1 / 57

Using Non-Disclosure Agreements Offensively and Defensively

Using Non-Disclosure Agreements Offensively and Defensively. A Case Study. Trade Secret Litigation. LITTLE CORP. V. GOLIATH CO. Larry — President, Chief Executive Officer. Curly —Director of Engineering. Moe —VP of Engineering. Shemp —Consulting Engineer.

jaguar
Download Presentation

Using Non-Disclosure Agreements Offensively and Defensively

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Using Non-Disclosure AgreementsOffensively and Defensively

  2. A Case Study Trade Secret Litigation LITTLE CORP. V. GOLIATH CO.

  3. Larry—President, Chief Executive Officer Curly—Director of Engineering Moe—VP of Engineering Shemp—Consulting Engineer Cast of Characters—Little Corp.

  4. Cast of Characters—Little Corp. CruellaDeVil - VP of Marketing and later President, CEO

  5. Before 1995 - 15 year mutually beneficial relationship 3/8/95 - CDA signed, both parties bound by terms 4/24/95 - Little Corp. presents concept to Goliath audience 9/10/95 - Moe fired - “choked” at presentation 11/6/95 - Follow-up meeting with Goliath engineers who challenge Little Corp.’s data and claims. Goliath suggests repositioning technology for internet. 12/1/95 - Shemp fired TimelineofEvents

  6. Jan. ‘96 - “New internet Project” announced at Little Corp. Spring ‘96 - Software development slow and product full of bugs June ‘96 - Curly fired July ‘96 - Cruella hired as VP Marketing Sept. ‘96 - Goliath announces future internet product release Nov. ‘96 - Memo from Cruella to Little Corp. Board re: alleged mismanagement of project by Larry 12/2/96 - Larry fired by Board TimelineofEvents

  7. TimelineofEvents • December ’96 - Cruella shuts down internet project and writes memo outlining strategy to sue Goliath • December ’97 - Goliath internet product beta release • June ’98 - Goliath internet product release • August ’98 - Little Corp. sues Goliath

  8. General Lessons of Little Corp. v. Goliath Co. • Business relationships are between individuals, but legal relationships are not • New management • Even former allies’ loyalties can be bought/rented . . . Larry - $50,000 Curly - $30,000 Moe - $20,000 Shemp - $110,000

  9. Lessons for CDA • Maintain a paper trail of what you disclosed and/or received and when [and who was present] • [Accurately] Define how the Confidential Information may be used in as much detail as possible

  10. Lessons for CDA Goliath Corp

  11. Lessons for CDA Goliath

  12. Court Order

  13. Lessons for CDA • Maintain a paper trail of what you disclosed and/or received and when [and who was present] • [Accurately] Define how the Confidential Information may be used in as much detail as possible • Confidentiality obligations terminate in 3 years unless otherwise stated

  14. Lessons for CDA Goliath

  15. Court Order

  16. Lessons for CDA • Maintain a paper trail of what you disclosed and/or received and when [and who was present] • [Accurately] Define how the Confidential Information may be used in as much detail as possible • Confidentiality obligations terminate in 3 years unless otherwise stated • Remember that ALL Confidential Information must be marked CONFIDENTIAL, or if disclosed orally, must be designated CONFIDENTIAL and then confirmed as such in writing WITHIN 30 DAYS of the disclosure

  17. Tailoring a Trade Secret Policyand Procedures to Your Company

  18. Developing A Trade Secret Program in 5 “Easy” Steps • Appoint the right people to develop P&P • Conduct a trade secret audit and inventory • Develop and implement the P&P • Educate Employees • Enforce It

  19. First Step for Developing A Trade Secret P&P • Appoint a Trade Secret Compliance Officer • Duties: • controlling the use of NDAs • maintaining logs and records of NDAs • track disclosures and receipts of confidential information • monitor steps taken to maintain secrecy • oversee the implementation and enforcement of the P&P

