause specifying that the covenant is

applicable whenever the employee stops working for the employer,

irrespective of the reason for the cessation of employment is advisable.

Page 68: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

64

(b) Some courts will not enforce covenants where the

employer terminated the employee, e.g., R-I-F, but will when the

termination was for cause. (See, Gallo, Comment, 1 U. Pa. J. Lab. & Emp.

L. 719 [1998] [collecting cases]). The drafter may wish to consider a clause

specifying that termination for cause will occur upon specified grounds.

4. Commencement Of Time Period

(a) A clause specifying that the time restriction will commence

in the event of a violation of the covenant when a court upholds the

covenant’s enforceability should be considered.

5. Liquidated Damages

(a) A liquidated damages clause may be enforced by the courts

when damages are difficult to assess and the specified amount seems

reasonable.

II. CONTRACTUAL: BENEFIT FORFEITURE

A. Employee Choice Doctrine

1. In Morris v. Schroder Capital Management Intl. (7 N.Y.3d 616,

825 N.Y.S.2d 697 [2006]), the New York Court of Appeals revisited, and

upheld, the “employee choice” doctrine. Under this doctrine an employee

will be bound by a contractual provision which requires forfeiture of rights

to benefits accrued under various employer deferred compensation plans if

Page 69: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

65

the employee violates the terms of a covenant not to compete without regard

to its reasonableness, provided the leaving of the employment was

voluntary.

2. The “employee choice” doctrine rests on the premise that if the

employee is given the choice of preserving his rights under his contract by

refraining from competition or risking forfeiture of such rights by exercising

his right to compete, there is no unreasonable restraint upon employee’s

liberty to earn a living. It assumes that the employee who leaves his

employer makes an informed choice between forfeiting his benefit or

retaining the benefit by avoiding competitive employment.

3. In Morris, plaintiff claimed he was constructively discharged

because his employment duties had been reduced - from investment control

over $7.5 billion to $1.5 billion. The Court held that the constructive

discharge from federal employment law - the actions of the employer in

creating the intolerable workplace condition must be deliberate and

intentional and the atmosphere in the workplace must be so intolerable as to

compel a reasonable person to leave - applies to the “employee choice”

doctrine. In so ruling, the Court noted that mere dissatisfaction with a job

responsibility does not render a resignation “involuntary.”

Page 70: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

66

4. The Court in dicta stated that “if an employee left his employer

voluntarily, a court must determine whether forfeiture is ‘reasonable’ if the

employee was terminated involuntarily and without cause (see, Post v.

Merrill, Lynch, Pierce, Fenner & Smith, 48 N.Y.2d 84, 89, 421 N.Y.S.2d

847 [1979][holding that a private pension plan provision permitting the

employer to forfeit pension benefits earned by an employee who competes

with an employer in violation of a covenant not to compete after being

discharged “is unreasonable as a matter of law and cannot stand”]).

QUAERE: Is the Court suggesting that a covenant not to compete is not

enforceable as a matter of law where the employee has been terminated

without cause? (See, Altieri, After Termination Without Cause: Restrictive

Covenants, N.Y.L.J. 2/16/07, p. 4, col. 4, concluding, without stating a basis

for doing so, that one would be “mistaken” to conclude that covenants not to

compete are not enforceable after Morris if the employee were discharged

without cause). QUAERE: Would the covenant be enforceable if the

employment agreement provided that it could be even if the employee who

discharged without cause? (See, Hartman, Non-competes With No

Reasonableness Hurdles, N.Y.L.J., 12/15/06, p. 4, col. 4).

Page 71: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

67

III. ANTI-SOLICITATION/NO-HIRE COVENANT

A. Enforcement

1. In UL Systems, Inc. v. Unisen, Inc. (152 App. 4th

708, 61 Cal.

Rptr. 3d 818 [2007]), a California Court of Appeals invalidated a broad no-

hire contract provision but left open the possibility of enforcing a more

narrowly drawn no-hire provision. In this case a former client of the

plaintiff consulting company hired the consultant’s employee.

(a) The opinion suggests that such a covenant will be

enforced where the employee sought to be bound by the covenant has

knowledge of and consents to the no-hire covenant; the covenant applies to

soliciting employees who had actually performed work for the client; there is

consideration to the employees to be bound by the no-hire covenant; and the

absence of a liquidated damages clause. (See, Communications Tech. Sys. v.

Densmore, 583 N.W.2d 125 [S.D. 1998]; Heyde Companies, Inc. v. Dove

Healthcare, LLC, 258 Wisc.2d 28, 654 N.W.2d 830 [2002]).

(b) In MicroStrategy Inc. v. Business Objects, S.A. (429 F.3d

1344 [Fed. Cir. 2006]) the non-solicitation clause in the employee contract

provided: “I agree that, for the period of one (1) year after termination of my

employment with MicroStrategy for any reason, I will not, directly or

indirectly, seek to influence any employees, agents, contractors or customers

Page 72: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

68

of MicroStrategy to terminate or modify their relationship with

MicroStrategy.” The court held the clause was not ambiguous and

enforceable.

IV. TORTIOUS INTERFERENCE WITH COVENANT NOT TO COMPETE

A. Generally

1. In Chicago Title Ins. Corp. v. Magnuson (487 F.3d 985 [7th

Cir.

2007]), the court held that the evidence on plaintiff’s summary judgment

motion showed that former employee’s new employer intended to induce the

employee to breach his covenant not to compete through proof that his job

responsibilities involved the geographical area he was precluded to work in

under his covenant. While malice was present, the court set aside a large

punitive verdict as not sufficient reprehensible.

2. In CRST Van Expedited, Inc. v. Werner Enterprises, Inc. (479

F.3d 1099 [9th

Cir. 2007]), the court held that if the employees are not “at-

will”, the recruiting employer could incur liability for inducing a breach of

contract. The contract here was for one-year employment with plaintiff, a

trucking company that trained employees to become certified truck drivers

and the employee/student driver agreed to be employed for one year. If the

employee left before that year expired, the employee was required to make

reimbursements for training.

Page 73: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

ARTICLES

THE CASE FOR ADOPTION OF A UNIFORM TRADE SECRETS ACT IN NEW YORK

Michael J. Hutter*

TABLE OF CONTENTS

1. Innovation, Advanced Technologies and Law of Trade Secrets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

II. The Law of Trade Secrets in New york............. 6 III. The Need for a Uniform Trade Secrets Act in New

york................................................. 7 IV. Proposed Uniform Trade Secrets Act for New York.. 9 V. Commmentary To The Proposed Sections Of The

Uniform Trade Secrets Act For New York. . . .. . . . . . . 13 A. Commentary To Proposed § 279-m. . . . . . . . . . . . . . . 13 B. Commentary To Proposed § 279-n . . . . . . . . . . . . . . . 14 C. Commentary To Proposed § 279-0 ............... 27 D. Commentary To Proposed § 279-p ............... 33 E. Commentary To Proposed § 279-q ............... 41 F. Commentary To Proposed § 279-r. . . . . . . . . . . . . . . . 45 G. Commentary To Proposed § 279-s................ 47 H. Commentary To Proposed § 279-t. . . . . . . . . . . . . . . . 51 1. Commentary To Proposed § 279-u ... . . . . . . . . . . . . 51 J. Commentary To Proposed § 279-v ............... 52 K. Commentary To Proposed § 2 of The Chapter ... 53

Exhibits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Exhibit "A:" Uniform Trade Secrets Act................ 54 Exhibit "B:" The Law of Trade Secrets in the United

States..................................... 58

• Professor of Law. Albany Law School of Union University

1

KFRANCIS
Text Box
This article is reprinted with the permission of the Albany Tech Journal.
Page 74: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

2 ALB. L.J. SCI. & TECH. [Vol. 10

Exhibit "C:" Unifonn Trade Secrets Act and Proposed Unifonn Trade Secrets Act for New York. 60

Page 75: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

19991 UNIFORM TRADE SECRETS ACT

1. INNOVATION, ADVANCED TECHNOLOGIES AND LAw OF

'I'RADE SECRETS

3

Innovation is key to a dynamic economy. Innovation is also cru­cial to the economic well being of New'York State and to the United States as a whole.' Sound public policy seeks to encourage invention of new products, processes and technologies. Society as a whole benefits from the creation of new technologies because they provide the public with new and improved products and serv­ices. New technology increases operating efficiency, promotes growth and rejuvenates the economy.

Today, gathering and processing information through advanced technologies of all kinds is more important than ever." Whether a firm or an entrepreneur is involved in computer-related busi­nesses and services, industrial development, communications, financial services, or the life sciences, technology and information are vital to continuing the development and success of the business.3

There is a concomitant need to protect and exploit the fruits of intellectual labor and thus ensure their continued creation. 4 Tra­ditionally, intellectual property was protected primarily by the federal patent and copyright systems.5 However, it has been observed that much of the information and cutting-edge technolo-

1 See generally JOSEPH A. SCHUMPETER, CAPITALISM, SOCIALISM AND

DEMOCRACY (3d ed. 1950). 2 See Stan Davis & Jim Botkin, The Coming of Knowledge-Based Business,

HARv. Bus. REV., Sept.-Oct. 1994, 165, 167 (assertion that the United States is on the verge of a knowledge-based economy); see also Michael J. Mandel, The Digital Juggernaut, Bus. WK., June 6, 1994, at 22 (discussing how this decade is driven by the "computer, software, and telecommunications industries")j see generally Marina Lao, Federalizing Trade Secrets Law in an Information Economy, 59 Omo ST. L.J. 1633 (1998) (addressing the need for a federal trade secrets law).

3 See 1 MELVIN F. JAGER, TRADE SECRETS LAw §§ 1.01, 1.02 (1992) (describing the importance of trade secrets and how to protect modern technology).

4 See Rockwell Graphic Sys. v. DEV Indus. Inc., 925 F.2d 174, 180 (7th Cir. 1991) ("The future of the nation depends in no small part on the efficiency of industry, and the efficiency of industry depends in no small part on the protection of intellectual property."); see also Kenneth W. Dam, The Economic Underpinnings of Patent Law, 23 J. LEGAL STUD. 247 (1994) (stating that patent law "prevents others from reaping where they have not sown and thereby promotes research and development [ ) investment in innovation").

5 See Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 430 (1984) (observing that protections given to copyrights have historically been statutory and through acts of Congress); Goldstein v. California, 412 U.S. 546, 555 (1973) (comparing the Copyright Clause of the Federal Constitution and the laws under the state of California).

Page 76: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

4 ALB. L.J. SCI. & TECH. [Vol. 10

gies that are driving the economy today (and will do so in the future), fall outside the patent and copyright systems. At the very least, protecting them under these systems can be problematic.s

As a result, firms and. entrepreneurs are increasingly turning to "trade secrets law" for protection.7 This movement is especially evident in the computer software iridustry.s To many commenta­tors, practicing attorneys, and those working with these innova­tive firms and entrepreneurs, trade secrets law has become crucial to the protection and exploitation of emerging new technologies and information.9 In a recent study of 530 firms in Massachu­setts, the developed empirical data indicated that although trade secrets law is important to all firms, it is indispensable for the small firms that drive innovation in many developing fields. 10

What is "trade secrets law"? The law of trade secrets seeks to protect a firm's secrets or an entrepreneur's interest in informa­tion or technology that the firm or entrepreneur has created and developed which is both confidential and commercially valuable.ll

Trade secrets law protects such valuable assets as "trade secrets" under certain circumstances against unauthorized acquisition, use, or disclosure by others, even though such assets are neither patented or copyrighted nor patentable or copyrightable. More­over, even if technology is covered by a patent, the actual way in which the patent owner practices the technology may well be pro­tected as a trade secret. '2 The law of trade secrets is not created by federal legislation. Rather, it is, and has developed as a crea-

6 See JAGER, supra note 3, § 1.01 at 1-2; J. H. Reichman, Legal Hybrids Between the Patent and Copyright Paradigms, 94 COLU1I. L. REV. 2432, 2444--45 (1994); Pamela Samuelson et al., A Manifesto Concerning the Legal Protection of Computer Programs, 94 COLUM. L. REV. 2308, 2343-48 (1994).

7 See generally JAGER, supra note 3, § 1.01. 8 See Victoria A. Cundiff, Protecting Computer Software as a Trade Secret, 507

PLIIPat 761, 764 (1998) (suggesting that "every owner or developer of computer software should at least consider using trade secret safeguards ... ").

9 See Michael A. Epstein & Stuart D. Levi, Protecting Trade Secret Information: A Plan for Proactive Strategy, 43 Bus. LAw. 887, 887 (1988) (noting the economic importance of protecting trade secrets); David Friedman et aI., Some Economics of Trade Secret Law, 5 J. ECON. PERSP. 61, 62 (1991) (arguing the efficiency of trade secret law); Gale R. Peterson, Trade Secrets in an Information Age, 32 Hous. L. REV. 385, 386-87 (1995) (noting the importance of trade secret law to the computer industry).

10 See Josh Lerner, The Importance of Trade Secrecy: Evidence From Civil Litigation, Harv. Bus. School working paper #95-043 (Nov. 1994).

11 RESTATEMENT OF TORTS §757 cmt.h (1939). 12 See generally 1 ROGER M. MILGRlM, MILGRlM ON TRADE SECRETS (1999)

(explaining the law of trade secrets and what it seeks to protect); see also JAGER, supra note 3, § 1.02 at I-I, 1-2.

Page 77: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 5

ture of state law since its emergence in the middle of the nine­teenth century.13 The early law of trade secrets developed primarily through the judiciary under the common law of the states. In order to clarify a confusing body of law, the First Restatement of Torts, published in 1939, defined "trade secret" and its rules of liability.14 Courts throughout the United States adopted the Restatement's view of the law.15

In February 1968, the Executive Committee of the National Conference of Commissioners on Uniform State Laws authorized the appointment of a Special Committee on Uniform Trade Secrets Protection Act.16 In August 1979, the Committee promul­gated the Uniform Trade Secrets Act and recommended its adop­tion by the states.17 The American Bar Association endorsed it in 1980.18 In 1985, the Act was amended to clarifY ambiguous provi­sions and to strengthen its remedial framework. 19 A copy of the Act, as amended, is appended to this Report as Exhibit "A." The Uniform Trade Secrets Act was promulgated to replace the existing common law of the states with a uniform statutory frame­work. Three arguments in support were advanced. One justifica­tion is that many states do not possess an extensive body of decisional law relating to trade secrets. A second rationale is that even in jurisdictions with numerous precedents, the case law does

13 See Ruckelshaus v. Monsanto Co., 467 U.S. 986, 1001; 104 S.Ct. 2862, 2872 (1984); see also JAOER, supra note 3, § 2.02 at 2-6, 2-11 (discussing Vickery v. Welch, 36 Mass. 523 (1837), which was "the first reported case involving trade secrets", and Hammer v. Barnes, 26 How. 174,176 (N.Y. Sup. Ct. 1863) where the New York courts considered trade secrets law and approved injunctive relief).

14 See RESTATEMENT (FIRST) OF TORTS § 757 (1939) (defining the general principal for liabilities of misuse of another's trade secrets); see also William B. Barton, A Study in the Law of Trade Secrets, 13 U. CIN. L. REV. 507, 515-18 (1939) (defining trade secrets by today's concept, scope and limitations).

15 See JAOER, supra note 3, § 3.02 at 3-16.4-3-24. (explaining the modern U.S. common law, particularly cases in which § 757 was heavily relied upon).

16 See UNlF. TaAnE SECRETS ACT with 1985 Amendments, Prefatory Note, 14 U.L.A. 433, 435 (1990) [hereinafter Prefatory Note) (noting that the Executive Committee "voted to authorize the appoinment of a Special Commitee on Uniform Trade Secrets Protection Act to investigate the question of drafting an act").

17 See id. at 436 (explaining that on August 9, 1979, "following discussions with members of the bar and bench, the Special Committee proposed amendments to Sections 2(b), 3(a), 7, and 11 that clarified the intent of the 1979 Official Text." Thereafter, on "August 8, 1985, these four clarifYing amendments were approved and recommended for enactment in all the states.").

16 See Summary of Action of the House of Delegates, A.B.A. (1980 Mid Year Meeting, Chicago, m.) Feb. 4-S, 1980, at 44.

19 See Prefatory Note, supra note 16, at 436 (amending the act on August 8, 1985).

Page 78: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

6 ALB. L.J. SCI. & TECH. [Vol. 10

not clearly set forth the parameters of trade secrets protection and the appropriate remedies for misappropriation of a trade secret. Finally, the omission of Section 757 from the Restatement (Sec­ond) of Torts is cited as evidence of a need for codHication.20

Today, almost every state and the District of Columbia protects trade secrets in some fashion. The Uniform Trade Secrets Act has actually been enacted by 42 states and the District ofColumbia?l Two states have statutes governing trade secrets law which are not modeled after the Uniform Trade Secrets Act.2 ' The remain­ing states rely on their common law to protect trade secrets, sup­plemented by statutes of general application?a

II. THE LAw OF TRADE SECRETS IN NEW YORK

New York is one ofthe seven states that has not enacted a com­prehensive trade secrets statute?· Rather, New York relies on common law principles derived from the First Restatement of Torts published 60 years ago to determine the existence of a trade secret; the circumstances under which liability will be imposed for the unauthorized acquisition, use or disclosure of another's trade secret; general common law remedial rules to govern relief for the trade secret owner upon the establishment of liability; general statutes of limitation to determine the timeliness of an initiated trade secret misappropriation action; general statutes and com­mon law rules to protect trade secrets in litigation; and general statutes and court rules to determine if the prevailing party in a trade secret action can recover its attorney's fees?5

As commentators have pointed out, the law of trade secrets in New York is in an outdated condition and in need of a comprehen­sive statutory treatment?6 There are several concerns.

