The Defend Trade Secrets Act: An Overview and Key Developments

Haug Partners LLP
Contact

[Co-author: Xincheng Ma2]

Introduction

Four years have passed since Congress enacted the Defend Trade Secrets Act (“DTSA”) in 2016, and federal courts have developed a new body of law based on this relatively young statute. The DTSA provides a private civil cause of action for victims of trade secret espionage or theft where a trade secret has been misappropriated, and requires that the misappropriated trade secret is related to a product or service used in, or intended for use in, interstate commerce.3 Since the passage of the DTSA, trade secret claims have become increasingly attractive to plaintiffs, including in high-profile cases such as the dispute between Waymo and Uber that was litigated in 2018.4 Although the DTSA was only passed four years ago, the impact the statute has had on trade secret law has been significant and has provided an avenue for civil relief for trade secret owners whose trade secrets are stolen or misappropriated.

Developments and Overview

Prima Facie Element of the DTSA: Defining “Trade Secret”

In passing the DTSA, Congress intended to create a unified definition of what constitutes a trade secret and a separate federal cause of action for misappropriation of trade secrets. Under subsection 1839, a trade secret is defined as “all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing.”3 The majority of courts have implied or even expressly held that the definition of a trade secret is the same under the DTSA and state trade secret law. Many of these courts still rely on pre-DTSA state law cases in analyzing DTSA claims. However, at least one court has held that the DTSA defines trade secrets more broadly than state laws.6

Additionally, section 1839 further requires that trade secret owners must take certain measures in order for the information at issue to maintain protection as a trade secret under the DTSA:

(A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from the disclosure or use of the information.7
 

Accused parties frequently argue that protection of the information at issue as a trade secret was destroyed because owners did not take “reasonable measures to keep their information secret.” Whether measures taken by trade secret owners are “reasonable” highly depends on the specific facts of each case, including the technology used, the industry, and how sophisticated the parties are.6 For example, in Weride Corporation v. Huang, the District Court for the Northern District of California held that restricting access to a source code by logging-in, encrypting the source code, and requiring employees to sign a proprietary information and inventions assignment agreement was sufficient to meet the reasonable measurement standard.9 By contrast, the District Court for the Southern District of Florida in Temurian v. Piccolo held that giving other parties access to the information without requiring the other parties to sign any confidentiality agreement was insufficient to constitute reasonable measures to protect the alleged trade secret, and hence protection of the trade secret was waived.10

In terms of the “readily ascertainable” requirement, case law is still developing as to the proper test for different types of trade secrets. For example, it is still an open question how to determine whether a customer list qualifies as a trade secret. Some courts considered the amount of labor and time needed for compiling such a list in determining whether it is “readily ascertainable.”11 Other courts have held such difficulty irrelevant,12 and concluded that to be a trade secret, the customer list must contain some additional customer information, such as purchasing preferences and order histories.13

Finally, plaintiffs always face a dilemma in trade secret litigation. To survive the pleading stage, a plaintiff needs to identify the trade secret at issue.14 At the same time, a plaintiff has many reasons to avoid disclosing too much of their trade secret so as to amount to a de facto forfeiture of the trade secret, especially when the presiding judge has expressed an inclination that a motion to seal will not be granted. For example, in AlterG Inc. v. Boost Treadmills LLC, a judge from the Northern District of California recognized such a dilemma faced by trade secret owners and held that the identification of commercial trade secrets needs less specificity than a technical and complex trade secret.15

Prima Facie Element: Nexus to Interstate Commerce

Section 1836 requires a trade secret to be “related to a product or service used in, or intended for use in, interstate or foreign commerce” in order to constitute an actionable claim under the DTSA.16 The majority of courts set a very low standard to meet this requirement at the pleading stage.17 One court even suggested that no allegation of such a relationship is necessary to adequately plead a DTSA claim.18 Excluding this outlier, it is prudent for trade secret owners to allege sufficient nexus between the trade secret at issue and interstate or foreign commerce. Otherwise, the DTSA claims will risk being dismissed for “fail[ing] to allege any nexus between interstate or foreign commerce and the alleged trade secrets.”19

