On Monday, the Senate unanimously passed the Defend Trade Secrets Act (“DTSA”) — a bill that would allow companies to pursue trade secret theft through civil litigation in federal court. This long-awaited measure is a major step towards elevating trade secrets to the level of federal protection enjoyed by the other intellectual property, such as patents, copyrights, and trademarks. Currently, if companies want to sue for trade secret theft, they are generally relegated to state courts where there is a patchwork of inconsistent laws modeled after the Uniform Trade Secrets Act (“UTSA”). The DTSA would create a uniform standard for trade secret misappropriation and provide companies with pathways to injunctive relief and monetary damages to preserve evidence, prevent disclosure, and account for economic harm suffered from misappropriation.
The Legislation. The DTSA would authorize a private civil action in federal court for the misappropriation of a trade secret that is related to a product or service used in, or intended for use in, interstate or foreign commerce. The proposed legislation defines “misappropriation” consistently with the UTSA, and provides for similar remedies, including injunctive relief, compensatory damages, exemplary damages and attorneys’ fees for willful or malicious cases of misappropriation. But the DTSA also differs from the UTSA in several important aspects that could greatly assist companies. Most importantly, the DTSA provides a direct avenue for companies to use the federal court system to protect trade secrets. The DTSA also provides preemptive measures that companies may utilize to preserve evidence, and to thwart dissemination or theft before it occurs. For instance, companies who suspect that the confidentiality of their trade secrets may be compromised could apply for an ex parte order that allows the government to seize its trade secrets before giving any notice of the lawsuit to the defendant. This seizure protection goes well beyond what courts are typically willing to order under existing state and federal law. The DTSA’s statute of limitations period is also five years, as compared to just three under the UTSA. Additionally, the DTSA allows for treble exemplary damages and, unlike the UTSA, contains no language preempting other causes of action that arise under the same common nucleus of facts.
The Implications. Of the four types of intellectual-property rights — copyrights, trademarks, trade secrets, and patents — trade secrets are unique. Trade secrets are not registered with any federal agency, and companies currently have no direct avenue to protect them under federal law through civil litigation. The DTSA addresses these unique qualities by opening the doors of federal courts to companies looking to protect what they consider to be valuable trade secrets. If the House and Senate come together on final legislation, it would be the federal government’s most aggressive response to trade secret theft. We will keep you updated as the DTSA moves to through Congress and the White House.
Prosecutors and employers take notice — one of the most robust, wide-reaching tools against computer fraud and abuse could be blunted. The Second Circuit recently joined the Fourth and Ninth circuits in narrowly interpreting the Computer Fraud and Abuse Act (CFAA) in
The Sixth Circuit recently held that an employer’s “playbook” was protected from disclosure and use, even if the business information was not a “trade secret.” (
Companies with employees across multiple states face an administrative challenge. How do they ensure that their non-compete programs remain up to date with the various states law requirements for enforcement? Four states have recently passed legislation that reinforces the importance of addressing this question. The highlights below from the changing non-compete landscape should prompt companies to review their current non-compete programs and discuss strategies for ensuring that their non-competes comply with any new state laws that may affect their enforcement.
The Center for Responsible Enterprise and Trade (
We frequently discuss the Computer Fraud and Abuse Act (“CFAA”), which prohibits obtaining information from protected computers through unauthorized access or access that exceeds such authorization. Violating the CFAA can have serious consequences, as the statute carries both criminal and civil penalties. But must a defendant obtain information through unauthorized access and exceed authorized access? Ordinarily not. Yet the U.S. Supreme Court will soon consider this question. On June 29, 2015, the Court
When the celebrity gossip blog
Hogan’s counsel also contacted the FBI and requested a criminal investigation regarding the creation and attempted sale of the sex tape. The FBI uncovered a large volume of evidence about the sex tape, and in November 2013, Gawker filed a FOIA request with the FBI, seeking “[a]ll documents relating to an investigation, or a request for an investigation, in October 2012 regarding allegations of illegal recording(s) of Terry Bollea a/k/a Hulk Hogan engaged in sexual relations.”
Williams-Sonoma is embroiled in a contentious trade secret theft case with its former executive and direct competitor. On June 18, 2015, a federal district court in Tennessee granted a preliminary injunction motion to enjoin Williams-Sonoma’s former vice president and direct competitor from using confidential business information, soliciting Williams-Sonoma employees, and destroying electronic evidence. But the federal court refused to give Williams-Sonoma everything it requested. It stopped short of prohibiting Williams-Sonoma’s former senior vice president from working for a competitor. And in doing so, the federal court rejected an invitation to adopt the inevitable disclosure doctrine in this trade secret theft case.