Professional Documents
Culture Documents
Trade Secret Law and Litigation 2
Trade Secret Law and Litigation 2
Discussions Only
2
IMPORTANCE, SENSITIVITY AND SERIOUSNESS OF
TRADE SECRETS
3
WHY IS THIS IMPORTANT?
4
WHY IS THIS IMPORTANT?
$2.3 billion jury award Pacesetter Inc. v. Nervicon Co. (Cal. Sup. Ct, Los Angeles 2011)
$765 million jury award Motorola Solutions v. Hytera Comms. Corp. (ND Ill. 2020)
$919.9 million jury award E.I. du Pont de Menours & Co. v. Kolon Industries (EDVA 2011)
$845.1 million jury award ASML US v. XTAL, Inc. (Cal. Sup. Ct., Santa Clara 2019)
5
WHY IS THIS IMPORTANT?
• By getting into the public domain, the loss of a trade secret can have
dire consequences
• Loss of competitive edge/market differentiator
• Loss of cost advantage
• Threat to (or loss of) first-to-market position
• Threat to your brand
• Significant business distraction
6
WHY IS IT SENSITIVE AND SERIOUS?
7
WHY IS IT SENSITIVE AND SERIOUS?
8
LESSONS LEARNED (CONT’D)
• Understand and comply with all applicable laws
• Espionage laws
• Export control
10
UNITED STATES TRADE SECRET LAWS
11
LEGISLATIVE OVERVIEW – US
(ii) Theft of trade secrets: theft/misappropriation of trade secrets for pecuniary gain.
See 18 U.S.C. § 1832.
12
ECONOMIC ESPIONAGE ACT OF 1996
13
“ECONOMIC ESPIONAGE”
14
“COMMERCIAL THEFT”
• Whoever, with intent to obtain a trade secret related to a product or service used in
interstate or foreign commerce, for the economic benefit of anyone other than the
owner and intending to injure the owner, knowingly
15
LEGISLATIVE OVERVIEW – US
The Defend the Trade Secret Act (“DTSA”)
• New federal civil claim for misappropriation of trade secrets (18 USC 1836
et seq.)
16
WHAT IS A TRADE SECRET? – U.S.
All forms and types of financial, business, scientific, technical, economic, or engineering information,
including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods,
techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or
how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing
if:
1) the information derives independent economic value, actual or potential, from not being
generally known to, and not being readily ascertainable by proper means by, other persons who
can obtain economic value from its disclosure or use; and
2) the owner has taken reasonable measures to keep such information secret
17
EXTRATERRITORIAL REACH OF U.S. LAW
18
CLAIMS IN THE UNITED STATES
BASED ON OVERSEAS CONDUCT
• U.S. claimants often prefer U.S. courts
• More discovery
– Electronic information
– Email
– Forensics
• Broader remedies
• Consistent, uniform application
of laws
19
U.S. GOVERNMENT TRADE
SECRET ENFORCEMENT
21
LEGISLATIVE OVERVIEW – CHINA
• 《最高人民法院关于审理侵犯商业秘密民事案件适用法律若干问题的规定》 / Provisions
of the Supreme People's Court on Several Issues Concerning the Application of
Law in Hearing Civil Cases of Trade Secret Infringement
• 《最高人民法院、最高人民检察院关于办理侵犯知识产权刑事案件具体应用法律若干问题
的解释 ( 三 ) 》 / Interpretation (III) of the Supreme People's Court and the Supreme
People's Procuratorate Concerning Some Issues on the Specific Application of
Law for Handling Criminal Cases of Infringement upon Intellectual Property Rights
22
TRADE SECRETS – WHAT CONSTITUTES TRADE
SECRETS
23
Click icon to add picture
TRADE SECRETS 商业秘密
• Formula/ 公式 • Technique/ 技术
• Pattern/ 模式 • Process/ 工艺
• Design/ 设计 • Procedure/ 程序
• Compilation/ 汇编 • Prototype/ 原型
• Program/ 程序 • Plan/ 计划
• Device/ 设备 • Code/ 代码
• Method/ 方法
24
TRADE SECRETS 商业秘密
25
WHAT MATTERS MOST TO YOU?
