Mbilike M. Mwafulirwa & Melissa A. East
This article explores an important question for businesses. Suppose a business hires an engineer—i.e., a thought-leader in an emerging industry—to develop a certain product or service. In fact, the business only developed its product or service because it employed the engineer. But assume also that the engineer decides to join a competitor, and she takes her technical know-how with her and several confidential documents about the product or service. The information, the engineer claims, was largely drawn from her technical know-how, which she brought with her.
That, in turn, leads to the question that is the subject of this article: when exceptionally knowledgeable individuals perform creative work for companies in an industry, what right do they have to take those ideas with them? Simply, do employers own the knowledge in their worker’s heads? Oklahoma is an employment at-will state. That matters because in this state, an employee has rights to exploit her expertise and knowledge in the market. But the law also protects an employer’s right to protect its proprietary information and legitimate competitive advantages.
Thus, the question presented applies to different industries where creative work is done (which should be several businesses). What follows in this article is an analysis that strives to tackle the question presented head-on, while outlining the governing legal principles.
I. Analytical framework for the problem of the creatives—the public and private dichotomy
When a business makes a useful discovery, it can deal with that information in one or two ways. The business can publicly share the intimate details of its discovery with us – We the People – through either the patent, copyright or trademark registration systems. In exchange for that disclosure, the United States gives the inventor, the author, or owner (as the case may be) a limited monopoly to enjoy the fruits of its innovation.[1] Trademark law, on the other hand,—which protects words or phrases that identify the source of goods or services[2]—gives the owner a perpetual monopoly.[3] But a business can also decide to keep the intimate details of its discovery private. In doing so, the business, in effect, relies on trade secrets, non-compete concepts and varied other state law theories to protect its competitive advantage. We address each of those concepts below.
A. The nature of the ownership interest in publicly registered intellectual property developed during the course of the employer-employee relationship
For those who make useful and innovative contributions, America’s copyright and patent laws give them a temporary government monopoly.[4] But trademark law affords trademark owners a perpetual monopoly.[5] Either route, the trade-off is the same: (potentially) anyone can learn from the creative work and improve upon it for themselves.[6] And in the employee/employer context, this dynamic presents difficult questions. Copyright laws, for example, apply the “work for hire” rule. Under that rule, an employer has copyrights over any creative work an employee generates within the course and scope of her employment, unless a written agreement provides to the contrary.[7]
Not so with patent law. The default rule is that inventors own their inventions.[8] Unless an agreement with the employer displaces the default rule, the worker owns what she invented.[9] Two exceptions bear on this rule. The first is called the “hired to invent” rule. Under that rule, if an employee was hired to invent a specific thing or solve a specific problem, the employee may have to assign her rights to the employer.[10] The rule is anchored in implied contract concepts and requires a fact-sensitive inquiry into the employment relationship.[11] The second exception to the default rule is called the “shop right.” Under that rule, an employer may acquire a limited license to use the employee’s invention if it was invented using, for example, the employer’s resources.[12]
B. Eliminating any doubt and future headaches: intellectual property assignment rights agreements in the employer-employee context
Intellectual property rights assignment agreements resolve many problems in this area. State contract law generally governs the rights and obligations of the parties.[13] Intellectual property agreements typically take three primary forms: (1) complete assignment of all rights to another for a sum certain or as a gift; (2) assignment of all rights to another for a limited period or geographical area; (3) limited, non-exclusive rights to exercise the owner’s intellectual property rights for a period.[14] If all state law contract prerequisites are satisfied, courts will enforce those agreements.[15]
But even if there is a valid assignment agreement, the penultimate question is usually the same: whether, as written, the agreement succeeded in conveying intellectual property rights. Thus, for example, it is settled that when an agreement states that the employee “agree[s] to assign,”[16] or executes this “agreement to assign”[17] or agrees that intellectual property “will be assigned,” all those do not create a present interest.[18] Instead, a separate agreement is needed to complete the transfer of rights to the employer.[19] But if the transfer language states that the employee “agrees to and does hereby grant and assign” or “I will assign and do hereby assign”—those words are enough.[20] All this matters because, as shown below, the question of ownership of valuable information (and even the right to possess) is central to the applicability of any misuse or misappropriation claims.
II. The other side of the coin – when a business decides to keep the intimate details of its discoveries private
A. Overview of trade secret law considerations
When an employer in Oklahoma decides to keep the intimate details of an intellectual property discovery private, both statutory and common law protections come into play.
