California State Law

글쓴이
Simon
등록일
2004-10-04 01:18
조회
4,376회
추천
30건
댓글
0건
http://www.leginfo.ca.gov/calaw.html

California Law consists of 29 codes, covering various subject areas, the State Constitution and Statutes. Information presented reflects laws currently in effect. All California Codes have been updated to include the 2003 Statutes.

To display the Table of Contents for a code, select a code and click on Search.

Business and Professions Code
Civil Code
Code of Civil Procedure
Commercial Code
Corporations Code
Education Code
Elections Code
Evidence Code
Family Code
Financial Code
Fish and Game Code
Food and Agricultural Code
Government Code
Harbors and Navigation Code
Health and Safety Code
Insurance Code
Labor Code
Military and Veterans Code
Penal Code
Probate Code
Public Contract Code
Public Resources Code
Public Utilities Code
Revenue and Taxation Code
Streets and Highways Code
Unemployment Insurance Code
Vehicle Code
Water Code
Welfare and Institutions Code
All

>>>>>>>>>>>>>>>>>>
Important Ruling on Recovering Attorney's Fees Under California's Uniform Trade Secrets Act
February 22, 2002


Last week, the California Court of Appeal issued an important decision regarding the standard for recovering attorney's fees for "bad faith" trade secret misappropriation claims under California's enactment of the Uniform Trade Secrets Act, which also has been adopted in 42 other states and the District of Columbia. The California decision may be persuasive in other states, as it is only the fourth reported case in the country addressing this particular issue.


The UTSA, of course, is an important tool for protecting many business secrets that either do not qualify for traditional forms of intellectual property protection such as patent or copyright, or the owner believes are better preserved outside the traditional legal regimes. However, the act also can become an instrument of harassment, such as when less than meritorious claims are brought against departing employees to discourage them from joining a competitor.

One of the safeguards against such harassment suits is the UTSA's attorney's fees provision, which authorizes courts to award attorney's fees to a prevailing party whenever a misappropriation claim is made in "bad faith." This authorization for fees is significant, because otherwise fees generally are not recoverable unless the claim is shown to be "frivolous," a difficult standard to meet. To prove frivolousness, a prevailing defendant must show that any reasonable attorney would agree the plaintiff's claim is totally and completely without merit on its face.

In Gemini Aluminum Corp. v. California Custom Shapes, Inc. (Feb. 5, 2002) 2002 Cal. App. LEXIS 1241 (certified for publication), the California Court of Appeal held that a "bad faith" claim of misappropriation is one that is: (a) objectively "specious," and (b) pursued for an improper motive. A claim is objectively specious, the court ruled, if it superficially has merit but in reality is devoid of substance. The opinion suggests that an absence of evidence to support a key element of a misappropriation claim should be sufficient to establish the "specious" requirement.

In Gemini, a contract manufacturer, Gemini, sued its subcontractor, CCS, for allegedly misappropriating the name of Gemini's customer, Taskmaster (a designer and seller of workbenches), and certain technical drawings provided to Gemini by Taskmaster, for the purpose of obtaining Taskmaster's business directly. At the time CCS acquired these alleged trade secrets, Task-master was in financial ruin and arrears to Gemini by more than $320,000, facts that Gemini knew but CCS did not. CCS ultimately did obtain some business directly from Taskmaster, but the total volume was $25,000, for which CCS was paid only $6,100. By the time Gemini filed its trade secrets claim, Taskmaster had initiated liquidation proceedings under Chapter 7 of the Bankruptcy Code and apparently ceased operations.

The decision makes clear that the appeals court believed the value to Gemini and CCS of Taskmaster's identity and technical drawings at the time CCS acquired them was virtually nil, because of Taskmaster's failing financial condition and subsequent collapse. This was critical, because a secret cannot qualify for trade secret protection unless the plaintiff proves the secret has "independent economic value" from not being known.

