PRESENTATION TITLE CORPORATE ESPIONAGE: Protection, Prevention, Social Media and Prosecution Presented by Audra A. Dial & Clay C. Wheeler.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Advertisements

Bradley Lecture Trade Secrets, NDA’s and Non- competes IM 350 – Fall 2012 Steven L. Baron October 30, 2012.
Consumer Protection in the CNMI Gus Harb Assistant Attorney General.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
1 SSHHHH! It’s a Trade Secret Baron & Lamoureux March 5, 2015 Class 13.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
Restrictive Covenants, Confidentiality Agreements, and Trade Secrets.
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
Trade Secret Fundamentals: What You Can and Can’t Do Peter J. Toren Weisbrod, Matteis, and Copley PLLC 1900 M Street, N.W. Washington, D.C Weisbrod.
Predatory Raiding and High-End Executive Defections Joel P. Hoxie Snell & Wilmer LLP Phoenix, Arizona W INDY C ITY L ITIGATION M ANAGEMENT TRIAL.COM CHICAGO.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Intellectual Property Boston College Law School February 13, 2008 Trade Secret – Part 3.
1 SSHHHH! It’s a Trade Secret Steve Baron April 6, 2006.
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
NON-COMPETES: SHOULD YOU HAVE THEM, AND WHAT TO DO WHEN FACED WITH ONE? Jonathan A. Keselenko Partner Foley Hoag LLP February 6, 2008.
© 2005 West Legal Studies in Business, a division of Thompson Learning. All Rights Reserved.1 PowerPoint Slides to Accompany The Legal, Ethical, and International.
Criminal Antitrust Practice Donald C. Klawiter J. Clayton Everett, Jr. Jennifer M. Driscoll.
Mattel, Inc. V. MGA Entertainment, Inc.. In 2004, MGA Entertainment’s Bratz range of dolls emerged on the market, they presented severe competition to.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Trade Secrets Cases IM 350: Intellectual Property Law and New Media Spring, 2015.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
June 29, 2009 TRADE SECRET LAW.
WHEN THE DEPARTMENT OF JUSTICE KNOCKS DOJ Enforcement Trends: What to Expect and How to Respond Jacqueline Arango Shareholder Akerman Senterfitt.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
 What is conflict of interest and how can it be avoided  What factors should be considered when determining a “ fair wage “
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
1 SECTION 337 INVESTIGATIONS Managing Intellectual Property IP In China April 30, 2013 New York, New York.
Court Procedures Chapter 3.
Protecting Trade Secrets in the United States 2007 US / China Legal Exchange (Xian, Beijing, Shanghai) Rex Hockaday, Caterpillar (China) Investment Co.,
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
How to Protect the Company’s Crown Jewels – Customers & Trade Secrets – Against Unfair Competition William M. Corrigan, Jr. Armstrong Teasdale LLP One.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
1 SSHHHH! It’s a Trade Secret Slides 1-19 Adapted from Steve Baron.
Enforcing IP Rights Involving Foreign Companies Greg Vogler Chicago, Illinois May 2013.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
Lexmundi.com TRADE SECRET PROTECTION IN THE DIGITAL AGE Eric H. Rumbaugh Partner Michael Best & Friedrich LLP Lex Mundi member firm for Wisconsin This.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
What Is A Trade Secret?. Trade Secrets Are Property: Intellectual Property.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
TRADE SECRET SEGMENT PROF. JANICKE JULY Trade Secret Segment2 SOURCES OF LAW 45 STATES: UNIFORM TRADE SECRETS ACT – CIVIL TEXAS: CASELAW DOCTRINES.
1 SSHHHH! It’s a Trade Secret Steve Baron April 3, 2003.
Crime-Tort Jeopardy Business Related Crimes Elements of a Crime Classify Defenses Elements of a Tort Types of Torts Civil Procedure $100100$100100$100100$100100$100100$100100$
Guardians of the IP Law Galaxy: What Employment Lawyers Need to Know Howard L. Steele, Jr., Steele Law Group Penthouse, One Allen Center, Houston, Texas.
James G. Sheehan Associate United States Attorney 615 Chestnut Street, Suite 1250 Philadelphia, PA Phone: (215)
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
18 USC § 1030 Computer Fraud and Abuse Act
Drafting Key Commercial and Consumer Contract Terms
Astrachan Gunst Thomas, P.C.
SSHHHH! It’s a Trade Secret
A Comparative Legal and Economic View of Global Trade Secret Regimes
Update on the Computer Fraud and Abuse Act
INTELLECTUAL PROPERTY AND CYBER PIRACY
Theft of Trade Secrets & Economic Espionage
SSHHHH! It’s a Trade Secret
Trade Secrets CJ 520 / CJ September 27, 2010.
SSHHHH! It’s a Trade Secret
Presentation transcript:

PRESENTATION TITLE CORPORATE ESPIONAGE: Protection, Prevention, Social Media and Prosecution Presented by Audra A. Dial & Clay C. Wheeler

CORPORATE ESPIONAGE IN THE NEWS

PROTECTION OF IP ASSETS To qualify as a trade secret, an asset must derive economic value from not being generally known and be subject to reasonable degrees of protection. Securing confidential information is equally important. IP assets that do not rise to the level of trade secrets can still be protected as confidential information.

