Practical Tips

Fighting Back: Identifying Risks Posed by an Angry Current or Former Employee

Something lost is always in the last place you look (by definition).  It can also sometimes be in the first.

Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems and obtain confidential and trade secret information in novel and subtle ways, a lingering, persistent threat to a company’s confidential information and trade secret comes from unhappy employees, both during the time of their employ and after separation. READ MORE

Will Your Cyber Insurance Respond When You Need It Most?

As many companies are considering purchasing cyber insurance, they often wonder: “Will my insurer be there when I have a data breach?”  Cyber insurers have generally been good in paying claims. But the recent lawsuit featured in this Orrick Client Alert demonstrates that as the landscape evolves, insurers may refuse to cover breach costs by arguing that insureds failed to meet “minimum requirements” for cybersecurity. Tending to cybersecurity policies and procedures before breaches occur is more important than ever. READ MORE

Five Minutes With … National Security and Cybercrime Professor Ahmed Ghappour

This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally.  These will be question-and-answers with notable figures in the trade secrets world.

TSW got a chance to sit down with UC Hastings College of the Law professor and Liberty, Security & Technology Clinic founder Ahmed Ghappour.  He had a lot to say about trade secrets, cybersecurity, and encrypting “all the things.”
 
TSW:  Ahmed, TSW is dying to know what you’ve been up to lately in the world of economic espionage.  What’s the inside scoop? READ MORE

Snow Joke: The Weather Channel Zaps Trade Secrets Misappropriation Claims

We have written before about business collaborations gone sour that lead to trade secret misappropriation lawsuits.  In a recent example, The Weather Channel convinced a court to wash away claims that its use of data from a former licensor violated trade secret laws.  We can take away some useful lessons from how both parties approached this relationship and the treatment of sensitive data. READ MORE

Remote Controlled: Keeping Trade Secrets Safe While Employees Work Remotely

One of the biggest challenges the cyber-security field faces today—aside from outright hacking—is the fact that employees’ data is increasingly portable. Data portability can be a major boon for employers. For instance, it may allow an employer to offer its employees the ability to work remotely (something that can improve employees’ work/life balance, or could be a reasonable accommodation for an employee’s disability).  However, data portability can also present major risks for an employer, particularly if an employee stands to profit from misuse of that information. READ MORE

Russian Perspective: Can Sending Confidential Information to Your Personal Email Address Constitute a Disclosure of a Trade Secret?

Imagine that you are the General Director of a company (the Russian equivalent of an American CEO), and your information security department finds out that an employee, who you have long suspected of industrial espionage, has sent important confidential information belonging to the company to his personal email address. In that situation, what would you do? Would you (a) do nothing for the moment and wait until you have more definite proof of industrial espionage; (b) make the employee tell you why he sent the information to his personal email address; or (c) dismiss the employee? Clearly, you need to find out who the information is being sent to and maintain your reputation for enforcing the rules.

READ MORE

Trade Secrets and Third Parties: Litigation Traps To Avoid

Orrick’s Chris Ottenweller and Derek Knerr recently took to Law360 to review recent cases involving theories of third-party liability for trade secret misappropriation.  New employees are one obvious source of potential liability if they bring to the job information obtained from their prior employer. But in recent years companies have also increasingly faced suits based on relationships with contractors and vendors. Chris and Derek offer some practical considerations to help companies mitigate potential liability in the first place.

New Year’s Resolutions for Companies Seeking to Protect Their Trade Secrets in 2015

The start of a new year is a perfect opportunity to set lofty goals of self-improvement. While the odds of completing a New Year’s resolution aren’t exactly inspiring (over half are expected to fail within six months) studies still show that people who make specific resolutions are more likely to achieve their goals than those who don’t. The payout for making a specific plan (particularly when it comes to protecting trade secrets) can be quite rewarding. READ MORE

New Strings Attached: LinkedIn Contacts Are Now Trade Secrets?

From a birds-eye view, Cellular Accessories For Less, Inc. v. Trinitas, LLC appears to be a typical dispute between an employer and its former employee. However, a closer look reveals an issue new to the world of trade secrets—specifically, do LinkedIn contacts qualify as trade secrets? For now, they may: a federal judge in the Central District of California denied defendants’ motion for summary judgment last month, finding there were triable issues of material fact surrounding the question whether LinkedIn contacts were protectable trade secrets. READ MORE

Bigger in Texas? High Court to Decide Scope of Protection for Third Party Trade Secrets in Civil Discovery

On August 22, 2014, the Texas Supreme Court ordered oral argument in In re: Magnum Hunter Resources Corp., a case concerning the discoverability of third-party trade secrets documents in civil cases. When should such documents be produced? And who gets to see them?

A simple summary of the facts of Magnum Hunter are as follows:

Party A hires Law Firm to help it negotiate a contract with Party B regarding an oil and natural gas venture. Party A and Party B ultimately reach an agreement on the venture and enter into a contract that says that Party B will provide to Party A all reports related to the venture upon request, provided that Party A agrees to treat such reports as confidential information.

READ MORE