On to Appendix B.
INTRODUCTION Appendix A.
CLASSIFICATION OF INFORMATION PRINCIPLES
AND TRADE SECRET LAWThis appendix describes similarities between the field of knowledge designated as security classification of information and the field of knowledge designated as trade secret law. Those similarities can be used to provide support to some existing classification principles and to develop new classification principles. That trade secret/classification analogy is particularly appropriate with respect to principles for classifying scientific and technical information, which is of major interest in this document.
Our legal system's roots go back millennia, thereby giving that system a solid foundation. Trade secret law is a part of that legal system. Trade secret law has developed over hundreds of years and has been a distinct area of the legal system for over a century—principles of trade secret law are widely accepted. Because trade secret law evolved as part of the "common law,"* it has a firm basis in our culture. Our extensive body of trade secret law has been developed by a very open process; the workings of our legal system are essentially completely open to the public, and the judicial decisions on trade secrets have been extensively published and discussed. Thus, trade secret law rests on a solid foundation, is consistent with our culture, and is known, understood, and accepted by our citizens.
* "Common law" is that part of our law based on custom and precedents of court cases, as contrasted to statutory law, which is based on enactments of legislatures.
Although the right of a government to classify information has been accepted for thousands of years,1 extensive classification of information by the U.S. Government began only relatively recently at the start of World War II. During the ~50 years that the government has been extensively classifying information, there has been little development of classification principles. Also, details of the rationale for specific classification decisions usually have not been discussed openly--only by personnel with the requisite security clearance and a need to know the information. Therefore, the few classification principles that have been developed have not been subject to nearly as much thought and discussion as have trade secret law principles.We (the security classification of information community) should take advantage of trade secret law and related knowledge to help establish an extensive system of classification principles.+ To the extent that existing classification principles are consistent with accepted principles from another, well established field of knowledge (trade secret law), increased confidence can be placed in those classification principles. To the extent that new classification principles can be derived from accepted principles from that other field of knowledge, those new classification principles should be relatively reliable. Additionally, the time and effort required to independently develop new classification principles can be significantly reduced if those new principles can be derived from analogous principles from that other field of knowledge.
+ "A dwarf standing on the shoulders of a giant can see farther than the giant himself." [Quoted, but with no citation, by Z. Chaffee, Jr., in "Reflections on the Law of Copyright: I," Col. L. Rev., 45, 503 (1945), p. 511. Substantially the same quotation has been attributed to Bernard of Chartres (circa 1100) by J. Hunter, "Giants and Dwarfs," in "Letters," New Scientist, 137(1864), 55 (Mar. 13, 1993), citing M. A. Edey and D. C. Johnson, Blueprints: Solving the mystery of evolution.]
The next section of this appendix describes the many similarities between trade secret law and classification of information. A following section discusses the important elements of a trade secret with particular emphasis on those that are related to matters of classification of information, especially to the classification of scientific or technical information. The final section of this appendix briefly mentions a part of trade secret law that may be helpful when determining the extent to which expertise that an individual acquires by working on a classified program can (or cannot) legitimately be applied by that individual to unclassified programs.Although the similarities between classification of information and trade secret law are useful in helping to develop a system of classification principles, it should perhaps be emphasized that those analogies do not provide all the bases for such a system. Additional insights are needed, and much additional thought needs to be brought to bear on classification matters. Some of that material is provided in the main body of this document.
SIMILARITIES BETWEEN TRADE SECRET LAW
AND CLASSIFICATION OF INFORMATIONBusinesses protect information that gives them an advantage over competitors just as governments protect information that gives them an advantage over adversaries. One of today's best-kept secrets is a trade secret, the recipe for Coca-Cola Classic®.* "State secrets" probably accompanied the formation of the first "state." "Trade secrets" (proprietary information) may have been important assets of the first business. State secrets and trade secrets occasionally were identical. For about 3000 years the Chinese royal family closely guarded, as a state secret, the source of and production methods for silk, an important export item in China's trade with other countries.2 It was not until the 6th century A.D. that a silk industry was established in western countries when two Persian monks clandestinely removed silkworm eggs and mulberry tree seeds from China.3 The Chinese were even said to have used a "cover story" to confuse those who tried to learn the secrets of silk manufacture. The cover story was that the process of making silk involved putting wool in the sun, sprinkling it with water, and then combing it to produce silk.4
* The recipe for Coca-Cola Classic® has been kept a secret for over one hundred years. It is said that only two Coca-Cola® company executives know that recipe [M. Schiffres and G. Bronson, "Business Struggle to Keep Their Secrets," U.S. News and World Report, Sept. 23, 1985, p. 59]. The recipe's only written formula is in a safe deposit box in Atlanta, which may be opened only by a vote of the company's board of directors [Coca-Cola Bottling Co. of Shreveport v. Coca-Cola Company, 227 USPQ 18 (D. Del. 1985); see also Coca-Cola Bottling Co. of Shreveport v. Coca-Cola Company, 230 USPQ 1 (D. Del. 1986)]. Few national security secrets are as well-kept as the secret of Coca-Cola® (although we probably would not know if a national security secret was as well-kept as the secret of Coca-Cola®).