26
TRADE SECRETS ARE NOT . . .
27
LEGAL ASSESSMENT
28
KEY CONCEPTS: IS THE INFORMATION ‘SECRET’?
– Multi step processes where the steps are each individually known
29
KEY CONCEPTS: “REASONABLE MEASURES”
30
KEY CONCEPTS: “REASONABLE MEASURES”
• Above all: “need to know” principle, access to potential trade secrets should be
limited to the smallest number of persons possible, both inside and out side the
company!
• Marking as “confidential” can be helpful but is not sufficient if document is not treated
confidential otherwise
• Signing of NDAs should be the first step on any retention of outside contractors
31
TRADE SECRET MISAPPROPRIATION
32
WHY DOES TRADE SECRET INFRINGEMENT OCCUR?
33
SPECIFIC CASES OF TRADE SECRET INFRINGEMENT
Suppliers Internal
& Partners Employees
34
SPECIFIC CASES OF TRADE SECRET INFRINGEMENT
Unintentional Actions
35
TOP REASONS EMPLOYEES TAKE DATA
36
HOW DO EMPLOYEES TAKE INFORMATION?
37
HOW CAN YOU REDUCE
THE RISK?
• Arriving employees
• Departing employees
38
WHAT TO DO…WITH ARRIVING EMPLOYEES
39
WHAT TO DO . . . ARRIVING EMPLOYEES
Before Arrival
40
WHAT TO DO . . . ARRIVING EMPLOYEES
Upon Arrival
• Do not let recruit start work until after departure from prior employer
• Confidentiality agreement with clear description of policies and ramifications for
breach, i.e., use or disclosure of confidential information and trade secrets
• Reiterate in detail prohibitions against bringing or using former employer
information
• Can be done in separate, standalone document
• Re-sign periodically
41
WHAT TO DO . . . WITH ARRIVING EMPLOYEES
Upon Arrival – “Code Red” Level Employee
42
WHAT TO DO . . . WITH DEPARTING EMPLOYEES
43
WHAT TO DO . . . WITH DEPARTING EMPLOYEES
• Use a checklist/
• Determine appropriate last day of work
• Consider immediate departure
• Notify IT and consider immediate cutoff from computers, email, apps,
company cell phone/
• Cut off physical access to sites
• Conduct an exit interview (with witness)
• Interview co-workers when necessary
• Be aware that co-workers may be leaving too
• Control who knows what
44
WHAT TO DO . . . WITH DEPARTING EMPLOYEES
45
WHAT TO DO . . . WITH DEPARTING EMPLOYEES
• When necessary:
• Notify FBI
46
IMPROPER ACCESS TO CONFIDENTIAL DOCUMENTS BY DEPARTING
EMPLOYEES – CURRENT CONFLICTS
• Typical scenario – Departing employees transferred confidential files containing trade
secrets to personal email accounts.
• In practice, Chinese courts have taken different positions on whether such access
constitute trade secret misappropriation.
No Finding of Infringements
Zhejiang High People’s Court: Shiyuan Technology (Jiaxing) Medical Electronics Co., Ltd. v. Cao Youwei
[Case Number: (2010) Zhe Zhi Zhong No. 267]
Shanghai First Intermediate People’s Court: Etis Biotechnology (Shanghai) Co., Ltd. v. Pangfei [Case
number: (2018) Hu 01 Min Zhong No. 3148]
• Defendant had legitimate access to those confidential files when working for the current employer.
• Defendant did not disclose those confidential files to third parties.
• No third parties can access those confidential files saved at defendant’s personal email account via
legitimate means.
47
IMPROPER ACCESS TO CONFIDENTIAL DOCUMENTS BY DEPARTING
EMPLOYEES – CURRENT CONFLICTS
• Typical scenario – Departing employees transferred confidential files containing trade
secrets to personal email accounts.
• In practice, Chinese courts have taken different positions on whether such access
constitute trade secret misappropriation.
