There are many ways to gain trade secret protection, but also many ways to lose it. As the recent motion to dismiss ruling in Fleetwood Packaging v. Hein from the Northern District of Illinois illustrates, how a company vacuum packs its confidential information can make all the difference between preserving it and watching it get spoiled by a competitor. READ MORE
Employee Misappropriation
Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case
Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly accessed (but later misused), your CFAA claim, and the federal question jurisdiction that comes with it, is in jeopardy. In SunPower Corp. v. SunEdison, Inc., Judge Orrick of the Northern District of California recently dismissed the plaintiff’s CFAA claim because the plaintiff failed to allege that the data was accessed without authorization, only that it was later misused. Because the CFAA claim provided the basis for federal jurisdiction, Judge Orrick indicated that he would dismiss the entire case and not exercise pendent jurisdiction over the remaining thirteen state claims if the CFAA claim could not be properly amended. READ MORE
Securing your Network: Claiming Contacts as Trade Secrets
The paradigmatic trade secret is something that is obviously technical, such as source code or the formula for Coke. Though trade secrets protection is not limited to technical trade secrets, it can sometimes be tricky to claim trade secrecy over non-technical trade secrets, such as customer or employee contact lists, that are commercially valuable yet may seem more accessible and therefore less secret. California Code of Civil Procedure Section 2019.210 compounds the issue by requiring a plaintiff to make a detailed disclosure of trade secrets as a precondition to frame the discovery to come. Section 2019.210 therefore immediately places an often-challenging decision upon the plaintiff—selecting what it should claim as trade secrets in litigation. READ MORE
Fighting Back: Identifying Risks Posed by an Angry Current or Former Employee
Something lost is always in the last place you look (by definition). It can also sometimes be in the first.
Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems and obtain confidential and trade secret information in novel and subtle ways, a lingering, persistent threat to a company’s confidential information and trade secret comes from unhappy employees, both during the time of their employ and after separation. READ MORE