20 Id. at 434 (explaining the three reasons why the Uniform Trade Secrets Act should replace existing common law).

21 A chart listing the statutes of trade secreta law among the states and the District of Columbia is appended to this report as Exhibit "Eo"

22 North Carolina and Massachusetts, see Exhibit "E". 23 See Exhibit "B". 24 Id. 26 See Commentary on present New York law, infra. 26 See Robert T. Neufeld, Note, Mission Impossible: New York Cannot Face the

Future Without a Trade Secret Act, 7 FORDHAM INTELL. PRoP. MEDIA & ENT. L.J. 883, 889, 916 (1997) (advocating for a comprehensive trade secrets act to be adopted by New York); see generally Ramon A. Klitzke, The Uniform Trade Secrets Act, 64 MARQ. L. REv. 277, 282-284 (1980) (stating that "while the Restatement greatly contributed to the evolution of trade secrets law ... [there

Page 79: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 7

Although New York law is in the mainstream of trade secrets law, as to the definition of a trade secret and the imposition of liability for its unauthorized acquisition, use, or disclosure, there are uncertainties in its application, as well as serious shortcom­ings and limitations.27 In that regard, the Uniform Trade Secrets Act makes several desirable changes from the common law. These changes have been accepted in the trade secrets provision of the new Restatement (Third) of Unfair Competition (1995)."8 How­ever, there is no assurance that the New York courts will rely on the Restatement (Third) of Unfair Competition, or that the courts will adopt this Restatement in a timely and cohesive manner."·

Additionally, the common law rules regarding the available remedies upon the establishment of a successful trade secret mis­appropriation action are not entirely clear. Thus, there is no definitive acceptance of a "reasonable royalty" as a basis for an award of compensatory damages, nor is there any uniform ruIe as to the availability of "lead time" injunctive relief against a trade secret misappropriator upon public disclosure of the trade secret. The availability of an award of attorney's fees has likewise been open to argument.

The present statute of limitations scheme is fraught with con­cerns. It is unclear which statute of limitations (tort or contract) applies. The fairness of the cause of action accruing upon the use of a misappropriated trade secret, notwithstanding the user's lack of knowledge that the trade secret has been misappropriated, and the viability of the "continuing misappropriation" doctrine is open to serious question.

III. THE NEED FOR A UNIFORM TRADE SECRETS ACT IN

NEW YORK

Without clear, comprehensive, and uniform rules regarding the protection of trade secrets, firms and entrepreneurs in New York whose economic viability rests in large part upon their possession, development and exploitation of technology and information, will

are] factors ... [that] work[ ] to prevent it from providing the uniformity ... n of the Trade Secrets Act).

27 See Commentary infra Part III. 28 See JAGER, supra note 3, § 3.03. 29 See Christopher Rebel J. Pace, The Case for a Federal Trade Secrets Act, 8

HARv. J.L. & TECH. 427, 430 & n.12 (1995); Merckle GmbH v. Johnson & Johnson, 961 F. Supp. 721, 730-31 & n.11 (D.N.J. 1997) (stating "that the Restatement (Third) of Unfair Competition is, at least, relevant, if not instructive").

Page 80: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

8 ALB. L.J. SCI. & TECH. [Vol. 10

find themselves at risk. The reasoning behind the ·risk is that there are great incentives for theft of such technologies and infor­mation. They can be very valuable, thus vulnerable to theft. so

It cannot be doubted that a state's clear and workable law of t,rade secrets creates an environment for firms and entrepreneurs that is conducive to innovation.s1 Many other states have recog­nized this effect in their recent enactment of a trade secrets act. S2

The recent Lerner study, of firms in Massachusetts, fully supports this commentary and legislative authority.ss

As New York strives to retain existing firms and to attract new ones, it inust offer them a way of obtaining and maintaining an advantage over the firms against whom they compete. Greater certainty in the rules governing their right to protect and exploit their intellectual property is central to the success of New York's economic development effort. An important, if not critical, means of achieving that certainty and conferring that advantage is to have comprehensive trade secrets legislation. Otherwise, New York will be at a distinct disadvantage relative to the 45 other jurisdictions when providing a hospitable economic climate for firms and entrepreneurs.

In view of the importance of trade secrets to firms and entrepre­neurs, the uncertainties and antiquity of New York's present law governing trade secrets, and the widespread adoption of uniform trade secrets acts throughout the United States, now is the time for the enactment of a comprehensive trade secrets act in New

30 See Economic Espionage Act of 1996, H.R. REP. No. 104-788, at 4·6, (1996); JAGER, supra note 3, § 1.03; Michael J. Hutter, Protecting Trade Secrets: Legal Theories, in PROTECTING TRADE SECRETS 1989 at 9, 18-19 & 22-24 (Patents, Copyrights, Trademarks & Literary Property Practice Course Handbook Series No. 269, 1989).

31 See Allison Coleman, THE LEGAL PROTECTION OF TRADE SECRETS (1999); Michael J. Mandel, The Digital Juggernaut, Bus. WK., June 6, 1999, at 22.

32 See Melvin F. Jager, Illinois Returns to the Mainstream of Trade·Secrets Protection, CHI. B. Ass'N. REC., Oct. 1988, at 18 (noting the importance of the minois Trade Secrets Act to the state's economy); Paul Thiel, Va. Law Puts High· Tech Emphasis on the Protection of Trade Secrets, WASH. POST, June 30,1986, at 3; Susan C. Miller, Florida's Uniform Trade Secrets Act, 16 FLA. ST. U. L. REV. 863, 863 & n.5 (1988) (summarizing legislative history that stressed the need to give effective protection to trade secrets from economic espionage); Gerald B. Buechler, Jr., Revealing Nebraska's Trade Secrets Act, 23 CREIGHTON L. REV.

323, 323-24 (1990) (citing legislative history that showed concern for protection of trade secrets of firms that are "the new emerging hope for our state's economy"); R. Sosebee, Selling and Other Trade Practices: Expand Trade Secrets Statute, 7 GA. ST. U. L. REV. 213, 220 (1990) (expressing the opinion that the uniform act will "encourage greater industrial growth within [Georgia]").

33 See Lerner, supra note 10.

Page 81: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 9

York.S4 Such an act should provide a single cause of action for the misappropriation of trade secrets, supplemented by uniform rules regarding remedies, recovery of attorney's fees, a statute oflimita­tions, and the protection of trade secrets in litigation. Such a com­prehensive act would eliminate uncertainties in present law and provide a pragmatic and workable framework for the protection of trade secrets in New York.

It is recommended that the act be modeled after the Uniform Trade Secrets Act. Forty-two states and the District of Columbia have enacted acts based on the Uniform Trade Secrets Act. There is no compelling reason why New York should not do likewise.

Within the following pages of this report is a proposed Trade Secrets Act for New York. It follows in large part the Uniform Trade Secrets Act. As the Commentary to this proposed statute demonstrates, the differences between the acts are minor and were made to conform to longstanding New York practice without substantial harm to the goal of national uniformity. In Exhibit "C," a marked-up Uniform Trade Secrets Act shows the differences between that act and the proposed act for New York.a5

In conclusion, the purpose of the proposed act is to provide a comprehensive, uniform law of trade secrets. With its enactment, the act will provide a solid foundation for the protection of trade secrets, and. will make a substantial contribution to the ongoing creation of a business climate in New York that is hospitable to industrial innovation and creativity. It is obvious that such a cli­mate is essential if New York is to regain its rightful place as the Empire State in the Nation's economic firmament.

IV. PROPOSED UNIFORM TRADE SECRETS ACT FOR NEW YORK

AN ACT to amend the general business law, in relation to enacting the uniform trade secrets act.

The People of the State of New York, represented in Senate and Assembly, do enact as follows:

SECTION 1. The general business law is amended by adding a new article 17-B to read as follows:

34 See Neufeld, supra note 26 at 916-18 (1997). 35 For a discussion of the acts adopted in other states, see JAGER, supra note 3,

§ 3.04; ARNOLD H. l'EDowrrz & ROBERT W. SrKKEL, TRADE SECRETS: A STATE·BY­STATE SURVEY (1997); Linda B. Samuels and Bryan K. Johnson, The Uniform Trade Secrets Act: The States' Response, 24 CREtoHTON L. REV. 49 (1998) (describing that "trade secrets law developed through court de~isions, primarily at the state level").

Page 82: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

10 ALB. L.J. SCI. & TECH.

UNIFORM TRADE SECRETS ACT Section: 279-m. 279-n. 279-0. 279-p. 279-q. 279-r. 279-s. 279-t.

Short title. Definitions. Injunctive relief. Damages. Attorney's fees. Preservation of secrecy. Statute of limitations. Effect on other law.

[Vol. 10

279-u. Uniformity of application and construction. 279-v. Severability.

§ 279-M. SHORT TITLE. This article shall be known as and may be cited as Uniform

Trade Secrets Act. § 279-N. DEFINITIONS. As used in this article, unless the context requires otherwise: 1. "Improper means" includes theft, bribery, misrepresentation,

breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means;

2. "Misappropriation" means: (a) acquisition of a trade secret of another by a person who

knows or has reason to know that the trade secret was acquired by improper means; or

(b) disclosure or use of a trade secret of another without express or implied consent by a person who (i) used improper means to acquire knowledge of the trade secret; or (ti) at the time of disclo­sure or use, knew or had reason to know that his or her knowledge of the trade secret was (aa) derived from or thorough a person who had utilized improper means to acquire it, (bb) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use, or (cc) derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or (iii) before a material change of his or her position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake.

3. "Person" means a natural person, corporation, limited liabil­ity company, business trust, estate, trust, partnership, associa­tion, joint venture, government, governmental subdivision or agency, or any other legal or commercial entity.

Page 83: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999) UNIFORM TRADE SECRETS ACT 11

4. "Trade secret" means information, technical and non-techni­cal, including but not limited to a formula, pattern, compilation, program, device, method, technique, or process, that:

(a) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascer­tainable by proper means by, other persons who can obtain eco­nomic value from its disclosure or use, and

(b) is the subject of efforts that are reasonable under the cir­cumstances to maintain its secrecy.

§ 279-0. INJUNCTIVE RELIEF.

1. Actual or threatened misappropriation may be temporarily, preliminarily, or permanently enjoined. Upon application to the court, an injunction shall be vacated when the trade secret has ceased to exist, but the injunction may be continued for an addi­tional reasonable period of time in order to eliminate commercial advantage that otherwise would be derived from the misappropriation.

2. In exceptional circumstances, an injunction may condition future use upon payment of a reasonable royalty for no longer than the period of time for which use could have been prohibited. Exceptional circumstances include, but are not limited to, a mate­rial and prejudicial change of position prior to acquiring knowl­edge or reason to know of misappropriation that renders a prohibitive injunction inequitable.

3. In appropriate circumstances, the court may order affirma­tive acts to protect a trade secret.

§ 279-p. DAMAGES.

1. Except to the extent that a material and prejudicial change of position prior to acquiring knowledge or reason to know of mis­appropriation renders a monetary recovery inequitable, the com­plainant is entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropria­tion and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. In lieu of dam­ages measured by any other methods, the damages caused by mis­appropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator's unauthorized disclo­sure or use of a trade secret.

2. If willful or malicious misappropriation exists, the court may award exemplary damages in an amount not exceeding twice any award made under subdivision one of this section.

§ 279-Q. ATTORNEy'S FEES.

Page 84: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

12 ALB. L.J. SCI. & TECH. [Vol. 10

If (i) a claim of misappropriation is made or continued in bad faith; or (ii) a motion to terminate an injunction is made or resisted or continued in bad faith; or (iii) willful or malicious mis­appropriation is established, the court may award reasonable attorney's fees to the prevailing party. For purposes of this sec­tion, a claim of misappropriation is made or continued in bad faith or a motion to terminate an injunction is made or resisted or con­tinued in bad faith ifit is undertaken or continued solely to harass or maliciously injure another or to delay or prolong the resolution of the litigation; or it is undertaken or continued without any rea­sonable basis in fact or law and could not be supported by a good faith argument for an extension, modification or reversal of existing law.

§ 279-R. PRESERVATION OF SECRECY.

In an action under this article, a court shall preserve the secrecy of an alleged trade secret by reasonable means, including but not limited to, granting protective orders in connection with discovery devices pursuant to the provisions of § 3103 of the Civil Practice Laws and Rules, holding in-camera hearings, sealing the records of the action, and ordering any person involved in the litigation not to disclose an alleged trade secret without prior court approval.

§ 279-s. STATUTE OF LIMITATIONS.

Notwithstanding any inconsistent provision oflaw, an action for misappropriation must be brought within three years after the misappropriation is discovered or by the exercise of reasonable dil­igence should have been discovered. For the purposes of this sec­tion, a continuing misappropriation constitutes a single claim.

§ 279-T. EFFECT ON OTHER LAw.

1. Except as provided in subdivision two of this section, this article displaces conflicting tort, restitutionary, and other law of this state providing civil remedies for misappropriation of a trade secret.

2. This article does not affect: (a) contractual remedies, whether or not based upon misappro­

priation of a trade secret; (b) other civil remedies that are not based upon misappropria­

tion of a trade secret; or (c) criminal remedies whether or not based upon misappropria­

tion of a trade secret. § 279-u. UNIFORMITY OF APPLICATION AND CONSTRUCTION.

Page 85: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 13

This article shall be applied and construed to effectuate its gen­eral purpose to make uniform the law with respect to the subject of this article among states enacting it.

§ 279-v. SEVERABILITY. If any provision of this article or its application to any person or

circumstances is held invalid, the invalidity does not affect other provisions or applications of this article which can be given effect without the invalid provision or application, and to this end the provisions of this article are severable.

SECTION 2. Section 8303-a of the civil practice law and rules, as amended by chapter 620 of the laws of 1997, is amended by adding a new subdivision (d) to read as follows:

(d). The provisions of this section shall not apply to actions gov­erned by article 17-B of the general business law.

SECTION 3. This act shall take effect on the first day of January next succeeding the date on which it shall have become a law, except that the provisions of article 17-B of the general business law, as added by section one of this act, shall not apply to a misap­propriation occurring prior to such effective date. With respect to a continuing misappropriation that began prior to such effective date, this act shall not apply to the continuing misappropriation that occurs after such effective date.

V. COMMENTARY TO THE PROPOSED SECTIONS OF THE UNIFORM TRADE SECRETS ACT FOR NEW YORK

A. Com17U!ntary To Proposed § 279-m

Proposed § 279-m: Proposed § 279-m sets forth the name of the article enacting

this new law and the manner in which it is to be cited: Uniform Trade Secrets Act. It is drafted consistent with other acts which contain similar provisions.a6 Placement of this section as the ini­tial section, is also consistent with other acts.a7

Variations from Uniform Trade Secrets Act: UTSA § 9 sets forth the Uniform Trade Secret Act's "Short

Title," but does not state its citation form. Proposed § 279-m, as to its content and placement, is consistent with New York legislative drafting form.as

3. See, e.g., N.Y. C.P.L.R. § 101; SURR. CT. FRoe. ACT § 101; U.C.C. § 1-1O!. 37 See id. 38 See id.

Page 86: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

14 ALB. L.J. SCI. & TECH.

B. Commentary To Proposed § 279-n

Present Law:

[Vol. 10

The law of trade secrets protects (under certain circumstances) a firm's confidential information. Such information may not be patented or copyrighted, or patentable or copyrightable. In New York, there is no comprehensive statutory treatment of trade secrets law. Rather, the New York courts rely upon common law rules. These rules have been based extensively upon the Restate­ment of Torts, published in 1939, and general statutory enact­ments, in order to give protection against one's unauthorized acquisition, use or disclosure of another's confidential information.

As developed in New York under the common law, a firm will be given protection for its confidential information upon a showing that (1) the information is protectible as a "trade secret"; and (2) the misappropriation of the trade secret (i.e., its acquisition, use or disclosure of the information) is a breach of confidence or fiduciary duty or it involves other improper means. Upon these two elements, a successful trade secrets misappropriation action is established. It should be noted that this general framework is substantially similar in all jurisdictions.39

Trade Secret: Recognizing that there is no generally accepted definition of a

trade secret, New York courts look to section 757 of the Restate­ment of Torts (1939) for the definition.40 Under this definition, a "trade secret" is "any formula, pattern, device or compilation of information which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it."4!

Preliminarily, it must be noted that, consistent with the Restatement's definition, New York courts recognize that almost any information used in the conduct of one's business may be pro-

39 See Michael J. Hutter, Trade Secret Misappropriation: A Lawyer's Practical Approach to the Case Law, 1 W. NEW ENG. L. REV. 1 (1978).

40 See Ashland Management Inc. v. Janien, 82 N.Y.2d 395, 407 (1993); Delta Filter Corp. v. Morin, 108 A.D.2d 991, 992 (3d Dep't 1985) (affirming that the New York judicial system has "substantially adopted the approach of the original Restatement of Torts (1939) [to define] the law of trade secrets") (citation omitted); Eagle Comtronics, Inc. v. Pico Inc., 89 A.D.2d 803, 803 (4th Dep't 1982) (defining a trade secret as "any device 'which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it'") (citation omitted); Lehman v. Dow Jones & Co., 783 F.2d 285, 297 (2d Cir. 1986).

41 See RESTATEMENT OF TORTS § 757, cmt. b, at 5 (1939).

Page 87: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 15

tected as a trade secret.42 This information may be technical or non-technical in nature.43 Thus, formulas, manufacturing tech­niques and product specifications, customer lists and information, and information relating to merchandising, costs and pricing, are all protectible subject matter.44 Computer technology, whether it relates to hardware or software, and whether copyrightable or patentable, may also be protectible as a trade secret.4•

Although a wide variety of business information can qualify as protectible subject matter, the skills and efficiency which an employee develops through his or her work or general knowledge, are not considered protectible subject matter which belongs to his or her employer.46 In addition, the United States Court of Appeals for the Second Circuit has stated that New York law will not protect information which is characterized as a "single or ephemeral" event in the company's business.47 This conclusion was based on the Restatement's comment that a trade secret must be "used in one's business."48

The Restatement of Torts (1939) suggests that in deciding whether a trade secret exists in accordance with that definition, several factors should be considered:

(1) the extent to which the information is known outside of [thel business; (2) the extent to which it is known by employees and others involved in [thel business; (3) the extent of measures taken by [the businessl to guard the secrecy of the information; (4) the value of the information to [the businessl and {itsJ competitors; (5) the amount of effort or money expended by [the businessl in developing

42 See Victoria Cundiff, The New York Law of Trade Secrets: A Practical Guide, 67 N.Y. ST. B.J. 32, 34--.'l5 (May/June 1995) (iisting New York cases which discuss the various categories of information which may qualify as protectible trade secrets).

43 See id. at 35 (stating that "[t]he list of possibilities [for trade secret protection] is virtually inexhaustible").

44 See id. at 34--.'l5. 45 See Computer Assoc. Int'l v. Altai, Inc., 982 F.2d 693, 717 (2nd Cir. 1992)

(explaining tbat "protection [is] extended to computer programs."); see also Integrated Case Management Services, Inc. v. Digital Transactions, Inc., 920 F.2d In, 173-74 (2d Cir. 1990) (stating that software programs are a protectible trade secret).

46 See L.M. Rabinowitz & Co. v. Dasher, 82 N.Y.S.2d 431, 439 (N.Y. Sup. Ct. 1948) (finding that employee is entitled to take his general knowledge and skill to future employment, thus it is not protected under trade secrets).

