{"id":105,"date":"2015-12-09T17:07:45","date_gmt":"2015-12-09T21:07:45","guid":{"rendered":"http:\/\/blogs.duanemorris.com\/lifescienceslaw\/?p=105"},"modified":"2015-12-10T13:53:57","modified_gmt":"2015-12-10T17:53:57","slug":"confidential-vs-trade-secret-a-non-binary-dilemma","status":"publish","type":"post","link":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/2015\/12\/09\/confidential-vs-trade-secret-a-non-binary-dilemma\/","title":{"rendered":"&#8220;Confidential&#8221; vs. &#8220;Trade Secret&#8221; &#8211; A Non-Binary Dilemma"},"content":{"rendered":"<p>Virtually all life sciences companies use routine protocols which they believe will protect their intellectual property and other confidential or &#8220;trade secret&#8221; information.\u00a0 Among these routine proactive protocols are having a standard confidentiality\/nondisclosure agreement (sometimes referred to below as &#8220;NDA&#8221;), limiting access to confidential and trade secret information, periodic internal audits of safeguarding methods, and more.\u00a0\u00a0\u00a0 But are &#8220;trade secrets&#8221; the same as &#8220;confidential information?&#8221;\u00a0 <!--more--><\/p>\n<p>Most confidentiality\/nondisclosure agreements will include references to &#8220;intellectual property,&#8221; &#8220;trade secrets,&#8221; and &#8220;other confidential information.&#8221;\u00a0 The agreements usually contain a boilerplate laundry list of the types of information the company deems to be protected under the agreement &#8211; formulae, protocols, cell lines, and so on.\u00a0 Many agreements define &#8220;trade secrets and other confidential information&#8221; far too broadly &#8212; for example, a clause defining as confidential &#8220;all other information about the company or its business.&#8221;\u00a0\u00a0\u00a0 There is an inherent tension between defining a company&#8217;s confidential\/trade secret information too narrowly (the risk being that something important is not defined as confidential or trade secret) or defining such information too broadly (the risk being that a court will conclude that the definition is overly broad and will refuse to enforce the agreement).\u00a0\u00a0 A discussion on striking the right balance in a company&#8217;s definition of its confidential or trade secret information is a topic for another blogging day.\u00a0\u00a0\u00a0 Stay tuned.<\/p>\n<p>Today&#8217;s\u00a0blog will focus on two alternate paths a company might take in seeking to protect its confidential or trade secret information.\u00a0\u00a0 We will work under the assumption that an individual formerly employed by biotech Company A has now left and is working for biotech Company B in the same capacity, a high level research position.\u00a0\u00a0 We will further assume that the worker had access to highly confidential trade secret information belonging to Company A, and that he or she did execute a confidentiality\/nondisclosure agreement while employed by Company A.\u00a0 Company B heralds the employee&#8217;s arrival with press releases, and soon thereafter, Company A learns that Company B is now doing research that sounds remarkably similar to that which the employee spearheaded while at Company A.\u00a0\u00a0\u00a0 What are Company A&#8217;s options?<\/p>\n<p>First and foremost, Company A needs to evaluate and identify the specific information it believes that the employee is now disclosing and\/or using for the benefit of Company B.\u00a0\u00a0 The reader will note that I specifically stated that the employee is working in the same capacity at Company B as when he or she was employed at Company A.\u00a0 Some states recognize what is known as the &#8220;inevitable disclosure&#8221; doctrine, which presumes that the individual will inevitably use or disclose confidential or trade secret information, gained through former employment, if he or she works in the same or closely similar capacity in a subsequent employment.\u00a0 California is a state which does <strong>not<\/strong> recognize the inevitable disclosure doctrine.\u00a0 So, to make this exercise even more fun, we&#8217;ll assume that the worker is in California, and that Company A will not be able to rely upon the inevitable disclosure doctrine to build its case.<\/p>\n<p>One path that Company A may have available to it is a lawsuit (or arbitration, if Company A and the employee entered into a binding arbitration agreement) against the employee for breach of his or her confidentiality\/nondisclosure agreement.\u00a0 Company A may also be able sue Company B in the same action if it has a basis for alleging that Company B knew of and encouraged the employee to breach his or her NDA with Company A.\u00a0 (Note that suing the former employee and Company B in the same action may be complicated if Company A has an arbitration agreement with the employee, since Company B is not a signatory to such agreement.\u00a0 Joining non-signatory defendants into an arbitration proceeding is\u00a0yet another topic for another blogging day.)<\/p>\n<p>A second pathway that Company A might consider is a suit against the employee and Company B for violation of the Uniform Trade Secrets Act (&#8220;UTSA&#8221;).