GENERAL STRATEGIES TO PROTECT INFORMATION Employment agreements –Ensure employees understand their obligations clearly –Expressly authorize use of electronic information as narrowly as possible –Confidentiality restrictions –Narrowly tailored covenants Computer log-ins and passwords –Restrict levels of access on need-to-know basis Confidential designations, legends, and markings on all confidential information Security cameras, badges, restrictions on access Keep secret information under “lock and key”

WHAT IS CORPORATE ESPIONAGE? 18 U.S.C. §§ 1831 and 1832 prohibit theft of trade secrets by persons or business entities with: Knowledge or intent that the theft will benefit any foreign government, foreign instrumentality, or foreign agent, or Knowledge or intent that the theft will benefit anyone other than the owner of the trade secret, and knowing the offense will injure that owner “Trade secrets” are defined broadly, but not without limit Benefit requirement for trade secret theft is limited to “economic” benefit. Statute reaches overseas conduct

CRIMINAL PROSECUTION CASE STUDY: VICTIM GOLDMAN SACHS Goldman Sachs programmer copied and transferred hundreds of thousands of lines of proprietary source code for benefit of a competitor Convicted of theft of trade secrets under Economic Espionage Act of 1996 and transportation of stolen property in interstate commerce Sentenced to 97 months in prison, 3 years of supervised release, and $12,500 fine (U.S. v. Aleynikov, No. 1:10-cr (S.D.N.Y. Feb. 11, 2010) In February 2012, the Second Circuit reversed the conviction on both counts, but left the door open for the government to seek an en banc hearing. –The decision to reverse may have hinged on the “produced for or placed in interstate or foreign commerce” language in §1832(a)

WASHINGTON’S REACTION TO THIS THREAT Office of the U.S. Intellectual Property Enforcement Coordinator created in 2008 The Department of Justice Task Force on Intellectual Property created in 2010— monitors and coordinates enforcement Economic Espionage Penalty Enhancement Act of 2011—increased maximum penalties

TECHNIQUES OF CORPORATE ESPIONAGE –Theft by an insider (esp. current or former employee) –Exploiting lax password management – spam –Manipulation of supplier/customer relationship –Aggressive collection of public information

CASE STUDY: MGA ENTERTAINMENT v. MATTEL, INC. Manufacturer of Bratz® dolls alleged that Mattel infiltrated confidential competitor showrooms in order to get an illicit preview of new Bratz® products before they hit market so that Mattel could imitate or copy them, after market for Barbie dolls had declined Alleged violations of, inter alia, Sherman Antitrust Act and California Business Practices Act $309 million judgment entered: $85 million in compensatory damages, $2.5 million in attorneys' fees/costs on trade secret claims, $135 million attorneys' fees and costs on copyright claims MGA Entm’t, Inc. v. Mattel, Inc., No. 2:11CV01063 (C.D. CAL. Feb. 3, 2011)

PREVENTION OF CORPORATE ESPIONAGE Remind employees of confidentiality obligations and what information is confidential Audits of compliance with corporate policies Central monitoring of electronic access to information Monitor Internet postings and blogs Password security Global employee “tip line” Anti-eavesdropping techniques

INTERNAL INVESTIGATIONS Why conduct an internal investigation? –Identify problems with internal controls –Identify and discipline bad employees –Satisfy disclosure obligations to shareholders, governments or others –Prepare for disclosure to law enforcement

BENEFITS OF A WELL-DONE INVESTIGATION China Corporate Espionage Boom Knocks Wind Out of U.S. Companies (Bloomberg 3/15/12) Through forensic data, AMSC determined its engineer in Austria had ed AMSC’s proprietary source code to Sinovel counterparts. AMSC filed four separate lawsuits against the Chinese company in Chinese courts seeking over $1.2 billion in damages for theft of source code involving wind turbine technology.

TO REPORT OR NOT TO REPORT? The determination of whether to involve the criminal authorities can be complicated: –Loss of control of the matter –Subjecting company to government subpoenas and interviews –Risk of disclosure of the trade secret –Increased resources of federal law enforcement The first consideration is how to protect the client from any potential criminal exposure.