Time of Misappropriation

Because the DTSA covers “any misappropriation of a trade secret for which any act occurs on or after the date of the enactment of [the statute],”20 plaintiffs need to allege in their pleading when the accused misappropriation happened, and to be covered under the DTSA, the date must apply to an act or acts occurring after the enactment of the DTSA in May 2016. Defendants often challenge a DTSA claim by raising this timing defense. This issue most frequently arises when the acquisition of a trade secret occurred before the DTSA’s enactment in May 2016. In the last four years, courts have continuously issued opinions shaping the law in this regard. For example, the District Court for the District of Utah in Ultradent Products., Inc. v. Spectrum Solutions LLC granted the defendant’s motion to dismiss because the plaintiffs’ employee joined the defendant before the enactment of the DTSA.21 Although the plaintiffs argued that the defendant was currently “using or threatening to use the [plaintiffs’] trade secrets,” the court rejected such argument and explained that “this conclusory allegation [was] wholly devoid of any well-plead facts” and was “insufficient to state a claim under the federal DTSA.”22 In contrast, in AllCells, LLC v. Zhai, a judge from the District Court for Northern District of California held otherwise and explained: “even if [defendants] copied and thus acquired the alleged trade secrets before May 11, 2016, [the plaintiff] has sufficiently alleged that there was at least use of the trade secrets after that date. Hence, the Act applies.”23 These cases teach that to survive a timing defense, trade secret owners should allege in their complaint and lay some evidentiary support that the misappropriated trade secret had been used or will inevitably be used after the enactment date of the DTSA, hence constituting “continuing” misappropriation that falls under the DTSA. If a trade secret owner is not confident in its timing argument, it should consider filing a state law claim that does not have this timing issue.

Damages

Courts have also consistently insisted that plaintiffs should establish the causal relationship between the trade secrets misappropriated and the damages pled. For example, in Texas Advanced Optoelectronic Solutions, Inc. v. Renesas Electronics America, Inc., the Federal Circuit reversed the district court’s determination of the damages award because the plaintiff’s expert did not apportion damages by trade secret, but instead attributed “all profits to the misappropriation of all trade secrets.”24 As a result, the Federal Circuit held that there was an insufficient link between the misappropriated trade secrets and the damages award. Similarly, the Fourth Circuit affirmed a lower court’s summary judgment against the plaintiff for lack of support for a finding of proximate causation.25 The same problem might also underlie why the final settlement amount in the famous case between Waymo and Uber was much lower than the initial damage demanded by Waymo, observing that at least those docket entries not filed under seal provided little evidence that Uber had used any of the information taken from Waymo.26

Unique Remedy: Ex parte seizure

The ex parte seizure remedy is one of the most potent weapons the DTSA affords to trade secret holders. It empowers a court to issue an order to allow law enforcement to seize stolen trade secrets without hearing the opposing party’s argument. Because Congress was concerned that this weapon would be too powerful in interfering with the accused parties’ normal business operations, the statute requires courts to issue such an order only in “extraordinary circumstances,” such as a situation where the accused party will not comply with a normal injunctive order and no other remedies are applicable.27 Therefore, courts generally favor less extreme alternatives, such as Temporary Restraining Orders, which request defendants to not obstruct or modify the property containing trade secrets, or in more serious situations request defendants to temporarily turn the property over to the court or to plaintiff’s counsel directly.28

Whistleblower Immunity

The DTSA also includes an “immunity” provision, which exempts whistleblowers from liability for any trade secret disclosure made “solely for the purpose of reporting or investigating a suspected violation of law” to attorneys or government officials.29 Recent case law on this provision suggests that if an accused party raises this affirmative defense, the court will check whether there are facts in the record indicating that the accused party is truly using the information for such purpose.30 If so, the burden will shift to the trade secret owner to prove that the accused party intends to use or disclose the alleged trade secrets for another unprotected purpose.31 Furthermore, the “immunity” provision requires employers to provide notices to their employees about the availability of this “immunity.”32 Failing to do so will result in employers losing certain remedies under the DTSA, such as attorney fees and exemplary damages.33 In contrast, most state trade secret laws do not have such a provision.

Conclusion

The DTSA has been heavily litigated in the past four years, but case law around this statute is still far from definitive. Companies should actively monitor the newest developments in this area of law, but more importantly, companies should establish their internal trade secret management and clearance mechanisms to avoid disputes as much as possible and establish necessary protection for their trade secrets. For example, as explained above, the “reasonable measurement” requirement can be a prerequisite for trade secret protection. On the other hand, if a company unintentionally obtains trade secrets from new hires, companies can take proper measures to mitigate damages and avoid a trade secret dispute. Trade secret litigation can be costly, and companies do not want negative publicity regarding trade secrets. Understanding recent developments and what is required to maintain protection for a company’s trade secrets is critical, and the DTSA provides powerful tools for trade secret holders to seek damages in the event of theft of their trade secrets.