There are many similarities between the classification and protection of national defense and foreign relations information by governments and the identification and protection of trade secrets by businesses.5, 6, 7 In both circumstances the information being protected is so important that its loss to an adversary (enemy/competitor) could have very bad effects on key interests (national security/profits) of the protector. Both trade secrets and classified information require continuing vigilance to protect against their unauthorized disclosure. Both may lose their status as secrets with the passage of time (e.g., because of technological advances, state-of-the-art technology may become commonplace). A rule in trade secret law—"that which has become public property cannot be recalled to privacy"8 -- has its classification counterpart in the rule that information declassified or officially disclosed cannot be reclassified.** This rule is absolute with respect to atomic energy information that has been declassified. [42 U.S.C. §2166] National Security Information may be reclassified if "the information requires protection in the interest of national security" and if "the information may reasonably be recovered" [Executive Order 12356, Fed. Reg., 47, 14874 (Apr. 6, 1982), §1.6(c)]. This authority to reclassify National Security Information is a new feature of Executive Orders on the classification of information. It was added to make possible the reclassification of information where a mistake has been made in its declassification and only a few unauthorized persons have received that information. The Information Security Oversight Office is very much concerned about the potential for abuse of this authority to reclassify information [S. Garfinkel, "An Information Security Oversight Office Overview of Executive Order 12356 and Its Implementing Directive," J. Nat. Class. Mgmt. Soc., 18, 17–23 (1982), p. 22].
Some trade secrets such as chemical formulas or knowledge of certain manufacturing processes are comparable to classified scientific and technical information. Other trade secrets such as lists of customers are analogous to classified intelligence information (e.g., confidential sources). A proprietary code for determining discounts from a catalog price list is not unlike classified cryptographic codes.Information about a new commercial product is kept secret by a business to give that business a head start+ and, therefore, a market advantage (greater profits) over its competitors. Information about the design and manufacture of a new weapons system is kept secret by a nation to give that nation a lead time and, therefore, a military advantage (greater security) over its adversaries.
+ The term "lead time" has also been used with respect to trade secrets. Injunctions have been issued against those who misappropriated trade secrets to negate the lead time they have gained through that misappropriation ["Uniform Laws Annotated," 14, 1988 Cumulative Annual Pocket Part, West Publishing Co., St. Paul, Minn., 1988, pp. 336–337; M. F. Jager, Trade Secrets Law, Clark Boardman Co., Ltd., New York, 1988, p. 3-27].
Classified information is more likely to be protected if it is precisely defined. Trade secrets are more likely to be protected if they are "delineated with some particularity."9 The need to know has relevance in trade secret law; if a business does not limit knowledge of a trade secret only to those who need this knowledge to benefit the business, then a court may decide that this knowledge was not a trade secret.10 The need to know is also a well known principle in the protection of classified information.Espionage, long practiced by governments, has its counterpart in business as industrial espionage,++, 11 which significantly affected technology transfer during the industrial revolution.12 A Society of Competitor Intelligence has even been established.13, 14 With the apparent end of the "cold war," the U.S. Central Intelligence Agency appears to be interested in putting its espionage expertise to use in industrial espionage for the benefit of the nation.15
++ Authors R. Eells and P. Nehemkis (Corporate Intelligence and Espionage, Macmillan Publishing Co., New York, 1984, pp. 108–110) cite (at p. 108) J. Bergier, Secret Armies—The Growth of Corporate and Industrial Espionage, Bobbs-Merrill, New York, 1975, to the effect that industrial espionage is older than military espionage. However, that concept is difficult to accept because physical survival is generally more important to an individual than economic survival and it would seem that desperate measures (espionage) would have been more likely to have occurred first with respect to matters of survival (self-defense, warfare, etc.) than with respect to making profits from a business.
The legal protection afforded both to trade secrets and state secrets have their roots in the common law. Some of our states now provide statutory protection for trade secrets in addition to or in place of the common-law protection afforded trade secrets. The government now uses statutes and Executive Orders as authority to classify and protect our national secrets.The government specifies three levels of classification—Confidential, Secret, and Top Secret. It has been suggested that businesses with trade secrets should perhaps establish two or three grades (levels) of importance for those secrets.*, 16
* One author has suggested the following designations for information that should be protected by a business: critical trade secrets (CTS), important trade secrets (ITS), trade secrets (TS), and know-how (K-H). Know-how is valuable information but probably does not warrant trade secret protection [D. Unkovic, The Trade Secrets Handbook: Strategies and Techniques for Safeguarding Corporate Information, Prentice-Hall, Inc., Englewood Cliffs, N.J., 1985, pp. 54–55].
Neither trade secrets nor classified information need to be the sole knowledge of one entity (e.g., business entities for trade secrets; national entities for state secrets) to warrant protection. Just as several countries independently have and protect the secrets for enriching uranium by gas centrifuge technology, so may a specific trade secret be known to more than one company in a field and still be protected by each company as a trade secret.17Trade secret law protects the holder of a trade secret "against the disclosure or unauthorized use of the trade secret by those to whom the secret has been confided . . . or when the knowledge [of the trade secret] is gained, not by the owner's volition, but by some `improper means'."18 Trade secret law does not protect a trade secret holder against discovery of that trade secret by "fair and honest means, such as by independent invention, accidental disclosure, or by so-called reverse engineering."+, 19 In that respect, trade secret law is identical to classification policy, because the objective of classification is not to prevent an adversary from obtaining the information by independent efforts or by reverse engineering but rather to avoid assisting the adversary in acquiring that information.++
+ "Reverse engineering" is a process that starts with a product and works backward to discover how the product was made.
Because of the above-mentioned similarities between trade secrets and classified information, the rationale for some of the principles used in deciding whether certain information is a trade secret can also be used as a rationale for some of the principles for classifying information, thereby providing added support to those classification principles. The next section of this chapter very briefly summarizes the principles of trade secret law that appear to be applicable to security classification of information.++ There is also somewhat of a similarity between the ways that trade secret law and classification treat accidental disclosures. Classification policy requires "no comment" about classified information that has been accidentally disclosed but which the government has not officially declassified. Nothing, of course, can be done to prevent others from using that information. Trade secret law will not prevent a competitor from using trade secrets that the trade secret owner has accidentally disclosed.
TRADE SECRET LAW
Definitions of a Trade Secret
A trade secret consists of secret knowledge used in a business, not previously available, and not known to a business's competitors. It is difficult to precisely define a trade secret (just as it is difficult to precisely define classified information). One widely accepted definition, from the Restatement of the Law of Torts, is as follows:
A trade secret may consist of any formula, pattern, device or compilation of information which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it. It may be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a machine or other device, or a list of customers. It differs from other secret information in a business (see §759) in that it is not simply information as to single or ephemeral events in the conduct of the business, as, for example, the amount or other terms of a secret bid for a contract or the salary of certain employees, or the security investments made or contemplated, or the date fixed for the announcement of a new policy or for bringing out a new model or the like. A trade secret is a process or device for continuous use in the operation of the business. Generally it relates to the production of goods, as, for example, a machine or formula for the production of an article. It may, however, relate to the sale of goods or to other operations in the business, such as a code for determining discounts, rebates or other concessions in a price list or catalogue, or a list of specialized customers, or a method of bookkeeping or other office management.20Another definition of trade secrets is contained in the Uniform Trade Secrets Act:"Trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, or process that:
(i) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and
(ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.21In the definition of trade secret contained in the Uniform Trade Secrets Act, the words "method, technique" are intended to include know-how.*, 22 It is evident that many types of information can be trade secrets, just as many types of information can be classified.
* One court has stated that "The concept of `know-how' is also a very fuzzily defined area, used primarily as a short-hand device for stating the conclusion that a process is protectable [as a trade secret]" [Van Products Co. v. General Welding & Fabricating Co., 213 A. 2d 769, 777 (Pa. 1965)].
The Uniform Trade Secrets Act allows information to be protected as a trade secret even though that information has not yet been put to use22 (i.e., it protects research and development information that may lead to commercial products in addition to protecting information on existing commercial products). However, the Restatement of the Law of Torts definition requires that a trade secret be used in a business before the business can receive protection under trade secret law. The broader definition in the Uniform Trade Secrets Act recognizes the value of research and development information or other information that gives a business a head start over its competitors23 and is, therefore, closer to the definition of classified information than is the Restatement of the Law of Torts definition.A trade secret represents objective knowledge, such as a manufacturing process and not subjective knowledge, such as the date for the announcement of a new product.* In that regard, trade secrets differ from classified information because subjective national defense or foreign relations information is frequently classified (e.g., a time or location for a military invasion of another nation).+ Trade secret information particularly resembles classified scientific or technical information, which is always objective information.
* Trade secret information differs from other secret information used in a business "in that it is not simply information as to single or ephemeral events in the conduct of a business" [Restatement of the Law of Torts, 4, American Law Institute, St. Paul, Minn., §757, Comment (b), 1939, p. 5].
Not all commercial secrets are trade secrets. Many business matters are confidential (e.g., for a business's internal use only) but "only secrets affording a demonstrable competitive advantage may be properly considered as trade secrets."24 Perhaps most of the confidential business matters that are not trade secrets represent subjective information that, as mentioned above, is not generally given trade secret protection.+ See Chapter 2 in this document for a discussion of objective and subjective secrets.
Determining whether information meets the requirements of a trade secret is to some extent a subjective process.++ The elements of a trade secret described below are widely accepted as factors to be used when making such a determination. However, the weight assigned to each factor will vary depending on the facts of a particular situation (e.g., the nature of the information and the conduct of the parties involved).25
++ Somewhat like deciding whether information should be classified!
Specific Elements of a Trade SecretThe characteristics of information that is protectable as a trade secret are similar to the characteristics of information that is protectable as classified information. Because of those similarities, it is especially pertinent to examine that part of trade secret law which characterizes trade secrets.
Six elements or factors have been proposed for use in determining whether information is a trade secret:** "(1) the extent to which the information is known outside of his business; (2) the extent to which it is known by employees and others involved in his business; (3) the extent of measures taken by him to guard the secrecy of the information; (4) the value of the information to him and to his competitors; (5) the amount of effort or money expended by him in developing the information; (6) the ease or difficulty with which the information could be properly acquired or duplicated by others."*, 26 These specific elements of a trade secret are discussed in the following subsections.
** There may also be other major elements of trade secrets of which the author is not aware.
It should be noted, with respect to similarities between trade secret law and classification principles, that the second and third elements of a trade secret (given above) are mostly security-of-information matters, not classification-of-information concerns. Those two elements indicate whether the possessor of an alleged trade secret truly acted as if that information was valuable to the business. They are not elements to be considered when objectively evaluating whether the information is a trade secret.* See also A. V. Gross, p. 652 of What is "Trade Secret" So As to Render Actionable Under State Law Its Use or Disclosure by Former Employee, 59 ALR 4th, 641, 652 (1988), who describes three major factors considered when determining whether information is a trade secret. Those factors combined Elements 1 and 6 as one factor, Elements 2 and 3 as another, and Elements 4 and 5 as the third major factor. Thus, Gross's three major factors include all six elements proposed by the Restatement of the Law of Torts.
General Availability of Information. For information to be a trade secret, that information must in fact be secret.+
+ One author has stated that "Courts have never upheld the existence of a trade secret absent the element of secrecy" [M. A. Epstein, "Modern Intellectual Property," Law & Business, Inc./Harcourt Brace Jovanovich, Publishers, Clifton, N.J., 1984, p. 2].