Defend Trade Secrets Act 2016
Effective May 11, 2016, the Defend Trade Secrets Act 2016 (the “DTSA”) added a federal dimension to trade secret protection. Historically an exclusive area of state statutory and common law, the DTSA created a federal cause of action for “any misappropriation of a trade secret, (as defined in [the DTSA]) . . . which . . . occurs on or after the date of the enactment of [the] Act.”[21] To assert a DTSA claim, the complaint must generally allege plaintiff: (1) possessed secret information that relates to a product or service used or intended for use in interstate commerce; (2) that the defendant used, disclosed or acquired for use that information without plaintiff’s consent; and (3) the defendant acquired the information or disclosed it by improper means.[22]
If there is any doubt about ownership rights in intellectual property between employer and employee, this is a fertile area for a trade secret misappropriation lawsuit. The DTSA creates a cause of action for the “owner of a trade secret.”[23] That is why courts closely monitor what is claimed as trade secret. The DTSA defines a trade secret as all forms of financial, technical, economic and engineering information.[24] Even with such a broad definition, courts (federal courts particularly) require “sufficient particularity to separate [the trade secret] from matters of general knowledge in the trade or of special persons who are skilled in the trade, and to permit the defendant to ascertain at least the boundaries within which the secret lies.”[25]
In fact, “[a]lleging mere possession of trade secrets is not enough” to state a DTSA misappropriate claim.[26] Neither is simply alleging, without more, that a former employee has quit and is working for a competitor performing her old job.[27]Instead, the DTSA and federal cases require that there be the acquisition of a trade secret belonging to another by a person who knows or should know that it was acquired through improper means or without the owner’s consent.[28] “Improper means,” the statute defines as, “theft, bribery, misrepresentation, breach or inducement of a breach of duty to maintain secrecy, or espionage.”[29] While the DTSA requires the owner of protected information to reasonably secure it, the law does not require absolute secrecy.[30] Most courts have found the requirement satisfied when a business has, for example, confidentiality policies and internal data control measures.[31] In most cases, this is fact question for the fact-finder.[32]
1. Oklahoma Uniform Trade Secrets Act: the state analog to the DTSA
In 1986, Oklahoma adopted the Uniform Trade Secrets Act (the “UTSA”).[33] Although the UTSA’s definitions for trade secret and misappropriation “are nearly identical to the DTSA,” a plaintiff must also allege “use” and “detriment.”[34] A misappropriation claim under the UTSA has three elements. A plaintiff must show: (1) the existence of a trade secret; (2) misappropriation of the secret by another; and (3) use of the secret to the intellectual property owner’s detriment.[35] The UTSA entails a fact-intensive inquiry, and the plaintiff has the burden of proving the existence of a trade secret.[36] Parties should track measures taken by an employer to guard the secrecy of the alleged trade secret, as Oklahoma courts tend to focus on that factor.[37] Under the UTSA, “use” exists when a product or process is substantially derived from the trade secret, even if it is with independent improvements or modifications.[38] Detriment means adverse consequences for the trade secret user.[39]
Under the UTSA, ownership is not the dispositive consideration; the right to possess or use the information instead is.[40] Thus, owners, licensees, and all others with the right to possess or use the information could perhaps assert UTSA trade secret rights. That especially matters in an employer/employee setting because while an employee may initially own an invention or an idea, when she shares it with her employer that might affect her rights. The Oklahoma Supreme Court, recognizing this possibility, has come down in favor of a multi-factor balancing test.[41]
The employee’s rights are on their strongest footing when she is both the inventor and developer and the source information is drawn from her knowledge and skill. If the employee developed the subject matter of the claimed trade secret, through her own initiative, based on her own skill and experience, a duty not to disclose the trade secret may arise because the employee would have an interest in the subject matter equal to or better than that of her employer.[42] But if the employee learns of the coveted information in the course an scope of her employment, the stronger the employer’s rights.[43] Thus, the issue becomes one of a balancing act, and the analysis hinges on the equities of the given set of circumstances out of which the trade secret arose.[44] Ultimately, the question becomes how closely tied the development is to the highly developed skill and knowledge of the innovator, and if the development emerged with no secret being divulged by the employer, the more likely a court will find no trade secret.[45]
B. Fighting fairly – Oklahoma non-compete law considerations and how they affect the employer-employee dynamic when creative information is involved; Computer Fraud and Abuse Act, 18 U.S.C. §1030
1. Oklahoma Non-Compete Law
A typical fact-pattern in the world of creatives sees a creative person develop a product or service and then depart to join a competitor. And as so often is the case, the employee has a noncompete or non-solicitation agreement to contend with. Typical agreements (1) preclude an employee from taking any job in any capacity with a competitor or within the industry; (2)impose timeless and geographical-less limitations; (3) prevent the employee from soliciting all persons including (work colleagues) from previous employer. We address each in turn below.
