4 Ways to Mitigate Emerging Challenges in Trade Secret Litigation
Recovering trade secrets, remediating them, and pursuing reparations for losses relating to IP theft is often worth the investment, but only if efforts are strategic.
December 18, 2019 at 09:30 AM
7 minute read
Trade secret litigation is on the rise. In the last two years, the number of filings have grown more than 30 percent. The stakes in these matters are becoming increasingly high as well—with awards reaching into the hundreds of millions for some civil cases. Investigators are facing new challenges that make the task of gathering evidence and remediating lost IP ever more difficult.
When trade secret theft is suspected or a suit is filed, the investigations that commence are complex, expensive, and intense. They involve collection of data from numerous physical and digital sources, across multiple geographies, and for potentially dozens of custodians. In addition to searching for evidence of trade secret theft or malicious behavior, investigators must then also locate every place to which stolen trade secret information has been copied or shared, and remove it from those unauthorized stores. When you layer in the potential for data privacy concerns, the complexity is even more evident.
In my investigations work in recent years, I've seen the scope and complexity of these matters deepen significantly, along with changes in how they are approached. Complicated protocols for investigations are causing costs to rise. The proliferation of varied data sources and cloud usage introduces more challenges for finding and remediating lost IP. Gaps between new demands and the capabilities of technology solutions are placing added importance on the skill and expertise of investigators.
Recovering trade secrets, remediating them, and pursuing reparations for losses relating to IP theft is often worth the investment, but only if efforts are strategic, such that every step truly brings value to the case. Below are four areas counsel must consider and address in today's trade secret litigation landscape to prevent time and costs from spiraling out of control.
1. Case and Protocol Strategy: Make mindful case strategy a priority, especially with regard to protocols and the use of neutral experts. In these matters, plaintiffs want to find evidence that their lost IP is not being used or disseminated. One way they do this is by negotiating protocols, the scope of how the investigation is carried out and the extent of date ranges, keywords, custodians and data sources that must be examined. We're observing plaintiffs heavily negotiate complicated protocols above and beyond what was the norm five or 10 years ago. Complex protocols can contain highly technical aspects that don't always yield value proportionate to the cost of the in-depth, technical forensic analysis required.
For example, the protocol in one recent matter required us to search unallocated space (space not currently being used by an active file but may contain remnants of prior deleted data). Unallocated space can contain a wealth of information about deleted files—but understanding why it should be searched is critical. Does counsel wish to establish that a file once existed but does not anymore? Is the goal to recover the file and review it? Without an understanding of the goal, one can easily spend a great deal of money running keywords that won't return actual files. In the case referenced above, the existence of the key documents in unallocated space would not have told the parties anything they didn't already know and thus added very little value despite the cost. Work with digital forensics experts to build a strategy that will recover key information without breaking the budget.
2. Understand Remediation: Remediation is an important part of a trade secret theft investigation, to stop misappropriation from perpetuating. Unfortunately it is rarely as simple as hitting the delete button and moving on. Each place where trade secret data lives must be addressed across operating systems (Windows, MacOS, iOS, Android, Linux, etc.) and hardware (Mac, PC, iPhone, Android, USB external hard drives), all which introduce unique nuances in how data could be deleted and overwritten. More, the volume of files that must be remediated is also increasing.
While rare, certain technical limitations may lead to thousands of dollars in costs to overwrite just one file, even when lower cost alternatives exist. Often, forensic investigators are bound by a remediation protocol that doesn't give them the flexibility to deviate to a lower cost alternative. Close coordination between forensic experts and counsel can help address technical challenges as they arise to ensure timely, accurate and cost effective removal of misappropriated trade secrets.
3. Be Prepared for Cloud Complications: Data taken from an organization can quickly end up in a lot of different places. From an investigations standpoint, this requires the team to cast a wide net in the sources they search and analyze, and ultimately remediate. A single action, like taking a photo of a confidential information, could cause replication of trade secrets to numerous locations. Investigators must address a vast variety of virtual and physical digital data sources.
In the example of the photo, I commonly advise clients to check iCloud, Dropbox, Google Photos, Amazon Photos and other similar services, in addition to traditional sources, like a laptop, for copies of the same photograph. The first step in this process is to identify all the possible locations where the trade secrets could have spread. Once those locations are identified, the team may encounter a range of challenges getting access to the files and removing the files from the accounts, adding to the remediation challenges and costs outlined earlier.
One recent case involved a single individual who took trade secrets. At first, we expected the matter to be resolved quickly given the individual's assertion that he would cooperate with our investigation. We obtained his computer and cloud account credentials. Upon inspection of the computer, we identified other cloud accounts not provided to us, as well as files in a Dropbox folder that didn't match the online Dropbox account. As it turned out, the individual had multiple Dropbox accounts but had only provided one to us. Further investigation of the second account revealed yet another computer to which the client's trade secrets had been synchronized.
Despite the fact that the laptop and cloud credentials were provided up front, the investigation became quite extensive—the work of accessing and combing through data sources and remediating the trade secrets was significant for what was initially considered a fairly isolated and small incident. The lesson? Counsel must be prepared for cloud complications and take them into consideration when planning case strategy.
4. Get Smart about Technology: First, understand that today's forensics tools, while robust, lack certain capabilities to meet today's complex needs. They do provide the ability to work much faster, but at the same time, investigators often mix and match different tools to meet the unique challenges of any given investigation. In some circumstances this means writing custom scripts, or building proprietary tools to bridge gaps—tasks that require specialized expertise in computer forensics and an understanding of tools available and the nuances of trade secret theft work.
Further, analytics can provide significant value to searching for key information in a case, but only when applied alongside experienced people and thoughtful process. Our teams have seen numerous instances in which clients relied upon leading analytics tools to uncover specific information in a trade secret matter, only to find that other settings, other tools or custom tools would have been more effective at uncovering the critical evidence. This is a valuable reminder of the importance of having a deep understanding of the tools and how they are used.
The most critical step counsel can take in dealing with these new trends is to strike a healthy balance of people, process, and technology. With input from digital forensic investigators that understand the activities and factors that will drive up costs, counsel can ensure an approach that is reasonable and effective without scorching the earth in terms of cost and effort.
Daniel Roffman is a Senior Managing Director at FTI Consulting in the Computer Forensics practice of the Technology segment. Mr. Roffman is an expert in computer forensics, eDiscovery, and cyber investigations.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250