47 Lehman v. Dow Jones & Co., 783 F.2d 285, 297 (2d Cir. 1986) (stating that secret information is not "simply information as to a single or ephemeral events in the conduct of the business .. .") .

. 48 1d.

Page 88: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

16 ALB. L.J. SCI. & TECH. IVol.10

the information; (6) the ease or difficulty with which the information could be properly acquired or duplicated by others.49

The New York courts employ these factors. 5o

Although the New York courts, cite the Restatement and men­tion these factors in determining whether particular information is a trade secret, the most important consideration is whether the information is secret.51 Information which is generally known in the trade (or business) or to the public cannot form the basis of a trade secret and its acquisition, use or disclosure by others can cause little or no damage.52

Under this factor, however, absolute secrecy is not required; rel­ative secrecy will be sufficient. 53 Thus, the attribute of secrecy is not lost if the owner of the information revealed it to another for legitimate business purposes, (e.g., disclosure to employees, pro­spective Iicensees).54

When the claimed trade secret relates to a publicly marketed product and is embodied in that product, (i.e., the product's con­stituent elements, the process by which the product was made, engineering benefits derived from particular features of the prod­uct) the secrecy element is not lost for such trade secrets, provided the information is not readily discernible from the product or eas­ily extracted from the product, (i.e., reverse engineering).55 Simi-

49 49 Restatement of Torts § 757, cmt. b. 60 See generally Ashland Management v. Janien, 82 N.Y.2d 395, 407 (1993). 51 See Ashland Management, 82 N.Y.2d at 407 ("a trade secret must first of all

be secret"); Lehman, 783 F.2d at 298 ("Secrecy is a question of fact.") (citation omitted).

52 See National Starch Prods. v. Polymer Indus., 273 A.D. 732, 735 (lst Dep't 1948) ("if the facts pertaining to the matter are a subject of general knowledge in the trade, then any property right has evaporated.").

63 See generally Fairchild Engine & Airplane Corp. v. Cox, 50 N.Y.S.2d 643, 653 (N.Y. Sup. Ct. N.Y. Co., 1944); Q-Co Indus. v. Hoffman, 625 F. Supp. 608, 616 (S.D.N.Y. 1985) (enunciating the rule that to constitute "secret information" only a "'substantial element of secrecy must exist' .. . ") (citation omitted); 1 MILGRIM, supra note 12, § 1.07(2) (1999) .

54 See Riteoff, Inc. v. Contact Indus., 43 A.D.2d 731, 732 (2d Dep't 1973) (stating that plaintiff had a protectible trade secret even though he divulged it to defendant in confidence); Heyman v. AR. Winarick, Inc., 325 F.2d 584, 586-87 (2d Cir. 1963) (explaining that absent an express agreement establishing a confidential relationship between plaintiff and defendant, the circumstances surrounding their dealing could be determinative as to whether a relationship of confidence and trust naturally resulted between the two parties).

65 See Tabor v. Hoffman, 118 N.Y. 30, 37 (1889) (holding that even though it may be legal to copy a publicly marketed product, it is unlawful to copy the pattern of the product); Eagle Comtronics, Inc. v. Pico, Inc., 89 A.D.2d 803, 804 (4 th Dep't 1982) (stating that information in this case is readily accessible, rendering product not a secret); 1 MILGRIM, supra note 12, §§ 1.05(2) & 1.07(1).

Page 89: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 17

larly, where customer lists and customer information are readily ascertainable from directories or other publicly available informa­tion, such information is not protectible, even if the information was amassed with substantial effort.56 Additionally, in situations where the claimed trade secret consists of a combination of several compon'ents, each of which by itself is in the public domain, the combined result can still be protectible, provided it is not gener­ally known or readily discoverable. 57

In addition to the secrecy requirement, New York courts empha­size the need for the trade secret owner to take reasonable precau­tions to prevent disclosure, in order to have a protectible trade secret. 58 It is important to note that only reasonable precautions under the circumstances are required; the owner of the informa­tion does not have to establish that every conceivable precaution was taken.59 Although there is no mandated checklist of mini­mally acceptable precautions, the court will look askance upon measures that are obviously insufficient.60

As to the value factor, New York courts have required only a showing that the trade secret confers a competitive advantage

56 See Leo Silfen, Inc. v. Cream, 29 N.Y.2d 387, 392 (1972) (stating that where "customers are readily ascertainable outside the employer's business ... trade secret protection will not attach ... "); see also Ruesch Infl, Inc. v. MacCormack, 222 A.D.2d 343 (1st Dep't 1995) (holding that plaintiffs information Was easily ascertainable and therefore an unprotected trade secret); Williams Press, Inc. v. Flavin, 44 A.D.2d 634, 637 (3d Dep't 1974) (denying petitioners any compensation because information was readily and easily accessible).

67 See generally Integrated Cash Mgmt. Servs. v. Digital Transaction, 920 F.2d 171, 173-74 (2d Cir. 1990); Imperial Chern. Indust. v. Nat'l Distillers and Chem. Corp., 342 F.2d 737, 742·43 (2d Cir. 1965).

68 See Downtown Women's Ctr., Inc. v. Carron, 237 A.D.2d 209 (1st Dep't 1997) (finding that an unprotected patient list which' was left. on a centralized computer and accessible to everyone does not qualify as a trade secret); Precision Concepts, Inc. v. Bonsanti, 172 A.D.2d 737, 738 (2d Dep't 1991) (finding no cause of action for misappropriation of trade secreta because the plaintiff did not assert precautionary measures in protecting its alleged exclusive knowledge); Delta Filter Corp. v. Morin, 108 A.D.2d 991, 993 (3d Dep't 1985) (explaining that plaintiffs failure to "take rudimentary precautions to prevent employees from acquiring familiarity with the machines" preventa them from claiming protectable trade secrets); Defiance Button Mach. Co. v. C & C Metal Prod. Corp., 759 F.2d 1053 (2d Cir. 1985) (failing to separate source books and failing to erase the lists from computer did not give rise to protectable trade secrets because plaintiff did not take adequate measures to ensure the secrecy of the lists).

69 See 1 MILGRIM, supra note 12, § 1.04. 60 See Delta Filter Corp., 108 A.D.2d at 993-94; Michael J. Hutter, Trade

Secret Protection: The Requirement of Reasonable Efforts to Maintain Secrecy in Trade Secret Protection and Litigation, 340 PLl 97 (June, 1992).

Page 90: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

18 ALB. L.J. SCI. & TECH. [Vol. 10

over others who do not have it.61 Such showing can generally be met by proof establishing the secrecy and reasonable precautions factors.62 In that regard, "novelty" or "non-obviousness," as these terms are used in patent law, are not required.63 However, some element of invention or discovery is necessary to assure that the information is not publicly known or cannot be readily ascer­tained, lest the information fail to meet the secrecy element.64

Generally, the value factor is not one that causes problems or raises concern.

In sum, although New York courts profess to determine whether particular information is protectible as a trade secret by using the six Restatement factors, they generally emphasize the secrecy and reasonable precaution factors. Indeed, the presence, or absence, of these factors is usually dispositive of a trade secrets claim. None­theless, some courts will consider all six factors66, and still others will emphasize the use factor.66 As a result, some commentators have observed that exactly what "constitutes a trade secret [in New York] is still unclear."67

Misappropriation: Having established the existence of a trade secret, there must

then be proof that the trade secret was misappropriated, (i.e., the alleged misappropriator acquired, used or disclosed the informa-

61 See generally Franke v. Wiltschek, 209 F.2d 493 (2d Cir. 1953); Sheridan v. Mallinckrodt, Inc., 568 F. Supp. 1347, 1352 n.7 (N.D.N.Y. 1983) (indicating that in order to constitute a trade secret, the information must provide a competitive advantage to the owner).

62 See Spiselman v. Rabinowtiz, 61 N.Y.S. 2d 138, 141 (1" Dept 1946) (finding that plaintiff showed he had a property right in the secret formula and defendant did not obtain this formula innocently); Minnesota Mining & Mfg. Co. v. Technical Tape Corp., 23 Misc.2d 671, 679-82 (Sup. Ct. Westchester County 1959).

63 See Softel, Inc. v. Dragon Med. and Scientific Communications, Inc., 118 F.3d 955, 968 (2d Cir. 1997) (cautioning the district court on its use of the word "novelty").

64 See 1 MILGRIM, supra note 12, § 1.08(2). 65 See United States v. Int'I Bus. Mach., 67 F.R.D. 40, 46-47 (S.D.N.Y. 1975)

(describing the six factors of secrecy to be considered when determining if given information ought to be treated as a trade secret).

66 See Lehman v. Dow Jones & Co., 783 F.2d 285, 298 (2d Cir. 1986) (explaining that even if confidential information doesn't qualify as a trade secret, a cause of action may arise if the information is later used in a manner that breaches the confidence).

67 See Neufeld, supra note 6 at 912-13; see also Steven R. Kramer, Protecting Dissemination of Business Secrets During Discovery, N.Y. B.J., Jan. 1997, at 24.

Page 91: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 19

tion improperly or wrongfully).68 Unlike patent law, establish­ment of a trade secret does not give one the right to exclude all others from acquiring, using or disclosing the trade secret, regard­less of how they came upon it. Rather, the trade secret owner is only given protection against one who uses improper or wrongful means to obtain the trade secret.69

There are two legally permissible ways in which a firm can learn or otherwise acquire another firm's trade secret. First, one may discover another's trade secret independently!O For exam­ple, in a situation where Y's information is identical to X's infor­mation and was developed after X's information was created, X cannot enjoin Y's use of the information so long as Y developed it through its own independent efforts. The trade secret may also be ascertained through publicly available literature.7l Secondly, a party may "reverse engineer" a product in order to learn the trade secret involved with it. This refers to the process by which one analyzes another's product in order to determine its nature or spe­cific content!2 For example, in a situation where Y purchases X's product and by working with and analyzing the product ascertains the process by which the product was manufactured, X cannot pre­clude Y from using this process even though this process other­wise meets the prerequisites of a trade secret.

68 See Kaumagraph Co. v. Stampagraph Co., 235 N.Y. 1, 6-7 (l923) (ruling that the determinative question in the case was whether the defendant acquired its knowledge of the secret through two of its employees who had previously worked for the plaintift); see generally Tabor v. Hoffman, 118 N.Y. 30 (1889); see also Spiselman v. Rabinowitz, 270 A.D.2d 548, 550-51 (lst Dep't 1946)(holding that anyone who learns of an unprotected secret in his or her capacity as an employee is under a duty not to disclose that secret, even if there is no non­disclosure contract); Ferranti Elec. Inc. v. Harwood, 43 Misc. 2d 533, 539-40 (Sup. Ct. Nassau Co. 1964) (holding that when determining whether or not a trade secret deserves protection, the court must first look at how it was acquired); Integrated Cash Management Serv., Inc. v. Digital Transactions Inc., 920 F.2d 171, 173 (2d Cir. 1990) (ruling that in order to prove trade secret misappropriation, a plaintiff must show it had a secret, and that the defendant obtained it through a breach of an agreement, duty or confidence).

69 See Integrated Cash Mgmt. Servo V. Digital Transactions, 920 F.2d. 171, 173 (2"' Cir. 1990) (noting that the individual defendant had misappropriated trade secrets).

70 See Minnesota Mining & Mfg. Co. v. Technical Tape Corp., 23 Misc.2d 671, 679 (Sup. Ct. Westchester Co. 1959).

71 See Ashland Mgmt. Inc. V. Janien, 82 N.Y.2d 395, 407 (1993) (stating that the alleged secret information could be reproduced based on plaintiffs public disclosures).

72 See Tabor, 118 N.Y. at 36 (noting if one finds out a secret through lawful analysis, he may use it without interference from the courts).

Page 92: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

20 ALB. L.J. SCI. & TECH. [Vol. lO

It is clear that no catalogue of what constitutes improper or wrongful means can be compiled." The following statement by the United States Court of Appeals for the Fifth Circuit is equally applicable in New York: '''Improper' will always be a word of many nuances, determined by time, place, and circumstances. We therefore need not proclaim a catalogue of commercial improprie­ties."74 However, the New York decisions identify three categories of improper or wrongful means.

It is well established that the test of improper conduct is satis­fied when one who stands in neither a fiduciary nor a confidential relationship acquires a trade secret by means that are "indepen­dently unlawful."75 Such means include: "theft, trespass, bribing or otherwise inducing employees or others to reveal the informa­tion in breach of duty, fraudulent misrepresentations, threats of harm by unlawful conduct, wiretapping, procuring one's own employees or agents to become employees of the other for purposes of espionage .... "76

New York courts also recognize that improper means have been employed when one uses for his or her own purposes a trade secret revealed under an obligation, express or implied, not to use it.77 Such a duty will be found to exist between employer and

73 RESTATEMENT OF TORTS, § 757, cmt. f (1939); cf. Guard·Life Corp. v. S. Parker Hardware Mfg. Corp., 50 N.Y.2d 183, 189-190 (1980) (looking to the Restatement of Torts as a guideline, but determining that these types of cases have to be decided based on the facts of each case individually. There is no set formula for determining what constitutes improper means); Electrolux Corp. v. Val·Worth, Inc., 6 N.Y.2d 556, 568 (1959) (stating that the court has not found any "cases where the issue of definition of wrongful means has been squarely presented and decided").

7. E.!. duPont deNemours & Co. v. Christopher, 431 F.2d 1012, 1017 (5th Cir. 1970), (concluding that espionage ... is an improper method of discovering a trade secret).

76 See Eastern Extracting Co. v. Greater New York Extracting Co., 110 N.Y.S. 738 (2d Dep't 1908) (ruling that it is improper to seek employment with a company for the sole means oflearning and stealing its trade secrets); Franke v. Wiltschek, 209 F.2d 493, 495 (2d Cir. 1953) (ruling that even if discovery of a secret may be possible by fair means, it does not justifY misappropriation by unfair, unlawful means); Telerate Sys. v. Caro, 689 F. Supp. 221 (S.D.N.Y. 1988) (holding that acquiring a secret by tapping into a computer with an unauthorized line monitor is improper).

76 RESTATEMENT OF TORTS § 759, cmt. c (1939). 77 See L.M. Rabinowitz Co. v. Dasher, 82 N.y.s.2d 431, 435 (Sup. Ct. N.Y. Co.

1948) (stating that an employee will be held liable for divulging trade secrets even ifthe obligation to hold such secrets in confidence was not expressly written in their employment contract. Such an obligation will be implied).

Page 93: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 21

employee, prospective licensor and licensee and prospective merger partners!S

Finally, it would appear that the New York courts would also find that improper means are employed when the acquisition of the trade secret occurred in a way that offends standards of com­mercial ethics, even if no specific independent wrongful conduct was involved!· The Restatement of Torts likewise recognizes this category of improper means.so

Third parties not in privity with a trade secret owner who obtain the trade secret may be liable for trade secret misappropri­ation if they know or had reason to know that they obtained the trade secret from someone who had acquired or disclosed it unlaw­fully.s1 Absent such actual or constructive knowledge, the third party would not be liable for the use or disclosure of another's trade secret.S2

Proposed § 279-n: Proposed § 279-n, which is the definitional section of the pro­

posed Act, is the cornerstone of the Act. The section actually does more than merely provide definition. It is substantive in nature; it sets forth in conjunction with proposed §§ 279-0 and 279-p the two basic elements of establishing liability for trade secrets mis­appropriation through its definitions of "improper means" (subdi­vision 1), "misappropriation" (subdivision 2), "person" (subdivision 3), and "trade secret" (subdivision 4). Like the common law, the section provides in essence that liability for trade secrets misap-

78 See generally Byrne v. Barrett, 268 N.Y. 199 (1935) (ruling that it is an absolute duty of an employee to keep trade secrets in confidence, even after employment is terminated); see Heyman v. Winarick, Inc., 325 F.2d 584 (2d Cir. 1963); see Speedry Chern. Prods., Inc. v. Carter's Ink Co., 306 F.2d 328 (2d Cir. 1962) (holding that during the negotiations for a license agreement, a confidential relationship existed between the parties).

79 See Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 481 (1974) (explaining that "commercial ethics and the encouragement of inventions are the broadly stated policies behind trade secret law"); see also E.!. duPont de Nemours & Co. v. Christopher, 431 F.2d 1012, 1013 (5 th Cir. 1970).

80 See RESTATEMENT OF TORTS § 757, cmt. f (1939). 81 See Tabor v. Hoffman, 118 N.Y. 30 (1889); see also Lamont, Corliss & Co. v.

Bonnie Blend Chocolate Corp., 135 Misc. 537, 539 (Sup. Ct. N.Y. Co. 1929) (ruling that "one who learns a trade secret from another who is pledged to secrecy may be enjoined from using it"); see also Computer Assoc. Int'l v. Altai, Inc., 982 F.2d 693, 718 (2d Cir. 1992) (holding that the third party does not need to have actual notice that the information they received was acquired unlawfully. Constructive notice is sufficient).

82 See Conmar Prods. Corp. v. Universal Slide Fastener Co., 172 F.2d 150 (2d Cir. 1949) (noting that one cannot be held liable for consequences they were not aware of).

Page 94: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

22 ALB. L.J. SCI. & TECH. [Vol. 10

propriation requires proof of (1) the existence of a trade secret and (2) the acquisition of the trade secret by a party by improper con­duct or wrongful means. However, as described below, proposed § 279-n makes several desirable changes from the common law.

Trade Secret (Subdivision 4): Subdivision 4 sets forth three elements as the basis of the trade

secret definition. First, a trade secret must be information; sec­ond, it must have actual or potential independent economic value based on its secrecy; and third, reasonable efforts have been main­tained to protect its secrecy. This definition closely follows the common law, with the following changes:

(1) The Restatement of Torts definition tacitly recognized that a trade secret is information.83 Although the Restatement provides examples of categories of information that are protectible84, the addition of the words "including but not limited to" into proposed § 279-n indicates the examples are not intended to be exclusive. The Restatement of Torts lists "formula, pattern, device or compi­lation of information"85; subdivision 4 adds "data, program, method and technique" to the list. This is done to accommodate modern technology, (e.g., "data" and "program") as recognized by the courts. "Methods" and "techniques" are added to insure that the concept of "know-how," recognized in several cases as knowl­edge gained by an employee during employment, is protectible information.86 "Technical and non-technical" is added as a preface to ensure that the common law treatment of non-technical infor­mation as protectible subject matter continues.

