exhibit a - E

advertisement
EXHIBIT A
[CONFIDENTIALLODGED UNDER SEAL]
EXHIBIT A
EXHIBIT B
1-9 Trade Secret Law and Corporate Strategy § 9.05
Trade Secret Law and Corporate Strategy > PART III Trade Secrets in Practice > CHAPTER 9 Trade
Secret Litigation: What to Expect When You’re Litigating
§ 9.05 Important Trade Secret Litigation Lessons If You Are the Accused
[1]
Don’t Make the Situation Worse
A process server just handed your receptionist a packet of very formal-looking papers. Flipping
through them, you discern that a competitor has sued your company for trade secret misappropriation.
Most people immediately realize that they have to act quickly. Some people, however, believe that
acting quickly means they should destroy any evidence that might be used to incriminate them. This
is not the right answer. It will only make the situation worse. This advice is so important, it bears
repeating: Don’t destroy evidence.
Even if someone succeeds in destroying evidence, it will be obvious that data has been deleted or
destroyed, and courts will assume that the deleted information would have confirmed the alleged
misdeeds. You have already seen examples of this. In chapter 2, you learned about Muhammad
Munawar Ali, who ran software programs called CleanUp! and Erasure on his laptop after his former
insurance brokerage employer accused him of stealing customer information. He claimed that his
computer had caught a virus while he was “visiting some ‘adult’ websites.” The court didn’t believe
him, found that he had tried to hide his work for a competitor, and referred the case to law enforcement
authorities to investigate Ali’s potential perjury. You may also remember Hawaiian Airlines’ failed
merger discussions with Mesa described in chapter 6. Mesa’s CFO denied having Hawaiian’s
confidential information on his company computer. He later tried to explain having used a file deletion
program by claiming that he wanted to erase “adult content” on the computer and the company’s
network. The court did not believe the excuse and awarded $80 million to Hawaiian, which eventually
received $52 million from Mesa as part of a settlement.
In these two cases, the plaintiffs relied on sophisticated computer forensics to prove that evidence had
been destroyed. But sometimes the evidence of destruction requires far less sophisticated methods to
collect, even if the consequences are just as devastating for the defense, as shown in the following case.
ROBOTS THAT DISARM BOMBS, EVIDENCE DESTRUCTION, AND DUMPSTER DIVING
Jameel Ahed joined iRobot immediately after graduating from the University of Illinois
with a biomedical engineering degree. Ahed helped develop the PackBot, a tactical robot
that disarms explosives on the battlefield. When Massachusetts-headquartered iRobot tested
its PackBots near the Pakistani border, the “battle bots” were so wildly popular with the
troops that they wouldn’t let iRobot take the PackBots home with them. But not everyone
was as enthralled with iRobot. When iRobot denied him a raise, Ahed left iRobot to make
his own tactical robot—the Negotiator—at his newly formed company, Robotic FX. Ahed
was so eager to start his own company that he already had five employees working on the
Negotiator, using PackBot schematics, before he left iRobot. When iRobot discovered
Page 2 of 7
1-9 Trade Secret Law and Corporate Strategy § 9.05
Ahed’s Negotiator, which eventually beat out the PackBot for a $285 million military
contract, it used a third party to buy a prototype. iRobot’s experts disassembled the
Negotiator and discovered that Ahed’s new robot was based on stolen PackBot designs. Its
suspicions confirmed, iRobot sued Ahed for trade secret theft. The day iRobot filed its
complaint, Ahed gathered the specialized welding equipment used to make the Negotiator,
100 CDs containing the Negotiator’s schematics, and three external hard drives. He drove
to an office supply store to purchase a heavy-duty shredder, and on the way home, he
dropped a portion of the evidence in a trash bin. When he returned home, Ahed began
shredding the CDs, but the shredder jammed. He dumped the broken shredder in a different
trash bin and drove back to the office supply store to buy another shredder. Using the new
shredder, he finished his work and trashed the CDs. Unfortunately for Ahed, iRobot hired
private detectives to keep an eye on him. After a day spent dumpster diving, iRobot’s
investigators had all the evidence the company needed to get a preliminary injunction. The
court said Ahed’s conduct profoundly undermined his credibility, which was devastating to
his case since he served as Robotic FX’s principal witness. The case settled soon after on
ruinous terms for Ahed and Robotic FX: iRobot now owns Robotic FX, and Ahed was
prohibited from participating in competitive robotics for five years.
[2]
It Will Not Go Away Because You Ignore It
The next important lesson for anyone accused of trade secret misappropriation is a close cousin to the
first. Just as destroyed evidence will not help you appear innocent, the accusations will not go away
because you ignore them.
