The United States Court of Appeals for the Fifth Circuit recently revisited the issue of the Copyright Law preemption of trade secrets claims in Spear Marketing, Inc. v. Bancorpsouth Bank. The decision not only resolved the scope of Copyright Law preemption in the Fifth Circuit, but also made clear that the Fifth Circuit “join[s] the majority position” to hold that state law claims based on ideas fixed in tangible media are preempted by §301(a). The decision creates greater clarity and uniformity in Copyright Law preemption and should help litigants avoid wasting resources by filing actions based on state law claims that are preempted. READ MORE
Trade Secrets
One Step Closer: European Parliament Legal Affairs Committee Approves Trade Secret Directive
As Trade Secrets Watch has previously reported, new rules regarding the protection of trade secrets are on the horizon for the European Union. In November 2013, the European Commission announced a proposed Directive on trade secrets and confidential information. Around six months later, in May 2014, the Council of the European Union agreed on a revised draft Directive. Reception of the Trade Secrets Directive has been mixed. READ MORE
Securing your Network: Claiming Contacts as Trade Secrets
The paradigmatic trade secret is something that is obviously technical, such as source code or the formula for Coke. Though trade secrets protection is not limited to technical trade secrets, it can sometimes be tricky to claim trade secrecy over non-technical trade secrets, such as customer or employee contact lists, that are commercially valuable yet may seem more accessible and therefore less secret. California Code of Civil Procedure Section 2019.210 compounds the issue by requiring a plaintiff to make a detailed disclosure of trade secrets as a precondition to frame the discovery to come. Section 2019.210 therefore immediately places an often-challenging decision upon the plaintiff—selecting what it should claim as trade secrets in litigation. READ MORE
First Foreign Hacker Is Convicted In The United States Of Hacking Crimes Involving Theft Of Trade Secrets From American Companies
A 22-year-old Canadian hacker has been sentenced to federal prison by a Delaware court for engaging in a conspiracy to break into the computer networks of several large gaming companies, to steal trade secret and other information related to unreleased products, and to commit criminal copyright infringement. According to the Government’s Sentencing Memorandum, David Pokora of Ontario, sentenced last Thursday was “a leading member in an international computer hacking ring . . . that committed numerous unlawful intrusions into the computer networks of various technology companies involved in the $22 billion-dollar video gaming industry.” The conspiracy’s victims included Microsoft, Epic Games (which develops the highly popular “Gears of War” series), and Activision Blizzard (which published, among many other successful games, “Call of Duty: Modern Warfare 3”). READ MORE
All Bets Are Off: Kentucky Downs Trade Secrets Case Presents Novel Question Under Kentucky’s Uniform Trade Secrets Act
Earlier this month, AmTote International, Inc. sued the famed Kentucky Downs racetrack, three high-ranking Kentucky Downs employees, and Encore Gaming, LLC in federal court alleging misappropriation of trade secrets related to horse racing betting machines. AmTote’s lawsuit presents the interesting question of whether the “inevitable disclosure” doctrine applies under Kentucky law. READ MORE
Back in a Flash: Sergey “Flash Boy” Aleynikov Returns to Court for New Trial
Sergey Aleynikov’s six-year odyssey through the U.S. judicial systems—both federal and state—continues. Last week, Aleynikov stepped into a New York State courtroom to defend himself at trial against a pair of criminal charges stemming from his 2009 arrest for allegedly stealing source code for one of Goldman Sachs high-frequency trading platforms. If convicted on the two counts – unlawful use of secret scientific material and unlawful duplication of computer-related material – Aleynikov could face a return trip to prison for up to eight years. READ MORE
How Much Damages Can You Realistically Expect for Trade Secrets Misappropriation in China
The best way to protect trade secrets is to prevent them from being misappropriated in the first place, but when trade secret misappropriation occurs, a trade secret holder will likely want to obtain adequate damages through litigation. The methods of calculating damages for trade secret misappropriation are thus crucial, since remedies available to the trade secret holder are determined by these methods. Although China lacks formal remedies for trade secret misappropriation, it has a body of trade secret law that flows from various statutes. READ MORE
March Madness: Trade Secrets Claims Block Billion Dollar Bracket
For those of us who revel in this time of year as amateur “bracketologists,” last year’s promise of the billion dollar bracket brought an added lottery-like level of fun to the NCAA basketball tournament. Even though the odds of winning were (as stated by the rules) 1 in 9 quintillion, people believed that there COULD be that one winning bracket – that is, until Memphis beat George Washington University and everyone’s perfect bracket hopes died. READ MORE
POTUS Declares Cybercrime a National Emergency, Announces New Penalties for Trade Secrets Theft
Declaring cybercrime a “national emergency,” President Obama today empowered Treasury to freeze assets that are the fruits of cybercrime, according to an Executive Order issued this afternoon. The agency can block money or property in the United States or in the control of any United States person determined to have engaged in “cyber-enabled activities” originating or directed from outside the United States. Targeted activities include harming computer networks in critical infrastructure sectors; significantly disrupting a computer network; or causing significant misappropriation of trade secrets and other protected information. The EO also enables seizure of money or property of any persons involved in misappropriating trade secrets by “cyber-enabled means” that impact the national security, foreign policy, or economic health or financial stability of the United States.
TSW is tracking the EO and will report further developments.
China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?
Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. Among other things, the newly adopted regulations require foreign technology companies that sell computer equipment to Chinese banks to submit to obtrusive audits, set up research and development centers in the country, build “back doors” into their hardware and software, and, perhaps most disconcerting, disclose intellectual property to the Chinese government, including proprietary source code. READ MORE