Under present law, "methods" and "techniques," (e.g., know­how) do not include general knowledge or skill gained in the nor-

83 See Ramon A. Klitzke, The Uniform Trade Secrets Act, 64 MARQ. L. REV.

277, 285--86 (1980) (explaining that while the Restatement of Torts did not "provide a black letter definition of a trade secret" ... "it did tacitly recognize, by its choice of example, that a trade secret is information."),

84 See RESTATEMENT OF TORTS § 757 cmt.b at 5 (1939) ("A trade secret may consist of any formula, pattern, device or compilation of information which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it."),

86 Id. 86 UNIF. TRADE SECRETS ACT § 1 cmt. (1985), 14 U.L.A. 433, 439 (1990).

Page 95: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 23

mal course ofemployment.87 Consequently, the need to draw dis­tinctions between the two categories will continue.88

Unlike the Restatement of Torts, the information does not need to be in continuous use to be protectible.89 Thus, information con­cerning a single event which has passed, or short-lived informa­tion or information that has not yet been put to use, can be protectible.90 Such information can certainly be valuable, and there is no reason to exclude it categorically from protection sim­ply because it is not in "continuous use." Similarly, "negative know-how," (i.e., knowing what not to do) is potentially pro­tectible.91 Cases that hold that such types of information do not constitute protectible trade secret subject matter are overruled.

(2) The second definitional element is that to be protectible the information must have "economic value, actual or potential." Such value is derived from the information "not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use." In other words, the information must derive its value from being secret.

This definitional element is consistent with present law, and present case law will continue to have precedential value. Thus, there is only a requirement of relative secrecy, not absolute secrecy. Information which is generally known within the indus­try cannot be protected as a trade secret,92 nor can information which is readily ascertainable through reverse engineering or inspection.93 Like present law, by focusing on the element of

87 RESTATEMENT (THrnD) OF UNFAIR COMPETITION § 42 cmt. d (1995) ("Information that forms the general skill, knowledge, training, and experience of an employee cannot be claimed as a trade secret by a former employer even when the information is directly attributable to an investment of resources by the employer in the employee.").

88 See id. ("Whether partiCUlar information is properly regarded as a trade secret of the former employer or as part of the general skill, knowledge, training, and experience of the former employee depends on the facts and circumstances of the particular case.").

89 See RESTATEMENT OF TORTS § 757, cmt. b. 90 See Klitze, supra note 83, at 2!J8. 91 See Cundiff, supra note 8, at 35 (explaining that a "deadend" could be

categorized as a protected trade secret as "[k)nowing what does not work can tell a competitor what not to waste money on").

92 See Klitze, supra note 83, at 289. 93 See E.I. duPont deNemours & Co. v. Christopher, 431 F.2d 1012, 1015

(1970) ("One may use his competitor's secret if he discovered the process by reverse engineering applied to the finished product; one may use a competitor's process if he discovers it by his own independent research.").

Page 96: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

24 ALB. L.J. SCI. & TECH. [Vol. 10

secrecy, the Act does not require any showing of novelty to estab­lish value.

It should also be noted that potential value will suffice. This is consistent with the information element, which does not impose any use requirement.

(3) The third definitional element carries over the common law requirement that there be reasonable efforts undertaken to pro­tect and maintain the information's secrecy.

In sum, the definition sets forth three distinct elements of a trade secret. Although the definition does not sharply delineate the boundaries of what constitutes a trade secret, the definition does overcome the objection that present law, with its emphasis on considering generally several factors, leads to uncertainty. Moreover, its specification of the three elements is consistent with the better-reasoned New York decisions and overcomes several objectionable features of present law discussed above.

Misappropriation (Subdivision 2): Under the proposed Act, misappropriation of a trade secret

must be established before liability is imposed. Subdivision 2 specifies the instances in which misappropriation will occur. Because misappropriation as defined turns in part upon "improper means," which is defined in subdivision 1, these two subdivisions must be considered together.

To prove a misappropriation, the trade secret owner must show that the alleged misappropriator (l)acquired trade secret know­ing or having reason to know it was acquired by "improper means"; or (2) used or disclosed the trade secret without consent and used "improper means" to acquire the "trade secret"; or (3) acquired the trade secret from a third person rather than from the owner of the trade secret and knew of or should have known that the trade secret was either obtained by the third person by "improper means" or the third person was under a duty to keep it secret.

Additionally, misappropriation may be present with respect to a person who uses or discloses a trade secret acquired through acci­dent or mistake. In such a situation, misappropriation will be established only if the person knows or has reason to know that the information was a trade secret and that such actual or con­structive knowledge of the trade secret was acquired by accident or mistake; that the alleged misappropriator's actual or construc­tive knowledge occurred before there is any material change in the alleged misappropriator's position. Misappropriation will be

Page 97: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 25

defeated if the accident or mistake was due to a failure by the trade secret owner to employ reasonable efforts to maintain secrecy.94

Subdivision 1, "Improper means," continues present law, as based on the Restatement of Torts, with two exceptions. The exceptions are desirable changes from present law.

First, under this subdivision, but not under the Restatement of Torts, a person's improper acquisition of a trade secret, absent subsequent use or disclosure, is actionable as a misappropria­tion.9' In such a situation, there is no reason why the acquirer of a trade secret should be able to avoid liability.

Second, under this subdivision, a person who continues to use or disclose a trade secret after hearing of its initial improper acquisi­tion is subject to liability, even if the person had paid value for the trade secret or had substantially changed his or her position before receiving the notice. However, the Restatement of Torts provides that a person who innocently acquires a trade secret and subsequently learns that the original acquisition was improper (or a mistake) is not liable, even for subsequent use or disclosure, if the person had in good faith paid value for the information or otherwise substantially changed their position prior to receipt of notice.96 This subdivision gives more protection to the owner and is thus desirable. Any unfairness to the acquiring person is ame­liorated by § 279-0 (2). Under this subdivision, which recognizes the fact that an innocent person has paid value or has substan­tially changed his or her position before learning of the improper acquisition is relevant to whether an injunction is granted.97

9. See generally UNIF. TRADE SECRE'I'S ACT § 7, cmt. (1985), 14 U.L.A. 433, 463 (1990).

95 Compare RESTATEMENT OF ToRTS § 757 (1939) ("One who discloses or uses another's trade secret, without a privilege to do so, is liable to the other if . ... ") with 279·n(2) § 2 ("Misappropriation means: (a) acquisition of a trade secret .. . by improper means; or (b) disclosure or use of a trade secret of another without express or implied consent by a person who ... .") (emphasis added). See also RESTATEMENT (TruRD) OF UNFAIR COMPETITION § 40 cmt. b (1995) (explaining that the first Restatement of Torts imposed liability only for wrongful use or disclosure of another's trade secret but not for its independent improper acquisition, and stating that § 40 of the new Restatement, consistent with the UTSA, changes that rule).

96 See RESTATEMENT OF TORTS § 758(b) (1939). 97 See UNIF. TRADE SECRE'I'S ACT § 2(b) (1985), 14 U.L.A 433, 449 (1990)

(stating that "[iJn exceptional cicumstances, an injunction may condition future use upon payment of a reasonable royalty for no longer that the period of time for which use could have been prohibited . . . includ[ing) . . . a material and

Page 98: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

26 ALB. L.J. SCI. & TECH. [Vol. 10

In sum, the provisions of subdivision 2, defining misappropria­tion, continue present law, with two desirable changes.

"Improper Means" (Subdivision 1): As noted above, the definition of misappropriation relies heavily

upon the definition of "improper means." Subdivision 1 provides the definition for "improper means."98 It is fully consistent with present law.

Thus, the specification of "theft," "bribery," "misrepresentation," "espionage" or "inducement of a breach of a duty to maintain secrecy" follows the cases that recognize such independently tor­tious or criminal conduct as "improper." The "breach of a duty to maintain secrecy" follows the cases that predicate an "improper" finding on such conduct. The term "other means" following espio­nage through electronics, as in present law, gives the courts the flexibility to condemn devious forms of obtaining trade secrets, which fall short of proper means such as independent develop­ment or reverse engineering.99

"Person" (Subdivision 3): As for the "person" who owns a trade secret or is accused of mis­

appropriation, subdivision 3 provides a definition.lOo As can be seen, the definition is expansive. There is no reason to limit the persons who could own a trade secret or be misappropriators.

Variations From Uniform Trade Secrets Act: UTSA § 1 sets forth the definitions for the Uniform Trade

Secrets Act. Subdivisions (1) and (2) are identical to UTSA § l(a)(b). Subdivision (3) is identical to UTSA § l(c), except that it adds "limited liability company," a recent statutory creation. WI

Subdivision (4) is identical to UTSA § l(d), except that it adds "technical or non-technical," which is done to ensure that non-

prejudicial change of position prior to acquiring knowledge or reason to know of misappropriation that renders a prohibitive injunction inequitable.").

98 See UNIF. TRADE SECRE'fS ACT § 1(1) (1985) (defining improper means as "theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means").

99 See E.!. duPont deNemours & Co. v. Christopher, 431 F.2d 1012, 1015·1016 (5th Cir. 1970).

100 See UNIF. TRADE SECRETS ACT § 1(3) (1985) (defining "person" as a "natural perSOll, corporation, business trust, estate, trust, partnership, association, joint venture, government, governmental subdivision or agency, or any other legal or commercial entity").

101 See N.Y. LTD. LIAB. Co. LAw § 102 (m) (Consol. Supp. 1999) (defining "limited liability company" as "an unincorporated organization of one or more persons having limited liability for the contractual obligations and other liabilities of the business").

Page 99: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 27

technical information will be deemed protectible subject matter. 102

C. Commentary To Proposed § 279·0

Present Law: It is well established in New York that the remedies available

for the misappropriation of a trade secret include injunctive relief and monetary damages. ,o3 In appropriate cases, a court may order both.,00

From the standpoint ofthe trade secret owner, injunctive relief restraining future use and disclosure of a misappropriated trade secret is especially desirable. Such relief protects against addi­tional harm to the owner of the trade secret from further unau­thorized use or disclosure of the trade secret, and permits the court to fashion the relief so as to deprive the misappropriator of any further benefit from its misappropriation.

The trade secret owner may obtain preliminary injunctive relief to enjoin either actual or threatened misappropriation during the pendency of its trade secret misappropriation action. Pursuant to Article 63 of the Civil Practice Law and Rules (CPLR), such relief may be granted upon a showing of a likelihood of success on the merits; irreparable harm absent the injunction; and that a balanc­ing of the equities favors the issuance of the injunction.105 These

102 UNlF. 'l'RAnE SECRETS Acr § 1 (1985), 14 U.L.A. 433, 438 (1990); see also UNIF. 'l'RAnE SECRETS Acr § 4 (noting that formulas, patterns, complications, programs, devices, methods, techniques, and processes as what may be regarded as trade secrets).

103 See Spiselman v. Rabinowitz, 270 A.D. 548, 551 (ist Dep't 1946) (stating that "[wlhere ... one's property rights are infringed, .. .if he so elects, [hel may bring an action at law to recover money damages for the injury.).

104 See id. (noting that a plaintiff has a property right in their trade secret and is entitled to full protection from injury when it wrongfully falls into the hands of a defendant).

105 See U.S. Reinsurance Corp. v. Humphreys, 205 A.D.2d 187, 191 (1st Dep't 1994) (noting that injunctive relief was granted to a plaintiff against a defendant, a former corporate director of the plaintiff corporation, when the defendant resigned and inlmediately sought out the plaintiffs' clients for his own business); see also Nassau Soda Fountain Equip. Corp. v. Mason, 118 A.D.2d 764, 765 (2d Dep't 1986) (finding that plaintiffs would most likely prevail on the merits based on the fact that the defendants breached a fiduciary duty by starting their own soda company while still employed with the plaintiff); see also McLaughlin v. Nolan & Co., 114 A.D.2d 165, 172-75 (2d Dep't 1986) (granting injunctive relief when defendants started their own securities brokerage firm while still working for plaintiff corporation).

Page 100: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

28 ALB. L.J. SCI. & TECH. IVol.10

are the traditional elements for obtaining injunctive relief. 106

Additionally, if it is shown that "immediate and irreparable injury, loss or damage will result unless the defendant is restrained before the hearing [on the preliminary injunction] can be had," a temporary restraining order may be issued. lo7

A permanent injunction against the use or disclosure ofthe mis­appropriated trade secret may be issued as part of the final judg­ment.10S As in other actions, the prerequisites are a showing of irreparable harm in the absence of such relief and the inadequacy of a remedy at law. lOS

There is authority that permanent injunctive relief should be vacated once the trade secret becomes public knowledge.Ho How-

106 See W.T. Grant Co. v. Srogi, 52 N.Y.2d 496, 517 (1981); seegernlrally DAVID D. SIEGEL, NEW YORK PRACTICE § 327 (3d ed. 1999) (stating that CPLR § 6301 authorizes a preliminary injunction when it appears that the defendant threatens or is about to do an act in violation of the plaintiffs rights respecting the subject of the action, which would render a judgment ineffectual; or where the defendant continues an act which would produce injury to the plaintiff if committed during a pending action).

107 See N.Y. C.P.L.R. §§ 6301, 6313(a) (McKinney 1980); see also Siegel, supra note 106, § 330.

108 See gernlrally Allan Dampf, P.C. v. Bloom, 127 A.D.2d 719 (2d Dep't 1987) (affirming an injunction against the defendant dentist who took the names of the patients from his former employer while stin working at this office and solicited their business after being fired for this wrongful conduct); see also Reforce Steel & Wire Corp. v. Sigona, 23 A.D.2d 882 (2d Dep't 1965) (affirming an injunction against defendant for using certain machinery which plaintiff specially made for their own uee at a considerable expense); Bee alBa Eastern Extracting Co. v. Greater New York Extracting Co., 126 A.D. 928 (2d Dep't 1908) (restraining defendants from using the plaintift's alcohol-extracting processes); see also Minnesota Mining & Mfg. Co. v. Technical Tape Corp., 23 Misc.2d 671, 689 (Sup. Ct. Westchester Co. 1959) (granting injunction to plaintiff when defendant gained plaintiffs trade secrets and manufacturing processes and used them under a different name of a similar product).

109 See McCall Co. v. Wright, 198 N.Y. 143, 155 (1910) (placing emphasis on these two factors including whether the defendant may possess any extraordinary trait that would unduly hurt the moving party); see also Spiselman v. Rabinowitz, 270 AD.2d 548 (noting that when one's property rights are infringed, they are not bound to seek an equitable remedy, but may do so if a legal remedy is inadequate); see gernlrally 67 NY JUR. 2d, Injunctions §§ 42, 43 (1988) (defining "irreparable injury" as one which cannot adequately be compensated in damages, and stating that an injunction will not be granted if there is an adequate remedy of law.)

110 See Timely Prods. Corp. v. Arron, 523 F.2d 288, 304 (2d Cir. 1975) (measuring the amount of damages as whatever the plaintiff sustained until the time the information became public); see also Conmar Product Corp. v. Universal Slide Fastener Co., 172 F.2d 150 (2d Cir. 1949); cf" Ferber v. Stemdent Corp., 51 N.Y.2d 782 (1980) (denying injunction because plaintiffs idea and device "were not novel [and] ... became part of the public domain by ... subsequent patents and publications'); see gernlrolly Laurie Visual Etudes, Inc. v. Chesebrough-

Page 101: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 29

ever, based on out-of-state cases, there is some support in New York for the proposition that even if the trade secret has become public, an injunction may continue up to the length of time in which the misappropriator could have duplicated the trade secret independently.ll1 In addition, there is authority for the proposi­tion that the injunction will remain in effect even though the trade secret has entered the public domain in order to punish the misap­propriator because of its unethical behavior.H2 These cases are fully discussed elsewhere!,a Thus the question of whether an injunction must be vacated once the trade secret becomes public is not subject to a clear-cut answer in New York.

There is limited authority for the proposition that injunctions should not be issued when an important public interest is at stake, or it would be unreasonable or inequitable to enjoin the use of a trade secret. 114 In such a situation, royalty payments can be compelled to be made for any future use of the trade secret.u5

A court may order additional measures as part of its equitable relief. Such relief can include the surrendering of physical embod­iments of the trade secretj116 assignment of a patent or patent application on the trade secret j117 and perhaps, the destruction of products made through use of the trade secret.llS

Pond's, Inc., 83 A.D.2d 505 (1st Dep't 1981) (finding that a defendant could have obtained the trade secreta through the patent of a device and by use of ita own resources).

111 See Web Graphics, Inc. v. Jos. Hunkeler, Ltd., 682 F.2d 59 (2d Cir. 1982) 112 See Franke v. Wiltachek, 209 F.2d 493, 496 (2d Cir. 1953) (stating that

relief should be limited to either damages or injunction for "the period until the trade by legitimate means haa caught up with the plaintiff and their secret haa become general"); but see Laurie Visual Etudes, Inc. v. Chesebrough-Pond's, Inc., 83 A.D.2d 505, rev'd, 105 Misc.2d 413, 420-21 (Sup. Ct. N.Y. Co. 1980) (remanding in order to allow lower court to decide whether defendant did in fact breach a fiduciary duty during the course of negotiations with plaintiff).

113 See 4 RODER M. Mn.oRIM, Mn.oRIM ON TRADE SECRETS, § 15.02 (3) (1999); see gem rally Ruth E. Leistensnider, Trade Secret Misappropriation: What Is The Proper Length of an Injunction ~er Public Disclosure?, 51 ALB. L. REv. 271 (1987).

114 See Republic Aviation Corp. v. Schenk, 152 U.S.P.Q. 830, 835 (N.Y. Sup. Ct. Special Term, Suffolk Co. 1967).

116 See id. 116 See General Aniline & Film Corp. v. Frantz, 50 Misc.2d 994, 1003 (N.Y.

Sup. Ct. Broome Co. 1966). 117 Id. 118 See 4 Mn.oRIM, supra note 113, § 15.02(4) at 15-226.

Page 102: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

30 ALB. L.J. SCI. & TECH. [Vol. 10

Finally, it is worth remembering that disobedience of any part of the injunction can lead to a finding of contempt.119

In sum, New York is especially responsive to the needs of the trade secret owner in fashioning the most appropriate equitable relief. It recognizes that injunctive relief can be tailored to meet the needs of the particular case. There is, however, some uncer­tainty as to how long an injunction may continue upon public dis­closure of the trade secret.

Proposed § 279-0: Proposed § 279-0 provides for the issuance of injunctive relief in

a trade secret misappropriation case to enjoin actual or threatened misappropriation. Such relief is available in lieu of, or in addition to, compensatory damages pursuant to proposed § 279-p. The proposed section also provides standards for the length of injunctions, the alternative of royalty payments, and affirmative acts.

