COPPERPOD

INTELLECTUAL PROPERTY

TRADE SECRET ENFORCEMENT

A trade secret is any information used in commerce that the owner has taken reasonable measures to keep secret, from which the owner derives independent economic value and such information not being readily ascertainable by the public. Such trade secrets are afforded legal protection against theft as long as the owner continues to derive commercial value from it (as opposed to patents which usually only provide up to 20 years of protection).

 


18    U.S.C. § 1832: Theft of Trade Secrets

a)    Whoever, with intent to convert a trade secret, that is related to a product or service used in or intended for use in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret, knowingly—
(1)    steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information;
(2)    without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information;
(3)    receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization;
(4)    attempts to commit any offense described in paragraphs (1) through (3); or
(5)    conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined under this title or imprisoned not more than 10 years, or both.


b) Any organization that commits any offense described in subsection (a) shall be fined not more than the greater of $5,000,000 or 3 times the value of the stolen trade secret to the organization, including expenses for research and design and other costs of reproducing the trade secret that the organization has thereby avoided.
 

Based on trade secret misappropriation cases filed over the last 10 years, 40% of cases dealt with former employees taking trade secrets with them over to their new employers while 25% of cases dealt with suppliers, consultants and vendors misusing trade secrets disclosed to them in due course of business. Interestingly, cyber-criminals and hackers constituted only 15% of trade secret theft, while the remaining 20% were attributable to actions by current employees at companies where the theft occurred. These numbers highlight the need for not just technical solutions (effective most against cyber-criminals and hackers) but also (and even more so) legal and procedural solutions to protecting trade secrets before, during and after the secrets are willingly disclosed to employees and vendors.

HOW DO WE PROTECT TRADE SECRETS?

 

Our proprietary DM2 model for trade secret management and enforcement helps companies protect their competitive advantage through trade secrets and their trade secrets through technology.

commercially valuable trade secrets owned by the company, the date of origination, creators as well as employees and vendors that have been given access to individual trade secrets.
 

 

documents that contain trade secret information providing ample notice to a recipient of the confidential nature of the document.

 

to all current and new employees and vendors the nature and importance of trade secrets that will be disclosed to them, and insert trade secret provisions in contracts.

 

continuously the activities and association of current and former employees and vendors with competitors and litigate when necessary.

 

 

Contact Us to find out if you have trade secrets that might be at risk!

DEFINE

MARK

DISSEMINATE

MONITOR

We have also leveraged our source code review capabilities to help clients achieve success in several high-tech trade secret cases covering:

  • Enterprise Software

  • Embedded Systems

  • Power Management
  • Web Browsers and Applications

  • Cryptography

  • Data Compression

  • Content Management Systems

  • Video Surveillance Systems

  • Image Processing

  • Semiconductor Memory Management

Show More

$500 million Verdict for Leading Video Game Studio

 

Copperpod litigation consultants helped a major video gaming platform developer identify its trade secrets and successfully prove misappropriation by a leading virtual reality headset manufacturer. Their analysis showed how ex-employees shared important know-how with the defendant and how the source code was similar at an abstraction level.

Settlement with a Fortune 500 Computer Networking Player

Copperpod  trade secret consultants helped a San Francisco based law firm evaluate millions of documents to unearth key evidence showing how a major computer networking company defrauded a vendor's investors by taking control of the vendor's software and trade secrets kept in escrow pursuant to a liquidation event.

Trade Secret Processes Established at Texas SCM Software Manufacturer

Copperpod code review consultants helped a leading Texas-based supply chain management company identify and document its trade secrets through research, developer interviews and code review. Our consultants established industry best practices for active monitoring of exposure of business critical know-how to vendors and customers.

Copperpod is one of the world's leading technology research and forensics firms, with an acute focus on management and monetization of intellectual property assets. With offices in US and Asia, our global team of consultants has helped clients realize over $1 billion in revenues from patent licensing, jury verdicts and patent portfolio transactions.

© 2019 Carthaginian Ventures Private Limited. All Rights Reserved.                          Privacy Policy                                                     info@CopperpodIP.com