1Mr. Natter is a partner in the New York office of Haug Partners, where he specializes in all aspects of global trademark strategy, procurement, management, and enforcement and represents domestic and international clients across a broad range of industries.
2Xincheng Ma currently works for Tencent Holdings Ltd., in China, as IP counsel. Xincheng previously worked for Haug Partners as an associate after obtaining a J.D. from Georgetown Law.
3See 18 U.S.C. § 1836. For more information about the legislative history and background information of this statute, readers can find it in our previous article The Defend Trade Secrets Act: A Remedy.
4Waymo LLC v. Uber Techs., Inc., No. C 17-00939 WHA, 2018 WL 646701, at *22 (N.D. Cal. Jan. 30, 2018).
518 U.S.C. § 1839.
6See Earthbound Corp. v. MiTek USA, Inc., No. C16-1150, 2016 WL 4418013, at *10 (W.D. Wash. Aug. 19, 2016) (“The EEA defines trade secrets similarly to but even more broadly than the UTSA.”).
718 U.S.C. § 1839.
8See United States v. Liew, 856 F.3d 585, 598-99 (9th Cir. 2017) (holding that one unprotected disclosure did not automatically destroy a trade secret).
9WeRide Corp. v. Huang, 379 F. Supp. 3d 834, 847 (N.D. Cal. 2019).
10Temurian v. Piccolo, No. 18-cv-62737, 2019 WL 1763022, at *11 (S.D. Fla. Apr. 22, 2019).
11See, e.g., JetSmarter Inc. v. Benson, No. 0:17-cv-62541-FAM, 2018 U.S. Dist. LEXIS 60113, at *3 (S.D. Fla. Apr. 6, 2018).
12See, e.g., Duo-Fast Carolinas, Inc. v. Scott’s Hill Hardware & Supply Co., 2018 NCBC LEXIS 2, at *19–20 (N.C. Super. Ct. Jan. 2, 2018).
13See, e.g., Red Valve Inc. v. Titan Valve Inc., 2018 NCBC LEXIS 31, at *28 (N.C. Super. Ct. April 10, 2018).
14Fed. R. Civ. P. 8(a)(2).
15AlterG Inc. v. Boost Treadmills LLC, No. 18-CV-07568-EMC, 2019 WL 4221599, at *1 (N.D. Cal. Sept. 5, 2019).
1618 U.S.C. § 1836.
17See, e.g., Grow Fin. Fed. Credit Union v. GTE Fed. Credit Union, No: 8:17-cv-1239-T-30JSS, 2017 WL 3492707, at *3 (M.D. Fla. Aug. 15, 2017); Marimar Textiles, Inc. v. Jude Clothing & Accessories Corp., Civ. No. 17-2900, 2017 WL 4391748, at *7 (D.N.J. Oct. 2, 2017).
18Wells Lamont Indus. Grp. LLC v. Richard Mendoza & Radians, Inc., No. 17 C 1136, 2017 WL 3235682, at *3 n.7 (N.D. Ill. July 31, 2017).
19Gov’t Emps. Ins. Co. v. Nealy, 262 F. Supp. 3d 153, 173 (E.D. Pa. 2017).
20Defend Trade Secrets Act, Pub. L. 114-153, § 2(e), 130 Stat. 381 (May 11, 2016).
21Ultradent Prods., Inc. v. Spectrum Sols. LLC, No. 2:17-CV-890, 2018 WL 324868, at *1-2 (D. Utah Jan. 8, 2018).
22Id.
23AllCells, LLC v. Zhai, Case No. 16-cv-07323, 2017 U.S. Dist. LEXIS 44808 (N.D. Cal. Mar. 27, 2017).
24Texas Advanced Optoelectronic Solutions, Inc. v. Renesas Electronics America, Inc., f/k/a Intersil Corporation U.S., 895 F.3d 1304, 1312-15 (Fed. Cir. 2018).
25360 Mortgage Group LLC v. Home Point Financial Corporation, 740 Fed. App’x 263, 266-69 (4th Cir. 2018).
26Alexandria Sage, Dan Levine & Heather Somerville, Waymo accepts $245 million and Uber’s ‘regret’ to settle self-driving car dispute, REUTERS (Feb. 9, 2018), https://www.reuters.com/article/us-alphabet-uber-trial/waymo-accepts-245-million-and-ubers-regret-to-settle-self-driving-car-dispute-idUSKBN1FT2BA.
2718 U.S.C. § 1836.
28See, e.g., OOO Brunswick Rain Mgmt. v. Sultanov, No. 5:17-cv-00017-EJD, 2017 WL 67119, at *2 (N.D. Cal. Jan. 6, 2017); ARB Labs Inc. v. Woodard , No. 2:19-cv-00116, 2019 WL 332404, at *3 (D. Nev. Jan. 25, 2019); Magnesita Refractories Co. v. Mishra, No. 16-cv-5254, 2017 WL 655860, at *1-2 (N.D. Ind. Feb. 17, 2017).
2918 U.S.C. § 1833.
30Unum Grp. v. Loftus, 220 F. Supp. 3d 143, 148 (D. Mass. 2016).
31Christian v. Lannett Co. Inc., No. CV 16-963, 2018 WL 1532849, at *4-5 (E.D. Pa. March 29, 2018).
3218 U.S.C. § 1833.
33Id.

Written by:

Haug Partners LLP
Contact
more
less

Haug Partners LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.