Finding of Infringements
Shenzhen Intermediate People’s Court: Huace Testing and Certification Group Co., Ltd. v. Kong Lei,
[Case Number: (2015) Shen Zhong Fa Zhi Min Zhong No. 1222]
• Defendant had legitimate access to those confidential files when working for current employer.
• However, the employer had strict internal confidentiality policies, including prohibiting any employees
from forwarding confidential company files to personal email accounts.
• By forwarding them to personal email account, the defendant directly occupied those files and can freely
review, use or disclose them to third parties at any time.
• Defendant’s violation of employer’s policies constituted improper access to trade secrets.
48
Trade Secret Protection (Measures)
49
LIMIT ACCESS
50
BUILD VERSUS BUY ISSUES
• Manage “Build versus Buy” protocols for concurrently exploring partnering versus
going solo on a new technology
• Internal clean rooms for product development
• Separate teams and leadership
• Third party assistance
51
REVERSE ENGINEERING
52
INVENTION DISCLOSURES
53
DOCUMENT RETENTION PROGRAMS
54
Collection and preservation of evidence
55
WHEN AN INFRINGEMENT OF TRADE SECRETS IS DISCOVERED IN
THE COMPANY
56
WHEN AN INFRINGEMENT OF TRADE SECRETS IS DISCOVERED
IN THE COMPANY
57
WHEN AN INFRINGEMENT OF TRADE SECRETS IS DISCOVERED
IN THE COMPANY
Terminate the
Find out the scope of employment
Seek help from relationship
Check related records employees involved in
lawyers instantly immediately
the case
Take emergency
Collect and preserve Change cooperation
measures through the Backup files
evidence manufacturers
courts
58
WHEN AN INFRINGEMENT OF TRADE SECRETS IS DISCOVERED
IN THE COMPANY
59
WHEN AN INFRINGEMENT OF TRADE SECRETS IS DISCOVERED
IN THE COMPANY
• How to collect evidence - suppliers and partners, competitors
60
THE BEST TIME TO INVESTIGATE INTERNALLY AND SEEK
OUTSIDE HELP?
61
REMEDIES
• Money damages
• Injunctions
• To prevent actual or threatened misappropriation
• Can require affirmative action to protect trade secret
• Civil seizure
• Attorney fees
62
TRADE SECRET LITIGATION IN CHINA
63
TRADE SECRET LITIGATION IN CHINA – OVERVIEW
Published civil decisions (2010-2020): 2631 in total
64
TRADE SECRET LITIGATION IN CHINA – OVERVIEW
Published civil decisions (2010-2020): 2631 in total
NUMBER OF DECISIONS BY REGION*
Guangdong
Shanghai
Zhejiang
Jiangsu
Beijing
65
TRADE SECRET LITIGATION IN CHINA – OVERVIEW
66
TRADE SECRET LITIGATION IN CHINA – OVERVIEW
• Among the 377 fully published first instance judgments (out of 434 published first instance judgments)
67
RECENT LEGISLATIVE AND JUDICIAL DEVELOPMENTS IN CHINA
68
NEW CHANGES: EXPAND THE SCOPE OF INFRINGERS
China has expanded the scope of The Article 10 of TS JI further Such amendments provide a legal
infringers to include: provides that an implied basis to sue an individual, such as
confidentiality obligation can be an ex-employee, who is found to
1. Natural persons; based on the principles of good have infringed upon trade secrets.
faith and the nature and purpose
2. Persons or entities in
of the contract, or the nature of
violation of a confidentiality
business practices, contracting
obligation, including any
processes, etc. Certain types of
implied confidentiality
information, such as drawings,
obligation.
source code, or recipes, may also
See Article 9 of AUCL and Article 1.3 of imply confidentiality obligations.
Trade Agreement
69
NEW CHANGES: LOWERS THE BURDEN OF PROOF
• Plaintiff's burden of proof in trade secrets cases is greatly reduced: there is no need
for the plaintiff to establish that the trade secrets are “non-public.”
• Before the new AUCL was effective, a plaintiff only had to show that confidentiality
measures were taken to protect trade secrets, and that the trade secrets were non-
public and had economic value. The burden of proof was heavy.