CIVIL PROSECUTION OPTIONS State Trade Secret Statutes State Business Practices Acts Conversion Unfair Competition Breach of Employment/Confidentiality Agreements Tortious Interference Civil RICO or CFAA Claims

RICO ACT (18 U.S.C. § 1961 et seq.) “Pattern of Racketeering” requires two or more predicate acts such as mail/wire fraud, false statements, interstate transport of stolen goods, criminal copyright infringement “Enterprise” includes any individual, partnership, corporation, association, or other legal entity, and any union or group of individuals associated in fact although not a legal entity “Injured in his business or property” requires actual, quantifiable injury to business or property

COMPUTER FRAUD AND ABUSE ACT (“CFAA”) Provides for civil and criminal remedies against any person who “knowingly and with intent to defraud, accesses a computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value.” 18 U.S.C. § 1030(a)(4)

HOW BROAD IS THE CFAA? Agency/Broad: Did the employee use the computer for a disloyal or wrongful purpose? (7 th Circuit) Middle: Did the employee go beyond his employer’s access restrictions, even if he was authorized to use the computer for certain purposes? (1 st, 5 th and 9 th, 11 th Circuits) Plain Language/Narrow: Did the employer authorize the employee to use the computer? (2 nd, 3 rd, 9 th Circuits)

CIVIL PROSECUTION CASE STUDY: PAYPAL, INC., ET AL. v. GOOGLE INC. PayPal and eBay filed suit alleging former executives misappropriated “mobile payment” trade secret technology for the benefit of Google, which allegedly recruited and hired executives for that very purpose Alleges claims for misappropriation, breach of contract, interference with contractual relations, unfair competition, breach of fiduciary duties, etc. Seeking, inter alia, injunctive relief and damages PayPal, Inc., et al. v. Google Inc., et al., No CV (Santa Clara Cty. Super. Ct., Cal. May 26, 2011)

CIVIL PROSECUTION CASE STUDY: PHONEDOG.COM Trade secret misappropriation claim against former employee who followers followers upon departure from Phone Dog; trade secrets are Twitter followers Motion to dismiss denied

CIVIL PROSECUTION CASE STUDY: ALPHA TIRE SYSTEMS Former marketing manager of Alpha Tire Systems conspired with competitor to steal blueprint for unique mining tire Alleged copyright infringement, trademark infringement, unfair competition, conversion, conspiracy, etc. Jury verdict of $26 million on July 15, 2010 In re: Outsidewall Tire Litig., No. 1:09cv1217 (E.D. Va. Oct. 28, 2009)

CIVIL PROSECUTION CASE STUDY: STARWOOD HOTELS v. HILTON HOTELS Starwood alleged that Hilton induced Starwood employees to serve as corporate spies to provide Hilton with Starwood’s confidential development plans and business opportunities for its luxury brands Alleged theft of 100,000+ electronic files Preliminary & permanent injunction; court monitors appointed until 2013; ongoing criminal investigation Starwood Hotels v. Hilton Hotels Corp., No. 09-cv-3862 (S.D.N.Y. Apr. 16, 2009)

CRIMINAL PROSECUTION OPTIONS Economic Espionage Act of 1996 National Stolen Property Act Wire Fraud

NATIONAL STOLEN PROPERTY ACT Violation requires: 1)Transportation in interstate or foreign commerce of 2)Goods, wares, or merchandise 3)That the Defendant knew were stolen, converted or taken by fraud. 18 U.S.C. § 2314

CRIMINAL PROSECUTION CASE STUDY: VICTIM DOW CHEMICAL Former Dow Chemical Co. scientist stole trade secrets and confidential and proprietary information pertaining to Dow’s CPE process and product technology and conspired to sell the technology to various Chinese companies. Sentenced to five years in prison in a Louisiana federal court for selling the rubber-making secrets obtained from Dow and lying under oath U.S. v. Liu, No. 3:05-cr (M.D. La., February 7, 2011) Liu has filed notice of appeal

CRIMINAL PROSECUTION CASE STUDY: VICTIM GOODYEAR British engineers secretly photographed equipment in Goodyear’s Kansas factory to use in designing and manufacturing a similar device for Chinese customer Convicted of, inter alia, trade secret theft, conspiracy, and wire fraud Sentenced to 4 years probation and $1000 fine. Currently on appeal. United States v. Roberts, 3:08-cr (E.D. Tenn. Dec. 2, 2008)

CIVIL & CRIMINAL PROSECUTION CASE STUDY: VICTIM DUPONT Former DuPont employee took proprietary information to Korean company Kolon Industries for manufacture of Kevlar technology Employee convicted and sentenced to 18 months imprisonment for theft of trade secrets and obstruction of justice Civil trial against Kolon, alleging, inter alia, misappropriation, conspiracy to injure, civil conspiracy, and tortious interference with contractual relations ongoing $920 million compensatory + $350K punitive damages against Kolon with finding of spoliation of evidence U.S. v. Mitchell, No. 3:09-cr (E.D. Va. Dec. 9, 2009) DuPont v. Kolon Indus., Inc., No. 3:09-cv (E.D. Va. Feb. 3, 2009)

CONTACT INFORMATION Audra A. Dial Kilpatrick Townsend Atlanta (404) Clay C. Wheeler Kilpatrick Townsend Raleigh | Winston-Salem (919)