Subdivision (1):

Subdivision (1) furthers present New York law by providing for enjoining actual or threatened trade secret misappropriation. Such relief, whether it be temporary, preliminary or permanent, will be available when appropriate, as determined by Article 63 of the CPLR and basic principles of equity. The injunction must be drafted with sufficient specificity to provide the misappropriator fair notice of what conduct is prohibited.'20

Subdivision (1) also provides a standard for the duration of injunctions. Under its provisions, the injunction shall be vacated once the trade secret ceases to exist, except where continuation is necessary to elinlinate any commercial advantage that a misap­propriator might obtain through its misappropriation. This provi­sion works to deprive the misappropriator of any head start gained over other competitors due to the misappropriation. Thus, under this subdivision, a court which permanently enjoined use and disclosure would have to terminate such injunction upon proof that the misappropriated trade secret is no longer secret, except where continuation was needed to eliminate an improper lead time advantage.

119 See Dampf, P.C. v. Bloom, 127 A.D.2d 719 (2d Dep't 1987) (stating that contempt may be based on violation of temporary restraining order).

120 See 67 N.Y. JUR. 2D, 11\iunctions § 165 (noting that for an injunction order or decree to be enforceable, "it must define specifically what the enjoined person must or must not do").

Page 103: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 31

Although present law recognizes that an injunction should not continue once the trade secret becomes public, in the absence of any direct precedent, it is not clear whether present New York law would sanction the limited "lead time" exception. This exception is preferable to an unconditional termination, as it properly bal­ances the competing interests of the trade secret owner, the mis­appropriator, and the public's interest in competition. 121

Subdivision (2): Where an injunction would be unreasonable or inequitable, i.e., "exceptional circumstances," Subdivision (2) authorizes a court to condition further use on the payment of a reasonable royalty during the time an injunction would otherwise have been appropriate. As more fully described in UTSA § 2, Comment:

Exceptional circumstances include the existence of an overriding public interest which requires the denial of a prohibitory injunc­tion against future damaging use and a person's reasonable reli­ance upon acquisition of a misappropriated trade secret in good faith and without reason to know of its prior tnisappropriation that would be prejudiced by a prohibitory injunction against future damaging use. Republic Aviation Corp. v. Schenk, 152 USPQ 830 (N.Y. Sup. Ct. Special Term, Suffolk Co. 1967) illus­trates the public interest justification for withholding prohibitory injunctive relief. The court considered that enjoining a misap­propriator from supplying the U.S. with an aircraft weapons con­trol system would have endangered military personnel in Viet N am. The prejudice to a good faith third party justification for withholding prohibitory injunctive relief can arise upon a trade secret owner's notification to a good faith third party that the third party has knowledge of a trade secret as a result of misap­propriation by another. This notice suffices to make the third party a misappropriator thereafter under Section 1. In weighing an aggrieved person's interests and the interests of a third party who has relied in good faith upon his or her ability to utilize infor­mation, a court may conclude that restraining future use of the information by the third party is unwarranted. With respect to innocent acquirers of misappropriated trade secrets, [proposed § 279·0] is consistent with the principle of 4 Restatement Torts (First) § 758(b) (1939), but rejects the Restatement's literal confer­ral of absolute immunity upon all third parties who have paid value in good faith for a trade secret misappropriated by another. The position taken by the Uniform Act is supported by Forest Lab· oratories, Inc. v. Pillsbury Co., 452 F.2d 621 (7th Cir. 1971) in which a defendant's purchase of assets of a corporation to which a

121 See RESTATEMENT (THIRD) OF UNFAIR COMPETITION, § 44, cmt. f.

Page 104: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

32 ALB. L.J. SCI. & TECH. [Vol. 10

trade secret had been disclosed in confidence was not considered to confer immunity upon the defendant.

When [proposed § 279-01 applies, a court has discretion to sub­stitute an injunction conditioning future use upon payment of a reasonable royalty for an injunction prohibiting future use. Like all injunctive relief for misappropriation, a royalty order injunc­tion is appropriate only if a misappropriator has obtained a com­petitive advantage through misappropriation and only for the duration of that competitive advantage. In some situations, typi­cally those involving good faith acquirers of trade secrets misap­propriated by others, a court may conclude that the same considerations that render a prohibitory injunction against future use inappropriate also render a royalty order injunction inappro­priate. See, generally, Prince Manufacturing, Inc. u. Automatic Partner, Inc., 198 USPQ 618 (N.J. Super. Ct. 1976) (purchaser of misappropriator's assets from receiver after trade secret disclosed to public through sale of product not subject to liability for misappropriation).122

This subdivision is consistent with and clarifies present New York law.

Subdivision (3):

The provisions of this subdivision (3) authorize the court to order additional, affirmative steps, which in the circumstances presented, are deemed necessary to give as complete as possible relief to the trade secret owner. It is consistent with New York law.

Variations From Uniform Trade Secrets Act: UTSA § 2 sets forth the Uniform Trade Secret Act's injunctive

relief provisions.12a Proposed § 279-0 is identical to UTSA § 2, with three exceptions, none of which effects any substantive change.

First, "temporarily, preliminarily, or permanently" is added to the proposed section to reflect fully current practice. Although such relief is clearly implicit in UTSA § 2, it is preferable to state so expressly. Second, instead of "terminated," "vacated" is used. The use of "vacated" is consistent with New York terminology.124 Third, the language of subdivision (3) is changed to reflect New York terminology and practice.

122 See Prefatory Note, supra note 16. 123 UNlF. 'l'RAnE SECRETS ACT § 2. 124 See N.Y. C.P.L.R. § 6314 (McKinney 1980)

Page 105: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT

D. Commentary To Proposed § 279·p

Present Law: Compensatory Damages:

33

It is well established that compensatory damages may be awarded in trade secret misappropriation cases. "5 They are available in addition to, or in lieu of, an injunction."B AP. with injunctive relief, monetary recovery for misappropriation is appro­priate only for that limited period during which a trade secret is entitled to protection. '27

The two basic measures of recovery are the losses sustained by the trade secret owner, and the profits or other benefits gained by the misappropriation through the use of the misappropriated trade secret. "B The trade secret owner may recover under either theory, but not both; otherwise there would be a double recov­ery."9 Although double recovery is not pennitted, the two meas­ures of damages may be applicable, in turn, to different elements of damages in the same case. lao Thus, the owner may recover its consequential damages (e.g. expenses incurred), and the misap­propriator's profits, the former under a loss to owner theory, and the latter under a benefit to misappropriator theory.,a, Courts

125 See Town & Country House & Home Servo v. Newbery, 3 N.Y.2d 554, 561 (1958); see SpiseJman V. Rabinowitz, 270 A.D.2d 548 (lst Dep't 1946); see also Support Sys. Assocs., Inc. v. Tavolacci, 135 A.D.2d 704 (2d Dep't 1987) (stating that trial court was correct in awarding the plaintiff damages in the amount that the plaintiff would have made except for the defendant's wrong); see generally 4 MILGRIM, supra note 113, § 15.02(3).

126 See Duramark Inc. v. Stenholm, 30 N.Y.2d 911 (1972); see Spiselman V.

Rabinowitz, 270 A.D.2d 548 (1st Dep't 1946). 127 See Ferber V. Stemdent Corp., 51 N.Y.2d 782 (1980); see Construction

Tech. v. Lockformer Co., 704 F. Supp. 1212, 1225 (S.D.N.Y. 1989) (expressing that "once the information is no longer secret or confidential J there is no property to protect").

128 See A.F.A. Tours V. Whitchurch, 937 F.2d. 82, 87 (2d Cir. 1991) ("The amount of damages recoverable in an action for misappropriation of trade secrets may be measured either by the plaintiff's losses, .... or by the profits unjustly received by the defendant").

lZ9 See Computer Assocs., 982 F.2d at 720 (explaining that plaintiff "may not obtain a double recovery where the damages for copyright infringement and trade secret misappropriation are coextensive"),

130 See Santa's Workshop V. Sterling, 2 A.D.2d 262, 264 (3d Dep't 1956) (noting that each measure of recovery "one based on plaintiff's loss of profits and the other based on defendant's increased profits" was treated by the appellate court, for the purpose of review, as having been put forth by the plaintiff as alternatives for recovery).

131 See id. at 267 (notwithstanding these theories, the court notes that the general rule is to compensate plaintiff for the amount they would have made, but for the defendant's wrongful act in an unfair business competition case).

Page 106: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

34 ALB. L.J. SCI. & TECH. [Vol. 10

will permit the trade secret owner to proceed in the alternative to determine whether the misappropriator's profits exceeds the owner's losses caused by the misappropriation.'32

Ordinarily, the principal element of the trade secret owner's loss will be the amount of profits lost as a result ofloss of business, not the total reduction of revenue. ,aa Determining this sum involves, in turn, inquiry into other areas such as determination of the sales or revenue lost as a result of the misappropriation and of the mar­gin of profit on those revenues, and the degree of precision neces­sary in arriving at the final award!34 Although it is not entirely clear, the trade secret owner may also be able to recover costs incurred as a result of the misappropriation, such as increased manufacturing costs or added training expenses. '3•

The other measure of damages allows the trade secret owner to recover the misappropriator's profits, or the sums or expend­itures saved as a consequence of the misappropriation or other benefits the misappropriator has obtained by way of the mis­appropriation. '3B In order to properly measure these damages,

132 See id. at 264-265. 133 See David Fox & Sons v. King Poultry Co., 23 N.Y.2d 914 (1969) (finding

that the plaintiff, a wholesale poultry corporation, was entitled to receive damages based upon net profit per pound of poultry sold as opposed to damages based upon gross profit).

134 See American Elecs. Inc. v. Neptune Meter Co., 290 N.Y.S. 2d 333, 335 (1st Dep't 1968) (explaining that "plaintiffs' damages are measured by the contract price less what would have been plaintiffs' cost of performance").

135 See 104 N.Y. JUR. 2d § 284, Trade Regulation (1992) (stating that the "plaintiff may recover damages sustained as a result of the defendant's unfair competition that the defendant made no profit" from the wrongful act).

136 See Fisher Org. v. Ryan, 470 N.Y.S. 2d 968 (Civ; Ct. N.Y. Co. 1983) (stating that the plaintiff was entitled to recover defendants' profits. The defendants, former employers of the plaintiff, had misappropriated confidential infonnation which enabled them to place a candidate for an open employment position and learn a commision of $9,000); see Electro-Miniatures Corp. V. Wendon Co., 771 F.2d 23, 27 (2d Cir. 1985) (noting that an award to the plaintiff was proper. The Court determined that defendant's profits should be based on defendant's "sales of all equipment involving printed circuit slip rings, not ... just on its salea of the slip rings themselves"); see Softel, Inc. V. Dragon Med. and Scientific Communications, Ltd., 891 F. Supp. 935, 942-43 (S.D.N.Y. 1995), affd, 118 F.3d 955 (2d Cir. 1997) (explaining that plaintiffs damages should be based on the defendant's profits; furthennore, "[i]n measuring defendant's profits, it is also appropriate to apportion damages based on the role plaintiffs trade secret played in the commercial success of defendant's product") (citation omitted); see also RESTATEMENT (THrnn) OF UNFAIR COMPETITION, § 45, cmt. f (1995) ("An accounting of the defendanes profits from the unauthorized use of the plaintiffs trade secret is a common remedy ... [and] ... the plaintiff is entitled to the defendant's net profits from sales of good incorporating the trade secret. (citation

Page 107: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 35

the court can order an accounting to determine and calculate such profits. 137

There is also authority in New York for the use of a reasonable royalty standard. 13B A reasonable royalty has been defined as that amount which the trier of fact estimates that a party would be willing to pay and the owner would be willing to accept for use of the trade secret. 139 In calculating what a fair licensing price would have been had the parties agreed, the courts approving this \11ethod have stated that the factfinder should consider such vari­ables as "foreseeable changes in the parties' competitive [posi­tions]; the price[] past purchasers or licensees may have paid; the total value of the secret to the [owner], including the [owner's] development costs and the importance of the secret to the [owner's] business; the nature and extent of the use the [misap­propriator] intended for the secret; and whatever other unique factors [present] in the particular case . . . , such as the

omitted) The defendant may also be held accountable for sales of other products that are dependent upon sales of the appropriated product").

137 See Defier Corp. v. Kleeman, 243 N.Y.S.2d 930, 937 (4th Dep't 1963) (stating that" . . . an accounting for the profits realized by the defendants resulting from their illegal acts may furnish the most reliable method of computing the loss")(citation omitted); see also Extrin Foods, Inc. v. Leighton, 115 N.Y.S.2d 429, 439 (Sup. Ct. Kings Co. 1952) (stating that the defendant's who had wrongfully appropriated plaintiffs secret fommlae and processes, were "required to account for the profits earned from the manufacture, sale, and distribution of the [product] prepared by it in emulation of the [plaintiff's product] .. ."); see Smith v. Little, Brown & Co., 273 F. Supp. 870, 874 (S.D.N.Y. 1967) affd 360 F. 2d 928 (2d Cir. 1968) (stating that the plaintiff was entitled to defendant's entire profit); see Elnicky Enters. v. Spotlight Presents, Inc., 213 U.S.P.Q. 855, 862 (S.D.N.Y. 1981), ("As as alternative measure of damages, defendant may be required to account to plaintiff for its profits.") (citation omitted); see generally 63 AL.R.2d 1433, 1437-38 (1959) (explaining that the award in tltis situation is typically an amount equivalent to the defendant's net profits obtained from the wrongful acts, whlch may be determined from ajudicial accounting. Basically, this type of accounting allows the defendant to deduct their costs of production, which may even include a tax deduction if the defendant is found to have not acted in bad faith).

138 See Laurie Visual Etudes, Inc. v. Chesebrough·Pond's Inc., 432 N.Y.S. 2d 457 (Sup. Ct. N.Y. Co. 1980), reD'd on other grounds, 441 N.Y.S. 2d 88 (lst Dep't 1981) (explaiIDng that damages measured by the defendant's was not appropriate and instead, "the fixation of a fair royalty would be acceptable relieF); see also Softel, 891 F. Supp. at 942 ("Another method for computing damages for trade secret misappropriation is the assessment of a reasonable royalty for the use of the trade secret").

139 See University Computing Co. v. Lykes-Youngstown Corp., 504 F.2d 518, 539 (5th Cir. 1974) (finding that "the proper measure is to calculate what the parties would have agreed to as a fair price for licensing the defendant to put the trade secret to the use the defendant intended at the time the misappropriation took place").

Page 108: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

36 ALB. L.J. SCI. & TECH. [Vol. 10

ready availability of alternative processes", that may have affected the parties' agreement. "O

In sum, by recognizing that the trade secret owner is entitled to be made whole following a misappropriation of its trade secret, New York courts provide flexible compensatory damage remet;lies. The court may employ whatever method is the most reliable in computing the owner's damages and which will provide the owner the maximum recovery possible. '4l

Punitive Damages: When allowable, punitive damages, frequently referred to as

exemplary damages, are awarded "not only to punish the [wrong­doer] but to deter him, as well as others who might otherwise be so prompted, from indulging in similar conduct in the future."l42 To warrant an award of punitive damages in a tort action, there must be proof that the wrongdoing is intentional or deliberate, has cir­cumstances of aggravation or outrage, has a fraudulent or evil motive, or is in such conscious disregard of the rights of another that it is deemed willful or wanton. '43 However, punitive damages are not permitted when the conduct in question was not "aimed at the public generally."l4'

The law is unclear as to the availability of punitive damages in a trade secrets misappropriation action sounding in tort. There is authority that punitive damages are not recoverable because "no public right is involved and the underlying private wrong is sus­ceptible of adequate compensation'''l45 Whether these decisions are holding that punitive damages are never available because trade secret misappropriation does not involve a public wrong, or only that no public wrong was present in the facts of these cases is not readily ascertainable. In both of the cited cases, there are

"0 University Computing, 504 F.2d at 539: see generally, 4 MILGRI .. , supra note 113 at § 15.02(3)(e) (measuring damages with less need for different factors to be considered. Instead, an alternative theory is to assess the general value of the subject matter improperly obtained by the defendant).

141 See generally Defier Corp., 243 N.Y.S.2d at 930. 142 Walker v. Sheldon, 10 N.Y.2d 401, 404 (1961). 143 See Prozeralik v. Capital Cities Communications, Inc., 82 N.Y.2d 466,

478-79 (1993) (citing Prosser and Keeton, Torts § 2 at 9·10 (5th ed. 1984» (noting that punitive damages are generally not awarded when the conduct was not aimed at the general public).

144 See Vinlis Constr. Co. v. Roreck, 27 N.Y.2d 687, 689 (1970): see also Walker, 10 N.Y.2d at 405.

145 Huschle v. Battelle, 33 A.D.2d 1017, 1017 (1st Dep't 1970) (citation omitted).

Page 109: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 37

strong dissenting opinions arguing for an award of punitive dam­ages in trade secret misappropriation cases.146

On the other hand, there are decisions awarding punitive dam­ages in trade secrets cases."7 In both cases, punitive damages awards were made based on the defendant's willfulness and bad faith. ' •8 There was no extended discussion as to the availability of punitive damages in trade secrets cases.

Where punitive damages are allowable, the decision as to whether to award them, as well as their amount, are questions for the trier of fact (judge or jury) to determine. " " As to the amount awarded, they must "bear some reasonable relation to the harm done and the flagrancy of the conduct causing it."'50 There is no specific ratio to compensatory damages that the punitive damages needs to bear .'5'

Proposed § 279-p: Proposed § 279-p provides for the recovery of compensatory and

exemplary damages. Subdivision (1): Proposed § 279-p(1) provides for the recovery of compensatory

damages by the trade secret owner. As with injunctive relief, such damages are available for the period during which the alleged trade secret was entitled to protection and not in the public domain, plus the period during which the misappropriator retained a competitive advantage from its misappropriation. Under § 279-p(1), damages may be measured by the trade secret owner's actual losses, the misappropriator's unjust enrichment, e.g., profits, or a combination of both. Damages may also be mea­sured by the amount the trade secret owner would have reason-

146 See kl. at 1017-18; see also American Elecs., 30 A.D.2d at 120. 147 See Gen. Aniline & Film Corp. v. Frantz, 50 Misc.2d 994, 1003 (Sup. Ct.

Broome Co. 1966) (ruling that punitive damages were appropriate because of the defendant's willful breach of confidence and "wanton disregard of the property rights of others"); see also Sofiel, 891 F.Supp at 935 (awarding punitive damages to plaiotiff for defendants' trade secret misappropriation).

148 See also AF.A. Tours, Inc. v. Whitchurch, 937 F.2d 82, 87 (2d Cir. 1991) (allowing punitive damages if conduct has been sufficiently "gross and wanton").

14. See Loughry v. Lincoln First Bank, 67 N.Y.2d 369, 378 (1986); see also Nardelli v. Stamberg, 44 N.Y.2d 500, 503 (1978) (noting that the trier of fact determines the amount of punitive damages).