• With the new AUCL, if a plaintiff can show that confidentiality measures have been
undertaken to protect the trade secrets, the burden of proof will be shifted to the
defendant to show that the trade secrets are generally known by the public.
70
NEW CHANGES: LOWER THE BURDEN OF PROOF – CONT’D
• Plaintiff’s burden of proof in trade secrets cases is greatly reduced: there is no need to prove actual access.
• The burden of proof will shift to a defendant if the plaintiff can produce prima facie evidence (including
“circumstantial evidence”) to show trade secrets misappropriation. Such circumstantial evidence includes evidence
that shows the alleged infringer had the opportunity to access the trade secrets, or a risk of the trade secrets’
disclosure.
Article 32 of AUCL
……
If the right holder of a trade secret provides prima facie evidence to reasonably indicate that the trade secret has been infringed
upon, and provide any of the following evidence, the alleged infringer shall prove the absence of such infringement:
1. Evidence that the alleged infringer has a channel or an opportunity to access the trade secret and that the information it uses is
substantially the same as the trade secret.
2. Evidence that the trade secret has been disclosed or used, or is at risk of disclosure or use, by the alleged infringer.
3. Evidence that the trade secret is otherwise infringed upon by the alleged infringer.
71
NEW CHANGES: CHANGES IN PROCEDURAL MECHANISMS
• China has removed the requirements of notarization and legalization for most
types of evidence originated outside of China.
• Only certain documents, such as foreign official documents, need to be notarized for
them to be admissible in Chinese courts.
• Only certain documents showing identities and legal authority, such as powers of
attorney, need to be notarized and legalized.
72
PRACTICAL ENFORCEMENT OPTIONS IN CHINA
• Strong gesture of IP
• Quick
protection • Damages and
• Cost-efficient
Advantages • Cost-efficient injunction will be
• Strong government
• Effect of “killing one to granted
support
warn a hundred”
• No damages will be
granted
• Local protectionism • No damages will be • Heavy burden of
Disadvantages • Lack of capacity and granted proof as right holder
willingness in dealing • Expensive
with complex
technical issues
73
单独诉讼路径比较 COMPARISON OF SEPARATE LITIGATION
PATHS
证据能力 情节严重程度 权利人的打击意愿 公安机关支持程度
Evidence Severity of Right holders' Level of support
Capability Circumstances willingness to fight from public
security organs
单独民事诉讼路径 弱 / Weak 低 弱 刑事立案较难
Separate Civil (例如,损失数额小于 (无意通过刑事手段干 立案意愿不强 / difficult
Procedure Path 三十万) / Low (e.g., 涉侵权人的人身自由) / to file a criminal case,
loss amount less than Weak (no intention to lack of willingness to file
$300,000) interfere with the a case
personal freedom of the
infringer through
criminal means)
75
商业秘密刑民诉讼选择 CRIMINAL AND CIVIL LITIGATION
OPTIONS FOR TRADE SECRETS
76
刑民交叉路径——先刑后民
CRIMINAL-CIVIL CROSSOVER PATH——CRIMINAL
PROCEDURE BEFORE CIVIL PROCEDURE
77
刑民交叉路径——先民后刑
CRIMINAL-CIVIL CROSSOVER PATH——CIVIL PROCEDURE
BEFORE CRIMINAL PROCEDURE
78
商业秘密民事诉讼选择 – 违约或侵权? CIVIL LITIGATION OPTIONS
FOR TRADE SECRETS –TORTS OR CONTRACT BREACH?
Substantial
similarity or
Burden of Confidentiality,
identity between Existence and
value and utility
Proof for of asserted
asserted Illicit means validity of Actual losses
Plaintiff information and contract
information
defendant’s
information
Yes (or to
prove the
Torts Yes Yes Yes No profits gained
by
defendants)
Contract
No No No Yes Yes
Breaches
79
可以采取的诉讼策略——其他思路
POSSIBLE LITIGATION STRATEGIES——OTHER IDEAS
80
CASE STUDY – JIAXING ZHONGHUA CHEMICAL CO., LTD V.
