Friday, March 10, 2017

The Reading List (2017, No. 10): South Carolina Interprets Stealth Confidentiality Agreement

Non-Compete and Trade Secrets News for the week ended March 10, 2017

***

South Carolina Non-Competes

The Court of Appeals of South Carolina issued a very interesting and important ruling on the oft-overlooked interplay between non-disclosure and non-competition covenants. The case is Fay v. Total Quality Logistics, LLC, No. 2014-1828.

In Fay, the Court of Appeals determined that an indefinite non-disclosure agreement operated as a stealth non-competition restriction, because it provided that if the ex-employee entered into a similar business as his employer and worked in a similar type of position, he would "necessarily and inevitably" use the employer's confidential information to perform his job. In other words, the agreement attempted to graft the devilish "inevitable disclosure" doctrine into a non-disclosure/non-competition covenant. Bad move. This contractual language in effect prohibited the employee ever from competing with his former employer. Under South Carolina's strict "blue-pencil" rule, the court couldn't modify the contract to add in a reasonable time limit. As such, it was unenforceable.

The concurring opinion offered the same conclusion, but first looked to Ohio law because that's what the parties agreed to apply to the contract. But even under Ohio law (which is more friendly), the indefinite non-disclosure agreement would be unenforceable. Fay represents yet another case in an emerging area: an employee's challenge of a broad non-disclosure agreement and arguing it operates as a stealth non-compete. You can read the opinion of the Court of Appeals by clicking here.

Proposed Amendments to CFAA

The Computer Fraud and Abuse Act has been amended many times since it first appeared on the scene in 1986. In reality, it needs to be rewritten or broken up into several different laws. But it's back on the legislative docket, at least if one Congressman has his way.

Rep. Tom Graves (R. GA) has proposed the Active Cyber Defense Certainty Act. The bill would allow victims of cyber-attacks to engage in limited defensive measures to identify and stop attackers. In essence, it's a bill that enables "hacking back" and formalizes that concept as a defense to prosecution for unlawful computer access. The text of the bill is available here.

The theory of hack-backs have generated a lot of debate among scholars in recent years, with some arguing that, even if legal, it could have dramatic unintended consequences in ensnaring innocent third-parties. It is often difficult to trace the source of a hack.

***

In other news, a great deal of news is floating around about Waymo, LLC v. Uber Techs., Inc., the trade secrets case involving Google's self-driving technology. News reports first surfaced a few weeks ago about the claim that featured, at its core, the departure of Waymo manager Anthony Levandowski and the supposed downloading of nearly 14,000 confidential Waymo files. Waymo appears to have suspected misappropriation based on the erroneous e-mail transmission of a circuit board drawing, intended for Uber but delivered instead to Waymo. A copy of the Complaint, which features a claim under the Defend Trade Secrets Act, is available here. The "Introduction" sets forth the big-picture story and is a great example of persuasive legal writing.

***

For those interested in the ex parte seizure order procedure available under the DTSA, this link contains the first ever federal court seizure order carried out. The case is Mission Capital Advisors LLC v. Romaka, No. 1:16-cv-5878 (S.D.N.Y.). The collateral costs of obtaining such an order are fairly high. Of note, the defendant in this case never was represented by counsel during the litigation.

***

Finally, the U.S. Attorney's Office in the Middle District of Louisiana released a statement on February 16 that confirms the sentence of Brian Johnson for violating Section (a)(5)(A) of the CFAA. Johnson's guilty plea stemmed from his installation of malicious code on Georgia-Pacific's information technology system after G-P terminated his employment. The code resulted in significant damage to G-P's operations. Johnson will serve a 3-year prison term and must pay more than $1 million in restitution.

No comments:

Post a Comment