160 Rupert v. Sellers, 48 AD.2d 265, 269 (4th Dep't 1975) (quoting I.H.P .. Corp. v. 210 Central Park South Corp., 16 A.D.2d 461, 467 ( 1st Dep't 1962) (decreasing the judgment to match the injury).

161 See Hartford Accident. & Indem. Co. v. Hempstead, 48 N.Y.2d 218, 227 (1979) (ruling that a judge must look at all tbe factors in the case, and then determine the amount of damages that will be the most fair to the plaintiff).

Page 110: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

38 ALB. L.J. SCI. & TECH. [Vol. 10

ably charged as a royalty for the use of the trade secret. The court may permit recovery on whichever method affords the trade secret owner the greatest recovery, provided an adequate foundation for use of that method is established and there is no double recovery.

The proposed section is consistent with present New York law. In one respect, the section goes beyond what present law provides by permitting the recovery for damages that may have been sus­tained after the trade secret entered the public domain, but lim­ited to the time the misappropriator· retained a competitive advantage. Although no decision has recognized recovery in such circumstances, there is no decision that conclusively precludes recovery.,52 Recognizing the availability of damages during this limited time is consistent with permitting injunctive relief to con­tinue during this limited time. Moreover, there is no clear indica­tion that the New York courts would reject such a position.

Two of the provisions of the proposed section should be noted. First, the beginning "except" phrase is included to ensure that in instances where a person charged with misappropriation has materially and prejudicially changed his or her position in reli­ance upon knowledge of a trade secret acquired in good faith and without reason to know of its misappropriation by another, that person cannot be liable for monetary damages. Although there is no clear precedent on this point, such a provision is desirable and would appear to be the rule that would be adopted by the New York courtS.'53

The reasonable royalty alternative measure of damages should be distinguished from a royalty order injunction that is permissi­ble under proposed § 279-0. As stated in the Comment to UTSA § 3, a proposed §279-0:

... royalty order injunction is appropriate only in exceptional cir­cumstances; ... a reasonable royalty measure of damages is a gen­eral option. Because [proposed § 279-p(2)1 damages are awarded for a misapproprlator's past conduct and a [proposed § 279-01 royalty order injunction regulates a misappropriator's future conduct, both remedies cannot be awarded for the same conduct. If a royalty order injunction is appropriate because of a person's material and prejudi­cial change of position prior to having reason to know that a trade

,52 See Laurie Visual Etudes, Inc. v. Chesebrough-Pond's, Inc., 83 A.D.2d 505, 506 (lst Dep't 1981) (stating that a finding that the defendant competed unfairly and/or breached a fiduciary duty would be necessary for a recovery). .

153 See Conmar Prods. Corp. v. Universal Slide Fastener Co., 172 F.2d 150, 154-155 (2d Cir. 1949) (finding that an employer is entitled to exploit innocently acquired secrets until it learned of the misappropriation by its employee).

Page 111: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 39

secret has been acquired from a misappropriator, damages should not also be awarded for past conduct that occurred prior to notice [or reason to know] that a misappropriated trade secret has been acquired. 154 Subdivision (2): Proposed § 279-p(2) authorizes the court to award "exemplary"

damages for a willful or malicious misappropriation, but caps the amount of such damages at twice the amount of compensatory damages awarded under proposed § 279_p(1).155 Whether to award exemplary damages in a particular case, as well as the amount of such damages, if any, are questions which reside in the sound discretion of the COurt.156 Although "exemplary damages" and "punitive damages" are frequently used interchangeably, the term "exemplary damages" is used because, unlike the situation here, punitive damages are more appropriate for use when no monetary caps are present.

As the misappropriation of trade secrets causes harm to the competitive process and involves intentional conduct, there is no good reason to preclude an award of exemplary damages upon the making of the requisite showing. If the purpose of exemplary or punitive damages is to punish the wrongdoer and protect society against similar acts in the future, they should likewise be avail­able in a trade secrets misappropriation case.

Using a standard of willfulness or maliciousness is consistent with awards of punitive damages in tort cases generally.'57 These terms have been given different meanings under the common law. In that regard, "willfulness," sometimes referred to as "wanton," will be present when the misappropriation is done under such cir­cumstances as to show conscious and deliberate disregard of the rights or interests of another .'58 "Maliciousness" will be present

164 UNlF. TRADE SECRETS ACT §3, 14 U.L.A. 455 (1985) 165 See UNlF. TRADE SECRETS ACT § 3, 14 U.L.A. 455, 456 (1990) (explaining

that under §3, a court may award exemplary damages in addition to the actual damage).

166 See id. <stating that the court may award exemplary damages in an amount not exceeding twice any award made under subsection (a)).

161 See Prozeralik v. Capital Cities Communications, 82 N.Y.2d 466, 479 (1993) (stating that punitive damages in tort actions are awarded "[if] the defendant's wrongdoing has been intentional and deliberate, and has the character of outrage frequently associated with crime").

16B See id. (stating that something more than tort is required for punitive damages); Gostkowski v. Roman Catholic Church of Sacred Hearts of Jesus & Mary, 262 N.Y. 320, 323-24 (1933) (holding that a conscious indifference to the e!fecta of one's act may constitute willful and malicious behavior); Sweeney v. McCormick, 159 A.D.2d 832, 834 (3d Dep't 1990); 1A PATTERN JURY

Page 112: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

40 ALB. L.J. SCI. & TECH. IVol.10

when the misappropriation is done·deliberately with knowledge of the trade secret owner's rights and with the intent to interfere with those rights.!59 Permitting recovery in these alternative instances is consistent with protecting trade secrets in our com­petitive economy. As these terms have an accepted meaning, there is no need to define them in the section.

Empowering only the court to award exemplary damages, and not a jury, and capping their amount at twice the amount of com­pensatory damages that are awarded is consistent with other stat­utory enactments.!60 While some jurisdictions have not imposed these limitations!6! proposed section 279-p(2) rejects this approach and adopts the position of the UTSA and the vast major­ity of the states that have enacted it. The section's approach is preferable as it adequately balances the desirability of exemplary damages and the possibility of unnecessarily ruinously excessive awards. It is also consistent with recent legislative enactments in the business competition area.

Variations From Uniform Trade Secrets Act: UTSA § 3(a) sets forth the Uniform Trade Secret Act's compen­

satory damages provisions.!62 Proposed section 279-p(1) is identi­cal to UTSA §3(a).

INSTRUCTIONS 2:278 (3d ed. 1998) (defining willful conduct as "'having a high degree of moral culpability' . . . or activated by an evil and reprehensible motive .. , which manifests a 'conscious disregard of the rights of others or conduct so reckless as to amount to such disregard'").

159 See Lamb v. Cheney & Son, 227 N.Y. 418, 418 (1920). !60 See, e.g., N.Y. GEN. Bus. LAW §§ 349(h), 350(d)(3), 360(m) (McKinney

1988); compare, N.Y. REAL PRoP. ACTS. LAw § 853 (1979 and Supp.I 1999) (entitling person to automatic treble damages with certain exceptions).

161 MISS. CODE ANN. § 75·26·7(2) (1972) (stating that Mississippi has no cap on award); Mo. REV. STAT. § 417.457(2); MONT. CODE ANN. § 30·14·404(2); N.C. GEN. STAT. § 66·154(a)(2)(c).

!62 UNIF. TRADE SECRETS ACT § 3(a), 14 U.L.A. 455 (1985)

Except to the extent that a material and prejudicial change of position prior to acquiring knowledge or reason to know of misappropriation renders a monetary recovery equitable, a complainant is entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropriation and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. In lieu of damages measured by any other method, the damages caused by misappropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator's unauthorized disclosure or use of a trade secret.

[d.

Page 113: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 41

UTSA § 3(b) sets forth the Uniform Trade Secrets Act's exem­plary damages provisions.16a Proposed section 279-p(2) is identi­cal to UTSA § 3(b), with one exception. Instead of "willful and malicious," § 279-p(2) uses "willful or malicious." As willful and malicious have different meanings in New York law, and it is unclear what the words willful and malicious mean or encompass under UTSA § 3(b), "or" instead of "and" is used. Such change is also appropriate because there is nothing to indicate that under UTSA § 3(b) conduct had to be both consciously and deliberately indifferent to the rights of the trade secret owner, and engaged in with knowledge of the owner's rights and with the intent to inter­fere with them. It should be noted that other states have used "or" instead of "and."164

E. Commentary To Proposed § 279-q

Present Law: The ordinary and historical rule in New York has been that par­

ties in a lawsuit are responsible for their own attorney's fees, regardless of whether they prevail. 165 This "rule is based upon the high priority accorded free access to the courts and a desire to avoid placing barriers in the way of those desiring judicial redress of wrongs.'>!66 Only where a statute, court rule, or agreement. between parties authorizes an award of attorney's fees are they recoverable. 167 These exceptions are recognized to further other public policies: to curb the waste of judicial resources that result from frivolous litigation; to compensate fully the party harmed by unlawful conduct; and to encourage parties to vindicate their rightS.16B

163 See id. at §3(b) (stating that "[i1f willful and malicious misappropriation exists, the court may award exemplary damages in an amount not exceeding twice any award made under subsection (a)").

164 See COLO. REV. STAT.§ 7-74-104(2) (1999) (using "or" between malice and willful); OR. REv. STAT. § 646.465(3) (using "or" between willful and malicious misappropriation).

165 See Hooper Ass'n, Ltd. v. AGS Computers, 74 N.Y.2d 487, 491 (1989) (explaining that prevailing party may not collect attorney's rees from the losing party unless there is an agreement between the parties, or it is stated in a statute or court rule).

166 Ship Maintenance Corp. v. Lezak, 69 N.Y.2d I, 5 (1986). 167 See Hooper, 74 N.Y.2d at 491 (providing an exception to the general rule). 168 See 1 MARy FRANCIS DERFNER & ARTHUR D. WOLF, COURT AWARDED

ATTORNEY FEES, ch. 5, Statutory Exceptions to the American Rule (1998), State Attorney Fee Shilling Statutes: Are We Quietly Repealing The American Rule? LAw & CONTEMP. PROBS., Winter 1984, at 321, 321.

Page 114: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

42 ALB. L.J. SCI. & TECH. [Vol. 10

There is no statute that specifically authorizes an award of attorney's fees in a trade secrets misappropriation action. '69 How­ever, the prevailing party may seek to invoke. CPLR § 8303-a, which authorizes an award of reasonable attorney's fees not exceeding $10,000.00 in an action to recover damages for "injury to property" if the action or defense thereto is found to be "frivo­lous."'70 Misappropriation of a trade secret would seem to be "injury to property," as defined in General Construction Law § 25-b. Motion practice deemed "frivolous" could give rise to an award of reasonable attorney's fees under New York Codes, Rules and Regulationspl

Proposed § 279-q: Proposed § 279-q authorizes an award of reasonable attorney's

fees to the prevailing party in three situations: (1) a claim of mis­appropriation is made in bad faith; (2) a motion to terminate an injunction is made or resisted in bad faith; or (3) willful or mali­cious misappropriation is established. No cap on the amount recoverable is set forth. The section further states alternative grounds for "bad faith" to be present: (1) the claim or defense or motion was made or continued or resisted solely to harass or mali­ciously injure another or to prolong the litigation; or (2) the claim or defense or motion was made or continued or resisted with no reasonable basis in fact or law and could not be supported by a good faith argument for an extension, modification or reversal of existing law. "Willful or malicious" misappropriation is present in the same circumstances that punitive damages may be awarded pursuant to proposed § 279-p.

Although no empirical research can be cited, it seems evident that trade secret misappropriation actions present a particularly compelling need for authorizing the right to recover attorney's fees. They are now authorized in the vast majority of the states to parties that establish misappropriation.172 As previously noted, firms and entrepreneurs are relying more heavily than ever on

169 See Laurie Visual Etudes, Inc. v. Chesebrough-Pond's Inc., 105 Misc.2d 413, 421 (Sup. Ct. N.Y. Co. 1980), rev'd on other grounds, 83 A.D.2d 505 (lst Dep't 1981) (denying attorneys fees).

170 See generally, N.Y. C.P.L.R. § 8303 (a), (McKinney 1981 & Supp. 1999). 171 See 22 N.Y.C.R.R. § 130-2.1 (West 1995). 172 James Chapman, California Uniform Trade Secrets Act: A Comparative

Analysis of the Act and the Common Law, 2 SANTA CLARA COMPUTER & HIGH

TECH. L.J. 389, 409 (noting that "the California Act provides that if a claim of misappropriation is made in bad faith, the court may award reasonable attorneys' fees to the prevailing party").

Page 115: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 43

trade secrets to protect their technology.173 Consequently, trade secrets play a major and increasingly important role in the advancement of technology in New York.'7' These facts also make trade secret misappropriation particularly appealing to unethical competitors. Because effective enforcement of trade secret rights is I.eft to trade secret owners, they should be encouraged to enforce their rights.'76 It would be unsound policy not to provide a com­plete remedy, including attorney's fees without a cap, because the complexity of litigating a trade secrets case results in large attor­ney's fees. Often the trade secrets owner is an individual or small entity for which attorney's fees represent a substantial deterrent to vindicating their rights. As a result, their business can be retarded or even destroyed. The provision for attorney's fees in § 279-q is thus necessary to level the playing field.176

Awards of reasonable attorney's fees without caps are author­ized to be made to parties who have successfully demonstrated the illegality of challenged business conduct in other instances.177

Under General Business Law § 360-m, such award can be made only where the defendant acts in "bad faith" or "with knowl­edge."l78 There is no substantial reason to treat prevailing trade secret parties any different than prevailing trademarklser­vicemark plaintiffs.

The proposed section also permits recovery of reasonable attor­ney's fees by the prevailing party on a motion to terminate an injunction, either made, resisted, or continued in bad faith, or the prevailing party in an action brought or continued in bad faith. This provides protection against unfounded suits or motions brought or resisted for harassment or other reasons, as set forth in

173 Vytas M. Rimas, Trade Secret Protection of Computer Software, 5 COMPUTER L.J. 77, 84 n.58 (1984) (asserting that since "more software programs are created than are registered for copyright protection," trade secrets must be the primary avenue in which to protect this newly developed technology).

114 See id. at 99 (stating that the "most promising development has been the judicially approved use of ... trade secret[sJ ... to maximize the protection of both software and firmware.").

115 See generally 4 Mu.ORIM, supra note 113, at § 15.01[lJ (postulating that in trade secret litigation, since the plaintiff is the owner of the trade secret, the plaintiff has the burden of establishing a prima facie case against the defendant).

1,. See 4 MILGRIM, supra note 113 at § 15.02(3)(k).(1997); James Chapman, California Uniform Trade Secrets Act: A Comparative Analysis of the Act and the Common Law, 2 SANTA CLARA COMPUTER & HIGH TECH. L.J. 389,409 (1986).

111 See N.Y. GEN. Bus. LAw §§ 340(5) (antitrust violation), 349(h) (deceptive acts and practices), 350(d)(3) (false advertising), 360-m (registered trademarks! servicemarks) (McKinney 1988 & Supp.l 1999).

11S See N.Y. GEN. Bus. LAw § 360-m (McKinney 1988).

Page 116: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

44 ALB. L.J. SCI. & TECH. [Vol. 10

the section, and should deter groundless trade secret actions that may harm the economy by deterring procompetitive conduct. '79

The proposed section does not state the guidelines for determin­ing the amount to be awarded as a reasonable attorney's fee because present case law concerning the awarding of attorney's fees and the factors to be considered is more than adequate. '8o With a proposed amendment to N.Y.C.P.L.R. § 8303-a, adding a new subdivision (d), which is a part of this legislative package, N.Y.C.P.L.R. § 8303-a will be inapplicable to requested awards in actions subject to the Act. However, except to the extent the pro­posed section applies to motions to terminate injunctions, 22 N.Y.C.R.R. § 130-1.1 will still be available to other forms of frivo­lous conduct in actions subject to the act.

In sum, the proposed section provides an effective means to vin­dicate trade secret rights and deter potential misappropriation and prevent misuse of the courts by unfounded trade secret Claims and arguments. As noted by one commentator, it "helps balance the equation between plaintiff and defendant. This is done by encouraging the plaintiff to consider more carefully the likelihood of success, while allowing the defendant to consider how he wants to proceed once a complaint is filed."'81

Variations From Uniform Trade Secrets Act: UTSA § 4 provides for an award of attorney's fees. '82 The pro­

posed section is identical to section 4 with four exceptions, none of which is a radical departure.

First, the proposed section adds a definition of ''bad faith."'83 This definition is taken from N.Y.C.P.L.R. § 8303-a(c). In the absence of any clear indication of what "bad faith" in section 4

179 See generally Michael J. Hutter, Recovery of Attorney's Fees in Track Secret Cases: Present Law and a Proposal, 1 'l'RAoE SECRET LAw REP. 288 (1986); Pooley, The Track Secret Lawsuit as an Anticompetitive Tool, 1 COMPo L. REP. 894 (1983) ("stating that "[T]he trade secret lawsuit is an unusually effective device for killing a 'new company. . . . [T]he attendant publicity and other restrictive effects ... can mortally wound a new enterprise by scaring away investors, customers, and employees."),

180 See generally Centre Great Neck CO. V. Penn Encore Inc., 680 N.Y.S.2d 866, 866·67 (2d Dep't 1998) (identifying types of evidence needed to meet the burden of proof to establish the necessity and reasonable value of legal services); see Ogletree, P.C. v. Albany Steel Inc., 243 A.D.2d 877 (3d Dep't 1997) (determining reasonable attorney fees under theory of quantum meruit); see Wells v. Crosson, 210 A.D.2d 932 (4th Dep't 1996).

181 Susan C. Miller, Comment, Florida's Uniform Trade Secrets Act, 16 FLA. ST. U. L. REV. 863, 886 (1988) (citation omitted).

182 UNIF. 'l'RAoE SECRETS ACT § 4, 14 U.L.A. 433, 459 (1990). 183 [d.

Page 117: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 45

encompasses, it would seem preferable to adopt a standard with which the courts and bar are familiar.

Second, the proposed section adds the word "continued." Although it would appear under section 4 that "bad faith" would be present in a situation where a claim seemed valid when first made but was continued after subsequent inquiries revealed that it lacked a reasonable basis, it seems preferable to ensure such result. This is consistent with the policy underlying the proposed section, as well as with present law generally.ls4 Third, for gram­matical reasons, "is established" is used instead of the word "exists" as in UTSA section 4.1S5

Fourth, "willful or malicious" misappropriation is used, instead of "willful and malicious." This variation is consistent with pro­posed § 279-p(2) and the Comment thereto.