\u00a0 The UTSA is a statute that has been adopted in 47 states, as well as by the District of Columbia, Puerto Rico and the U.S. Virgin Islands.\u00a0 This claim would allege that Company A had &#8220;trade secrets,&#8221; and that the employee wrongfully disclosed such trade secrets to Company B, or wrongfully used Company A&#8217;s trade secrets for the benefit of Company B.\u00a0\u00a0\u00a0 (Once again, Company A will need to assess whether it can proceed against both defendants in a single action.\u00a0 The existence of an arbitration agreement with the employee might affect Company A&#8217;s options, depending upon the wording and scope of the arbitration agreement &#8212; yet a third topic for another blogging entry!)<\/p>\n<p>As a practical matter, if the action is pursued against both defendants in a single action, Company A is likely to allege both theories &#8212; the employee&#8217;s breach of his\/her NDA (and Company B&#8217;s complicity in same), as well as both defendants&#8217; violation of the Uniform Trade Secrets Act.<\/p>\n<p>However, in order to prevail on a\u00a0claim brought under the UTSA, Company A must show that employee and Company B have misappropriated &#8220;trade secrets&#8221; belonging to Company A.\u00a0\u00a0 To meet this burden, Company A must show that:\u00a0\u00a0(a) the information in question is not generally known to the public; (b) the non-public nature of the information confers an economic benefit to Company A &#8211; in other words, Company A has an economic or competitive edge because it possesses this information and because that information is not known to the public; and (c) Company A takes reasonable steps to protect the information from public disclosure.\u00a0\u00a0\u00a0 Thus, while all &#8220;trade secrets&#8221; would undoubtedly be considered &#8220;confidential,&#8221; the reverse is not necessarily true.\u00a0 For example, the details and cost of Company A&#8217;s contract with its janitorial service may well be &#8220;confidential,&#8221; but it unlikely to be considered a &#8220;trade secret.&#8221;<\/p>\n<p>Yesterday, my colleagues reported on <a href=\"http:\/\/blogs.duanemorris.com\/tradesecretslaw\/2015\/12\/07\/new-sixth-circuit-case-imposes-liability-for-theft-of-confidential-information-that-does-not-qualify-for-trade-secrets-protection\/\">an unpublished decision<\/a> of the Sixth Circuit Court of Appeals, <em>Orthofix v. Hunter<\/em>, ___ Fed.Appx. ___, 2015 WL 7252996, at *1 (6th Cir.\u00a0 Nov. 17, 2015), in which the court ruled that a former employer could recover against a former employee for breach of a confidentiality agreement, even though the information the former employee took, used or disclosed did not rise to the level required for trade secret protection.<\/p>\n<p>This decision and others like it raise the question, &#8220;why would a company choose to pursue a trade secrets claim rather than the apparently easier course of only pursuing its claim for breach of an NDA?&#8221;\u00a0 While the answer will truly depend upon the facts of a particular case and the specific nature of the information disclosed or used, some considerations include:<\/p>\n<ul>\n<li>Only the former employee is a party to the NDA contract.\u00a0 If Company A chooses to pursue only a breach of contract claim, it may not be able to successfully sue Company B unless it has (or develops during discovery) evidence that Company B encouraged the employee to breach the contract or was a knowing beneficiary of the breach.<\/li>\n<li>If Company A chooses to pursue only a breach of contract claim, it can only recover damages for the breach of contract.\u00a0 Company A will have the burden of showing how it has been damaged by the employee&#8217;s breach and will have the burden of quantitating that damage.\u00a0 In many cases, the damages will be speculative and not capable\u00a0of being quantified.<\/li>\n<li>Punitive damages are not available even if Company A is able to prove a clear breach of the NDA and resulting monetary damage.<\/li>\n<li>Depending upon the language of the NDA, Company A may or may not be able to obtain contract-based injunctive relief.\u00a0 Injunctive relief can be crucial to stop violations while the litigation is still pending, as well as to insure that violations do not reoccur.<\/li>\n<li>As noted above, only the former employee is a party to the NDA agreement.\u00a0 If the former employee and Company A have an agreement to arbitrate all disputes between them, this can drive whether or not Company A can bring its claim in court, or whether it will have to arbitrate.<\/li>\n<li>Depending upon the language of the NDA, Company A may have to bear its own attorneys&#8217; fees and costs incurred in enforcing its rights.<\/li>\n<\/ul>\n<p>While bringing and maintaining a claim\u00a0under the UTSA is more burdensome in terms of the evidence that Company A must possess, Company A may have a larger universe of relief available to it for claims premised on the UTSA:<\/p>\n<ul>\n<li>The UTSA provides for injunctive relief to address actual, as well as threatened, misappropriation of trade secrets.