A brief primer on trade secret law for security professionals. Credit: Thinkstock In Part I of this series, I defined “trade secrets” and the risk of trade secret theft. In this post, I will give a primer on trade secret law, for security professionals. Since I am not a lawyer, the post is not meant as legal advice. My experience does include 16 years of work as an expert witness in security and intellectual property cases.Trade secret law has again hit the headlines with the Waymo vs. Uber case (the most recent headline is here). Cyber technology is rarely the cause of trade secret theft, but often these days is an enabler. In this matter, a Waymo engineer is accused of downloading 9.7 GB of trade secret files while employed at Waymo, and then making use of them after joining Uber. You can read the details here. Waymo’s complaint is based on both federal and state laws.The first trade secret laws in the US arose out of common law in the 19th century. One of the first cases, Peabody v. Norfolk (1868), involved a machinist leaving one textile manufacturer for a competitor – both firms were in Massachusetts. Trade secret statutes then evolved out of these intra-state disputes. Today, virtually all states have adopted the UTSA, Uniform Trade Secrets Act, as statutory law prohibiting trade secret theft. Plaintiffs generally seek relief against misappropriators in the state court system. You don’t steal a trade secret like you would steal a car. Damages can include: monetary damages, unjust enrichment, punitive damages and injunctive relief. The statute of limitations is three years.The Defend Trade Secrets Act (DTSA) is a new federal law passed in May, 2016. Congress gave potential victims the chance to litigate directly in Federal court. Waymo is taking advantage of the DSTA. For willful and malicious trade secret misappropriation, the DTSA permits recovery of attorney’s fees and triple punitive damages. There are other venues that trade secret plaintiffs may use. The ITC (International Trade Commission) hears cases related to imported products potentially infringing trade secrets held by domestic manufacturers. It’s known for relatively rapid resolution of cases. Recently, Jawbone claimed trade secret theft by Fitbit and unsuccessfully attempted to block Fitbit’s product imports from Asia.Finally, the Economic Espionage Act (EEA) provides criminal penalties for trade secret theft. These cases are tried in Federal courts, by US Attorneys. A recent example is the case of Sergey Aleynikov, former Goldman Sachs programmer, who allegedly stole trading software from his employer. After six years of litigation and $7M of legal fees, he was ultimately vindicated in this matter. If your organization depends on trade secrets for its business, you will want to become familiar with and track the types of breaches that are going on in your industry. Unfortunately there is no single source for this information. Three good sources include:Brooklyn Law School Trade Secrets Institute (TSI)PacerPro U.S. DOJ Intellectual Property Task Force (IPTF)The TSI reports on many trade secret theft cases, doing a fairly good job of coverage. PacerPro is a subscription based service that provides access to records of federal cases in litigation. The DOJ IPTF site provides press releases on all types of federal IP theft matters.Next, in Part III, I will analyze the root causes in 10 trade secret theft cases. Related content opinion How to become a cybersecurity RSO How to build a reliable security program By Frederick Scholl Aug 21, 2019 10 mins Security opinion Rethinking security 6 foundational steps to make your enterprise security program effective. By Frederick Scholl Jun 08, 2018 11 mins Technology Industry Data and Information Security Network Security opinion Protecting trade secrets: technology solutions you can use The fourth and final part of a series on stopping trade secret theft in your organization. By Frederick Scholl Apr 16, 2018 9 mins Technology Industry Cybercrime Data and Information Security opinion Understanding root causes of trade secret breaches The third part of a series on stopping trade secret theft in your organization. By Frederick Scholl Jan 24, 2018 6 mins IT Governance Data and Information Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe