Sign In
    Wisconsin Lawyer
    May 01, 1998

    Wisconsin Lawyer May 1998: Is a Padlock Better than a Patent?

    Avoiding Trade Secret Misappropriation
    Qualifying Information as a Trade Secret

    Is a Padlock Better than a Patent? Trade Secrets vs. Patents

    By Mimi C. Goller

    Editor's Note: To view Wisconsin statutory materials referenced in this article you must have and/or install Adobe Acrobat Reader 3.0 on your computer.

    In today's extremely competitive corporate environment, know-how and technology are key factors in the commercial success of a business, and businesses must determine whether to protect this valuable information under a patent or a trade secret. Making the wrong decision regarding which type of intellectual property protection to use could cost a company thousands or millions of dollars, and a competitive advantage. Therefore, a business must make a detailed analysis to determine the appropriate form of protection. This article reviews the various advantages and disadvantages with trade secrets and patents, and provides some important factors to consider when determining which form of protection to use.

    Trade secrets

    A trade secret is defined as any formula, pattern, device, or compilation of information that is used in one's business that gives it an advantage over competitors who do not know or use it.1 There are many advantages and disadvantages with trade secret law.

    Advantages. Unlike patent protection, which has a limited term, trade secret protection can be of unlimited duration. For example, Kentucky Fried Chicken's blend of 11 herbs and spices has been a well-kept trade secret for more than 37 years2 and Coca-Cola's soda formula has been a valuable trade secret during the 100 years since its original formulation.3

    Then, there is cost: Trade secret information can be relatively inexpensive. For example, there are no government fees associated with a trade secret. In addition, there are no attorney fees for drafting and prosecuting a trade secret, unlike for a patent application. However, various secrecy protection measures, such as computer security measures, employee nondisclosure agreements, employee exit interviews, secured/encrypted electronic communications, external audits, access restrictions, photocopying restrictions, and employee education programs, necessary to maintain trade secret status can be costly.

    Further, a trade secret does not have to meet the high patentability standards of utility, novelty, and nonobviousness. As a result, the subject matter protectable as a trade secret is extremely broad and can include chemical formulas, recipes, algorithms, internal pricing, methods of doing business, customer lists, special customer needs, codes for determining discounts, customer credit ratings, architectural plans, manufacturing techniques, marketing and advertising plans, product development information, personnel information, and computer software. Even the genetic content of seeds4 and "negative know-how" (that is, knowledge that a certain approach to a problem does not work) have been found legitimate trade secret subject matter.

    Additionally, trade secret misappropriation, unlike patent infringement, now can be prosecuted under criminal statutes. A new statute, 18 U.S.C. 1832, dubbed the Economic Espionage Act of 1996 (the Act), was signed into law on Oct. 11, 1996. The Act makes theft of trade secret information a federal criminal offense and gives the Department of Justice authority to prosecute trade secret theft whether it occurs in the United States or abroad.5 The penalties under the Act are severe. Violators of section 1832 can be imprisoned for up to 10 years and fined up to $500,000. A corporation or other organization can be fined up to $5 million.6

    "Competition is ruthless, unprincipled, uncharitable, unforgiving ­ and a boon to society."

    ­ Adam Smith

    The Act punishes the individual who misappropriated the trade secret and makes it a federal criminal offense to receive, possess, or buy the trade secret information knowing that such information was obtained or stolen without the trade secret owner's authorization. Criminal forfeiture provisions allow forfeiture of any property constituting or derived from the proceeds of Act violations.

    Two basic elements are required to prove theft of a trade secret under the Act. First, federal prosecutors must prove that the individual accused of misappropriating the trade secret did so knowingly. Second, the law requires proof of intent to injure the trade secret owner. This second element has drawn sharp criticism due to the difficulty in obtaining evidence proving an intent to cause injury; therefore, this law may be challenging to enforce.7

    In the past, trade secrets were exclusively under state jurisdiction. Under the Act, federal courts have exclusive original jurisdiction, but the law states that it shall not be construed to preempt or displace any other remedies, civil or criminal, relating to the misappropriation or theft of a trade secret.

    Wisconsin has a specific statute, section 134.90, that governs trade secret misappropriation.8 When examining an alleged violation of section 134.90, three questions must be answered. 1) Is the material at issue a trade secret under the definition in section 134.90(1)(c)? The definition requires that the "information derives independent economic value, actual or potential, from not being generally known to and not readily ascertainable by a proper means, by others who can obtain economic value from its disclosure or use." The definition also dictates that the information be subject to secrecy efforts.