The Restatement of the Law of Torts is unequivocal on this point:The subject matter of a trade secret must be secret. Matters of public knowledge or of general knowledge in an industry cannot be appropriated by one as his secret. Matters which are completely disclosed by the goods which one markets cannot be his secret.27
Absolute secrecy, in the sense that only the trade secret owner's employees or business associates know the trade secret, is not required. Some trade secrets may be known, via independent discovery, by several businesses in a trade. Each discoverer may have a trade secret in his information.28 However, as more entities obtain the information through legitimate means, "the protectable interest erodes—at some point there will be a sufficient number of independent users to render the matter no longer secret."29A substantial element of secrecy must exist, so that, except by the use of improper means, there would be difficulty in acquiring the information.26
Easily obtainable information, or information generally known, is not a trade secret.30 "Information is readily ascertainable if it is available in trade journals, reference books, or published materials"22 or is otherwise in the public domain. This includes information that is a matter of general knowledge within a trade or business.++
++ It is not always easy to determine whether information is generally known. In classification matters, the advice of experts in a field is necessary to establish whether an item of information in that field is generally known. Input from intelligence agencies is sometimes necessary to establish whether adversaries know that item of information.
Outside views of a facility are not trade secrets.31 "That which is readily visible and ascertainable cannot constitute a trade secret."32Some customer lists are considered trade secrets; others are not. Generally, if the customer list could be developed from public sources without extraordinary efforts, it is not a trade secret.33 For example, a customer list that is obtainable from the yellow pages of a telephone directory is not a trade secret.34 Customer routes that can be obtained by observation are not trade secrets.35 Customer lists that have been developed over a number of years and that cannot easily be obtained from public sources will be afforded trade secret protection.
Common "shop practices" are widely known, are not novel, and thus do not qualify as trade secrets. A combination of common shop practices generally will not be considered to be a trade secret unless the combination is unique.* A machine was considered to be a trade secret, even though all its components were known in the industry, because the combination was unique.36 High-technology products are said to "often consist largely of novel applications of `know-how' common to the industry" and "the trade secret status of such products depends not on the component parts but on the arrangements of such parts into new designs."37 By requiring at least some uniqueness, originality, or novelty, courts ensure that information in the public domain is not withdrawn from that common knowledge and designated a trade secret.38
* "A trade secret can exist in a combination of characteristics and components, each of which, by itself, is in the public domain, but the unified process, design and operation of which is in unique combination, affords a competitive advantage and is a protectable secret" [Imperial Chemical Industries v. National Distillers and Chemical Corp., 342 F.2d 737, 742 (2nd Cir., 1965)].
The Extent to Which the Information is Known by Employees and Business Associates. To be of value, information must be used. Trade secret information usually has to be disclosed to some employees or agents of a business so that they may use this information to further the purposes of the business. This principle was stated in one of the first trade secret cases in this country:A secret of trade or manufacture does not lose its character by being confidentially disclosed to agents or servants, without whose assistance it could not be made of any value.39
Under the doctrine of "relative secrecy," trade secret owners do not abandon their claim of secrecy by limited disclosure of the secret for a restricted purpose (i.e., to further their business).40 However, a "substantial element of secrecy must exist."41Trade secrets should be disclosed to employees or business associates only on a need-to-know basis. Trade secrets should be given only to those employees who need the information to do their jobs. Trade secrets should be given to nonemployees only if they need that information to further the trade secret owner's interests.40 Trade secret information can be given, in confidence and for valid business reasons, to joint venturers, materials suppliers, and others without losing its status as a trade secret.42 However, if trade secret information is not closely controlled—is given to employees or business associates even though the recipients do not need that information to further the trade secret owner's interests—then courts may determine that the information no longer deserves protection as a trade secret because the information was not rigorously protected by its owner. As mentioned earlier, this need-to-know element is mainly a protection-of-information consideration (a security matter) and not important to classification-of-information principles.
The Extent of Measures to Protect the Information. When determining whether information deserves protection as a trade secret, courts consider the extent to which the information's owner took measures to protect the information. To prove the existence of a trade secret, one must show that the possessor of the alleged trade secret considered it to be a secret and protected it accordingly. "Security costs money, and presumably an employer would not incur such costs if it believed that the competitors already knew the information."43 Conversely, if the owner did not take special measures to protect the information, then one could infer that the owner did not consider the information to be valuable and, therefore, the law should not consider it a secret.44 The "secrecy must be real and not merely formalistic."45
Although this element of a trade secret is not exactly relevant to classification principles (protection of classified information is the responsibility of the security organization, not the classification organization), the similarities between classification and trade secrets make it of interest to describe security measures considered reasonable in protecting trade secrets. Heroic protective measures are not required—only reasonable security precautions.46 Security measures used by industry to protect trade secrets include the following:
1. Facilities are surrounded by fences.
In Eastman Co. v. Reichenbach, the court noted with approval that a secret formula "was kept under lock and key, and, lest it should be discovered by other manufacturers, the different ingredients composing it were purchased in the name of a third party."*, 47 In another case involving secret machinery, the court noted that when new machinery was built, different components were obtained from different suppliers so that no "outside" person would see a completed machine in operation.+, 482. Access to facilities is by a limited number of gates.
3. "No Trespassing" or similar signs are used.
4. Security guards are present.
5. Employees are required to sign confidentiality agreements or restrictive covenants.
6. Employees are briefed on the confidential aspects of their work (initially and periodically).
7. Employees are required to wear identification badges on the premises.
8. Need-to-know procedures with respect to access to the trade secrets by employees and others have been established and are followed.
9. Permission is required to remove company property.
10. Nonemployee access is regulated (e.g., nonemployees are required to sign in and out; escorts are required for nonemployees).
11. Suppliers are advised that information (concerning trade secrets) provided to them is confidential.
12. Distribution of operating manuals for trade secret equipment or processes is limited.
13. Engineering drawings and other documents that reveal trade secrets are kept in locked cabinets or rooms when not in use.
