4 Ways to Mitigate Emerging Challenges in Trade Secret Litigation
Recovering trade secrets, remediating them, and pursuing reparations for losses relating to IP theft is often worth the investment, but only if efforts are strategic.
December 18, 2019 at 09:30 AM
7 minute read
|
Trade secret litigation is on the rise. In the last two years, the number of filings have grown more than 30 percent. The stakes in these matters are becoming increasingly high as well—with awards reaching into the hundreds of millions for some civil cases. Investigators are facing new challenges that make the task of gathering evidence and remediating lost IP ever more difficult.
When trade secret theft is suspected or a suit is filed, the investigations that commence are complex, expensive, and intense. They involve collection of data from numerous physical and digital sources, across multiple geographies, and for potentially dozens of custodians. In addition to searching for evidence of trade secret theft or malicious behavior, investigators must then also locate every place to which stolen trade secret information has been copied or shared, and remove it from those unauthorized stores. When you layer in the potential for data privacy concerns, the complexity is even more evident.
In my investigations work in recent years, I've seen the scope and complexity of these matters deepen significantly, along with changes in how they are approached. Complicated protocols for investigations are causing costs to rise. The proliferation of varied data sources and cloud usage introduces more challenges for finding and remediating lost IP. Gaps between new demands and the capabilities of technology solutions are placing added importance on the skill and expertise of investigators.
Recovering trade secrets, remediating them, and pursuing reparations for losses relating to IP theft is often worth the investment, but only if efforts are strategic, such that every step truly brings value to the case. Below are four areas counsel must consider and address in today's trade secret litigation landscape to prevent time and costs from spiraling out of control.
1. Case and Protocol Strategy: Make mindful case strategy a priority, especially with regard to protocols and the use of neutral experts. In these matters, plaintiffs want to find evidence that their lost IP is not being used or disseminated. One way they do this is by negotiating protocols, the scope of how the investigation is carried out and the extent of date ranges, keywords, custodians and data sources that must be examined. We're observing plaintiffs heavily negotiate complicated protocols above and beyond what was the norm five or 10 years ago. Complex protocols can contain highly technical aspects that don't always yield value proportionate to the cost of the in-depth, technical forensic analysis required.
For example, the protocol in one recent matter required us to search unallocated space (space not currently being used by an active file but may contain remnants of prior deleted data). Unallocated space can contain a wealth of information about deleted files—but understanding why it should be searched is critical. Does counsel wish to establish that a file once existed but does not anymore? Is the goal to recover the file and review it? Without an understanding of the goal, one can easily spend a great deal of money running keywords that won't return actual files. In the case referenced above, the existence of the key documents in unallocated space would not have told the parties anything they didn't already know and thus added very little value despite the cost. Work with digital forensics experts to build a strategy that will recover key information without breaking the budget.
2. Understand Remediation: Remediation is an important part of a trade secret theft investigation, to stop misappropriation from perpetuating. Unfortunately it is rarely as simple as hitting the delete button and moving on. Each place where trade secret data lives must be addressed across operating systems (Windows, MacOS, iOS, Android, Linux, etc.) and hardware (Mac, PC, iPhone, Android, USB external hard drives), all which introduce unique nuances in how data could be deleted and overwritten. More, the volume of files that must be remediated is also increasing.
While rare, certain technical limitations may lead to thousands of dollars in costs to overwrite just one file, even when lower cost alternatives exist. Often, forensic investigators are bound by a remediation protocol that doesn't give them the flexibility to deviate to a lower cost alternative. Close coordination between forensic experts and counsel can help address technical challenges as they arise to ensure timely, accurate and cost effective removal of misappropriated trade secrets.
3. Be Prepared for Cloud Complications: Data taken from an organization can quickly end up in a lot of different places. From an investigations standpoint, this requires the team to cast a wide net in the sources they search and analyze, and ultimately remediate. A single action, like taking a photo of a confidential information, could cause replication of trade secrets to numerous locations. Investigators must address a vast variety of virtual and physical digital data sources.
In the example of the photo, I commonly advise clients to check iCloud, Dropbox, Google Photos, Amazon Photos and other similar services, in addition to traditional sources, like a laptop, for copies of the same photograph. The first step in this process is to identify all the possible locations where the trade secrets could have spread. Once those locations are identified, the team may encounter a range of challenges getting access to the files and removing the files from the accounts, adding to the remediation challenges and costs outlined earlier.
One recent case involved a single individual who took trade secrets. At first, we expected the matter to be resolved quickly given the individual's assertion that he would cooperate with our investigation. We obtained his computer and cloud account credentials. Upon inspection of the computer, we identified other cloud accounts not provided to us, as well as files in a Dropbox folder that didn't match the online Dropbox account. As it turned out, the individual had multiple Dropbox accounts but had only provided one to us. Further investigation of the second account revealed yet another computer to which the client's trade secrets had been synchronized.
Despite the fact that the laptop and cloud credentials were provided up front, the investigation became quite extensive—the work of accessing and combing through data sources and remediating the trade secrets was significant for what was initially considered a fairly isolated and small incident. The lesson? Counsel must be prepared for cloud complications and take them into consideration when planning case strategy.
4. Get Smart about Technology: First, understand that today's forensics tools, while robust, lack certain capabilities to meet today's complex needs. They do provide the ability to work much faster, but at the same time, investigators often mix and match different tools to meet the unique challenges of any given investigation. In some circumstances this means writing custom scripts, or building proprietary tools to bridge gaps—tasks that require specialized expertise in computer forensics and an understanding of tools available and the nuances of trade secret theft work.
Further, analytics can provide significant value to searching for key information in a case, but only when applied alongside experienced people and thoughtful process. Our teams have seen numerous instances in which clients relied upon leading analytics tools to uncover specific information in a trade secret matter, only to find that other settings, other tools or custom tools would have been more effective at uncovering the critical evidence. This is a valuable reminder of the importance of having a deep understanding of the tools and how they are used.
The most critical step counsel can take in dealing with these new trends is to strike a healthy balance of people, process, and technology. With input from digital forensic investigators that understand the activities and factors that will drive up costs, counsel can ensure an approach that is reasonable and effective without scorching the earth in terms of cost and effort.
Daniel Roffman is a Senior Managing Director at FTI Consulting in the Computer Forensics practice of the Technology segment. Mr. Roffman is an expert in computer forensics, eDiscovery, and cyber investigations.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Cannabis Took a Hit on Red Wednesday, but Hope Is On the Way
- 2Ben Brafman Defending Celebrity Rabbi in Lawsuit by Miami Hotel
- 3People in the News—Dec. 23, 2024—Barley Snyder, Marshall Dennehey
- 4How I Made Office Managing Partner: 'Be a Lawyer First, Foremost and Always,' Says Matthew McLaughlin of Venable
- 5Bar Report - Dec. 23
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250