    2) Has misappropriation of the trade secret occurred? "Misappropriation" under section 134.90(2) includes not only actualmisappropriation but a mere threat to misappropriate a trade secret.

    If both of the above requirements are met, the next question is: 3) What is the proper remedy under section 134.90(3) or 134.90(4)? The remedy can include injunctive relief and monetary damages. Further, anyone who misappropriates a trade secret in Wisconsin may be guilty of a Class E felony.9

    Disadvantages. A trade secret is not necessarily exclusive and may be lost through independent discovery or reverse engineering by a third party, both of which are legal, unless prohibited by contract. Further, mere inadvertence by the trade secret holder may result in the loss of trade secret protection. It is not uncommon for an overzealous employee to inadvertently disclose confidential trade secret information at a trade show, during the bid-making process, or at industry seminars.

    Trade secret information also is frequently exploited by former employees due to malice toward the former employer or the profitability of corporate espionage, or both. The House of Representatives' Subcommittee on Crime estimates that economic espionage costs U.S. businesses up to $50 billion a year.10 Although a business may take legal action against individuals who misappropriate trade secrets, as a practical matter the individuals often are without sufficient assets to pay the assessed damages, and imprisonment does not replace the company's lost competitive advantage.

    The particular industry of a business may determine whether trade secret protection is beneficial. For instance, in the biotechnology industry, proprietary materials often are alive, microscopic, and able to reproduce themselves even when removed from a former employer's facility, making trade secret protection difficult.11

    The loss of trade secret protection also can be relatively easy and quick due to advances in computer technology. For example, an employee can download trade secret information from a company's computer onto a diskette, transfer the information to a home computer, and then upload it onto the Internet where it can be transmitted worldwide within minutes. Within hours, a company can lose complete control over its trade secret rights forever.12

    Trade secret protection requires stringent secrecy protocols to protect trade secret status. These protocols, as mentioned above, may be quite expensive and difficult, depending upon the industry the company is in, the company's size, and its long-term strategy or goals.

    In addition, advanced technology companies, such as those in the computer software or biotech industries, typically have high employee mobility which endangers trade secret preservation. This is especially troublesome since it often is difficult to determine whether an alleged trade secret constitutes the "general knowledge, skills or experience" of the former employee (which the employee has the right to take from the old employer and use for the new one) or the valid "trade secret" information of the former employer. An employee is free to use general skills or knowledge acquired during previous employment; and, as a general rule, courts tend to favor the employee in instances regarding trade secret versus general employee knowledge.13

    Patents

    A United States patent gives an owner the right to exclude others from making, using, or selling the invention covered by the patent. Every invention must have utility, novelty, and nonobviousness in view of the prior art in order to be patentable.

    Advantages. Patent protection is exclusive during the entire life of the patent, which now is 20 years from the date of filing the patent application. If a competitor independently invents or reverse engineers what is covered by one's patent, the patent holder still retains exclusive rights to the invention, unlike trade secret protection.

    Further, because there are no secrecy limitations surrounding issued patents, business transactions involving patents are easier to structure than those involving trade secrets because trade secrets are in increased danger of being lost through license agreements, joint developments, and consulting arrangements if certain precautions are not taken. Specifically, documents involving these transactions must include language ensuring strict confidentiality, enactment of proper trade secret protocols, and the like.

    Know-how and technology are key factors in a business's commercial success, and protecting this valuable information is critical. HOWEVER, using the wrong intellectual property protection could cost you everything.
    A patent also can generate revenue through licensing or assignment to third parties without the possibility of secrecy loss. Licensing allows companies to generate formerly untapped revenue from other corporations, ideally in unrelated industries that do not compete with the licensor. Some large companies, such as Texas Instruments, license their patents for sums approaching one billion dollars annually.14

    Patents also can block competitors, who then must design around the patent claims, if possible. Therefore, companies can exploit and dominate niche areas and maintain an increased market share. Patents even can force competitors out of entire markets. In 1991 the Eastman-Kodak Company paid $925 million to the Polaroid Company to settle charges that it had infringed Polaroid's patent for instant photography processes. The settlement agreement also called for Eastman-Kodak to withdraw entirely from the instant photography market.15

    For some businesses a corporation's patents are its only line of defense against competitors, especially for small start-up companies. For instance, a federal jury found that Microsoft's DOS 6 and DOS 6.2 operating systems infringed on patents held by Stac Electronics Inc., a small California company. The jury awarded Stac $120 million, which was more than Stac's entire sales since its 1983 founding.16 Eventually, Microsoft settled the case upon losing its appeal and agreed to pay Stac $43 million in royalties and to buy a $40 million stake in the tiny company.