Early on in the case, CCS pointed out the absence of economic value to Gemini, but Gemini proceeded to trial anyway, where it lost. The jury's unanimous verdict, reached after deliberating for an hour, included a special advisory determination that Gemini had pursued its misappropriation claim in "bad faith." CCS then moved to recover its attorney's fees under the UTSA, which the trial court granted in the amount of $160,000.

The California Court of Appeal concluded that Gemini's misappropriation claim was objectively "specious." Although Gemini's claim for theft of the customer list and the technical drawings appeared to have merit, the court concluded that a probe beneath the surface revealed the absence of economic value and, therefore, merit.

The appellate court also upheld the trial court's finding that Gemini pursued the trade secret claim for improper motives. Recognizing that direct evidence of a party's state of mind is rarely available, the court held that motives can be inferred from circumstantial evidence. The appeals court concluded that Gemini could not possibly have believed the alleged trade secrets had any economic value by the time the lawsuit was filed, because Gemini already knew of Taskmaster's collapse. The court also found significant the response by Gemini's lawyers after being told early in the case that the alleged trade secrets had no economic value: "[CCS] did not have a clue about [Gemini's] case." Finally, the court suggested that testimony by Gemini's principal that CCS's principal was "snaky," and that the principals of CCS and Taskmaster were "two snakes in a paper sack," tended to show that the misappropriation claim was pursued for reasons other than vindicating genuine trade secret rights.

Upshot: After Gemini, the defendants in trade secrets cases have a strong incentive to identify fatal defects in the plaintiffs' claims as early as possible, particularly where there is an obvious absence of evidence to support a key claim element. The missing element may persuade the plaintiff to drop the claim and, if not, may help establish the claim's speciousness later. A letter to opposing counsel pointing out the defect also may help establish the plaintiff's improper motive, particularly if no evidence is subsequently developed.

Of course, just because a trade secrets claim is lost does not mean that it was brought in "bad faith." Even under Gemini, a losing party may be able to escape a finding of speciousness by presenting at least one credible fact in support of each element of its claim. Thus, the Gemini case will likely have the greatest impact on the truly egregious cases where a trade secret plaintiff persists despite the absence of key supporting evidence or the realistic prospect of finding any.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
An Introduction to California Trade Secrets Law


By Dylan W. Wiseman

According to recent statistics, more than 80 percent of information theft facing businesses in the United States occurs internally. This means that a company's greatest threat to loss of sensitive information comes from within -- its own employees.

Lawyers inexperienced in this area often venture into trade secret litigation with visions of Ian Fleming characters and high adventure dancing in their heads. What inevitably awaits is the brutal, hard-fought battle of trade secrets litigation. Typically, the cases move at the lightning-fast pace of temporary restraining orders and preliminary injunctions. And, in many instances, by the time inexperienced attorneys understand the law, the case is already lost.

Trade Secrets Law in California

When most people think of a "trade secret" they envision the formula to Coca Cola or the design schematic from a bio-medical research lab. While the California Uniform Trade Secrets Act ("UTSA") certainly protects such information, the UTSA also affords protection to much more common pieces of information. Civil Code sections 3426.1-3426.11. If a company takes reasonable measures to protect its information, and if the information is valuable because it is kept secret, California courts will recognize that common, every-day pieces of data can be afforded protection as a trade secret. For example, customer lists, business plans, spreadsheets, corporate minutes and agendas, and bid specifications can be afforded protection as trade secrets.

Misappropriation Defined
Rather than "theft," the UTSA uses the term "misappropriation." Misappropriation has a specific legal definition which includes two distinct types of misuse: 1) the acquisition by improper means, and 2) the use or disclosure of trade secrets. Civil Code section 3426.1.

"Improper means" includes "theft, bribery, misrepresentation, breach or inducement of a breach of duty to maintain secrecy, or espionage through electronic or other means." Civil Code section 3426.1(a). Thus, if a former employee were to physically take or copy a trade secret, that information would be acquired by improper means.