Defending against the accusations will be inconvenient. But it is worth the effort to prove your
innocence or to minimize the effects of any lapses in judgment.
HACKER SKIPS ARRAIGNMENT TO PLAY MODERN WARFARE
2
While attending the Penny Arcade Expo East gaming conference (PAX) in Boston,
20-year-old gamer Justin May decided that he was not going to wait for the official release
of the hotly anticipated video game “Breach.” Instead, May used his laptop to hack into the
Xbox 360 Test Kit demonstrating the game and began downloading the code. PAX staff
questioned May, who fled the scene, but conference security quickly caught up to him.
Boston prosecutors charged May with receiving stolen trade secrets in the form of the
source code for a game worth more than $6 million. May failed to show up for his court
hearing, and the gaming website joystiq.com reported that May, or someone using his Xbox
gamertag, was playing Modern Warfare 2 while he was supposed to be in court. Ultimately,
May was convicted of trade secret theft and required to forfeit his computer and stay off
Xbox Live.
[3] Don’t Allow the Plaintiff to Rely on Vague Descriptions of Its Trade Secrets
As part of your defense in the litigation, you should force your accuser to specifically identify all
allegedly misappropriated trade secrets. Depending on the jurisdiction in which you bring suit, courts
Page 3 of 7
1-9 Trade Secret Law and Corporate Strategy § 9.05
will usually support these efforts. Especially in technology-rich regions where trade secret cases are
common, courts recognize that allegations of trade secret theft are not always borne out. Judges
acknowledge that trade secret cases can be unfairly brought to stifle an unwanted competitor. And more
than one plaintiff has overstated its case amid the whirl of emotions evoked by a formerly loyal
employee’s departure.
THE SECRET ART OF STACKING APPLES
Anthony Settipani spent 25 years stocking produce and corralling carts in the fruitmarket
industry. When his employer, Randazzo Fresh Market, turned down his application for a
supervisory position, Settipani left to work at Vince & Joe’s Gourmet Market, one of
Randazzo’s Eastern Michigan competitors. Although Vince & Joe’s offered Settipani the
same pay—$9 an hour—they were willing to provide him with health insurance, vacation
benefits, and a chance for advancement. Randazzo did not take this defection lightly. The
company sued Settipani, arguing that he could reveal Randazzo’s trade secrets to Vince &
Joe’s. Randazzo’s owner, Sonny Randazzo, acknowledged that his confidential practices
“are not nuclear secrets,” but he argued that his 40 years of experience have helped him
develop “the Randazzo way,” an invaluable asset to his business. Settipani’s attorney,
handling the case on a pro bono basis, challenged Randazzo to identify the specific trade
secrets Settipani might reveal. According to Settipani’s attorney, “[T]here’s no trade secrets
on how to stack apples.” Soon after Randazzo filed suit, the parties settled the dispute.
Although neither would reveal the terms of the settlement, both sides said the resolution
was “amicable.”
Forcing the plaintiff to identify all allegedly misappropriated trade secrets helps prevent the plaintiff
from relying on trumped-up or imagined accusations. It can also help minimize the burden imposed
by the litigation. The enormous surge in electronically stored information has greatly inflated the cost
of all litigation, including trade secret litigation. Plaintiffs who believe they have suffered trade secret
misappropriation predictably want to look at everything a defendant possesses. Most courts, however,
will not allow this. Courts are increasingly sensitive to the cost and burden of litigation and will limit
the plaintiff to investigating only those areas reasonably related to the allegedly misappropriated trade
secrets.
Similarly, by putting the onus on the plaintiff to identify all supposedly misappropriated trade secrets,
a defendant can better thwart contrived allegations of trade secret theft. More than one plaintiff has
reviewed a defendant’s internal documents only to claim information in those documents as the
plaintiff’s trade secret. With the defendant’s use confirmed, the plaintiff need only prove that the
information originated with the plaintiff. This “proof” might come in the form of testimony from an
employee who is highly motivated to convince the court that the defendant misappropriated the
plaintiff’s trade secrets. Courts are appropriately wary of this tactic, and forcing a plaintiff to identify
its trade secrets before the plaintiff starts reviewing a defendant’s materials can help minimize the
potential abuse.
Faced with a demand for a list of the allegedly misappropriated trade secrets, plaintiffs predictably
respond that the defendant “knows what it stole.” Your lawyer can work with you to make sure the
Page 4 of 7
1-9 Trade Secret Law and Corporate Strategy § 9.05
plaintiff does not get away with such misdirection. The plaintiff must have a good-faith basis for
bringing its lawsuit, and you are entitled to know what the plaintiff believes was taken. With that
information, you can better focus your investigation and plan your defense.