  20. First Step for Developing A Trade Secret P&P • Appoint a P&P Development Team • Comprised of: • trade secret compliance officer • representatives of company departments: • information technology • human resources • training • records management • security • legal

  21. Next Step: Trade Secret Audit and Inventory • Reasons for Identifying Company Trade Secrets • Know and understand confidential assets • Protect confidential assets consistently • Reduces risks involving third party trade secrets • Meet burden of proof in trade secret litigation • often fast track • little time to identify and document trade secrets • some problems can’t be fixed

  22. Information may be viewed andtreated as a trade secret if: • Not generally known outside of the company • Valuable to the company (or likely would be valuable to competitors), for example: • company spent significant effort or money developing the information • gives the company a competitive advantage • is likely to lead to a commercial product or licensing • cannot be easily acquired or duplicated by others • a competitor is likely to try to arrive at the same development independently • a competitor is likely to design around • Measures have been taken to guard the secrecy of the information.

  23. Trade Secret Audit and Inventory • Identify the information the company wishes to protect • by type • by value to the company • by location • by storage method • Memorialize nonwritteninformation • Include catchall language • “purpose of inventory is to identify types of company trade secrets to better inform management, and may not be complete” • Describe the value of the secret information to the company • Maintain records • Develop procedures for documenting • Trade secrets identified by inventory • Steps taken to maintain secrecy

  24. Trade Secret Audit and Inventory • Develop a plan for applying these principles and auditing • One approach: group leaders identify and document secrets in their groups, report to compliance officer • Identification and protection of trade secrets should be a dynamic, ongoing process. • portfolio of trade secrets is constantly changing • new confidential information should be documented and protected as it is created or received • update annually, if possible • Develop procedures for conducting periodic review and update

  25. Where to Look for Trade Secrets • Technical Information/Research & Development • Production/Process Information • Vendor/Supplier Information • Quality Control Information • Sales & Marketing Information • Internal Financial Information • Internal Administrative Information • Internal Computer Software • Any information of strategic or other importance to the company

  26. Third Step: Developing A Trade Secret P&P • Basic Goals • Courts expect a combination of measures that: • keep information secret inside the company • prevent or control access to such information by third parties • Two separate documents, both tailored to the company

  27. Developing A Trade Secret P&P • P&P and Inventory should be done in conjunction with counsel • They have done it before • Adequate audit and inventory • Adequate steps to maintain secrecy • Adequate documentation • Adequate procedures and enforcement • Attorney-client privilege

  28. Developing A Trade Secret Policy • Directed to all employees • Relatively short • Easy to understand • Expresses general rules, guidelines, principles, and philosophy • Informs employees of the existence of company’s trade secret protection procedures

  29. Developing A Trade Secret Policy • State that employees have affirmative obligations to: • identify, protect, and maintain secrets • access, use, and disclose company secrets only for business purposes, to benefit the company • resolve doubts in favor of the company and its best interests, and maintain secrecy • comply with applicable laws and regulations • honor software licenses and other agreements • report violations of the P&P • direct doubts and questions about the P&P to management.

  30. Developing Trade Secret Procedures • Much more detailed • This presentation is the tip of the iceberg • Checklist • Company’s rules for handling confidential information • They should control and standardize procedures for: • Identifying trade secrets • Handling trade secrets inside the company • Trade secrets leaving the company • Equipment used in connection with trade secrets • People with access to trade secrets

  31. Developing Trade Secret Procedures • They should control and standardize procedures for (cont’d): • Company’s receipt of third party trade secrets • Implementing clean room procedures • Company’s engagement in R&D (or other joint projects) with third parties, involving trade secrets • Educating company employees regarding the P&P

  32. Developing Trade Secret Procedures • State that the definition and scope of potential trade secrets is very broad • Include examples of trade secrets • Include examples of trade secret materials • Company may wish to protect information that does not rise to the level of a trade secret. • may designate several levels of confidential information • may protect them in different ways