The second definition of "misappropriation" under the UTSA refers to the prohibition of the use or disclosure of trade secret information. Civil Code section 3426.1(b)(2). Cases interpreting this provision of the UTSA have held that a former employee's use or disclosure of confidential customer information to solicit new accounts on behalf of a new employer constitutes the misappropriation of a trade secret. Morlife, Inc. v. Perry, 56 Cal.App.4th 1514, 1526 (1997); Merrill, Lynch, Pierce, Fenner & Smith, Inc. v. Garcia, 127 F.Supp.2d 1305, 1306 (C.D. Cal. 2000).

The UTSA and the Memories of Former Employees
When a company alleges that its trade secret has been used or disclosed, it is a common misconception that the wrongdoer must have physically absconded with a customer list or design schematic. Under the UTSA, however, a company is not required to show that a former employee physically took trade secret information. The UTSA actually affords protection to the contents of an employee's memory, if the information fits the definition of a trade secret. Morlife, Inc. v. Perry, 56 Cal.App.4th at 1523. Thus, an employer need only show that the employee used or disclosed the contents of his or her memories regarding a trade secret to demonstrate that a misappropriation occurred.

Prior to the UTSA's enactment, former employees argued that they could not be expected to "wipe clean" the contents of their memories, and thus were entitled to use the employer's trade secret information. This so-called "wipe clean" doctrine is no longer viable. Gable-Leigh, Inc. v. North American Miss, 2001 WL 521695, *18 (C.D. Cal. 2001); Morlife, Inc. v. Perry, 56 Cal.App.4th at 1527. This is a major shift in the law. As a result, many cases decided prior to the UTSA's enactment in 1984 are of little guidance in trade secrets disputes.

Courts have also placed limits on relying upon the contents of an employee's memory to form the basis of a misappropriation claim. Quite often, employees will depart and work for a direct competitor in the same type of field, and work in the same or similar type of project. Under those circumstances, it could be argued that the former employee will inevitably disclose the former employer's trade secrets. California, however, has flatly rejected the so-called inevitable disclosure doctrine and requires that some evidence of use or disclosure be presented. See Whyte v. Schlage Lock Co., 101 Cal. App. 4th 1443, 1459-60 (2002). Thus, the former employer must have actual evidence of the use or disclosure of trade secret information prior to bringing a lawsuit. For example, an employer satisfies its evidentiary burden by showing that the former employee used trade secret information to solicit its customers.

While an employee's memory of the specific identities of a company's best customers may be protected as a trade secret, courts are generally hesitant to consider broad categories of knowledge, such as "general business know-how," to be protected under the UTSA. In re Providian Credit Cards, 96 Cal.App.4th 292, 309 (2002). [1]

An Employer's Liability for Unauthorized Use of Trade Secrets

When facing a use or disclosure claim, the former employee's new company may assert that it did not know that its employee had used or disclosed trade secret information. Under the UTSA, the standard is not actual knowledge of wrongdoing, but merely constructive knowledge. (Civil Code section 3426.1(b)(2)(B)(ii)(iii).) If the facts show that a company's principals knew or should have known that the alleged wrongdoing was occurring, liability may attach to the company. It is extremely important to contain the use of such information because "[t]he potential damages encompassed by a continuing misappropriation may expand with each illicit use of disclosure of the trade secret." Cadence Design Systems, Inc. v. Avant!, 29 Cal. 4th 215, 226 (2002).

Tips for Employers

In this electronic age, most companies have taken reasonable measures to protect trade secret information. Reasonable electronic measures may include having secured networks, limited employee access to certain directories, firewalls, multi-character passwords, or other ways to limit access or to track employee network activity.