WANGLONG GROUP CO., LTD
• Highest Damages Awarded in Trade Secret Litigation in China: RMB 159 Million
(Approximately USD 24 Million)
• The Plaintiffs Zhonghua Chemical and Shanghai Xinchen New Technology Co.,Ltd.
(“Shanghai Xinchen”) sued defendants Wanglong Group Co.,Ltd. (“Wanglong Group”)
etc. for infringement of trade secrets of new processes to manufacture Vanillin.
• The alleged trade secret has been acknowledged by several national technical awards.
• Before the infringement, Zhonghua Chemical was the largest manufacturer of Vanillin,
occupying 60% of the global Vanillin market.
• Wanglong Group started to manufacture Vanillin from June 2011. In a short time, it
became the third-largest Vanillin manufacturer in the world and Zhonghua Chemical’s
global Vanillin market share slipping from 60% to 50%.
81
CASE STUDY – JIAXING ZHONGHUA CHEMICAL CO., LTD V.
WANGLONG GROUP CO., LTD
• Most evidence (including access and technology similarity) was obtained from
corresponding criminal case.
• Access: FENG voluntarily reported to Jiaxing PSB regarding the trade secrets misappropriation
and submitted essential access evidence –USB, payment proof and technical materials.
A USB containing more than 200 drawings, flow charts, key equipment list, etc. 82
CASE STUDY – JIAXING ZHONGHUA CHEMICAL CO., LTD. V.
WANGLONG GROUP CO., LTD
83
CASE STUDY – JIAXING ZHONGHUA CHEMICAL CO., LTD. V.
WANGLONG GROUP CO., LTD
• Damages: 159 million RMB (including reasonable expenses of 3.49 million RMB)
• Key factors:
1 2 3 4
Seriousness of the Large quantity of trade secrets Continuous infringement – FU High value of trade secrets –
infringement – Paying ex- – Steeling 185 equipment solicited more ex-employees of Defendant occupied 10% of
employee to steel trade drawings and 15 flow charts plaintiff to join defendants; the global Vanillin market,
secrets; using exactly the including plaintiff’s core continuing to conduct becoming the third-largest
same drawings, etc. technologies. infringement after the first Vanillin manufacturer in a
instance court issued short time.
preliminary injunctions.
5 6 7 8
Defendant established its Sever damages to plaintiff – Defendant refused to prove Defendant refused to enforce
business solely for Plaintiff’s global Vanillin evidence as requested by the preliminary injunction
infringement. market share slipped from Court. issued by first instance court.
60% to 50%.
84
BEST PRACTICES
• Sign confidentiality clause and non-solicitation clause with employees. Over approximately 89% of
civil trade secret cases are related to disputes concerning former employees.
• Take physical and electronic confidentiality measures, such as prohibiting or restricting access,
storage, and copying of electronic versions of the trade secrets.
• Conduct exit interview with employees and request employees to return, delete, or destroy trade
secrets at their departure.
• Remind ex-employees to continue to honor the confidentiality obligations after departure by signing
a certificate.
• Seize the business laptops of suspicious ex-employees and conduct forensic analysis.
• Sue domestic entities to avoid possible delay caused by Hague Convention (around 3 – 6 months).
85
BEST PRACTICES
• Conduct trade secret appraisal to prove “unknown to public” and “economic value”.
• Consider criminal action firstly to gather more evidence. No US-style discovery in China.
• Petition for court to request defendants to submit evidence occupied by defendants, such as
financial books.
• Collect as much evidence as possible regarding direct and indirect damages, such as decline of
market share, damages of business reputation, etc. to show seriousness of infringement.
86
DISCLAIMER LANGUAGE
87
Any presentation by a Jones Day lawyer or employee should not be considered or construed as legal advice on any individual matter or
circumstance. The contents of this document are intended for general information purposes only and may not be quoted or referred to in any
other presentation, publication or proceeding without the prior written consent of Jones Day, which may be given or withheld at Jones Day's
discretion. The distribution of this presentation or its content is not intended to create, and receipt of it does not constitute, an attorney-client
relationship. The views set forth herein are the personal views of the authors and do not necessarily reflect those of Jones Day.