14. Engineering drawings and documents that contain trade secrets bear "confidential" markings or cautionary labels or legends, including perhaps two or three "levels" of secrecy markings. Those markings are used selectively, so that the credibility of such markings is maintained.
15. Professional employees' technical presentations (oral or written) are screened before release.
16. When employees leave the company, they receive exit briefings on their continuing trade secret protection responsibilities.
* Analogous to "cover" or "classified" procurements in certain classified U.S. Government programs.
The "extent of measures to protect the information" element of trade secret law has an analogy in prosecutions under the U.S. espionage statutes. In United States v. Heine,49 the defendant Heine was convicted in a U.S. District Court of violating an espionage statute++ that forbade the communication of information relating to the national defense to a foreign nation. Heine had gathered information on the U.S. aviation industry and sent it to a foreign country (the United States was not at war with this country). The information that he gathered was "lawfully accessible to anyone who was willing to take the pains to find, sift, and collate it."50 A Circuit Court overturned the conviction, stating that Heine could not be guilty of violating the espionage statute for such activities because the government had not objected to the dissemination of the information (that Heine had gathered) within the United States.** Thus, the court held that if the government did not protect the information within the United States, then it cannot be espionage to send that information outside the United States. The Executive Branch must try to protect information that it considers to be secret before the Judicial Branch will apply the sanctions of espionage statutes to such information.++++ Similar principles were applied during the U.S. Army's World War II Manhattan Project that developed the first atomic bombs. Security considerations resulted in the requirement that certain equipment be assembled at a location different from that of its manufacture and that certain raw materials be procured from a number of suppliers so that the end use could better be concealed [V. C. Jones, Manhattan: The Army and the Atomic Bomb, United States Army in World War II, Special Studies, Center of Military History, United States Army, Washington, D.C., 1985, p. 269].
++ Currently codified at 18 U.S.C. 794(a).
The Value of the Information to the Business and to its Competitors. Trade secret information must have economic value (competitive advantage), actual or potential, in not being known to others.***, 51 The requirement that a trade secret provide a competitive advantage has been characterized as "minimal," and "deemed to exist almost by virtue of a corporation taking steps to meet the secrecy element requirement for information to be a trade secret."52 "In essence . . . it [the trade secret] must reasonably be believed to provide the trade secret owner with some not too speculative value and benefit."53** "It is obviously lawful to transmit any information about weapons and munitions of war which the services [U.S. Army and Navy] had themselves made public; and if that be true, we can see no warrant for making a distinction between such information, and information which the services have never thought it necessary to withhold at all. . . . The services must be trusted to determine what information may be broadcast without prejudice to the `national defense,' and their consent to its dissemination is as much evidenced by what they do not seek to suppress, as by what they utter" [United States v. Heine, 151 F.2d 813, 816 (2nd Cir., 1945)].
+++ "Apart from the traditional areas of libel, obscenity, and incitement to violence, the Supreme Court has never sanctioned a restriction upon the circulation of information in the public domain" [T. I. Emerson, "National Security and Civil Liberties," Yale J. World Pub. Order, 9, 78–112 (1982), p. 89].
*** The value of classified information is in avoiding damage to national security caused by unauthorized disclosure of the information.
Negative information, such as results that show a process will not work, has economic value and frequently may be a trade secret.22, 54 However, some courts have held that knowledge about a mistake to be avoided is not a trade secret.55Information is not protected as a trade secret if it is only a "trivial advance" or its value is "not significant"; an "unusual competitive advantage" is usually required.56, 57 However, slight advantages in technical know-how have sometimes been considered trade secrets because they help control production costs and thereby provide a competitive edge.58
The history of human progress is rarely characterized by the giant advances achieved by isolated geniuses whose presence towers above entire civilizations. Rather Man's progress occurs through gradual accretion to the established mode of thought and behavior. To the ideas of our forefather's we add small, perhaps infinitesimal, new matter.
The value of information to a competitor is also an important consideration in determining whether that information is a trade secret. If the information saves a competitor time and money, then that competitor has materially benefitted from the information.60 With respect to business matters such as secret bid information, a suggested threshold test is whether a competitor could use the information to change the competitive balance in favor of the competitor.61This tendency has relevance to the protection which may be accorded improvements to otherwise well-known processes, formulas or machines. The courts are prepared to recognize that a small improvement may lend a distinct advantage to an old process.59
Amount of Effort or Money Expended to Develop the Information. One of the purposes of trade secret law is to protect "the substantial investment of employers in their proprietary information [trade secrets]"62 so as to encourage invention and promote research and development.63 Trade secret determinations are based in part on "the investment of time, money, or effort expended to research and develop or otherwise acquire the information."*, 64 In cases where the existence of a trade secret was upheld because of the time, money, or effort required to develop that trade secret, the amounts of time, money, or effort have varied widely.+, 65 Thus, there are no established minimum values for these parameters that can be used as guidance in determining whether information qualifies as a trade secret—the outcome of each case depends upon the facts and equities in that case.
* The amount of time and effort required to develop scientific or technical information is a factor in determining whether to classify that information.
The amount of effort expended to develop information is never the sole factor in determining whether that information is a trade secret.66 Other trade secret elements, especially the secrecy element, must be present. Because trade secrets can arise from inexpensive development efforts or fortuitous discoveries,67, 68 it would be inconsistent if the effort required to develop information was the determinative element of a trade secret.69+ In an earlier section of this appendix it was stated that a combination of common shop practices will not be considered a trade secret unless the combination is unique. It has been implied that if substantial effort was required to develop a combination of common shop practices, then that combination can be a trade secret [D. C. Maizel, "Trade Secrets and Technical Data Rights in Government Contracts," Military L. Rev., 114, 227–298 (1986), p. 233, citing Comp. Gen. Dec. B-187051 (15 Apr. 1977), 71-1 CPD para. 262]. However, there is said to be little case authority to support this result [R. M. Milgrim, Milgrim on Trade Secrets, Matthew Bender & Co., Inc., New York, 1987, §2.02[2], p. 2-33].