Many cases concerning the acquisition of trade secrets by improper means involve the saving or transferring of data to an electronic storage medium like a Zip disk, CD-rom or other storage device containing a USB port. As a result, forensic evidence can be crucial for proving such cases. When companies confront such a problem, they should never have their own information technology ("IT") professionals conduct any type of forensic work. While a company's in-house IT staff may be good at updating software and making sure that its network runs smoothly, they are generally ill-equipped to handle any meaningful forensic work. Further, a company's in-house IT professionals may complicate the chain of evidence. [2]

To further protect their investments, companies should make certain that they take the following measures to safeguard trade secret information:

Make certain that contractual measures are in place to protect confidential data and trade secrets. Given several recent decisions, companies doing business in California should seriously consider updating their confidentiality agreements, non-solicitation provisions and intellectual property assignment contracts.
Promulgate policies regarding the use of electronic storage devices, Internet use, and use of the company's e-mail system to help prevent misappropriation.
Remind employees of their contractual obligations to protect confidential information and not to use or disclose trade secrets. This may be done during exit or new-hire interviews.
Have a legal plan of action in place in the event you learn that trade secrets have been misappropriated, or that you have hired an employee who may have misappropriated trade secrets.
Whether the dispute involves the yet-to-be-patented designs for a left-ventricular assist device or a valued customer list, companies have likely invested substantial sums to protect the sanctity of such information. To protect these investments, companies should ensure they have solid legal and technical measures in place to safeguard the information that is the lifeblood of their success.


--------------------------------------------------------------------------------

Footnotes
1. Similarly, a recent case commented upon the circumstances under which employers can rely upon contractual non-solicitation provisions to prevent employees from contacting their former accounts. Thompson v. Impaxx, Inc., 113 Cal.App.4th 427, 430 (2003). However, in that case, the employer admitted that the identities of its customers were not trade secrets and could easily be deduced by public means.
2. The theft of electronic data is a crime in California under Penal Code section 502, and most law enforcement agencies are generally reluctant to proceed with cases where a company's in-house IT staff handles the evidence. Lawyers who practice in this area work with forensic teams who can move at a rapid pace and are mindful of the evidentiary issues.

Intellectual Property

http://library.lp.findlaw.com/articles/file/00073/009531/title/Subject/topic/Intellectual%20Property_Trade%20Secrets/filename/intellectualproperty_1_764


과학기술칼럼

게시판 리스트
번호 제목 글쓴이 등록일 조회 추천
1203 [노동부] 근로자퇴직급여보장법 시행령 및 시행규칙(안) 입법예고 scieng 03-21 6261 2
1202 [정통부] 독일 바이에른주, 한국 지상파DMB 실험방송 추진 scieng 03-21 4803 1
1201 [과기부] 癌조기진단 방사성 동위원소 국내 기술로 본격 생산 scieng 03-21 4407 1
1200 [산자부] 기업들 경상이익 크게 늘고 부채비율은 줄어 scieng 03-21 5005 1
1199 [특허청] 이공계 전공자의 공직진출, 특허청에 길이 있다. scieng 03-21 5595 1
1198 [산자부] `06년도 미국 연구개발예산 scieng 03-07 5228 58
1197 Application 취약성을 이용한 해킹 및 위험 一終無終一 01-10 4718 29
1196 Terry Schiavo Simon 01-03 5013 31
1195 제대군인지원에관한법률 개정안 회의록 (냉무) 핫컴 12-23 4969 33
1194 SAS output Simon 12-14 5103 34
1193 [아래] 데이터 정리한 Excel File Simon 12-11 4579 40
1192 기술유출 보도양태 - 연합 & 조중동; 1998-2004 Simon 12-10 7748 27
1191 [OECD] 2002 자료 & Contrast Summary Simon 11-19 5250 65
1190 [IMF] '90년 OECD 국가로의 고급인력유출 순위 댓글 1 Simon 11-19 4569 33
1189 [Brain Drain] EU 2003~2004 sysop2 11-19 4496 30
1188 KEEA_Rev1 Simon 11-18 3972 32
1187 국정원 배포 - 산업스파이 사건 재조명 (홍보물) 댓글 1 Simon 11-16 4683 30
1186 기술을 상품처럼 거래한다? 신희균 10-14 4034 28
1185 산하기관 - 자리 상임이사 10-10 4120 33
1184 [1997 ver.] 영업비밀보호법을 "성문화"한 주 list (미국) Simon 10-04 5831 30


랜덤글로 점프
과학기술인이 한국의 미래를 만듭니다.
© 2002 - 2015 scieng.net
모바일 버전으로 보기