[caption id="attachment_2116" align="alignright" width="113"]James P. Flynn James P. Flynn[/caption]

In the recent case of United States v. Nosal, the United States Court of Appeals for the Ninth Circuit confirmed the applicability of both the Computer Fraud and Abuse Act and the Economic Espionage Act as safeguards against theft of trade secrets by departed former employees.  Importantly, Nosal applied such laws to convict a former employee in a case involving domestic businesses and personnel without any alleged overseas connections.  Because of civil enforcement provisions in the CFAA itself and the recently enacted Defend Trade Secrets Act, Nosal represents a possible guide to employers seeking to protect their trade secrets through civil or criminal mechanisms, or both.

In assessing the implication of Nosal, one may consider three framing questions:

  1. How does this case take the trend of criminalization and federalization of trade secret law a step further?

The Nosal case is a great example of three trends coming together to give corporate employer and trade secret owners access to new avenues for relief.

First, Nosal pushes forward the trend that began in 2013 when the Department of Justice announced that trade secret prosecutions would become an area of emphasis.  Since then, DOJ has been much more receptive to business crime claims.

Second, it is the next step in the law’s evolution—the majority decision construed both the Consumer Fraud & Abuse Act and Economic Espionage Act in a complementary manner consistent with their plain language and applied them to common sense circumstances that seemed like theft. The CFAA is written in language beyond that of  a technical anti-hacking statute, and it is important that a federal appeals court has recognized that scope.

Third, and most importantly, Nosal is a step in the right direction on protecting trade secrets whether or not there are later criminal prosecutions on similar theories.  That is because the CFAA and now, since April, the Defend Trade Secrets Act also allow for civil remedies. Nosal’s common sense result was that one is acting without authorization when one uses another’s password because the actor’s password  has been revoked—that holding is not only a tool for prosecutors, but is one that civil litigants could use as well.

2. Why have there been more criminal convictions in trade secrets cases in the past few years?

Changes in in policy, changes in politics, and changes in perceptions.

First, the Obama administration formally issued a written policy in February 2013 announcing ADMINISTRATION STRATEGY ON MITIGATING THE THEFT OF U.S. TRADE SECRETS.  So one is seeing more prosecutions, and convictions, in some sense because DOJ has pursued that policy.

Second, there is a growing sense that these crimes not only hurt individual companies economically, but hurt the United States and its citizens more generally. That is why so many of the higher profile trade secret prosecutions have involved defendants who were foreign nationals or were assisting foreign companies.  Public and political support for pursuing such cases cannot be underestimated.

Finally, in light of the announced policy and the evolving political reality, companies are simply more likely to report such crimes. In the past, victimized companies hesitated to draw attention to their own losses or injuries and thought doing so also required them to give up control of recovery efforts to prosecutors.  Those perceptions have changed, and Nosal and cases like it are examples of such changes.

3. What were the key takeaways from the dissent in Nosal that might gain traction as other circuits address these issues?

The dissent had three main criticisms of the majority opinion.

The first criticism was that, in the dissent’s view, the 9th Circuit improperly expanded the CFAA beyond its anti-hacking roots to apply it to what the dissent described as mere password sharing.

Second, the dissenting judge contended that the decision effectively turns employers’ computer use policies into non-public criminal codes of which defendants have inadequate notice.

Third, and what likely in some ways probably motivates the dissent’s first two points, the dissent observed that this decision potentially empowers corporate employers to have undue influence in criminal prosecutions.

These statutes and the criminal prosecution of trade secret theft continue to be areas of interest that trade secret owners and their counsel should follow, and should consider in enforcing their own rights in these matters.

Back to Trade Secrets & Employee Mobility Blog

Search This Blog

Blog Editors

Authors

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Trade Secrets & Employee Mobility posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.