The Law of Trade Secrecy and Covenants Not to Compete in Colorado-part I
Publication year | 2001 |
Pages | 7 |
Citation | Vol. 30 No. 4 Pg. 7 |
2001, April, Pg. 7. The Law of Trade Secrecy and Covenants Not to Compete in Colorado-Part I
Vol. 30, No. 4, Pg. 7
The Colorado Lawyer
April 2001
Vol. 30, No. 4 [Page 7]
April 2001
Vol. 30, No. 4 [Page 7]
Articles
The Law of Trade Secrecy and Covenants Not to Compete in
Colorado - Part I
by John F. Reha
by John F. Reha
In the past ten years, few areas of the law have experienced
the exponential growth as those of trade secrecy and
competition restrictions. The advent of technology and the
coming of age of the "dot.com" world have only
accelerated a process of legal development, which was already
in a state of rapid growth. In the post-industrial
information-based economy, increasingly it is information
that is the key asset of business. In the industrial age
hard assets were the lifeblood of most businesses, but they
have now been relegated to the supporting role of tools. Many
businesses sell information, others market concepts, and
still others sell identity. Thus, fewer new businesses are
involved in the sale of tangible items, at least in the
traditional, "bricks and mortar" sense
Moreover, for all businesses, even those involved in
traditional inventory-based industries, knowledge and
relationships are increasingly proving to be the core value
of organizations. Sales personnel with a large network of
contacts and designers and engineers possessing "know
how" commonly hold in their hands the key to the value
of the entire enterprise (or at least a critical part of it).
The law has attempted to keep up with these fundamental
changes. That attempt is often through the concepts of trade
secrecy and covenants not to compete. This article addresses
a number of those developments, with an emphasis on the law
of Colorado.
The first part of this two-part article focuses on trade
secrets. The second part, to be published in the May 2001
issue, will discuss covenants not to compete. These articles
have two purposes: (1) to afford Colorado practitioners a
greater understanding of the substantive law in the areas of
intangible asset misappropriation and competition; and (2) to
provide practical drafting and litigation tips on issues that
may arise in these areas.
HISTORY OF GOVERNANCE OF INTANGIBLES
Many facets of the law impact the general area of intangible
assets. At the federal level, statutes governing patent,
trademark, and copyright have existed for many years. In a
product-driven, industrial economy, the systems arising under
these statutory schemes proved adequate to protect much of
the intellectual property issues of the day. However, over
the past twenty years, the rapid rise of "soft"
assets to the fore of the nation's economy has rendered
much of the protection offered by these statutes ineffective
or misplaced. Patent covers "invention," which
historically has connoted a tangible item. Copyright protects
expression only, not ideas or concepts. Trademark protects
identification of the source of goods or services. Thus,
while the scope of the federal statutory scheme is fairly
broad, it does not cover many key aspects of business in
today's world, including a great deal of research and
development information, technical innovation, processes,
business strategy, customer identity information, and
"relationship capital" with existing suppliers and
customers.
As business has increasingly recognized the real world value
of such information, the law has developed to govern many of
the issues that arise outside of the historical areas covered
by federal statute. The two major areas falling outside the
patent, copyright, and trademark scheme are trade secrecy and
competitive restrictions. Both have seen rapid development in
the United States in the recent past.
Because states such as Colorado (which has enjoyed a large
increase of technology-based business activity) have seen a
disproportionately large number of issues in this arena, they
have led the way in the development of law to cover these
areas. Much of this legal development has been via the
typical common-law vehicles, but statutory attempts to deal
with these areas have occurred as well. This is especially
true in Colorado, which has not only adopted the Uniform
Trade Secrets Act ("UTSA"),1 along with the
majority of other states, but has taken the unique step of
enacting a statute that governs issues arising as to
covenants not to compete (to be discussed in Part II of this
article).2
THE MODERN LAW OF TRADE SECRECY
Colorado has long recognized and protected trade secrets.
With the adoption of the UTSA in 1986, the law of trade
secrecy in Colorado underwent significant revision.
