background image
W I N T E R 2 0 1 2
19
in light of the confidential relationship
between the parties. In Utah, for ex-
ample, the Muna opinion recognized that
trade secrets are property having intrinsic
value. But the court also noted that the
trade secret arose out of a confidential
relationship,
3
leaving one to wonder
which theory would apply. Either way,
lawyers must be on their toes because
they don't want to guess wrong.
The limitations question becomes
less clear when there are "continuing
misappropriations" or multiple misap-
propriators. California's courts have dealt
with these questions in recent years. In
Cadence Design Systems, Inc.v. Avant!
Corporation
, 57 P.3d 647 (Cal. 2002)
4
,
the California Supreme Court held that,
under the UTSA, continued improper use
of a trade secret by a single defendant
is part of a single claim of continuing
misappropriation accruing at the time
of the initial misappropriation.
The UTSA does not define "continu-
ing misappropriation." But the Cadence
court defined it as "the continuing use
or disclosure of a trade secret after that
secret was acquired by improper means
or as otherwise specified in [the statute]."
Id. at 651. Thus, California considers a
continuing misappropriation as a single
claim for the purpose of the statute of
limitations. See id.
The Cadence court also distinguished
between continuing misappropriation by
a single defendant, and multiple claims
of misappropriation against multiple
defendants. Id. The court observed, that
continuing misappropriation may consti-
tute more than one claim, each with its
own limitations period, when multiple
misappropriators are involved. See id.
at 652. See also PMC, Inc. v. Kadisha,
78 Cal.App. 4th 1368 (Cal. App. 2000);
Global Compliance, Inc. v. Am. Labor
Law Co.
, 2006 WL 1314171, *12-13
(Cal. Ct. App. 2nd, May 15, 2006)
(Unpublished); HiRel Connectors, Inc. v.
United States
, 2005 WL 4942595, *3,
(C.D. Cal., Jan 4, 2005) ("[T]here may be
separate claims of continuing misap-
propriation among different defendants,
with differing dates of accrual and types
of tortuous conduct ­ some defendants
liable for initial misappropriation of the
trade secret, others only for later con-
tinuing use.").
Here are some recommendations:
1. aggressively prosecute
misappropriation.
Absent clear authority to the con-
trary, assume trade secrets are based
on a "confidential relationship" theory.
This will guide your response when your
client calls to say his ex manager just
opened a competing business with the
owner's confidential information.
2. Be cautious in drafting settlement
agreements.
When drafting settlement agree-
ments, conscientious lawyers often
include clauses to "forever release and
discharge the wrongdoer for, among other
things, past and/or future known and
unsuspected damages, claims, or causes
of action, without limitation,
" or similar
provisions. But if the trade secrets owner
releases the wrongdoer for past and
"future" misappropriations and damages,
the owner may unintentionally release
the misappropriator from claims of future
misappropriations of the very same trade
secrets.
3. Identify your trade secrets.
Client, customer, and supplier lists,
recipes, renewal dates, salaries, pric-
ing, contacts, and a host of other things
can be trade secrets. Even compila-
tions of publicly-available information
gathered for a proprietary purpose can
be protected as trade secrets. Employers
must alert, and frequently remind, their
employees of what they consider to be
trade secrets. They should be marked on
each page with something like this:
THESE maTERIalS aRE coNfIDENTIal
TRaDE SEcRETS of XyZ comPaNy.
Do NoT TaKE THEm HomE.
Do NoT DoWNloaD.
Do NoT DIScloSE,
mISaPPRoPRIaTE, oR STEal.
Leave no room for doubt.
4. Guard your trade secrets.
Build walls around your clients' trade
secrets. Lock them up. Employees have
a common law duty in many states not to
misappropriate trade secrets. But many
employees may not know that they have
such a duty or even that they are privy to
their employer's trade secrets, and will
not hesitate to walk out the door with
them. Use appropriate non disclosure
and properly tailored non competition
agreements as part of your defenses to
guard against trade secret theft.
conclusion ­
Guard the crown Jewels
Success sometimes breeds jealousy,
justification, and rationalization among
employees. The temptation to steal trade
secrets for personal gain can be great.
Trade secret thieves will use a business
owner's trade secrets again and again
unless they are stopped. Business owners
must be vigilant. If they are not, their
trade secrets, earned with time, sweat,
and money, may end up lining someone
else's pockets.
Like sandcastles on the beach with a
rising tide, the stakes in today's economy
for business owners are high. With
modest planning, documentation, and a
willingness to act promptly, lawyers can
strengthen their clients' positions and
prevent the liquidation of vital assets ­
trade secrets.
1 See Uniform Trade Secrets Act § 1 (4) (1985) (adopted
by 45 states, the District of Columbia, Puerto Rico, and
the U.S. Virgin Islands).
2 The statute of limitations for misappropriation of trade
secrets in Utah is three years. See Utah Code Ann. §
13-24-7.
3 See Muna, 625 P.2d at 696
4 The case was rendered moot when the parties settled,
but published its opinion anyway because of heavy
public.