The Ease or Difficulty with Which the Information Could be Properly Acquired by Others. The first element of a trade secret given above was that the information is not generally known or available. Thus, information easily obtainable is not a trade secret. However, information that is publicly available but not easily ascertainable can be a trade secret. Therefore, the ease with which others may obtain the same information is a factor in determining whether that information is a trade secret.
A trade secret may be embodied in a product available to the public. Sometimes this trade secret may be discovered by reverse engineering a product purchased on the open market. If so, the information discovered is no longer a trade secret. However, it is not a defense to a charge of trade secret theft that the information could have been obtained by legitimate means (e.g., reverse engineering) but in fact was not obtained in that manner.70 "A valuable ingredient [in a hair care formula] that was not discovered by others for twenty years could not be `readily ascertainable.'"71 "Any finding of easy discoverability must be reconciled with the fact of non-discovery."71 The time required for reverse engineering is a factor in determining whether the information was readily obtainable.72 "If reverse engineering is lengthy and expensive, a person who discovers a trade secret through reverse engineering can have a trade secret in the information obtained from reverse engineering."*, 2
* One author has characterized a trade secret as "that which cannot be discovered by any process of reverse engineering within a limited period of time" [G. R. Bell, "Protecting and licensing trade secrets and know-how under Canadian law," Int. J. Technology Management, 3(1/2), 105–121 (1988), p. 111].
The policy of the law of trade secrets is that a competitor should not be given an advantage by obtaining a trade secret without incurring the usual costs of invention or duplication+ or without payment to the owner of the trade secret. In DuPont de Nemours v. Rolfe Christopher (1973), the court said: "To obtain knowledge of a process without spending the time and money to discover it independently is improper unless the holder voluntarily discloses it or fails to take reasonable precautions to ensure its secrecy."73 Another court said that a person should not be able to get a trade secret by unfair means and use it to advantage "Without himself paying the price in labor, money or machines expended by the discoverer."74+ This is consistent with a classification principle which states that if information is useful to an adversary, then the adversary should be required to expend its resources to get that information. The classification rationale is that generally one does not want to give an adversary information of significant value for nothing. One wants to make an adversary spend its resources to get that information instead of being able to use those resources in other ways to the detriment of the "donor."
FORMER EMPLOYEES AND TRADE SECRETSTrade secret litigation frequently occurs when a skilled employee quits a job to work for a competitor or to start a new business. The former employer is very suspicious that the employee was hired by his new employer because of the employee's knowledge of the former employer's trade secrets or that the employee will use those trade secrets in the employee's new business. Courts are then asked to determine whether a scientific or technical employee who knows his employer's trade secrets and who is a very competent scientist or engineer may (or may not) use certain specific information after leaving that employer. The employee's know-how (scientific and technical skills) includes publicly known information as well as the former employer's trade secrets.
Similar problems sometimes arise in classified research, development, or production activities.* The questions with respect to classified activities include: (1) What aspects of the technology may be applied to other unclassified programs? and (2) What restrictions may be placed on a scientific or technical person who leaves a classified program to work on an unclassified program (either within the same company or for a new employer)?+, ++ In the latter case, the employee's knowledge includes unclassified information as well as classified information. The answers to those questions may be found in the guidance supplied by court decisions concerning former employees and trade secrets.
* See, for example, discussions in J. Natl. Class. Mgmt. Soc., 2, 22–24 (1966).
When working for a new employer or in his or her own business, an employee can make use of his or her general skills, knowledge, memory,** and experience, some of which may have been acquired while working for the former employer, so long as those skills do not include trade secret knowledge—that "special confidential knowledge obtained from the employer which belongs to the employer."75 An employee "is entitled to take with him to his new employment his native skills as enhanced by his employment experiences."76 However, specialized knowledge (know-how) obtained on the job is more than experience and may be protectable trade secrets of the former employer.77 An employee's ability and experience do not belong to an employer; only "The compiled products of that ability and experience that had been recorded for repetitive use" are entitled to trade secret protection (emphasis added).78 The decision as to what knowledge an employee may use in a new job involves a balancing process between the employee's individual freedoms and the employer's right to protection of his business assets (trade secrets).79, 80+ This problem was mentioned by General L. R. Groves when appearing before a congressional committee in 1945. General Groves was discussing the types of secrets of the Manhattan Project and stated: "Another class of secrets falls in the industrial sphere. This contains many industrial applications which, in the course of time, will be made known in this country. A man who has worked on this project and who is confronted with a similar problem in industrial life cannot forget the solution that was used on this project, and he is going to use that information no matter how honorable he is, and he cannot be prevented from doing it" [Atomic Energy, Hearings on H.R. 4280, An Act For the Development and Control of Atomic Energy, U.S. Congress, House of Representatives, Committee on Military Affairs, 79th Congress, 1st Session, Oct. 9 and 18, 1945, U.S. Govt. Printing Office, 1945, p. 13]. General Groves later made a similar comment regarding scientific knowledge: "And it is the same in the scientific field. If, as the result of his [the scientist's] experimental work [on the Manhattan Project], he sees a machine or an instrument used to make a certain measurement, and he is faced in his own laboratory later, 2 or 3 years later, with that same problem in front of him, he is going to use that knowledge, and you cannot strike it out of his brain" [Ibid., p. 24].