F. Commentary To Proposed § 279-r

Present Law: Actions involving trade secrets will necessarily place them at

risk of further disclosure.1B6 To minimize this danger, and to encourage trade secret owners to present their claims or defenses fully, New York law provides the courts with broad authority to protect trade secrets from disclosure due to litigation. Such authority is derived from statutes or from the common law, which recognizes a limited privilege for trade secrets. 1S7

Thus, N.y'C.P.L.R. § 3103 authorizes a court in any action to issue a protective order in connection with the basic pre-trial dis­closure devices to guard against any unnecessary disclosure that may endanger the value of a trade secret.1SS What protective

184 See Mitchell v. Herald Co., 137 A.D.2d 213, 219 (4th Dep't 1988). 185 See VNlF. TRADE SECRETS Am: § 4, 14 V.L.A. 433, 459. 186 See Cundiff, supra note 8 at 40 (explaining that "trade secret litigation ...

[could] place secrets at risk of further disclosure"). 187 See Drake v. Hermann, 261 N.Y. 414, 418 (1933) (stating that "disclosure

of legitimate trade secrets will not be required except to the extent that it appears to be indispensible for ascertainment of the truth"); Citibank, N.A. v. Recycling Carroll Gardens, 116 A.D.2d 494, 495 (1st Dep't 1986) (The plaintiff claims that "its procedures and policies governing approval of loan applications constitutes trade secrets." Thus the court remanded the case to "ensure proper protection against unwarranted disclosure of such data."); Cronin v. Pierce & Stevens Chern. Corp., 36 A.D.2d 764, 765 (2d Dep't 1971); (stating that defendant's employees could not be directed to testify about the defendant's trade secrets); MICHAEL M. MARTIN ET AL' I NEW YORK EvIDENCE HANDBOOK: RULES, THEORV, AND PRACTICE, § 5.9.1 (1997).

188 See DAVID D. SIEGEL, PRACTICE COMMENTARIES, N.Y. C.P.L.R.§ 3103(4), (McKinney 1991) ("examples of Protective Orders"); Steven R. Kramer,

Page 118: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

46 ALB. L.J. SCI. & TECH. [Vol. 10

measures will be included in the protective order depends upon the circumstances. 'S9 They may include, inter alia, specific limita­tions on use and disclosure. '9o Furthermore, such protective orders can continue through the trial, as well as after the tria!.'91

The courts also possess the inherent authority to adopt appro­priate and reasonable measures to limit access to trade secrets during the tria!.'92 Such safeguarding measures include receiving proof in camera; 193 the closure of the courtroom; 194 orders directing parties and their representatives not to disclose a trade secret;'95 and sealing records. '9S

Proposed § 279·r: Proposed § 279-r provides a court with broad authority to pro­

tect trade secrets before, during, and after the trial of a trade secret misappropriation action. It sets forth as examples of pro­tective means, several procedures that can be judicially ordered, but they are not exclusive. In essence, the court can order

Protecting Dissemination of Business Secrets During Discovery, 69 N.Y. SC. B. J., 24 (Jan. 1997) (comparing and contrasting F.R.C.P. 2b(c)(7) and § 3103 and the their ability to adequately protect trade secrets during litigation).

189 See 3 RoGER M. M11oRIM, MILGRIM ON TRADE SECRETS, § 14.02(4) (1999). 190Id. at § 14.02(4)(e). 191 Schenectady Chem., Inc. v. lmitec, Inc., 151 A.D.2d 804 (3d Dep't 1989)

(observing that the lower court properly concluded that the confidentiality agreement between the parties of the litigation should survive the final disposition of the case so as to protect the disclosing party's interest in her trade secret); 3 MILoRIM, supra note 187 at § 14.02(4)(g) (1998); see also Richard E. Lyons, Discovery in Trade Secrecy Cases, in 4 INTELLECTUAL PROPERTY COUNSELINO AND LITIO. § 72.02(2) (Lester Horwitz & Ethan Horwitz, eds. 1999) (suggesting that the best way to reduce any chance of public disclosure, is for the adversely affected party to move for a suitable protection order early in the litigation).

192 See Nat'l Starch Prods. v. Polymer Indus., 273 A. D. 732, 739 (1st Dep't 1948) (holding that the court has discretion, but must exercise "great care" in the conduct of a tria!); see Fairchild Engine & Airplane Corp. v. Cox, 50 N.Y.S.2d 643,646 (Sup. Ct. N.Y. Co. 1944) (noting that iffacts are revealed, it could cause mischieO.

193 See, Sybron Corp. v. Wetzel, 46 N.Y.2d 197, (1978); see Rabinowitz & Co. v. Dasher, 82 N.Y.S.2d 431, 436 (Sup. Ct. N.Y. Co. 1948) (involving a manufacturer whose methods and machines were so similar to the plaintiffs, the court was able to hear the testimony without revealing it to the public).

194 See Nat'/ Starch Prods., 273 App. Div. at 739 (noting that the trial court should carefully guide against disclosure during tria!).

195 See 3 MILORIM, supra note 189 at § 14.02(4)(0 (explaining that the court will interpose an attorney for "general" information), .

196 See Kaumagraph Co. v. Stampagraph Co., 197 A.D. 66, 73 (1st Dep't 1921), affd, 235 N.Y. 1 (1923) (describing that testimony taken in camera is sealable until needed at tria!); 3 M11oRIM, supra note 189 at § 14.02(6) (explaining power to seal records and hearing matters in camera).

Page 119: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999) UNIFORM TRADE SECRETS ACT 47

whatever reasonable protective measures are appropriate under the circumstances.

The proposed section restates present New York statutory and common law. Although the proposed section neither limits nor adds to present law, it is desirable because it is a single reference point for the authority and means to protect trade secrets in trade secret misappropriation actions. These means, in turn, are consis­tent with one of the purposes of this proposed Uniform Trade Secrets Act. In actions not governed by the Uniform Trade Secrets Act, where an alleged trade secret is in issue, the trade secret can be protected by the means discussed in "Present Law."197

Variations From Uniform Trade Secrets Act: UTSA § 5 sets forth the act's protective measures for trade

secrets. Proposed § 279-r is identical to it with two exceptions, neither of which is a change in substance. First, the proposed sec­tion makes a specific reference to N.Y. C.P.L.R. § 3103 as the authority for a protective order, an approach that is preferable because that section is the source for all protective orders in New York. Second, the proposed statute adds the phrase "including, but not limited to," to assure that the specific examples are con­strued as illustrative and not exclusive, which is the section's intent. This phrase is consistent with New York legislative draft­ing form.

G. Commentary To Proposed § 279-s

Present Law: There is no statutory provision which specifically sets forth the

statute of limitations for a cause of action alleging misappropria­tion of a trade secret. The two most appropriate limitation periods are set forth in N.Y. C.P.L.R. § 214(4), which provides that an action to recover damages for an "injury to property" be com­menced within three years, and N.Y. C.P.L.R. § 213(2), which pro­vides that an action "upon a contractual obligation or liability, express or implied" must be commenced within six years. Because the courts are not bound by either the label the party has affixed to the cause of action or the form in which the cause of action is

197 See SIEGEl, supra note 188, at § 3103.

Page 120: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

48 ALB. L.J. SCI. & TECH. [Vol. 10

pleaded, the limitation period to be applied turns upon the grava­men of the cause of action. 198

Where the cause of action sounds in tort, the courts have applied N.Y. C.P.L.R. § 214(4).'99 On the other hand, if the cause of action sounds in breach of contract or breach of fiduciary duty, the courts have applied the general statute of limitations."oo

Under N.Y. C.P.L.R. § 213(2) or N.Y. C.P.L.R. § 214(4), the cause of action accrues either when the defendant first discloses the trade secret or when the defendant first makes use of the trade secret. 201 Whether each subsequent use by the defendant of the trade secret establishes a new accrual date, with the limita­tions periods of N.Y. C.P.L.R. § 213(2) or N.Y. C.P.L.R. § 214(4) beginning to run with each new use, depends upon defendant's conduct.

If the defendant keeps the trade secret confidential, yet makes use of the trade secret to its own commercial advantage, a "contin­uing misappropriation" theory is used. Each subsequent use will give rise to a new cause of action with its own limitations period, three or six years, as the case may be.202 The plaintiffs cause of action is not time-barred with respect to any use within the three

198 See Wilson v. Bristol·Myers Co., 61 A.D.2d 965 (1st Dep't 1978); Petnel v. American Tel. & Tel. Co., 280 A.D. 706 (3d Dep't 1952) (allowing part of a cause of action to be dismissed, because the statute of limitation had run, however, the court allowed the valid claims to be served and to proceed); see also Lemelson v. Carolina Enters., 541 F. Supp. 645 (S.D.N.Y. 1982) (dismissing patent infringement claim because it was barred by the statute of limitations).

199 See Architectronics Inc. v. Control Systems, 935 F. Supp. 425, 432-433 (S.D.N.Y. 1996) (applying the three year statute limitations as staled by N.Y. C.P.L.R. § 214 (4) (McKinney 1990); see Lemelson, 541 F. Supp. at 658; see Kistler Instrumente A.G. v. PCB Piezotronics, Inc., 419 F. Supp. 120, 122 (W.D.N.Y. 1976); M & T Chern. v. Int'l Bus. Mach. Corp., 403 F. Supp. 1145, 1147-48 (S.D.N.Y. 1975).

200 See Wilson 61 A.D.2d at 965; see Peine! 280 A.D. at 706; Sachs v. Cluett Peabody & Co., 265 A.D. 497, 502 (1st Dep't 1943) (explaining that the "action ... [was] . . . barred by the statute of limitations whether the six or ten·year period [was] applicable").

201 See Peine!, 280 A.D. at 710 (holding that there must be "actual utilization of the plaintiff's ideas by the defendants" before the statute of limitations will run); Lemelson, 541 F. Supp. at 659 (concluding that when a defendant "discloses a trade secret he becom,es liable to plaintiff upon disclosure"),

202 See General Precision v. Ametek, Inc., 20 N.Y.2d 898, 899 (1967) (stating that there is "a cause of action for a continued breach on each occasion" the defendant uses the plaintiff's secret); see Peine! , 280 A.D. at 710 (explaining that the defendant can be subject to "successive accounts or successive actions for damage" ifthe defendant continued to utilize the plaintiff's property); Kistler 419 F. Supp. at 123 (holding that "the continued use of confidential information gives rise to successive causes of action under the law of New York").

Page 121: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 49

or six years prior to the commencement of the actions, even if such use(s) occurred after three or six years had elapsed from the date of the first use.

On the other hand, once the defendant publicizes or otherwise discloses the trade secret, each subsequent use by the defendant will not give rise to any new cause of action.203 As there is no "con­tinuing misappropriation," the plaintiff's cause of action will be time-barred unless an action is commenced within three or six years from the disclosure.

There is no provision in New York law, which provides that a cause of action for misappropriation accrues or can accrue upon the discovery of the misappropriation.204

Proposed § 279-s: Proposed § 279-s sets forth the applicable statute of limitations

for trade secret actions governed by the act. The section has three notable features: it specifies the period of time in which the action alleging misappropriation must be commenced; it states when the cause of action for misappropriation accrues; and it provides a rule for continuing misappropriation.

The proposed section provides a three-year limitation period for a cause of action alleging a misappropriation of a trade secret, regardless of the nature of the misappropriation. Consistent with the definition of "improper means" contained in Proposed § 279-n(1), providing a uniform limitations period is designed to avoid litigation over whether the tort or contract limitations period should be applied. This is a desirable result.205 In accordance with the provisions of proposed § 279-t, this section does not apply to a cause of action, involving a trade secret as defined in proposed § 279-n(4), which properly pleads a breach of contract or fiduciary duty. Such causes of action will be governed by N.Y.C.P.L.R. § 213(2).2°6 The proposed section provides that the cause of action

203 See Lemelson, 541 F. Supp. at 659 (explaining that if the defendant keeps the secret confidential, the defendant will be liable to each tort committed); M & T Chems., 403 F. Supp. at 1149 (declaring that once the "defendant 'published' the trade secret ... [the] plaintiffs rights on his trade secret were destroyed and no subsequent activities by the defendant could constitute a continuing misappropriation of the destroyed secret.").

204 See generally Thornton v. Roosevelt Hosp., 47 N.Y.2d 780, 781 (1979) (holding that "the cause of action accrued at the time" of the mistake, not at the time the injury "became apparent").

205 See Ramon A. Klitzke, The Uniform Trade Secrets Act, 64 MAnQ. L. REV. 277, 306-307 (1980).

206 See Dolgoff Holophase, Inc. v. E.!. duPont deNemours & Co., 212 A.D.2d 661, 662 (2d Dep't 1995).

Page 122: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

50 ALB. L.J. SCI. & TECH. [Vol. 10

for nlisappropriation accrues when the trade secret owner discov­(lrs or reasonably should have discovered the existence of the mis­appropriation of the owner's trade secret. Using a discovery date as the accrual trigger date is preferable to present law. Under present law, when the misappropriated trade secret is used in con­fidence to the nlisappropriator's competitive advantage, the owner may not become aware of the nlisappropriation until after the statute oflinlitations has run. Such a harsh result is unfair to the trade secret owner and would not occur under this proposed section.

The proposed section also changes present law to the extent that under present law a new cause of action accrues each time the nlisappropriator uses the trade secret, provided such use is kept confidential. The courts recognized such a "continuing mis­appropriation" theory presumably to assure that the trade secret owner would not be foreclosed from relief, as the accrual date for either N.Y. C.P.L.R. § 213(2) or § 214(4) was the first date of use or disclosure by the nlisappropriator. Because the cause of action under the proposed section now accrues upon discovery, there is no need to have a continuing accrual date. The trade secret owner will have three years from the date of discovery to commence an action alleging the cause of action. 207 This is sufficient time for the trade secret owner to vindicate its rights. 208

To assure that none of the provisions of article 2 of the N.Y. C.P.L.R. which conflict with the provisions of the. proposed section will be applied to a cause of action for trade secret nlisappropria­tion, the phrase "Notwithstanding any inconsistent provision of law" is added. Pertinent provisions of article 2 of the N.Y. C.P.L.R. which do not conflict will be applicable to a cause of action for trade secret nlisappropriation.

In sum, the proposed section is salutary. As stated by one com­mentator: "The combination of the single claim linlitation and the running of the period from the time of discovery balances the interests between the need for a clear date at which the statute

207 See Note, Limitation of Actions·Trade Secrets·Misappropriation and Use of Trade Secret Held Continuing Tort for Which Action May Be Maintained for Any Use Which Has Occurred During Statutory Period, 42 N.Y.U. L. REV. 565 (1967) (explaining that "[bJy running the staute from knowledge rather than the misappropriation, the injustice of barring a claim before it is realized is avoided . . . n), .

20B See UNIF. TRADE SECRETS Am: § 6, 14 U.L.A. 462 (1985) ("If objectively reasonable notice of misappropriation exists, three years is sufficient time to vindicate one's legal rights.").

Page 123: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 51

begins to run and the need for injured trade secret owners to have adequate time to discover and assert their claims."209

Variations From Uniform Trade Secrets Act: Uniform Trade Secrets Act § 6 sets forth the Uniform Trade

Secret Act's statute of limitations provisions .. Proposed § 279-s is identical in language to UTSA § 6, with one exception. As dis­cussed previously, the phrase "Notwithstanding any inconsistent provision of law" is added. The use of this phrase is consistent with New York legislative drafting form.

H. Commentary To Proposed § 279-t

Proposed § 279-t: Proposed § 279-t specifies which laws are preempted and not

preempted with the enactment of the Act. Consistent with a purpose in enacting the act to "make uniform

the law with respect to" trade secrets and to preclude inconsistent theories of relief for the same wrong, this section eliminates other causes of action where the underlying wrong is the misappropria­tion of a trade secret, as defined in proposed § 279-n(2). Thus, a cause of action claimed to be based only on the common law or unjust enrichment or unfair competition, or seeking an accounting where the underlying wrong was the misappropriation of trade secrets, it is preempted.

However, to the extent that a cause of action exists which is not dependent on a trade secret, that cause of action continues to exist, even though it may involve a trade secret. Thus, properly pleaded trade secret contract cause of actions or causes of action dependent upon an employee's duty of loyalty to his or her employer are not preempted.

Proposed § 279-t also makes clear that the act does not affect criminal actions.210

Variations From Uniform Trade Secrets Act: UTSA § 7 sets forth the Uniform Trade Secret Act's "Effect on

Other Law" provisions. Proposed § 279-t is identical to § 7.

1. Commentary To Proposed § 279-u

Proposed § 279-u: Proposed § 279-u sets forth a rule of statutory construction. It

recognizes that the objective of national uniformity cannot be

209 Miller, Florida's Uniform Trade Secrets Act, supra note 179, at 888. 210 See N.Y. PENAL LAw §§ 155.00, 155.30(3), §156.00 (McKinney 1999).

Page 124: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

52 ALB. L.J. SCI. & TECH. IVol.10

achieved by ignoring the construction of identical provisions of the Unifonn Trade Secrets Act in other states.

Pursuant to the section's rule of construction, the New York courts, in the absence of precedent, may refer to decisions from other states and construe the provisions of this act in accordance with these decisions. Although decisions of courts in other states are not binding on the courts of New York, they may be persuasive authority and entitled to deference. 211 "Otherwise the courts without reason introduce distinctions that are hannful and retard unifonnity of rules in a field where unifonnity should be sought.'>212 If there is no uniformity of interpretation among the states, the courts of this state should adopt the interpretation which seems most reasonable. 213

This section is a restatement of the principle ofunifonn applica­tion in other unifonn acts adopted in New York and in effect now and in the past?14

Variations From Uniform Trade Secrets Act: UTSA § 8 sets forth the Unifonn Trade Secret Act's ''Uniformity

of Application and Construction" provision. Proposed § 274-u is identical to it.

J. Commentary To Proposed § 279·v Proposed § 279-v: Proposed § 279-v sets forth a severability provision. It is self­

explanatory. The purpose is to assure that a finding of invalidity as to one provision of the Act or to its application to a person or circumstances does not necessarily invalidate the entire Act.

The section's language is identical to sections in other unifonn acts?15

Variations From Uniform Trade Secrets Act: UTSA § 10 sets forth the Act's "Severability" provision. Pro­

posed § 279-v is identical to it. The provision is the model sever-

211 See Broderick & Bascom Rope Co. v. McGrath, 81 Misc. 199, 201 (1st Dep't 1913) ("The desirability of uniformity in the laws of various states ... and the legislative intent to harmonize our [ J conflicting decisions ... is so clearly expressed, that full effect should be given thereto."); see also Brown v. Rowan, 91 Misc. 220, 223 (N.Y. City Ct. 1915) (adopting and following other court's interpretation); see also Century Bank of New York v. Breitbart, 89 Misc. 30S, 311-12 (N.Y. City Ct. 1915).

