March 31, 2023

Volume XIII, Number 90

Advertisement
Advertisement

March 30, 2023

Subscribe to Latest Legal News and Analysis

March 29, 2023

Subscribe to Latest Legal News and Analysis

March 28, 2023

Subscribe to Latest Legal News and Analysis

A Cautionary Tale: Don’t Wait Until There Is A Problem To Protect Your Trade Secrets

A federal decision recently reminded businesses about the importance of taking appropriate measures to protect their proprietary information before any misappropriation occurs. In Abrasic 90 Inc. v. Weldcote Medals, Inc.[1], the court denied the plaintiff’s motion for a preliminary injunction “largely because [the plaintiff] did not protect its supposedly secret information.” The court’s order underscores that businesses may be unable to enforce as a trade secret their valuable information unless they have taken adequate steps to protect its secrecy.

In that case, a manufacturer of grinding and sanding disks sought to enjoin its former employees and their new employer from operating in the abrasives industry and from using its trade secrets. The defendants took information about the plaintiff’s pricing, customers and suppliers when they left the company to start a competing business. Yet, the court declined to issue an injunction on the ground that Abrasic had failed to protect its supposedly trade secret information.

The court explained that there are two basic elements to the analysis: (1) the information must have been “sufficiently secret to impart economic value because of its relative secrecy” and (2) the plaintiff must have made “reasonable efforts to maintain the secrecy of the information.” The court concluded that the plaintiff failed to establish the second element because it “did virtually nothing to protect that information to preserve its status as a trade secret.”

The court criticized “[the plaintiff’s] almost total failure to adopt even fundamental and routine safeguards for the information at issue[,]” pointing to the following conduct by the plaintiff:

  • Failing to confine access to the alleged trade secret information to those who had a need to access it (aka “need to know” access).

  • Permitting employees to access the confidential information without requiring them to sign non-disclosure agreements (NDAs).

  • Using employment policies that do not require employees to maintain the confidentiality of the company’s confidential information after the employment ends.

  • At termination of employment, failing to ask the employee if she possesses any of the company’s confidential information and failing to ask the employee to delete or return it.

  • Failing to admonish employees at termination of an on-going obligation to protect the company’s confidential information.

  • Using confidentiality employment policies that are vague and do not give employees sufficient guidance about what information they are to treat as confidential to the company.

  • Doing nothing to train or educate employees about their obligations to protect the company’s confidential information.

  • Failing to require suppliers and distributors who had access to the information to execute NDAs.

  • Failing to password-protect and encrypt the company’s trade secrets.

  • Permitting employees unfettered ability to download, save elsewhere (e.g., a USB drive), print, and email files containing the company’s confidential information.

  • Allowing employees to share passwords.

  • Failing to label “proprietary” or “confidential” documents or files containing the company’s confidential information.

  • Disclosing publicly supposedly confidential information.

  • Using an IT Manager who has no training in data security or is otherwise unqualified.

  • Not implementing security measure recommendations of its IT Manager, such as requiring employees to remove company data from their personal devices when their employment ends.

  • Taking no measures to protect supposedly confidential information that are different than measures taken to protect non-confidential information.

There is no single set of protection measures that automatically qualifies as reasonable efforts. What are reasonable efforts depends on the circumstances, such as the nature of the information to be protected. For example, reasonable measures to protect a trade secret recipe may not be appropriate to protect trade secret customer pricing terms. Other circumstances affecting reasonableness may include the trade secret holder’s sophistication, size and resources. A “mom and pop” operation likely would not be held to the same standard as a Fortune 500 company. As a business grows and become more sophisticated and its trade secrets change, it should periodically revisit its protection measures to attempt to ensure that they are appropriate and commensurate to those taken by businesses in similar circumstances.

We stand ready to assist you to identify and implement measures that are reasonable to protect the confidentiality of your business’ trade secrets. Not only should such measures reduce the risk that your trade secrets will be misappropriated, but also they should put your business in a better position if it needs to litigate against a competitor which has misappropriated or threatens to misappropriate your trade secrets.

[1] United States District Court for Northern District of Illinois Case No. 1:18-cv-05376, Dkt. 63 (March 4, 2019 Order).

Copyright © 2023, Sheppard Mullin Richter & Hampton LLP.National Law Review, Volume IX, Number 122
Advertisement
Advertisement
Advertisement

About this Author

Partner

Ms. Edelson’s practice emphasizes intellectual property, unfair competition, and injunctions. She has broad experience in all phases of state and federal litigation, including pre-trial development, discovery and motion practice, trials, writs, and appeals. She also counsels businesses on protecting their proprietary rights and information outside of the litigation context.

Ms. Edelson is a recognized expert in trade secret law and is a co-editor and an author of the treatise, Trade Secret Litigation and Protection in...

310-228-3734
Seong Kim Intellectual Property Lawyer Sheppard
Partner

Seong Kim is a partner in the Intellectual Property and Litigation Practice Groups in the firm's Los Angeles (Century City) office. He also spends considerable time in the firm’s Seoul office, representing Korean companies in a variety of matters.   

Mr. Kim is known for his exceptional winning record at trials and arbitrations, having obtained judgments and settlements totaling hundreds of million dollars. Some of the largest companies around the world turn to Mr. Kim to protect their interests.

301-228-6161
Youngbin Son, Lawyer, Sheppard Mullin,Intellectual Property, Litigation
Associate

Youngbin Son is an associate in the Intellectual Property Practice group in the firm's Century City office.

Areas of Practice

Her practice focuses on litigation and counseling in the areas of trademark, copyright, false advertising, trade secrets and anti-piracy for clients across a range of industries.

Youngbin is fluent in Korean and proficient in Japanese.

1.310.228.3743