Criminal

Pooley’s Corner: Was America’s Industrial Revolution Based on Trade Secret Theft?

When I was in Geneva trying to engage developing countries about the value of robust IP laws, occasionally I heard a response like this: “What hypocrites you are! The U.S. economy got its start by stealing from abroad. Why should today’s poor nations be denied the same opportunity to catch up?” The argument stung enough that I thought I should check out the real story. Here’s what I found.

On an early September day in 1789, Samuel Slater, 21 years old, boarded a ship in London to begin a voyage to New York. His family didn’t know he was doing this. He presented himself as a simple laborer, a farm hand. He was lying. Hidden in his pocket were his only official papers, identifying him as a recently released apprentice to a cotton mill. READ MORE

ECONOMIC ESPIONAGE AND PROTECTING TRADE SECRETS: Ninth Circuit Holds That Reasonable Measures to Guard Technology are Sufficient

How can you protect your trade secrets from a vast and well-concealed international effort to steal those secrets? What constitutes a “reasonable” effort to protect that information where at least one competitor may already have the information?  The Ninth Circuit recently opined on these matters in the ongoing saga of U.S. v. Liew.

In 2014, Walter Liew and his company, USA Performance Technology, Inc., were convicted of multiple offenses, including claims under the Economic Espionage Act and conveying misappropriated trade secrets to a third party. The trade secrets related to DuPont’s technology for producing titanium dioxide, which is used in a wide range of products such as paint and Oreo cookies. READ MORE

The Saga Continues: New York’s Highest Court Will Weigh in on Aleynikov’s Fate

On April 20, 2017, the New York Court of Appeals issued a brief order continuing former Goldman Sachs programmer Sergey Aleynikov’s eight-year voyage through the state’s and country’s legal systems.  Here’s the issue:  does making a digital copy of misappropriated source code instead of physical copy constitute a “tangible reproduction or representation” of the source code?   READ MORE

Password Sharing Is Not a Crime, Ninth Circuit Reassures in Denial of Nosal’s Request for Rehearing

Since the early days of this blog, we’ve been covering the ongoing legal battle involving ex-Korn Ferry recruiter David Nosal as it winds its way through the courts. The latest chapter in this saga came on December 8, 2016, when a Ninth Circuit panel clarified that the Computer Fraud and Abuse Act (CFAA) does not criminalize innocent password sharing, in a published opinion denying Nosal’s request for a rehearing en banc. READ MORE

Amendment to Federal Criminal Procedural Rule Could Impact Trade Secret Cases

Much attention, including here at Trade Secrets Watch, has been focused in recent weeks on the Defend Trade Secret Act (“DTSA”), which overwhelmingly passed both houses of Congress in April and was signed into law by President Obama on May 11th. The DTSA gives companies new tools for combatting alleged trade secret theft, including a direct path to federal court via the addition of a private right of action to the Economic Espionage Act (EEA) and the ability to apply for ex parte seizure orders to prevent propagation or dissemination of stolen trade secrets. READ MORE

Trade Secrets and Cloud Services: Is the Sky the Limit?

Germany is not only known as one of the best countries for enjoying beer and bratwurst, but it is also known as a country with some of the strictest data privacy laws on the planet. Within this environment, should companies doing business in Germany even consider using cloud services for trade secrets? They should! READ MORE

Proving “Loss” Under the Economic Espionage Act – Not Always Straightforward

The Obama Administration’s focus on criminal trade secret prosecutions under the Economic Espionage Act (EEA) highlights the legal complexities at the murky intersection between criminal and civil jurisprudence in trade secrets cases. As we previously discussed, when it comes time for sentencing, determining the “value” of the stolen trade secrets is often difficult—and courts have applied different valuation models. READ MORE

Money Is Time: A Note on Valuation and Sentencing in Criminal Trade Secrets Cases

Criminal trade secrets prosecutions tend to make national headlines, and for good reason. With fact patterns that often involve international intrigue, high technology, and millions of dollars in play, these cases can read like a James Bond flick. But while astronomical monetary figures make good copy, they also present vexing legal questions that can have drastic impacts on sentencing. READ MORE

Ninth Circuit Hears Oral Arguments in United States v. Nosal, Part II

On October 20, 2015, a three judge panel of the Ninth Circuit heard oral arguments in Round II of United States v. David Nosal.  Both sides generally stuck with arguments from their briefs, with Nosal’s counsel arguing that upholding Nosal’s  conviction under the Computer Fraud and Abuse Act (the “CFAA”) would lead to criminalization of relatively minor misappropriations of information, and the government arguing that the precedent would only apply in the employment context. READ MORE

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco.  So we figured it may be a good time to review both sides’ arguments related to the Computer Fraud and Abuse Act. After doing so, it seems to us that one topic not given any consideration in the briefs, but that may play a role during oral argument is the phenomenon known as phishing schemes, and how such schemes might be compared and contrasted with the scheme alleged in this case. READ MORE