212 Agar v. Orda, 264 N.Y. 24S, 253 (1934). 213 See 2B NORMAN J. SINGER, SUTHERLAND STAT. CONST. § 52.05 (5th ed.

1992). 214 See N.Y. PARTNERSHIP LAw § 4 (Mcllinney 1999); see U.C.C. § 1-102(2)(c). 215 See, e.g., U.C.C. § I-lOS.

Page 125: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999) UNIFORM TRADE SECRETS ACT 53

ability section recommended by the National Conference of Commissioners on Uniform State Laws for inclusion in all acts of extensive scope.

K. Commentary To Proposed § 2 Of The Chapter

Proposed § 2: Proposed § 2 sets forth the act's effective date. Furthermore, to

assure. that the Act will not be given any retroactive effect, the section states that it will not apply to a misappropriation occur­ring before its effective date,. nor to a continuing misappropriation that began before the Act's effective date and continued thereaf­ter. Thus, the Act applies only to misappropriations that begin after the act's effective date.

Variations From Uniform Trade Secrets Act: UTSA § 11 sets forth the Act's effective date (to be decided) and

applicability provisions. Proposed § 2 sets forth the Act's specific effective date and uses for its applicability language the identical substantive language in UTSA § 11. It differs only with respect to using New York legislative drafting form, which effects no sub­stantive change from § 11.

Page 126: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

54

§ 1. Definitions

ALB. L.J. SCI. & TECH.

EXHIBITS

Exhibit "A"

UNIFORM TRADE SECRETS ACT

[Vol. 10

As used in the [Act], unless the context requires otherwise: (1) "Improper means" includes theft, bribery, misrepresentation,

breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means;

(2) "Misappropriation" means; (i) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (ii) disclosure or use of a trade secret of another without express or implied consent by a person who (A) used improper means to acquire knowledge of the trade secret; or (B) at the time of disclosure or use, knew or had a reason to know that his knowledge of the trade secret was (1) derived from or through a person who had utilized improper means to acquire it; (II) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or (III) derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or (C) before a mate­rial change of his [or her] position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake.

(3) "Person" means a natural person, corporation , business trust, estate, trust, partnership, association, joint venture, gov­ernment governmental subdivision or agency, or any other legal or commercial entity.

(4) "Trade Secret" means information, including a formula, pat­tern, compilation, program, device, method, technique, or process, that: (i) derives independent econOInic value, actual or potential, from not being generally know to, and not being readily ascertain­able by proper means by, other persons who can obtain economic value from its disclosure or use, and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

§2. Injunctive Relief

(a) Actual or threatened misappropriation may be enjoined. Upon application to the court, an injunction shall be terminated when the trade secret has ceased to exist, but the injunction may be continued for an additional reasonable period of time in order

Page 127: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 55

to eliminate commercial advantage that otherwise would be derived from the misappropriation.

(b) In exceptional circumstances, an injunction may condition future use upon payment of a reasonable royalty for no longer than the period of time for which use could have been prohibited. Exceptional circumstances include, but are not limited to, a mate­rial and prejudicial change of position prior to acquiring knowl­edge or reason to know of misappropriation that renders a prohibitive injunction inequitable.

(c) In appropriate circumstances, affirmative acts to protect a trade secret may be compelled by court order.

§3. Damages

(a) Except to the extent that a material and prejudicial change of position prior to acquiring knowledge or reason to know of mis­appropriation that renders a monetary recovery inequitable, a complainant is entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropria­tion and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. In lieu of dam­ages measured by any other methods, the damages caused by mis­appropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator's unauthorized disclo­sure or use of a trade secret.

(b) If willful and malicious misappropriation exists, the court may award exemplary damages in an amount not exceeding twice any award made under subsection (a).

§4. Attorney's Fees

If (i) a claim of misappropriation is made in bad faith, (ii) a motion to terminate an injunction is made or resisted in bad faith, or (iii) willful and malicious misappropriation exists, the court may award reasonable attorney's fees to the prevailing party.

§5. Preservation of Secrecy

In an action under this [Act], a court shall preserve the secrecy of an alleged trade secret by reasonable means, which may include granting protective orders in connection with discovery proceed­ings, holding in-camera hearings, sealing the records of the action, and ordering any person involved in the litigation not to disclose an alleged trade secret without prior court approval.

Page 128: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

56 ALB. L.J. SCI. & TECH. [Vol. 10

§6. Statute of Limitations

An action for misappropriation must be brought within 3 years after the misappropriation is discovered or by the exercise of rea­sonable diligence should have been discovered. For the purposes of this section, a continuing misappropriation constitutes a single claim.

§7. Effect on Other Law

(a) Except as provided in subsection (b), this [Act) displaces con­flicting tort, restitutionary, and other law of this State providing civil remedies for misappropriation of a trade secret.

(b) This [Act) does not affect: (1) contractual remedies, whether or not based upon misappropriation of a trade secret; (2) other civil remedies that are not based upon misappropriation of a trade secret; or (3) criminal remedies, whether or not based upon misap­propriation of a trade secret.

§8. Uniformity of Application and Construction

This [Act) shall be applied and construed to effectuate its gen­eral purpose to make uniform the law with respect to the subject of this [Act) among states enacting it.

§9. Short Title

This [Act) may be cited as the Uniform Trade Secrets Act.

§10. Severability

If any provision of this [Act) or its application to any person or circumstances is held invalid, the invalidity does not affect other provisions or applications of the [Act) which can be given effect without the invalid provision or application, and to this end the provisions of the [Act) are severable.

§11. Time of Taking Effect

This [Act) takes effect on --, and does not apply to misappropri­ation occurring prior to the effective date. With respect to a con­tinuing misappropriation that began prior to the effective date, the [Act) also does not apply to the continuing misappropriation that occurs after the effective date.

Page 129: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT

§12. Repeal

The following Acts and parts 'of Acts are repealed: (1) (2) (3)

57

Page 130: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

58 ALB. L.J. SCI. & TECH. [Vol. 10

EXHIBIT "B"

THE LAw OF 'I'RADE SECRETS IN THE UNITED STATES

State Statute Effective Date Alabama UTSA ALA CODE §§8·27-1 to 8·27·6 August 12, 1987 Alaska UTSA ALASKA STAT. §§45.50.91O to September 2, 1988

45.50.945 Arizona UTSA ARIZ. REV. STAT. ANN. §§44·401 to April 11, 1990

44·407 Arkansas UTSA ARK. CODE ANN. §§4-75·601 to 4· Marob 12, 1981

75·607 California UTSA CAL. CIV. CODE §§3426 to 3426.11 "anuary 1, 1985 Colorado UTSA COLO. REV. STAT. §§7·74·101 to 7· July I, 1986

74·110 Connecticut UTSA CONN. GEN. STAT. §§35·50 to 35·58 June 23, 1983 Delaware UTSA DEL. CODE ANN. tit 6, §§2001 to April 15, 1982

2009 District of UTSA D.C. CODE ANN. §§48·501 to 48·510 March 16, 1989 Columbia

Florida UTSA FLA. STAT. cbs. 688.001 to 688.009 October I, 1988 Georgia UTSA GA. CODE ANN. §§10·1·760 to 10·1- July I, 1990

767 Hawaii UTSA HAW. REV. STAT. §§428B·1 to July I, 1989

482B·9 Idaho UTSA IDAHO CODE §§48·801 to 48·807 July I, 1981 Illinois UTSA 765 !LCS 1065/1·1065/9 January 1, 1988 Indiana UTSA IND. CODE §§24·2·3·1 to 24-2·3·8 February 25, 1982 Iowa UTSA IOWA CODE §§550.1 to 550.8 April 27, 1990 Kansas UTSA KAN. STAT. ANN. §§60·3320 to 60· July I, 1981

3330 Kentucky UTSA KY. REV. STAT. ANN. §§365.880 to April 6, 1990

365.900 Louisiana UTSA LA REV. STAT. ANN. §§51:1431 to July 19, 1981

51:1439 Maine UTSA ME. REV. STAT. ANN. tit. 10 May 22,1987

§§1541 to 1548 Maryland UTSA MD. CODE ANN., Com. Law §§11· July I, 1989

1201 to 11·1209 Massachusetts non·UTSA MASS. GEN. L. ch. 93, §§42, 42A Michigan UTSA MICH. CaMP. LAWS ANN. October I, 1998

§§445.1901 to 445.1910 Minnesota UTSA MINN. STAT. ANN. §§325C.01· January 1, 1981

325C.08 Mississippi UTSA MISS. CODE. ANN. §§75·26·1 to 75· July 1, 1990

26·19 Missouri UTSA MO. REV. STAT. §417.450 to October 6, 1996

417.467 Montana UTSA MONT. CODE ANN. §§30·14·401 to 1985

30·14·409 Nebraska UTSA NEB. REV. STAT. §§87·501 to 87· July 9, 1988

507 Nevada UTSA NEV. REV. STAT. §§600A.010 to Marcb 5, 1987

600A.100 New Hampshire UTSA N.H. REV. STAT. ANN. §§350·B:1 to April 3, 1989

350·B:9 New Jersey common law New Mexico UTSA N.M. STAT. ANN. §57·3A·1 to 57·3A· April 3, 1989

7 New York common law

Page 131: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 59

North Carolina non·UTSA N.C. GEN. STAT. §§66-152 to 66-157 1981 North Dakota UTSA N.D. CENT. CODE §§47-25.1-01 to July I, 1983

47·25.1-08 Ohio UTSA OHIO REV. CODE ANN. §§1333.61 July 22, 1994

to 1333.69 Oklahoma UTSA OKLA. STAT. tit. 78, §§85 to 94 January 1, 1986 Oregon UTSA OR. REV. STAT. §§646.461 to January I, 1988

646.475 Pennsylvania common law Rhode Island UTSA RI. GEN. LAWS §§6-41-1 to 6-41-11 July I, 1986 South Carolina UTSA S.C. CODE ANN. §§39-8-10 to 39-8- June 15, 1992

130 South Dakota UTSA S.D. CODIFIED LAWS ANN. §§37- July I, 1988

29-1 to 37-29-11 Tennessee common law Texas common law Utah UTSA UTAH CODE ANN. §§13-24-1 to 13- May I, 1989

24-9 Vermont UTSA VT. STAT. ANN. tit. 9, §§4601 to July I, 1989

4609 ; tit. 12 § 523 Virginia UTSA VA. CODE ANN. §§59.1-336 to 59.1- July I, 1986

343 Washington UTSA WASH. REV. CODE §§19.108.010 to January I, 1982

19.108.940 West Virginia UTSA W. VA. CODE §§47-22-1 to 47-22-10 July I, 1986 Wisconsin UTSA WIS. STAT. §134.90 April 24, 1986 Wyoming common law

"UTSA" indicates that the state statute is modeled after the Uniform Trade Secrets Act "Non-UTSA" indicates that the state stature is not modeled after the Uniform Trade Secrets Act

Page 132: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

60 ALB. L.J. SCI. & TECH. [Vol. 10

EXHIBIT "e"

UNIFORM TRADE SECRETS ACT AND PROPOSED UNIFORM TRADE

SECRETS ACT FOR NEW YORK*

§t§279-n. Definitions As used in this {Aci}article, unless the context requires

otherwise: fBI. "Improper means" includes theft, bribery, misrepresenta­

tion, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means; ~2. "Misappropriation" means: mea) acquisition of a trade

secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or 6B(b) disclosure or use of a trade secret of another without express or implied consent by a person who WCi) used improper means to acquire knowledge of the trade secret; or ffi3(ii) at the time of dis­closure or use, knew or had reason to know that his or her knowl­edge of the trade secret was EB(aa) derived from or through a person who had utilized improper means to acquire it; EH1(bb) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or fHBCcc) derived from or through a per­son who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or tG1(iii) before a material change of his for hert position, knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or mistake.

ffij3. "Person" means a natural person, corporation, limited lia­bility company, business trust, estate, trust, partnership, associa­tion, joint venture, government governmental subdivision or agency, or any other legal or commercial entity.

f4i4. "Trade secret" means information, technical and non-tech­nical, including but not limited to a formula, pattern, compilation, program, device, method, technique, or process, that: @Ca) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its

• Deletions from the Uniform Trade Secrets Act in the proposed Act are indicated by a line through the deleted language. Additions to the proposed Act are indicated by shading of the additions. Sections of the proposed Act have been rearranged to match the Uniform Trade Secrets Act.

Page 133: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999) UNIFORM TRADE SECRETS ACT 61

disclosure or use, and W(b) is the subject of efforts that are rea­sonable under the circumstances to maintain its secrecy. ~279-o. Injunctive Relief

WI. Actual or threatened misappropriation may be temporar­ily, preliminarily, or permanently enjoined. Upon application to the court, an injunction shall be terminatetlvacated when the trade secret has ceased to exist, but the injunction maybe contin­ued for an additional reasonable period of time in order to elimi­nate commercial advantage that otherwise would be derived from the misappropriation. ~2. In exceptional circumstances, an injunction may condition

future use upon payment of a reasonable royalty for no longer than the period of time for which use could have been prohibited. Exceptional circumstances include, but are not limited to, a mate­rial and prejudicial change of position prior to acquiring knowl­edge or reason to know of misappropriation that renders a prohibitive injunction inequitable.

fei3. In appropria.te circumstances, the court may order affirma­tive acts to protect a trade secret. may be eemllelled by eetlrt ertler-;-

§3-;§279-p. Damages Wi. Except to the extent that a material and prejudicial change

of position prior to acquiring knowledge or reason to know of mis­appropriation that renders a monetary recovery inequitable, a complainant is entitled to recover damages for misappropriation. Damages can include both the actual loss caused by misappropria­tion and the unjust enrichment caused by misappropriation that is not taken into account in computing actual loss. In lieu of dam­ages measured by any other methods, the damages caused by mis­appropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator's unauthorized disclo­sure or use of a trade secret. ~2. If willful amlor malicious misappropriation exists, the

court may award exemplary damages in an amount not exceeding twice any award made under stlbseetien (alsubdivision one of this section. §+.§279-q. Attorneys Fees

If (i) a claim of misappropriation is made or continued in bad faith, (ii) a motion to terminate an injunction is made or resisted or continued in bad faith, or (iii) willful amlor malicious misappro­priation exists, the court may award reasonable attorney's fees to the prevailing party. For purposes of this section, a claim of mis-

Page 134: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

62 ALB. L.J. SCI. & TECH. [Vol. 10

appropriation is made or continued in bad faith or a motion to ter­minate an injunction is made or resisted or continued in bad faith if it is undertaken or continued solely to harass or maliciously injure another or to delay or prolong the resolution of the litiga­tion; or it is undertaken or continued without any reasonable basis in fact or law and could not be supported by a good faith argument for an extension, modification or reversal of existing law. §5;§279-r. Preservation of Secrecy

In an action under this {Aet;tarticle, a court shall preserve the secrecy of an alleged trade secret by reasonable means, -" meh may ifteitlffeincluding but not limited to, granting protective orders in connection with discovery flf'eeeeffiftgsdevices pursuant to the pro­visions of §3103 of the civil practice laws and rules, holding in­camera hearings, sealing the records of the action, and ordering any person involved in the litigation not to disclose an alleged trade secret without prior court approval. §&'§279-s. Statute of Limitations

Notwithstanding any inconsistent provision of law, Aaan action for misappropriation must be brought within 3three years after the misappropriation is discovered or by the exercise of reasonable diligence should have been discovered. For the purposes of this section, a continuing misappropriation constitutes a single claim. §'h§279-t. Effect on Other Law

Wl. Except as provided in subsection ~two of this section, this {Aet;tarticle displaces conflicting tort, restitutionary, and other law of this Sifttestate providing civil remedies for misappropriation of a trade secret. ~2. This {Aet;tarticle does not affect: EB(a) contractual reme­

dies, whether or not based upon misappropriation of a trade secret; (B}{b) other civil remedies that are not based upon misap­propriation of a trade secret; or E&)(c) criminal remedies, whether or not based upon misappropriation of a trade secret. §&§279-u. Uniformity of Application and Construction

This {Aet;tarticle shall be applied and construed to effectuate its general purpose to make uniform the law with respect to the sub­ject of this {Aet;tarticle among states enacting it. §9.§279-m. Short Title

This {Aet;tarticle shall be known as and may be cited as the Uni­form Trade Secrets Act. ~§279-v. Severability

Page 135: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

1999] UNIFORM TRADE SECRETS ACT 63

If any provision of this {Aet}article or its application to any per­son or circumstances is held invalid, the invalidity does not affect other provisions or applications of the f.Aetlthis article which can be given effect without the invalid provision or application, and to this end the provisions of the [f,.etlthis article are severable. §H-; Section 2 Time of Taking Effect

This [Act] article takes effect on --, and does not apply to mis­appropriation occurring prior to the effective date. With respect to a continuing misappropriation that began prior to the effective date, the [Act] also does not apply to the continuing misappropria­tion that occurs after the effective date. §l2. Repeal

The fu1l6 .. ing Aets and parts eL\ets are repealed: fB ~ ffi

This document was prepared as a report to the New York State Legislature as a product of the Albany Law School Science and Technology Law Center with funding provided by the Empire State Development Corporation.

Tha Albany Law School Science and Technology Law Center was established in 1998 to provide a resource for constituencies throughout New York State with respect to the legal issues criti­cal to forming, attracting and retaining high technology industries and to facilitate the commercialization of technologies developed at research institutions in the State. To accomplish its mission, the Center: conducts studies to increase awareness about impor­tant legal issues related to technology, such as intellectual prop­erty protection, technology transfer ,university-ind ustrial collaboration, business partnering, employment and immigration; assists in streamlining the technology transfer process and mak­ing it more understandable at research institutions and providing legal services to them; offers an extensive educational program to professionals, entrepreneurs, and others on legal topics important in developing high technology industries using traditional, dis­tance and on-line learning; provides affordable services to start-up and early stage companies for most legal matters through its Entrepreneurial Legal Assistance Program staffed by law stu­dents under the supervision offaculty and volunteer practitioners; and promotes the use of disagreement avoidance and Alternate

Page 136: PROTECTING CORPORATE CONFIDENTIAL INFORMATION: THE …

64 ALB. L.J. SCI. & TECH. [Vol. 10

Dispute Resolution ("ADR") techniques in the technology arena, including training mediators and serving as a clearinghouse for ADR information.

-Editor