[4]
Conduct Your Own Investigation
In chapter 7, we described the investigation you should conduct if you believe you are the victim of
trade secret misappropriation. If you have been accused of trade secret misappropriation, you should
conduct an investigation that mirrors the victim’s. That investigation will have three basic parts: (1)
data preservation, (2) data review, and (3) interviews.
Data preservation is a corollary to the imperative not to destroy evidence. Court rules require that you
preserve evidence reasonably related to the subject matter of the litigation. And failing to preserve the
evidence, as we have already seen, can become a substitute for proof of misappropriation. Evidence
preservation means more than not using a shredder or electronic file deletion programs. Evidence
preservation in this context means suspending automatic file deletion programs, such as those routinely
used for e-mail. It also means creating forensically sound copies of storage locations (on computers,
mobile storage devices, and networks) where information relevant to the investigation is likely to be
found.
Data review means conducting the same type of forensic investigation that the plaintiff or law
enforcement will undertake of your data. Electronic information leaves a trail, and plaintiffs or law
enforcement will use that trail to full advantage.
HARD KNOCKS AND HARD CIDER IN THE GREEN MOUNTAIN STATE
Since the time of the colonists, Vermonters have been perfecting their home-brewed hard
apple cider recipes. In 1991, Joseph Cerniglia, the owner of a small winery, decided to
produce hard apple cider on a large scale. His business, Woodchuck Hard Cider, became
wildly successful and was the first hard cider in the country to sell more than a million
cases. To oversee Woodchuck’s expanding distribution network, the company hired Lenny
Ciolek, a 25-year beverage industry veteran, to manage its national accounts. Unbeknown to
his new employer, Ciolek was planning to launch his own hard cider brand. Shortly after
arriving at Woodchuck, Ciolek began communicating with Garrett Mayer of Mayer
Brothers—the East Coast’s largest apple juice distributer. The two exchanged e-mails about
the name and logo for the new venture, with Mayer emphasizing that “we need to add the
exact nutrition facts and ingredients from the [W]oodchuck label.” Before leaving
Woodchuck, Ciolek posted on his Facebook page that the cans for his new cider were
already in production. Woodchuck became suspicious when Ciolek left and immediately
launched his own cider brand, prompting his former employer to conduct a forensic
examination of his computer. Along with the e-mails to Mayer, they discovered that Ciolek
downloaded confidential pricing information onto his personal USB drive while still at the
company. Woodchuck sued Ciolek, alleging violations of the Vermont Trade Secrets Act.
The two parties eventually settled. The settlement included a permanent injunction
precluding Ciolek from using any of Woodchuck’s trade secrets.
Page 5 of 7
1-9 Trade Secret Law and Corporate Strategy § 9.05
With subjects ranging from apple cider to high-tech robots, you have seen numerous examples of
plaintiffs proving misappropriation with incriminating electronic data obtained from the defendant. As
a defendant, you want to know what that information shows before the plaintiff does. You also want
to know what that information does not show. A well-conducted forensic investigation that reveals no
evidence of misconduct can be powerful evidence that the plaintiff’s allegations are false.
Interviews conducted by your attorneys should also form an essential part of your investigation. The
plaintiff’s complaint likely identifies the person (or people) it accuses of having taken the alleged trade
secrets without authorization, and that is a good place to start asking questions. Chapter 7 offers
guidelines for conducting interviews, and those should be followed here as well to better ensure you
get useful and truthful information.
Understanding the plaintiff’s allegations is an obvious goal of interviewing witnesses. But interviews
can also reveal essential information for other defenses. The interviews thus need not be limited to
company employees. By talking to knowledgeable people, you may discover that the claimed trade
secret is well known, was obtained from another source, or was authorized to be used. You might
likewise discover that the plaintiff’s security measures are inadequate. And you might discover that the
plaintiff is simply mistaken about the alleged trade secret being used at your company. All of these
defenses require evidence to support them. And the plaintiff is not going to volunteer that evidence.
You need to identify leads as soon as possible, and the more information your investigation uncovers,
the more informed your defense will be.
[5]
Don’t Wait to Take Appropriate Action—Be Proactive
Although the techniques for handling the investigation are similar whether you are the plaintiff or the
defendant, what you do with the results of the investigation varies tremendously. As a victim of trade
secret misappropriation, you become a plaintiff in a lawsuit seeking the court’s help in preventing
further misappropriation and seeking damages.