Restrictive covenants against trade, competition and the ability to practice a profession are void unless they hew closely to Oklahoma law’s requirements.[46] Consider first non-compete clauses that prohibit an employee from taking any job in capacity with a competitor. Applying and clarifying longstanding precedent, the Oklahoma Court of Appeals has held that a non-compete is void when it prevents employees from taking jobs with competitors in any capacity at all.[47] Second, geographically and timeless non-competes are also problematic. Oklahoma courts have stricken non-competes that impose countywide bans,[48] or those whose reach exceeds 100-miles from where the employee was employed.[49] Likewise, non-competes longer than 2-years are also problematic.[50] Just as those non-competes that prevent “competition from an employee who has not gained some competitive advantage or opportunity from the employment is inherently unfair.”[51] Thus, it matters where the employee gained her expertise and experience. If the employee brought the expertise and knowledge with her to the job, like our industry leader in our hypothetical, a noncompete that restricts her use of that knowledge is perhaps unlawful. But if she gained the expertise and experience “directly from the employment with employer,” then it may be a reasonable subject for non-competes.[52]
Oklahoma law also restricts unreasonable non-solicitation agreements. Non-solicitation provisions that “go beyond a prohibition on active solicitation and thus prevent fair competition have been declared void.”[53] Newer cases have clarified that the law only permits restrictions on solicitation of established customers. Established customers are “those businesses and customers wherein a relationship was ongoing and anticipated to continue into the future.”[54] What about non-solicitation of former colleagues? The Oklahoma Supreme Court has addressed this issue. The Court invalidated a non-solicitation clause that completely prevented former employees from engaging with a competitor, even those who sought employment from a competitor of their own accord.[55]
2. Computer Fraud and Abuse Act
Through the Computer Fraud and Abuse Act (CFAA), Congress sought to curb and punish abuses of computers. The Act creates criminal offenses for conduct like hacking into computers, stealing information and destroying or damaging a “protected computer,” among others.[56] A protected computer is one that is used either in interstate or foreign commerce or communications.[57] To complement the criminal laws, Congress also created a civil action under which a party that has suffered harm listed in the statute can recover compensatory damages or injunctive or other equitable relief.[58]
In the employment context, employers typically sue employees for appropriation of proprietary information or the destruction of a computer that causes loss. They do so mostly based on theories of unauthorized or excess use or destruction of data.[59] The employer typically authorizes the employee to access its computers, but what triggers liability, is when the employee accesses the information in violation of her duty of loyalty.[60] This could be by the employee emailing herself the information to use for purposes adverse to her employer or for personal gain.[61] The definition of “economic damages” or “loss” under the CFAA is broad. The definition encompasses loss of business, the cost of repairs to computer systems and taking protective measures.[62]
C. Varied Oklahoma law common law considerations
The Legislature in Oklahoma has declared that, unless abrogated, the common law remains a vital part of this state’s law. The Bar is already familiar with most of these theories that only deserve honorable mentions—breach of contracts, tortious interference with business relations or prospects, conversion, civil conspiracy, aiding and abetting and perhaps breach of fiduciary duty.[63] We say perhaps because courts struggle with this question: at what point does an employee-at-will stopmerely preparing to depart to breaching her fiduciary duties? For those employees without non-competes, the law permits employees to take preparatory steps for competition with their employers.[64]
The law frowns upon an employee’s wrongful acts when preparing to leave.[65] But what is wrongful? An employee leaving after lining her pockets with the employer’s trade secrets, existing client lists or sabotaging the employer’s information systems all qualify.[66] And then there is everything else: there are “no ironclad rules as to the type of conduct which is permissible . . . since the spectrum of activities in this regard is as broad as the ingenuity of man itself.”[67] Even so, courts have laid down some bright markers. If the allegation is misappropriation, the subject information must first be “exclusive or proprietary” to the employer. So, if the information can be acquired from another source, that undermines the claim.[68]Second, the employer cannot prevail if the conduct did not deprive it of objective tangible business opportunities. Indeed, a mere hope that “business relationships would continue” or the “possibility [of] future economic benefit[s]” are insufficient.[69]
III. CONCLUSION
In this age of the creatives, the line between catering to a rational self-interest and engaging in unfair competition is a fine one. Today’s market places a high premium on talent and creativity, so firms feel inclined to take strong measures to protect their talent to maintain their competitive advantage. Caught in the middle is the law, trying to strike a balance between the competing concerns. This article, we hope, shows (in several ways) how challenging that task is.