++ A Department of Defense official has suggested that the high mobility of U.S. scientific and technical personnel contributes significantly to the dissemination of knowledge from classified programs, to the overall benefit of the United States. When major new technical programs are established by the government, technical personnel from previous large programs will join the new program and bring to it their knowledge which was acquired on a previous job. Classified information developed in one program can thereby be transferred to a new classified program [F. Thomas, "Keynote Address--Classification and Technological Breakthroughs," J. Natl. Class. Mgmt. Soc., 2, 11–19 (1966), p. 16].
** However, an employee cannot memorize the employer's trade secrets and subsequently lawfully use what he memorized for the benefit of himself or a new employer [G. Sobel, "Preserving Trade Secret Protection," Chap. 12 in Protecting Trade Secrets 1986, M. F. Jager, Chmn., Practising Law Institute, New York, 1984, p. 598.
Reasoning similar to that contained in the previous paragraph can be used to evaluate classification aspects of situations that arise when a scientific or technical employee working on a classified program applies professional expertise to an unclassified program.REFERENCES
1. A. S. Quist, "Introduction to Classification," Chap. 1 in Security Classification of Information, Volume 1. Introduction, History, and Adverse Impacts, K/CG-1077/V1, Martin Marietta Energy Systems, Inc., Oak Ridge, Tennessee, 1989.
2. The New Encyclopedia Britannica, Macropaedia, Encyclopedia Britannica, Inc., Chicago, 15th ed., 1982, 7, p. 287; 9, p. 183. The Encyclopedia Americana, International ed., Grolier, Inc., Danbury, Conn., 24, 1985, pp. 816–819. The World Book Encyclopedia, World Book–Childcraft International, Inc., Chicago, 17, 1979, pp. 379–382. Compton's Encyclopedia and Fact-Index, The University of Chicago, 21, 1987, pp. 197–202.
3. The New Encyclopedia Britannica, Macropaedia, Encyclopedia Britannica, Inc., Chicago, 15th ed., 7, 1982, p. 287.
4. R. J. Healy, "Panel: Protection of Company Proprietary Information," J. Natl. Class. Mgmt. Soc., 10, 84–88 (1974), p. 85.
5. T. S. Church, "Panel—Science and Technology, and Classification Management," J. Natl. Class. Mgmt. Soc., 2, 39–43 (1966), p. 40.
6. R. L. Taylor, "A Study of the Effects of Security Classification Restrictions on Technical Communication," J. Natl. Class. Mgmt. Soc., 9, 47–53 (1973), p. 48.
7. W. P. Ranney, "The Sea Lanes & Their Challenges," J. Natl. Class. Mgmt. Soc., 13, 17–22 (1977), p. 21.
8. Smith v. Dravo Corp., 203 F.2d 369, 373 (7th Cir., 1953).
9. Jostens, Inc. v. National Computer Systems, 318 N.W.2d 691, 699 (Minn. 1982).
10. R. M. Milgrim, Milgrim on Trade Secrets, Matthew Bender & Co., Inc., New York, 1987, §2.04, pp. 2-62 through 2-64. Hereafter cited as "Milgrim."
11. See also S. Ghoshal and S. K. Kim, "Building Effective Intelligence Systems for Competitive Advantage," Sloan Management Review, 28(1), 49–58 (Fall 1986); E. Mount and W. B. Newman, Top Secret/Trade Secret, Neal-Schumam Publishers, Inc., New York, 1985.
12. J. Harris, "Spies Who Sparked the Industrial Revolution," New Scientist, 110(1509), 42–47 (May 22, 1986).
13. E. M. Fowler, "Careers: Intelligence Experts for Corporations," New York Times, 138(47,641), p. D23 (Sept. 27, 1988).
14. D. A. Maxwell, "Keeping the Secret in Trade Secrets," Security Management, 33(1), 38–42 (January 1989), p. 39.
15. A. Borrus et al., "Should the CIA Start Spying for Corporate America?" Business Week, 3235, 96–100 (Oct. 14, 1991); M. Crawford, "CIA Stakes Out Larger Role in Technology and Trade Policy," Defense Week, 13(17), 17 (Apr. 27, 1992).
16. S. H. Lieberstein, Who Owns What is in Your Head, Hawthorn Books, Inc., New York, 1979, pp. 91–92.
17. Electro-Craft Corporation v. Controlled Motion, Inc., 332 N.W.2d, 890,900 (Minn. 1983).
18. Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 475–476 (1974).
19. Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974).
20. Restatement of the Law of Torts, 4, American Law Institute, St. Paul, Minn., §757, Comment (b) (1939). Hereafter cited as "4 Restatement of the Law of Torts."
21. "Uniform Trade Secrets Act," in Uniform Laws Annotated, 14, 541–551 (1980), §1(4), p. 542, West Publishing Co., St. Paul, Minn. Hereafter cited as "Uniform Trade Secrets Act."
22. Uniform Trade Secrets Act, comment to §1, p. 543.
23. Milgrim, §2.02[1], p. 2-28.
24. Milgrim, §2.03, p. 2-40.
25. A. V. Gross, What is "Trade Secret" So As to Render Actionable Under State Law Its Use or Disclosure by Former Employee, 59 ALR 4th, 641, 652 (1988). Hereafter cited as "Gross."
26. 4 Restatement of the Law of Torts, p. 6.
27. 4 Restatement of the Law of Torts, pp. 5-6.
