International Theft of Trade Secret: A Case Study Presented by: Nenette Day.

Slides:



Advertisements
Similar presentations
TRADE SECRETS. Outline of Presentation What are trade secrets Keeping them secret Trade secrets or patents Legal protection for trade secrets and remedies.
Advertisements

Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
© 2009 Cengage Learning. All Rights Reserved. Healthcare Fraud and Abuse.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
Criminal Law and Cyber Crime
Law I Chapter 18.
The University Startup Company Law Firm California Massachusetts Florida (310) Stephen P.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Sarbanes-Oxley Act. 2 What Is It? Act passed by Congress in response to the recent and continuing corporate scandals. Signed into law July 30, Established.
Detection and Confiscation of the property obtained by criminal means Dalian, 2012.
Steven D. Grimberg United States Attorney’s Office Northern District of Georgia DATA SECURITY BREACHES.
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
Intellectual Property Boston College Law School February 10, 2009 Trade Secret – Part 2.
Intellectual Property Boston College Law School February 7, 2007 Trade Secret – Part 2.
1 SSHHHH! It’s a Trade Secret Steve Baron April 6, 2006.
INTERNET and CODE OF CONDUCT
Company LOGO Software Piracy Software Piracy Software Pirate Gets 7 Years in Prison Cannelle Cuvelier.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
The Investigative Process The responsibility of all who work within the field of criminal justice, both public and private investigators.
“How Private Is It?”.  Resources  Learning Opportunities  Reporting  Policies and Procedures.
Corruption in the United States Introduction Federal Bureau of Investigation Public Integrity Section of Dept. of Justice Overview –Jack Abramoff –U.S.
Obtaining Evidence through Discovery & Witnesses John W. McReynolds Assistant Chief New York Field Office Antitrust Division U.S. Department of Justice.
Federal Bureau of Investigation
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
June 29, 2009 TRADE SECRET LAW.
Summary of the Investor Protection, Auditor Reform, and Transparency Act of 2002 (Sarbanes-Oxley Act)
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
11 Controlling Organized Crime.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
1 SSHHHH! It’s a Trade Secret Slides 1-19 Adapted from Steve Baron.
Enforcing IP Rights Involving Foreign Companies Greg Vogler Chicago, Illinois May 2013.
CD4D Export Control and Economic Espionage Briefing Unit Chief CD4D Alexis Hatten Phone:
CHAPTER LOCAL FACILITIES FOR DETENTION County to maintain county jail; location; agreements for detention of prisoners Duties of.
 Terms and Procedures  Constitutional Issues  Specific Crimes  Conclusion.
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Criminal Investigation: An Overview
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
CRIMES Used by permission. For Educational purposes only.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
Chapter 41 Corporations: Securities and Investor Protection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
What Is A Trade Secret?. Trade Secrets Are Property: Intellectual Property.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 4: Laws, Regulations, and Compliance
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
1 SSHHHH! It’s a Trade Secret Steve Baron April 3, 2003.
The R.I.C.O. Statute By UN CICP. Why Is Organized Crime So Difficult to Fight? n It is a hidden phenomenon n It is produced by organizations that have:
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Prosecution and investigative authorities in Romania Current status and future reforms Monica Otava Prosecutor Prosecutor’s Office Attached to the High.
IRS Resources for Payroll Professionals & IRS Combats ID Theft with the Help of Payroll Professionals June 16, 2016 Nora Huffman.
Surveillance around the world
Witness Protection in Indonesia
A Comparative Legal and Economic View of Global Trade Secret Regimes
Cyber Issues Facing Medical Practice Managers
Designed and Developed by IP Laboratory, MNNIT Allahabad , Uttar Pradesh, India
Theft of Trade Secrets & Economic Espionage
Trade Secrets CJ 520 / CJ September 27, 2010.
SSHHHH! It’s a Trade Secret
Child Abduction Prosecutions
Presentation transcript:

International Theft of Trade Secret: A Case Study Presented by: Nenette Day

OVERVIEW THE LAW BACKGROUND THE CRIME UNDERCOVER OPERATION RESOLUTION / ISSUES

Economic Espionage Act. Economic Espionage. Theft of Trade Secrets. Penalty of up to 15 years in prison. Penalty of up to 10 years in prison. Provides for fines and forfeiture of property obtained as a result of the theft. Put into law in 1996 Title 18 Section 1831 Title 18 Section 1832

Trade Secret. What’s covered: All forms and types of financial, business, scientific, technical, economic or engineering information.. Elements: A) must take reasonable measures to keep such information safe and B) information must derive independent economic value by being kept secret.

. ”There is no specific law in India that protects trade secrets and confidential information.”. Common Law: Breach of Contractual Obligation Civil Remedy Only injunction to prevent release return of trade secret compensation for losses Indian Law

Background. SolidWorks 2001 Plus. Outsource Programming. What is source code?. Geometric Software Solutions Limited Hint: Trade Secret! $85 Million to create $60 Million in sales Non-Disclosure Agreement Good Security

The Crime. Research Competitors. Establish Alias. Steal Source Code. Solicit Competitors via . Under estimate ethics of US Company

Undercover Operation. Obtain cooperation of India CBI. Obtain approval for Undercover Operation from God on down…. Notify FBI Legal Attache in India. Establish Agent as Solid Concepts Contactor. Victim company assistance First FBI UCO in India

Once in India…. Establish communications with subject. Meeting with Verma confirmed. Spend a lot, and I do mean a lot, of quality time at the CBI. Money wired to Verma’s Bank

Who is this guy?. Former GSSL programmer. Master’s Student. Shekhar Verma. Fired for for poor performance. Brother is a high ranking Police Official Insiders are the most dangerous criminals.. 27 years old and married to a Doctor

The Meeting. Meet Independent Observers. Meeting commences (Complete with compiling and acknowledgement of wrong doing). CBI wires room for audio and video. Wait in hotel lobby (what are the odds). Verma is arrested

Resolution and Issues. He is currently on trial. Many issues to deal with related to witness statements and international investigations. Verma was charged with Theft and Criminal Breach of Trust. Extraditable Offense. Global Business. Search Warrant executed and CD’s retrieved

And lastly…. I did get to see…