    As shown, lucrative judgments are available from patent infringers. Upon a finding of infringement, a court can assess lost profits, or at the very least, reasonable royalties. A patent holder does not need to prove that it lost sales due to the infringement or that it manufactured a product made in accordance with the patent in order to receive a substantial damage award. For instance, Honeywell Corporation received more than $300 million from various camera manufacturers for patent infringement even though Honeywell had never used its patented auto-focus technology in its own products.17

    If a competitor willfully infringes a patent, a court may award treble damages, possibly increasing the jury award by thousands or millions of dollars.18 A court also may award attorney fees to the prevailing party in "exceptional" cases to deter willful infringement.19

    Another advantage of patent protection is notice, which places the burden of avoiding infringement on all who have actual knowledge of the patent. Where a potential infringer actually has knowledge of another's patent, he or she has an affirmative duty of due care. If this duty is neglected or ignored, trebled damages often result.

    Patent owners also may invoke the aid of the U.S. Customs Service (U.S.C.S.). If an owner of a U.S. patent believes that infringing merchandise is being imported into the United States, the owner may apply for a survey to assist him or her in taking appropriate action. The survey provides the patent owner with names and addresses of importers of merchandise that appear to infringe the issued patent.20 Patent holders can use the survey results to institute court proceedings or administrative proceedings at the International Trade Commission (I.T.C.). If the I.T.C. or a court issues an exclusion order, the U.S.C.S. has the authority to prevent importation of infringing products. The U.S.C.S. will enforce the exclusion order and deny entry of imports in violation of the order and seize imports from repetitive violators.

    Disadvantages. Patent protection can be relatively expensive, requiring fees for drafting patent drawings, government filing fees, attorney fees for drafting the initial application and prosecuting the application through the Patent & Trademark Office (PTO),and assisting in the prosecution through foreign patent offices. Maintenance fees also must be paid to the PTO at various intervals throughout the life of the patent, which become increasingly more expensive as the patent approaches its twentieth year.

    Filing a patent application does not guarantee that a patent will eventually issue. It also does not guarantee that if a patent does issue, it will have the scope the inventor desires, since the scope of protection can be affected by necessary amendments made to the patent application during prosecution through the PTO. Additionally, when a patent eventually issues, it is limited to only 20 years of protection, unlike a trade secret, which potentially can offer indefinite protection.

    Publication is a further disadvantage with a patent. In the U.S., once a patent issues it is published, allowing the patent holder's competitors a chance to analyze the invention. Filing in certain foreign countries results in publication of the patent application at 18 months from the filing date, even if a patent never eventually issues from the application.

    It is possible to use patent protection in conjunction with trade secret protection. For instance, one may file a patent application on the confidential technology and at the same time use trade secret protocols. If patent prosecution proceeds poorly, the application may be abandoned and the confidential technology may enjoy trade secret protection, provided the application is not referenced in a subsequent U.S. patent. Under U.S. law, patent applications are kept confidential until issuance, unless referred to in a U.S. patent, wherein the abandoned application then is available to any member of the public, thereby destroying trade secret protection. If the individual proceeds with prosecution and a patent does eventually issue (and is thereby publicly disclosed), trade secret protection also is lost.

    Mimi C. Goller, Marquette 1993, is a patent and trademark counsel for Abbott Laboratories, Abbott Park, Ill., concentrating in biotechnology. She formerly was with the Milwaukee law firm of Andrus, Sceales, Starke & Sawall.
    There are several factors to consider in determining whether patent protection is available. One factor is the type of subject matter at issue. Utility patents may cover machines, articles of manufacture, compositions of matter, and processes. 21 While patentable subject matter is not as broad as trade secret subject matter, it is quite far reaching. For example, patentable subject matter could include inventions ranging from methods of producing cortisone to commercial package configurations, 22 to fishing lures, and to diagnostic X-ray systems. Transgenic animals, fungi, viral strains, and bacteria also have received patent protection.