Disclaimer: The materials and information on this blog are provided for informational purposes only, and may not reflect the law in your jurisdiction. The information contained on this blog and the specific post(s) you have reviewed or accessed should not be construed as legal advice, nor does the receipt and review of that information create an attorney-client relationship between the individual author(s), this blog, or the recipient of such information. Readers of this blog or any its posts are urged to seek appropriate legal counsel in their respective jurisdiction, state, or country, so that advice tailored to that person’s particular facts and circumstances might be given from those licensed legal professionals.
[1] See Am. Steel Foundries v. Robertson, 262 U.S. 209, 215 (1923) (patent monopoly); United States v. Paramount Pics., 334 U.S. 131, 158 (1948) (copyright monopoly).
[2] See Robert A. Gorman, Copyright Law 7 (2d ed. Fed. Jud. Cntr. 2006).
[3] Apple, Inc. v. Samsung Elect., Inc., 786 F.3d 983, 991 (Fed. Cir. 2015), rev’d and remanded on other grounds, 137 S.Ct. 429 (2016) (“Trademark law allows for a perpetual monopoly . . . .”) (emphasis added).
[4] See Am. Steel, 262 U.S. at 215 (patent); Paramount Pics., 334 U.S. at 158 (copyright).
[5] Apple, 786 F.3d at 991 (trademark).
[6] See, e.g., Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994); see also, e.g., Leatherman Tool Grp. v. Cooper Ind., Inc., 199 F.3d 1009, 1011-1012 (9th Cir. 1999).
[7] See 17 U.S.C. §201(b); Comm. for Creative Non-Violence v. Reid, 490 U.S. 730, 737-738 (1989). But when the author is an independent contractor, and the work was performed at the instance and expense of the hirer, the presumption of ownership lies in favor of the hiring party. See Playboy Ent., Inc. v. Dumas, 53 F.3d 549, 554 (2d Cir. 1995) (citations omitted).
[8] Banks v. Unisys Corp., 228 F.3d 1357, 1359 (Fed. Cir. 2000).
[9] Id.
[10]Gellman v. Telular Corp., 449 Fed. App’x 941, 945 (Fed. Cir. 2011) (under the hired-to-invent “doctrine is expressly equitable, and creates only an obligation for the employee to assign to his employer”).
[11] Id; see also Banks, 228 F.3d at 1359.
[12] See Melin v. United States, 478 F.2d 1210, 1213 (Fed. Cir. 1973) (citing Gill v. United States, 160 U.S. 426, 433-434 (1809)).
[13] See, e.g., Jim Arnold Corp v. Hydrotech Sys., 109 F.3d 1567, 1572 (Fed. Cir. 1997) (“[T]he question of who owns the patent rights and on what terms typically is a question exclusively for state courts.”)
[14] See, e.g., Herbert F. Schwartz, Patent Law & Practice 34 (2d ed. Fed. Jud. Cntr. 1995).
[15] See generally id.
[16] IpVenture, Inc. v. Prostar Comp., Inc., 503 F.3d 1324, 1327 (Fed. Cir. 2007).
[17] See generally id.
[18] Arachnid, Inc. v. Merit Indust., Inc., 939 F.2d 1574, 1580-1581 (Fed. Cir. 1991).
[19] See IpVenture, F.3d at 1327.
[20] Gellman, 449 Fed. App’x at 944 (citations omitted).
[21] Camick v. Holladay, 758 Fed. App’x 640, 644 (10th Cir. 2018) (quoting DTSA, 130 Stat. at 381-82).
[22] Video Gam. Tech., Inc. v. Castle Hill Stud., LLC, 2018 WL 3437083, at *4 (N.D. Okla. Jul. 17, 2018).
[23] 18 U.S.C. §1836(b)(1) (emphasis added).
[24] Id. §1839(3).
[25] Vendavo, Inc. v. Price f(x)G, 2018 WL 1456697, at* 4 (N.D. Cal. Mar. 23, 2018) (emphasis added).
[26] Pellerin v. Honeywell Int’l, 877 F. Supp. 2d 983, 989 (S.D. Cal. 2012) (citations omitted).
[27] Id.
[28] 18 U.S.C. §§1839(5)(A)-(B).
[29] 18 U.S.C. §1839(6).
[30] Blue Star Land Servs., LLC v. Coleman, 2017 WL 6210901, at *5(W.D. Okla. Dec. 8, 2017).