Common-Law Misappropriation
Prior to the adoption of the UTSA by the Colorado General
Assembly, effective July 1, 1986, Colorado adhered to the
common-law rule of trade secrecy. At common law, a six-part
analysis, set forth as follows in Porter Industries, Inc. v.
Higgins,3 determined the existence of a trade secret:
(1) the extent to which the information is known outside the
business, (2) the extent to which it is known to those inside
the business, i.e., by the employees, (3) the precautions
taken by the holder of the trade secrets to guard the secrecy
of the information, (4) the savings effected and the value to
the holder in having the information as against competitors,
(5) the amount of effort or money expended in obtaining and
developing the information, and (6) the amount of time and
expense it would take for others to acquire and duplicate the
information. . . .The most commonly accepted definition of
trade secrets is restricted to confidential information which
is not disclosed in the normal course of exploitation.4
Misappropriation Under the UTSA
By its express terms, the UTSA sets forth four elements
necessary to establish a claim for trade secret
misappropriation: secrecy, value, protective measures, and
improper means of appropriation. The first three of these
elements are set forth in the definition of trade secret, and
the fourth is included in the definition of misappropriation.
Definition of "Trade Secret"
Section 102(4),5 which defines trade secret for purposes of
the UTSA, varies significantly from the common-law test:
"Trade secret" means the whole or any portion or
phase of any scientific or technical information, design,
process, procedure, formula, improvement, confidential
business or financial information, listing of names,
addresses, or telephone numbers, or other information
relating to any business or profession which is secret and of
value. To be a "trade secret" the owner thereof
must have taken measures to prevent the secret from becoming
available to persons other than those selected by the owner
to have access thereto for limited purposes.
Three elements exist in this statutory definition - secrecy,
value, and protective measures. While these elements are
factors in the common-law test, they are requirements under
the UTSA. Despite this distinction, Colorado courts have
continued to cite authoritatively to the common-law test in
cases determined after the adoption of the UTSA.6 The
existence and scope of protective measures as a requirement
has served as the key issue in at least two cases decided
after the UTSA's adoption.7 From these cases, as well as
from the language of the UTSA itself, it is clear that
secrecy, value, and protective measures are all required for
a trade secret to be found.
Secrecy: The "laundry list" of candidates for trade
secrecy in the UTSA includes: "any scientific or
technical information, design, process, procedure, formula,
improvement, confidential business or financial information,
listing of names, addresses, or telephone numbers, or other
information,"8 provided that such items are truly
secret.9 Secrecy is often the key issue under the UTSA. In
turn, the UTSA puts great weight on protective measures as a
means of establishing secrecy.
Although the UTSA nowhere requires a written agreement to
preserve trade secrecy, enforcement of an oral agreement is
by no means a certainty, because an oral agreement may not be
an adequate protective measure, except perhaps as to highly
technical, clearly proprietary information. If a written
employment agreement is entered into that does not set forth
trade secrecy language, an attempt at imposing a trade
secrecy restriction may be barred by the parol evidence rule,
especially if the written agreement includes an integration
clause. As a matter of general contract law, such clauses
typically bar the introduction of evidence in addition to the
express terms of the written agreement itself.10
Protective Measures: For a trade secret to arise under the
UTSA, the owner of the information must adopt "measures
to prevent the secret from becoming available to persons
other than those selected by the owner to have access thereto
for limited purposes."11 In Network Telecommunications,
Inc. v. Boor-Crepeau,12 the plaintiff's complaint alleged
that "contact lists" used by telemarketers were
handed out on a weekly basis, telemarketers were prohibited
from sharing their lists with co-workers, and the lists were
collected and shredded on a regular basis. This was found at
least to merit the presentation of evidence on a motion for
preliminary injunction.
Conversely, in Colorado Supply Co. v. Stewart,13 neither a
written trade secrecy agreement nor any other appreciable
measures were used to safeguard secrecy. Moreover, the
"employee" at issue (in fact an independent
contractor sales representative) developed much of the
information himself, and the information compiled by the
"employer" was routinely given to him. As the court
stated:
Here, the trial court concluded that plaintiff's...
To continue reading
Request your trial