    Another factor to consider is public disclosure. If an item was sold, offered for sale, or displayed to the public, it may not be patentable due to statutory bars that require a U.S. patent application be filed no later than 12 months from the aforementioned activity. However, trade secret protection still may be an option, depending upon the specific circumstances.

    Further, if an industry is one in which technology progresses rapidly, thereby making advancements obsolete in a short time, trade secret may be the most logical form of protection. This is due primarily to the cost of filing a patent application and the amount of time an application may spend during prosecution in the PTO, usually several years.

    Conclusion

    Trade secret and patent protection can be very effective tools in securing a company's intangible assets and competitive edge. However, a careful analysis must be conducted to determine which type of protection is best suited for a particular piece of information and the specific circumstances. As evidenced, a client's long-term goals, product line, and the specific industry the client is in must be reviewed carefully in making this determination.

    Endnotes


    1 See generally, Milgrim on Trade Secrets, §1.01[1] at 1-20, (1993) (Matthew Bender).

    2K.F.C. Corp. v. Marion-Kay, 620 F. Supp. 1160, 1172, 228 U.S.P.Q. (BNA) 545 (S.D. Ind. 1985).

    3Coca-Cola Bottling Co. v. Coca-Cola Co., 107 F.R.D. 288, 289, 294, 227 U.S.P.Q. (BNA) 18 (D. Del. 1985).

    4 Pioneer Hi-Bred Int'l. v. Holden Found. Seeds Inc., 35 F.3d 1226 (8th Cir. 1993).

    5 See generally, R. Mark Haligan, The Recently Enacted Economic Espionage Act, Nat'l. L.J., Dec. 9, 1996.

    6 If the trade secret theft benefits a foreign government, the penalties are even more severe, fining an individual up to $500,000 and a possible prison term of 15 years. A corporation may be fined up to $10 million. See 18 U.S.C. § 1831.

    7 Stacey A. Barlow and Stasia L. Ogeden, After the Economic Espionage Act: Hiring, Firing, and Dealing in Corporate America, Intell. Prop. Today (1997).

    8 See Minuteman Inc. v. Alexander, 147 Wis. 2d 842 (1989), for a general discussion of Wisconsin trade secret law.

    9Wis. Stat. § 943. 205(3).

    10 D. Goodin, "Busting Industrial Spies," The Recorder,American Lawyer Media, L.P., Sept. 25, 1996.

    11 Stephen A. Bent et al., Intellectual Rights in Biotechnology Worldwide, 346-47 (1987).

    12 Haligan, id. at note 5; see also Religious Tech. Ctr. v. Lerma, 908 F. Supp. 1362 (E.D. Va. 1995) (A disgruntled former member of the Church of Scientology posted various documents on the Internet that were deemed trade secret information by the Church of Scientology. A court held that because this information was posted on the Internet, it was effectively part of the public domain, impossible to retrieve, and a party who merely downloads Internet information cannot be liable for misappropriation of what was once a trade secret even though the individual who originally posted the trade secret information on the Internet may be liable for misappropriation.)

    13 This general rule is derived from the strong public policy to encourage employees to use the general skills and knowledge they acquired during employment. This policy of favoring employee mobility and free competition puts a heavy burden on the employer. See Derek P. Martin, An Employer's Guide to Protecting Trade Secrets from Employee Misappropriation, BYU L. Rev., at 958 (1993); Lee T. Gesmer, Protection of Trade Secrets in the Computer Industry, LGU Tech. L. Bull. (January 1986).

    14Arthur Wineburg, Reconciling IP Rights and Industrial Policy, Legal Times, Sept. 13, 1993.

    15 Kevin Rivette and Orving Rappaport, Golden Opportunities, Legal Times, Dec. 19, 1994.

    16 Id. at n.13.

    17 Id.

    1835 U.S.C. § 284.

    1935 U.S.C. § 285.

    20 19 C.F.R. § 12.39.

    21 See generally, Chisum on Patents, chapter 1 (1996) (Matthew Bender).

    22U.S. Patent No. 2,435,355, "Package Construction" patented in 1948 by Edgar Ingram Sr. covers the White Castle box still used today.


Join the conversation! Log in to comment.

News & Pubs Search

-
Format: MM/DD/YYYY