[31] Select Energ. Servs., Inc. v. Mammoth En. Servs., 2019 WL 1434586, at *6 (W.D. Okla. Mar. 29, 2019).
[32] Id. at *5.
[33] 78 O.S. §§ 85-94.
[34] Blue Star, 2017 WL 6210901, at *7.
[35] MTG Guarnieri, 2010 OK CIV APP 71, ¶12, 239 P.3d at 209.
[36] Id. ¶13.
[37] See, e.g. ProLine Products, L.L.C. v. McBride, 2014 OK CIV APP 34, 324 P.3d 430;
[38] MTG Guarnieri Mfg., Inc. v. Clouatre, 2010 OK CIV APP 71, ¶17, 239 P.3d 202, 211.
[39] See Blue Star, 2017 WL 6210901, at *7.
[40] Gaedeke Hold. VII Ltd. v. Baker, 683 Fed. App’x 677, 683-684 (10th Cir. 2017) (Oklahoma law).
[41] Amoco Production Co. v. Lindley, 1980 OK 6, 609 P.2d 733.
[42] Id. ¶¶46-47, 609 P.2d at 744-745.
[43] Id.
[44] Id. ¶47, 609 P.2d at 745.
[45] Id.
[46] See 15 O.S. §§ 217-219.
[47] Autry v. Acosta, Inc., 2018 OK CIV APP 8, ¶30, 410 P.3d 1017, 1023 (quoting Howard v. Nitro-Lift Techs., L.L.C., 2011 OK 98, ¶ 22, 273 P.3d 20, rv’d on other grounds, 568 U.S. 17 (2012).
[48] Herrington v. Hackler, 1937 OK 720, ¶10, 74 P.2d 388, 391 (restrictive covenant “void to the extent that it prevents [a party] from engaging in a like business beyond the confines of the county.”).
[49] See Cardio. Surg. Spec. Corp. v. Mammana, 2002 OK 27, ¶17, 61 P.3d 201, 214-215 (finding non-compete void because it effectively banned a surgeon “from practicing . . . within 100 miles” of the community where he had previously been employed).
[50] Tatum v. Colo. Life & Acc. Ins. Co. of Am. 1970 OK 27,¶7, 465 P.2d 448, 451 (Approving 2-years).
[51] Loewen Grp. Acq. Corp. v. Matthews, 2000 OK CIV APP 109, ¶21, 12 P.3d 977, 982.
[52] Id. ¶¶21-22, 12 P.3d at 982. (emphasis in original).
[53] Mammana, 2002 OK 27, ¶17, 61 P.3d at 214-215 (emphasis added).
[54] Howard, 2011 OK 98, ¶ 26, 273 P.3d at 29.
[55] Id. ¶22, 273 P.3d at 28.
[56] See 18 U.S.C. §1030.
[57] Id. §1030(e)(2)(B).
[58] Id. §1030(g).
[59] Id. §§1030(a)(4)&(a)(5)(A).
[60] Int’l Airports Ctrs. v. Citrin, 440 F.3d 418, 420 (7th Cir. 2006).
[61] Nilfis–Advance, Inc. v. Mitchell, 2006 WL 827073, at *2 (W.D.Ark., Mar.28, 2006); Ervin & Smith Adv. & Pub. Rel. Inc. v. Ervin, 2009 WL 249998, at *8 (Feb. 3, 2009).
[62] Creative Comp. v. Getloaded.com LLC, 386 F.3d 930, 935 (9th Cir. 2004); EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 585 (1st Cir. 2001).
[63] See OUJIs Nos. 4.16; 23.1; 24.1; Gaylord En’t Co. v. Thompson, 1998 OK 30, 958 P.2d 128 (civil conspiracy); Keel v. Hainline, 1958 OK 201, 331 P.2d 397 (aiding and abetting).
[64] Sw. Stainless, L.P. v. Sappington, 2008 WL 3013548, at *26 (N.D. Okla. Aug. 1, 2008), aff’d in part, rev’d in part, 582 F.3d 1176 (10th Cir. 2009) (“[A]n agent is not prohibited from taking actions, not otherwise wrongful, to prepare for competition following termination of the agency relationship.”)
[65] Id.
[66] Feddeman & Co. v. Langan Assoc., 530 S.E. 2d 668, 672 (Va. 2000).
[67] Auxton Comp. Enterp. v. Parker, 174 N.J. Super. 418, 424 (1980).
[68] See Williams v. Dominion Tech. Part’nrs, 576 S.E. 2d 752, 758 (Va. 2003).
[69] Id. at 758-759.