  33. Developing Trade Secret Procedures • Establish meanings for terms and use them consistently (and not interchangeably if they have different meanings). For example: • Proprietary • may include all intellectual property • Confidential • may be available for licensing and disclosure to third parties • Restricted • may not be available for licensing and disclosure to third parties without special approval • Secret • may not be disclosed outside the company without Board approval • Top Secret • may be known by only a few people • maybe no one knows the whole secret

  34. Developing Trade Secret Procedures • Develop restrictions applicable to each level of confidentiality • “Need to know” matrix • Develop rules for labeling confidential information appropriately: • Company name • Confidentiality statement • Copying, disclosure, and use restrictions • Only authorized persons may access, use, disclose • Label every page

  35. Physical Safeguards Write Procedures for: • Creating maintaining, and using a trade secret repository • Restricting access to secret information, documents, plants, and facilities • Examples……….

  36. Dividing and coding information Visitors/tours Identity badges and/or access cards Movement of information Areas where secret information is kept Shredding or other destruction DON’T FORGET THE GARBAGE Physical and e-copies Technological copy protections Copying & copies Employees who work outside the office: materials access storage Hours and monitoring access to information or facilities Information in plain view Physical Safeguards Write Procedures for Controlling:

  37. Physical Safeguards Write Procedures for: • Installing security measures with varying degrees of security based on the level of confidential information kept in each area, e.g.: • automatic locks • fingerprint and retinal readers • voice recognition • changing locks and security codes periodically • fences • Signs • security guards and dogs • television monitors • alarms

  38. Procedural Safeguards Write Procedures for: • Assuring that access to trade secret information is on a need-to-know basis • Bringing or using at work: • Cameras • IPODS • Controlling disclosures in: • Speeches • Technical papers • Business and marketing documents

  39. Procedural Safeguards Write Procedures for: • Scrubbing old computers before disposing of them or donating them to charity • Distributing trade secret information • depending on level of confidentiality • Not by email (including text messaging and instant messaging)

  40. Procedural Safeguards Write Procedures for: • The end of the day: • log out of computer • lock up secret documents • lock the office • make sure everyone is gone from the division • lock the division offices • sign out

  41. Procedural Safeguards Write Procedures for: • Safeguarding documents • Labeling • Securing • Copying • Screening • Tracking

  42. Write Procedures for Electronic Data and Electronic Devices • Network and information access, firewalls • Encryption of communications • Use of computers, fax machines, photocopiers, etc. • Monitoring • Storage • Copying and downloading • Transmission • Tracking and logging access • Automatic legends • copying restrictions • secrecy restrictions

  43. Write Procedures for InformationLeaving the Company • What information can be disclosed • Who can disclose it • Who has authorized access • How and when • Participation in Open Source/Standards Bodies • Marking trade secret information • Encryption • Email (including text messaging and instant messaging): • no personal email software or accounts for business or personal communications at the office • require copying the boss • The use peer-to-peer applications

  44. Write Procedures for Information Leaving the Company • Monitoring employee communications, consistent with privacy laws • law may require informing employees that phone and email (including text messaging and instant messaging) will be monitored • some countries may not allow monitoring • Monitoring email attachment size • Monitoring third parties who have received company secrets • Using content filtering tools that automatically encrypt, block, hold • Monitoring vendors with access to secrets

  45. Write Procedures for Information Leaving the Company • Shipping • NDAs • Agreements with third parties (e.g., license agreements, collaboration agreements, joint venture agreements)

  46. Write Procedures for Controlling People • First line of defense: disclose trade secrets only on a need-to-know basis  • Second line: ensure that everyone with a need-to-know has executed a confidentiality agreement • Third line: confidentiality agreements should be executed with all employees with potential access to trade secrets 

  47. Write Procedures for Controlling People • Employee intake procedures • Employee exit procedures • Develop procedures for requiring employees who create information or inventions to: • assign IP to the company • license previous inventions to the company • agree to injunctive relief for breaches of the agreement • Current employees may need new consideration, and new agreement and consideration may be needed after material change in job (e.g., a promotion)

More Related