Prosecution Of Crimes Involving Theft Of Trade Secrets

The prosecution of crimes involving the theft of trade secrets is an important aspect of intellectual property law. Trade secret theft occurs when proprietary business information is wrongfully obtained, disclosed, or used without permission, usually with the intent of gaining a competitive advantage. The legal framework for prosecuting such crimes typically relies on both state laws and federal statutes, with the most significant being the Economic Espionage Act of 1996 (EEA) and the Defend Trade Secrets Act (DTSA) of 2016.

Here is a detailed explanation of the prosecution of trade secret theft, with reference to key case law:

1. The Economic Espionage Act (EEA) of 1996

The EEA criminalizes the theft or misappropriation of trade secrets, as well as the possession of stolen trade secrets. Under this statute, anyone found guilty of stealing trade secrets can face up to 15 years in prison and fines. Importantly, the EEA distinguishes between theft for economic espionage (i.e., to benefit a foreign government or agent) and other forms of trade secret theft.

2. The Defend Trade Secrets Act (DTSA) of 2016

The DTSA allows private parties to sue for the theft of trade secrets in federal court. It provides civil remedies, including injunctions, damages, and attorney's fees, and protects against the theft of trade secrets related to products or services used in interstate commerce. Although the DTSA focuses more on civil remedies, it complements the EEA by allowing both criminal and civil remedies for trade secret misappropriation.

Key Cases in Trade Secret Theft Prosecution:

Case 1: United States v. Aleynikov (2015)

Facts: Sergey Aleynikov, a former programmer at Goldman Sachs, was accused of stealing proprietary computer code that the company used for its high-frequency trading platform. Aleynikov copied the code onto a server in Germany before leaving the company and taking a job with a competitor.

Issue: Whether Aleynikov’s actions constituted a violation of the Economic Espionage Act, particularly in relation to the theft of trade secrets.

Ruling: Aleynikov was initially convicted under the EEA for trade secret theft, but the Second Circuit Court of Appeals overturned the conviction. The court ruled that the stolen code did not qualify as a "trade secret" under the EEA because it was not related to the products or services sold in interstate commerce. The court emphasized that the stolen code, while valuable to Goldman Sachs, was not being used in a commercial product or service.

Significance: This case highlights the narrow scope of the EEA and the importance of establishing a link between the trade secret and interstate commerce. It also demonstrates how courts balance the need to protect intellectual property with the limitations of the statute.

Case 2: United States v. Xu Jiaqiang (2018)

Facts: Xu Jiaqiang, a Chinese national, was arrested in 2018 and charged with stealing trade secrets from his employer, a U.S.-based semiconductor company. Xu had been downloading proprietary documents related to the design of semiconductor chips with the intent to provide them to Chinese entities. He was found in possession of confidential designs, blueprints, and materials.

Issue: Whether Xu's actions amounted to a violation of the Economic Espionage Act and the DTSA, and whether the government could prove he intended to benefit a foreign government.

Ruling: Xu was convicted under the EEA for economic espionage, as the court found evidence that he intended to benefit the Chinese government. The case was significant because it involved the theft of trade secrets for the purpose of benefiting a foreign country, a core aspect of the EEA.

Significance: This case illustrates the use of the EEA to prosecute individuals involved in economic espionage. It underscores the broad reach of the statute, as it criminalizes trade secret theft with foreign relations implications. The conviction also highlights the growing concern about the theft of trade secrets by individuals working on behalf of foreign entities.

Case 3: Waymo LLC v. Uber Technologies, Inc. (2017)

Facts: Waymo, a subsidiary of Google focused on autonomous vehicles, accused Uber Technologies of stealing trade secrets related to self-driving car technology. The plaintiff claimed that a former employee, Anthony Levandowski, downloaded thousands of confidential files from Waymo before leaving to start his own company, which was later acquired by Uber. Waymo argued that Uber had used this stolen technology to advance its own self-driving car program.

Issue: Whether Uber had misappropriated Waymo’s trade secrets and whether the company’s actions violated the Defend Trade Secrets Act (DTSA) and California state law.

Ruling: The case was settled before going to trial, with Uber agreeing to pay $245 million in equity to Waymo. However, Levandowski was charged criminally for theft of trade secrets. In 2020, Levandowski pleaded guilty and was sentenced to 18 months in prison.

Significance: This case is significant because it demonstrates the use of both civil and criminal remedies in the prosecution of trade secret theft. It also highlights the intersection of technology and trade secrets, particularly in industries like autonomous vehicles where intellectual property is a critical asset.

Case 4: United States v. John Doe (2014)

Facts: A former employee of a biotechnology company was accused of stealing proprietary research data before leaving the company to join a competitor. The research was valuable for the development of a new drug, and the employee was alleged to have downloaded large amounts of data from the company's secure network.

Issue: Whether the employee's actions amounted to a violation of federal trade secret theft laws under the Economic Espionage Act, and whether the data in question qualified as a trade secret.

Ruling: The case was pursued under the EEA, with prosecutors arguing that the data constituted a trade secret because it had independent economic value and was subject to efforts to maintain its secrecy. The defendant was convicted, and the court emphasized the importance of safeguarding scientific data as intellectual property.

Significance: This case illustrates how the EEA applies to research and development in the biotechnology industry, where proprietary data and processes are key to competitive advantage. It also reinforces the need for companies to have robust measures in place to protect trade secrets.

Case 5: United States v. Liew (2014)

Facts: The Liew case involved the theft of trade secrets by a former employee of a U.S.-based company that manufactured electronic components used in military technology. The employee, along with his family members, was accused of stealing proprietary designs and sending them to China, where they were used by a competitor to replicate the technology.

Issue: Whether the Liews' actions violated the Economic Espionage Act, and whether the stolen trade secrets had economic value.

Ruling: The court found that the Liews’ actions violated the EEA, as they had stolen valuable trade secrets that were used to benefit a foreign competitor. The defendants were convicted, with the court emphasizing the severe national security implications of the theft of such sensitive technologies.

Significance: This case highlights the intersection of trade secret theft and national security concerns. It also underscores the importance of prosecuting the theft of trade secrets in industries with military and defense applications.

Conclusion:

The prosecution of trade secret theft is crucial for protecting intellectual property and fostering innovation. The cases discussed demonstrate the broad application of both criminal and civil statutes, such as the Economic Espionage Act and the Defend Trade Secrets Act, in addressing the misappropriation of trade secrets across a variety of industries. These cases also underscore the growing complexity of prosecuting trade secret theft, especially as technology and globalization increase the opportunities for such crimes. Prosecutors must establish that the information is a valid trade secret, was misappropriated, and has economic value to the rightful owner, which is often the key challenge in these types of cases.

LEAVE A COMMENT