As a defendant, if your investigation uncovers likely misappropriation, you must determine what
additional steps are necessary to minimize the consequences. Those steps can include modifying
personnel policies to better incorporate the best practices described in this book. They can also include
changing physical and electronic security systems to prevent trade secrets from being improperly
introduced into the company. They can include taking actions against involved personnel, up to and
including termination. And they can include changing company products or programs to cease use of
alleged trade secrets.
Taking these steps as a defendant serves to help protect the company in a variety of ways. When taken
in the face of existing litigation, they are essential to demonstrate that the company did not participate
in or encourage any misappropriation. They send critical messages to the court handling your trade
secret case, to your employees, and to others that you do not tolerate unethical behavior. Prompt and
decisive action against individuals who misappropriated trade secrets or violated the company’s
information-handling policies can be especially difficult, but it is important to prevent their misconduct
from tainting the company.
Victrex’s response to learning that one of its employees was accused of trade secret theft provides an
instructive example. In chapter 8, you read how Gary Min stole tens of thousands of documents from
Page 6 of 7
1-9 Trade Secret Law and Corporate Strategy § 9.05
DuPont before he left to work for Victrex. After he started at Victrex, he loaded 180 DuPont
documents, some containing their trade secrets, onto his Victrex laptop. Min was eventually convicted
of trade secret misappropriation and sentenced to 18 months in jail. Victrex was not punished because
it took prompt, decisive action. When Victrex learned of DuPont’s allegations, Victrex confiscated
Min’s laptop and turned it over to the FBI. Victrex also suspended Min. This cooperation likely
prevented the FBI from suspecting that Victrex encouraged, or even knew about, Min’s theft.
Victrex’s investigation apparently revealed that it had not used information from DuPont’s trade secret
documents. Not all investigations end this way. You may learn that a rogue employee has copied
another company’s information onto your network and shared it with other employees. You may learn
that the information is now being used in the company’s materials or in certain of its products. These
are challenging situations, but they are not unusual or impossible.
You should immediately work with your attorney to rid the company of the tainted information. This
may mean making archive copies of files and deleting the active versions employees can access. It may
mean redesigning materials or products to avoid any use of another’s trade secrets. It some cases, this
redesign requires implementation of a clean-room process to ensure that the redesigned materials or
products are not tainted by previous, inappropriate exposure to trade secrets. These clean rooms do not
involve workers wearing sterile “moon suits.” They are “clean” because the employees and the work
environment are free from contamination created by unauthorized information, including another’s
trade secrets. Organizing and running them properly require an expensive and cumbersome
combination of legal and technical oversight. But once implemented, clean rooms can allow a
company to continue offering its goods and services regardless of the outcome of trade secret litigation.
Many defendants react to these suggestions by worrying that they will be viewed as admissions of
guilt. Administered properly, however, they can be strong evidence of innocence, as they were for
Victrex. They can also serve as the foundation for a prompt end to the litigation. Many settlements
result from a defendant expressing willingness to undertake remedial measures. Such settlements have
something to offer the plaintiff and the defendant. The plaintiff achieves a resolution that may include
elements a court would be unlikely to order, and the defendant ends the litigation on terms that will
allow it to continue as a viable business.
Some remedial actions are admittedly easier than others. Modernizing your physical and electronic
security and adopting personnel and technology policies that reflect best practices are steps you would
likely take anyway. Disciplining personnel and cooperating with law enforcement are much harder
decisions. Deciding to redesign materials or products, especially in a clean room, potentially has even
greater consequences for the company.
The importance of these decisions reinforces the need to retain experienced counsel to identify your
options and the consequences of pursuing each one. While some of these actions can be difficult, not
acting can be even more devastating. Being found guilty of trade secret misappropriation can
permanently change the way a company is viewed by shareholders, suppliers, customers, and others.
It could result in court orders prohibiting you from shipping your most important products. Making
these decisions as soon as possible is the best way to be in the best possible position to succeed in the
future, no matter what may have happened in the past.
Trade Secret Law and Corporate Strategy
Page 7 of 7
1-9 Trade Secret Law and Corporate Strategy § 9.05
Copyright 2014, Matthew Bender & Company, Inc., a member of the LexisNexis Group.
EXHIBIT C
EXHIBIT D
Michael Filardo
MTS Somewhere Over the Startup Rainbow
Experience
Member Technical Staff at a well funded stealth startup
January 2015 - Present (7 months)
"I am putting myself to the fullest possible use, which is all I think that any conscious entity can ever hope to
do." -HAL 9000
Chip Lead / Principal ASIC Design Engineer at Broadcom
April 2011 - January 2015 (3 years 10 months)
Chip Lead, Senior Design Engineer for 10G/40G/100G ethernet switch chips.
