We recently reported on good things (big verdicts) coming to trade secret plaintiffs that endure lengthy lawsuits. But good things don’t always come to those who wait. One trade secrets plaintiff received a starkly less favorable result after battling for ten years over misappropriation of its alleged trade secrets and related claims. On June 18, Eaton Corporation and Triumph Group announced they settled their decade-long dispute arising from Eaton’s claims that its former employees stole trade secrets and used them at competitor Frisby Aerospace (later acquired by Triumph). Though the exact terms of the settlement are confidential, Eaton will reportedly pay about $135 million to Triumph and $12 million to be split among its former employees. READ MORE
Geoff Moss is a recovering software developer who counsels software and technology clients through thorny intellectual property issues.
As a member of Orrick’s Intellectual Property group, Geoff represents clients big and small through all stages of litigation, from pre-suit investigations through trial and appeals. Geoff was a member of the trial team and lead technology associate in Oracle v. Google, the long-running and high stakes lawsuit over Google’s use of Oracle’s Java APIs in the Android operating system. Geoff also has significant experience representing clients in a variety of commercial, employment, and products liability lawsuits.
Before attending law school, Geoff worked as a software developer at The Capital Group Companies, Raytheon, and the Teradata division of NCR.
Geoff spends significant time working on pro bono matters, notably with the Domestic Violence Project through the Los Angeles County Bar Association. The Project helps those in need navigate a complicated legal system in their time of need to get the restraining orders they need to stay safe.
Posts by: Geoffrey Moss
The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate with DOD in the event that this information is compromised through a cyberattack. The rules come nearly two years after draft rules were first announced and in the midst of continuing public concern about the threat of state-sponsored trade secrets theft. READ MORE