Defenses to Trade Secret Actions
Employee at Will:
Although there may be a great variety of arguments available to an attorney defending a client against a trade secret action, there are three basic defenses available.
Example: “10-4 Rosey Trellis” is a major real estate company which provides services ranging from appraisals and broker services to property management. The company uses proprietary software to help its brokers and appraisers determine property values in a way which makes their lives easier and saves the company a great deal of money. The process by which this is done has not been patented, although the program itself might be protected by copyright law. Keeping this out of its competitor’s hands gives the company a competitive advantage. The software is installed on laptop computers provided to 10-4’s brokers and appraisers. Although many companies today require their employees to use a random code generator to log on to their laptops, an administrative decision was made to not use such code generators for the 10-4 laptops, as this would save the company even more money. Helene accidentally leaves her laptop on a plane. When Maggie finds the computer and turns it on to try to determine the identity of its owner, up pops this valuation program. Recognizing it for what it is, Maggie makes note of the process before finding Helene’s contact information and arranging to return the lost laptop.
In terms of making reasonable efforts to protect their secret process, 10-4 has probably failed. That means that the process is no longer a trade secret, and if divulged or used by another party, even if improperly acquired, there will be no cause of action under the UTSA. After all, only something which is an improperly acquired trade secret is protected, and the failure to take adequate security measures will be fatal to 10-4’s trade secret lawsuit.
In the example above, each of these two arguments could have been used. 10-4 failed to take reasonable measures under the circumstances to protect their property, and the person who “found” the property was not engaged in any kind of wrongful act.
Example: Having learned its lesson from Helene’s laptop loss, 10-4 now uses cutting edge security software to allow only properly authorized persons access to their newest valuation process software. Despite these great efforts, a freak accident involving a microwave, a wireless router, a garage door opener and a new-fangled cell phone results in the process somehow being displayed on a television in the apartment adjoining Helene’s. If her neighbor makes notes of the process and uses it for his own appraisal company, or sells it to a third party, there can be no trade secret claim. He has done nothing wrong to cause this information to be made available to him, and is free to use it for commercial gain.
Note that in this technology-fluke example some might intuitively want to protect 10-4 from second-comers because the company did everything they could do to protect their valuable intellectual property. A more realistic example might be of someone carrying secret documents down the street in a briefcase, slipping on ice, and dropping the briefcase causing it to open and scatter the documents down the street. If no copyright, trademark, or patent infringement results from someone picking up the paper and using the information to her advantage, shouldn’t we be able to use trade secret law to do so? Ultimately this is a policy decision, and depends on where we choose to strike the balance between protection of businesses and permitting the public to use intellectual property. For now, trade secret law essentially says that no, we will not protect against this innocent release of information to others. Finder’s keepers, so to say.
©2006 - 2013 National Paralegal College