Senior ASIC Design Engineer at NVIDIA
2005 - 2011 (6 years)
GPU rtl design
Senior Design Engineer at Centillium Communications
2003 - 2005 (2 years)
EPON networking chips
Senior Design Engineer at Morphics
2001 - 2003 (2 years)
Senior Design Engineer at HAL Computer Systems
1993 - 2001 (8 years)
Math Teacher at Peace Corps
November 1990 - December 1992 (2 years 2 months)
Senior Design Engineer at Siemens
1986 - 1989 (3 years)
Skills & Expertise
SoC
VLSI
RTL design
Verilog
ASIC
Static Timing Analysis
Page1
Bring-up
Functional Verification
RTL Design
Timing Closure
Debugging
Embedded Systems
Semiconductors
EDA
Integrated Circuit Design
IC
Education
UCLA
Bachelor of Science (B.S.), Electrical and Electronics Engineering, 1978 - 1983
Page2
Michael Filardo
MTS Somewhere Over the Startup Rainbow
Contact Michael on LinkedIn
Page3
EXHIBIT E
Avinash Mani
Senior Director, IC Design Engineering at Broadcom
Experience
Director, IC Design Engineering at Broadcom
June 2006 - Present (9 years 1 month)
Manage teams of 50+ engineers engaged in various aspects of ASIC Development of L2/L3 Switch Routing
chips, EPON chips, Security chips. Functions within the team include functional verification, emulation,
FPGA prototyping, silicon validation, micro-architecture and design specification review, etc...
Senior Director, IC Design Engineering at Broadcom
June 2006 - Present (9 years 1 month)
Sr Manager, IC Design Engineering at Broadcom
September 2010 - February 2012 (1 year 6 months)
Manager, IC Design Engineering at Broadcom
March 2008 - September 2010 (2 years 7 months)
Principal Engineer, IC Design at Broadcom
June 2006 - March 2008 (1 year 10 months)
Director Of Corporate Applications at Axiom Design Automation
March 2005 - July 2006 (1 year 5 months)
Verification Solution Architect at Synopsys
September 2002 - March 2005 (2 years 7 months)
Sr. Hardware Engineer at Riverstone Networks
June 2000 - September 2002 (2 years 4 months)
Skills & Expertise
SystemVerilog
Team Building
Functional Verification
Management
C++
Perl
TCL
Verilog
Traffic Management
Page1
Networking
Software Development
C#
Unix Shell Scripting
VHDL
Microarchitecture
Hardware
Debugging
ASIC
Education
University of Southern California
Master of Science (M.S.), Electrical and Electronics Engineering, 1996 - 1998
Indian Institute of Technology, Bombay
BTech, 1992 - 1996
Page2
Avinash Mani
Senior Director, IC Design Engineering at Broadcom
Contact Avinash on LinkedIn
Page3
EXHIBIT F
Bruce Kwan
Technical Director, Distinguished Engineer at Broadcom
Summary
Have worked at several networking systems and semiconductor companies in the area of broadband
communications.
Specialties
System architecture, switch fabric and traffic management architecture, performance analysis and modeling,
discrete event simulation.
Experience
Technical Director, Distinguished Engineer at Broadcom Corporation
March 2013 - Present (2 years 5 months)
Development of Ethernet switching ASICs.
Associate Technical Director at Broadcom
2011 - 2013 (2 years)
Senior Staff Scientist/Principal Scientist/Engineering Manager at Broadcom
2004 - 2011 (7 years)
Member Technical Staff at ZettaCom Inc.
February 2002 - December 2003 (1 year 11 months)
Development of high performance switch fabric and traffic management products.
1 recommendation available upon request
Systems Architect at Bravara Corporation
2000 - 2001 (1 year)
1 recommendation available upon request
Senior Member of the Technical Staff at Jet Propulsion Laboratory
1997 - 2000 (3 years)
Skills & Expertise
System Architecture
Discrete Event Simulation
Architecture
Electrical Engineering
Page1
Technical Leadership
System Design
Ethernet
Semiconductors
ASIC
Systems Engineering
Simulations
Education
University of California, Los Angeles
MS/PhD, Electrical Engineering, 1990 - 1997
University of California, Berkeley
BS, EECS, 1986 - 1990
Page2
Bruce Kwan
Technical Director, Distinguished Engineer at Broadcom
2 people have recommended Bruce
""
— Paul L., VP Strategic Marketing, ZettaCom, worked with Bruce at ZettaCom Inc.
""
— Gene O., Communications Architect, Bravara, worked directly with Bruce at Bravara Corporation
Contact Bruce on LinkedIn
Page3
Download