An Oregon Supreme Court opinion that received signficant media attention this week has implications for the litigation of trade secret cases in the state. The opinion focused on the Open Courts provision of the Oregon Constitution, and the immediate issue addressed by the Court was whether decades' worth of internal Boy Scout sex abuse files would be made public.
The files had been produced in discovery by the Boy Scouts in a case in which plaintiffs claimed abuse by a scouting volunteer. The files were maintained as confidential during discovery pursuant to a protective order. The files were later admitted into evidence in a Multnomah County trial in which the Boy Scouts were found liable. After the trial, news organizations including The Oregonian, the Associated Press and The New York Times, sought to view the files, citing Article I, Section 10 of the state Constitution, which provides that "No court shall be secret, but justice shall be administered, openly and without purchase, completely and without delay." The trial court judge ordered the files released, but with the names of victims and the people who reported the abuse redacted.
Both the media parties and the Boy Scounts sought mandamus review by the Oregon Supreme Court, with the media parties advocating for an absolute right of the public to view evidence admitted at trial, in particular in this case without redactions.
The Court rejected the media parties' view, confirming that the Open Courts clause does not create an individual right to observe court proceedings, but rather dictates how the institution of the courts operate. The principle of open justice allows the public to attend and view the administration of justice by the courts. Justice Robert Durham, writing for the Court, concluded that limiting post-trial access to evidence admitted at trial is not in violation of that principle.
The Court nonetheless held that the trial court had the power to make public evidence admitted at trial, including evidence that had been produced subject to a protective order. In particular, a court may conclude that granting a request to inspect evidence after the completion of a trial will foster public understanding of the administration of justice. In this case the judge did not abuse his discretion in ordering the files released with names redacted.
The Court's rejection of an absolute right of access to trial evidence means that courts can continue to protect the interests of parties to trade secret litigation. The result is consistent with the position of TechAmerica, which filed an amicus brief in the case. TechAmerica, the leading trade association for the electronics industry, argued that trial courts must be allowed to limit access to trial evidence in appropriate cases in order, for example, to avoid public disclosure of trade secrets in appropriate cases. Ater Wynne attorney Lori Irish Bauman filed the brief on behalf of TechAmerica.
The federal Computer Fraud and Abuse Act ("CFAA") creates a civil remedy against those who access information on a computer without authorization, or in a manner that exceeds authorized access. The Ninth Circuit last week gave a narrow reading to CFAA, limiting its use as a tool to punish disloyal employees.
In LVRC Holdings, LLC v. Brekka, defendant was a former employee of plaintiff who, during his employment, emailed company documents to his personal account. After defendant left his employment with plaintiff, plaintiff discovered that defendant had retained the documents and used them in connection with a competing business. Plaintiff claimed a violation of CFAA along with various state law tort claims.
The Ninth Circuit affirmed the District Court's summary judgment for defendant, and dismissed the CFAA claim. The court held that, because defendant was authorized to access the documents on plaintiff's computer system during his employment, and nothing in company policy prohibited emailing documents to employees' personal accounts, plaintiff could not claim that his access was "without authorization" under CFAA.
While an employer's ability to rely on CFAA is constrained by the result in Brekka, a rogue employee may still be subject to a trade secret claim under state law.
Most states have either adopted the Uniform Trade Secret Act, or enacted statutes that are very similar to the Act, which makes the misappropriation of trade secrets unlawful. Misappropriation can occur by improper use, disclosure, or acquisition of a trade secret. A court recently held that improper use of a trade secret may happen even where the alleged perpetrator does not know the trade secret.
In Cognis Corp. v. ChemCentral Corp., No. 05-C-6344 (N.D.Ill. 2006), a developer of a chemical used as a curing agent for adhesive sued a distributor of chemical products for misappropriation. The defendant distributor had previously distributed products for plaintiff and now distributed a curing agent from a former employee of plaintiff who was alleged to have misappropriated plaintiff's secret formula for its curing agent. In another state, Plaintiff had sued the former employee for misappropriation. Although the distributor did not know the secret formula of the curing agent, it knew that plaintiff had sued the former employee for misappropriation of the secret formula, and the distributor priced the product alleged to have been developed from the secret formula 10% below plaintiff's price to attract plaintiff's customers. The court held that these alleged facts were sufficient to state a claim for misappropriation of trade secrets against the distributor.
The Computer Fraud and Abuse Act prohibits the transmission of a program, information, code or command, which as a result, intentionally causes damage to a protected computer. The Act was designed to address, for example, attacks by virus and worm writers, as well as disgruntled programmers who intentionally damage an employer’s data system. An employer sued its former employee under the Act for deleting data and evidence of improper conduct during employment from a laptop computer furnished by the employer. The former employee argued that no claim could be stated because he merely deleted data on his laptop and did not engage in “transmission” of a program or command, which is an essential element under the Act.
The appellate court rejected the former employee’s argument and allowed the employer’s lawsuit to proceed. Specifically, the court found that “transmission” does not require a program or command to be sent remotely, as opposed to from the drive of the computer where the data or information was deleted. Furthermore, after the employee engaged in misconduct and decided to quit employment, his actions to destroy files on the laptop violated his duty of loyalty which then terminated his agency relationship with his employer and his authority to access the laptop. By accessing a computer without authorization to destroy files, the employee could also be liable for violating another provision of the Act that prohibits unauthorized access that causes damage. International Airport Centers, LLC v. Citrin, (7th Cir. 2006)