<\/li>\n<li>Company A may recover money damages for the actual loss it sustained as a result of the misappropriation, as well as an award for the &#8220;unjust enrichment&#8221; enjoyed by Company B as a result of the misappropriation.\u00a0 The unjust enrichment award is not taken into account in computing Company A&#8217;s actual damages or loss.<\/li>\n<li>Company A may recover exemplary damages of up to two (2) times the actual and unjust enrichment damages if it can show that the misappropriation of its trade secrets was &#8220;willful and malicious.&#8221;<\/li>\n<li>Finally, Company A may be awarded its attorneys&#8217; fees if the court determines that the misappropriation of Company A&#8217;s trade secrets as willful and malicious.\u00a0 However, Company A should also be aware that if the court concludes that its claim under the UTSA was made in bad faith, Company A will lose not only its UTSA claim, but can be ordered to pay the defendants&#8217; attorneys&#8217; fees.\u00a0 For this reason (among others), companies need to be careful when weighing whether to assert claims under the UTSA.<\/li>\n<\/ul>\n<p>In closing, the concepts of &#8220;confidential information&#8221; and &#8220;trade secrets&#8221; are intertwined, and a company seeking to enforce its rights to protect its own confidential and trade secret information will most certainly want to have a carefully drafted confidentiality\/NDA agreement.\u00a0 It will also want to evaluate how other employment-related agreements &#8212; such as arbitration agreements &#8212; might impact the company&#8217;s options in enforcing the NDA, or in initiating an action against a former employee and his or her new employer.\u00a0\u00a0 Ideally, an employer will have written agreements with its employees that are well crafted and likely to be upheld and enforced and still afford the employer the greatest degree of flexibility in the event that the employer needs to initiate action against a former employee and a third party.<\/p>\n<div class=\"shortcode-show-avatar  alignleft user-125 with-name with-email with-last-post with-biography bio-length--1\"style=\"\" ><a href=\"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/2015\/12\/09\/confidential-vs-trade-secret-a-non-binary-dilemma\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-content\/uploads\/sites\/15\/2014\/08\/kearnsjennifer-125x150.jpg\" width=\"80\" height=\"96\" srcset=\"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-content\/uploads\/sites\/15\/2014\/08\/kearnsjennifer.jpg 2x\" alt=\"Jennifer A. Kearns\" class=\"avatar avatar-96 wp-user-avatar wp-user-avatar-96 alignnone photo\" style=\"\"  \/><br \/>Jennifer A. Kearns<div class=\"last_post\"><a href=\"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/2015\/12\/09\/confidential-vs-trade-secret-a-non-binary-dilemma\/\" rel=\"bookmark\" title=\"Permanent Link to &#8220;Confidential&#8221; vs. &#8220;Trade Secret&#8221; &#8211; A Non-Binary Dilemma\">&#8220;Confidential&#8221; vs. &#8220;Trade Secret&#8221; &#8211; A Non-Binary Dilemma<\/a><\/div><\/a><div class=\"bio bio-length-0\"><p><a href=\"http:\/\/www.duanemorris.com\/attorneys\/jenniferakearns.html\">Read Jennifer's bio.<\/a><\/p>\n<\/div><div class='email'><a href='mailto:JKearns@duanemorris.com''>JKearns@duanemorris.com<\/a><\/div><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtually all life sciences companies use routine protocols which they believe will protect their intellectual property and other confidential or &#8220;trade secret&#8221; information.\u00a0 Among these routine proactive protocols are having a standard confidentiality\/nondisclosure agreement (sometimes referred to below as &#8220;NDA&#8221;), limiting access to confidential and trade secret information, periodic internal audits of safeguarding methods, and &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/2015\/12\/09\/confidential-vs-trade-secret-a-non-binary-dilemma\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;&#8220;Confidential&#8221; vs. &#8220;Trade Secret&#8221; &#8211; A Non-Binary Dilemma&#8221;<\/span><\/a><\/p>\n","protected":false},"author":125,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[277,285,281,280,10,279,283,275,278,282,276,287,286],"ppma_author":[523],"class_list":["post-105","post","type-post","status-publish","format-standard","hentry","category-general","tag-confidential","tag-duanemorris","tag-enjoin","tag-injunction","tag-intellectual-property","tag-ip","tag-ip-protection","tag-jennifer-kearns","tag-proprietary","tag-protection","tag-trade-secret","tag-uniformtradesecretsact","tag-utsa"],"authors":[{"term_id":523,"user_id":125,"is_guest":0,"slug":"jkearns","display_name":"Jennifer A. Kearns","avatar_url":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-content\/uploads\/sites\/15\/2014\/08\/kearnsjennifer-125x150.jpg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":0,"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/tags?post=105"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/lifescienceslaw\/wp-json\/wp\/v2\/ppma_author?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}