28. J. S. Rakoff and M. A. Glassberg, "Trade Secrets and the Criminal Law," Chap. 5 in Protecting Trade Secrets 1986, M. F. Jager, Chmn., Practising Law Institute, New York, 1986, pp. 167–168, citing E. I. duPont Nemours & Co. v. United States, 288 F.2d 904, 911 (Ct. Cl. 1961). Hereafter cited as "Rakoff and Glassberg."
29. Rakoff and Glassberg, p. 168, citing Milgrim, §2.07[2], p. 2-179.
30. Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 475, 481 (1974).
31. M. F. Jager, Trade Secrets Law, Clark Boardman Co., Ltd., New York, 1988, p. 5-37. Hereafter cited as "Jager." See also Interox America v. PPG Industries, Inc., 736 F.2d 194 (5th Cir. 1984).
32. Interox America v. PPG Industries, Inc., 736 F.2d 194, 201 (5th. Cir. 1984).
33. G. Sobel, "Preserving Trade Secret Protection," Chap. 12 in Protecting Trade Secrets 1986, M. F. Jager, Chmn., Practising Law Institute, New York, 1986, p. 573.
34. M. A. Epstein, Modern Intellectual Property, Law & Business, Inc./Harcourt Brace Jovanovich, Publishers, Clifton, N.J., 1984, p. 13 and citations therein. Hereafter cited as "Epstein."
35. Jager, p. 5-22.5.
36. Jager, pp. 5-52.1 through 5-54, citing By-Buk Co. v. Printed Cellophane Tape Co., 329 P.2d 147, 152 (1958) and other cases.
37. M. K. Readio, "Balancing Employers' Trade Secret Interests in High-Technology Products Against Employees' Rights and Public Interest in Minnesota," Minn. L. Rev., 68, 984–1006 (1985), p. 995.
38. Jager, p. 5-57.
39. Peabody v. Norfolk, 98 Mass. 452, 461 (1868).
40. Jager, p. 5-32 and citations therein.
41. 4 Restatement of the Law of Torts, p. 6.
42. Jager, pp. 5-32, 5-33, 6-3.
43. Jager, p. 5-48.
44. M. J. Hutter, "Legal Theories and Recent Developments," Chap. 1 in Protecting Trade Secrets 1986, M. F. Jager, Chmn., Practising Law Institute, New York, 1986, p. 18. Hereafter cited as "Hutter."
45. Hutter, p. 19.
46. Jager, p. 5-41.
47. Eastman Co. v. Reichenbach, 20 NYS 110, 113 (1892).
48. O. & W. Thum Co. v. Tloczynski, 114 Mich. 149, 152 (1897).
49. United States v. Heine, 151 F.2d 813 (2nd Cir., 1945).
50. United States v. Heine, 151 F.2d 813, 815 (2nd Cir., 1945).
51. Uniform Trade Secrets Act, §1(4)(i).
52. Epstein, p. 3.
53. Epstein, p. 3, citing Syntex Ophthamics, Inc. v. Tsuetaki, 701 F.2d 677, 683 (7th Cir., 1983).
54. Milgrim, §2.02[1], pp. 2-28 through 2-33.
55. Jager, p. 5-60.
56. Jager, p. 5-61.
57. S. J. Davidson and R. L. DeMay, "Application of Trade Secret Law to New Technology—Unwinding the Tangled Web," Wm. Mitchell L. Rev., 12, 579–621 (1986), p. 607. Hereafter cited as "Davidson and DeMay."
58. Jager, p. 5-63, citing Sheridan v. Mallinckrodt, Inc., 568 F. Supp. 1347, 1352, n. 7 (N.D.N.Y. 1983).
59. Milgrim, §2.07[3], p. 2-181.
60. Milgrim, §2.02[1], p. 2-27.
61. Davidson and DeMay, p. 608.
62. Valco v. N & D Machining, 24 Ohio St. 3d, 41 (1986); 492 NE2d 814; 59 ALR 4th 629, 638 (1988).
63. Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 481–482 (1974).
64. Gross, p. 652.
65. Gross, pp. 872–887.
66. Milgrim, §2.02[2], p. 2-33.
67. Milgrim, §2.02[2], pp. 2-33 through 2-36.
68. Hutter, p. 20 and citations therein.
69. Milgrim, §2.02[2], p. 2-36.
70. Milgrim, §2.02[2], p. 2-36.
71. Jager, p. 5-22.7, citing Zotos International, Inc. v. Young, 830 F.2d 350, 353 (D.C. Cir. 1987).
72. Electro-Craft Corp. v. Controlled Motion, Inc., 332 N.W.2d, 890, 899 (Minn., 1983).
73. DuPont de Nemours v. Rolfe Christopher, 431 F.2d 1012, 1015–1016 (5th Cir. 1970).
74. Jager, pp. 5-62 and 5-63, citing A. O. Smith Corporation v. Petroleum Iron Works Co., 73 F.2d 531, 538 (6th Cir., 1934).
75. Jager, p. 8-10. See also P. Guthrie, "Employee's Duty, In Absence of Express Contract, Not to Disclose or Use in New Employment Special Skills or Techniques Acquired in Earlier Employment," 30 ALR 3d, 631–669 (1970).
76. W. D. Hawkland, "Some Recent American Developments in the Protection of Know-How," Buffalo L. Rev., 20, 119–145 (1970), p. 137.
77. Jager, p. 5-55.
78. Hutter, p. 15, citing S. I. Handling Systems, Inc., v. Heisley, 753 F.2d 1244 (3rd Cir., 1985).
79. Engineered Mechanical Services, Inc. v. Langlois, La. App. 1 Cir. 1984, 464 So.2d 329, writ denied 467 So.2d 531.
80. T. Robison, "The Confidence Game: An Approach to the Law About Trade Secrets," Ariz. L. Rev., 25, 347–393 (1983).