The Law of Trade Secrecy and Covenants Not to Compete in Colorado-part I

Publication year2001
Pages7
CitationVol. 30 No. 4 Pg. 7
30 Colo.Law. 7
Colorado Lawyer
2001.

2001, April, Pg. 7. The Law of Trade Secrecy and Covenants Not to Compete in Colorado-Part I




7


Vol. 30, No. 4, Pg. 7

The Colorado Lawyer
April 2001
Vol. 30, No. 4 [Page 7]

Articles

The Law of Trade Secrecy and Covenants Not to Compete in Colorado - Part I
by John F. Reha

In the past ten years, few areas of the law have experienced the exponential growth as those of trade secrecy and competition restrictions. The advent of technology and the coming of age of the "dot.com" world have only accelerated a process of legal development, which was already in a state of rapid growth. In the post-industrial information-based economy, increasingly it is information that is the key asset of business. In the industrial age hard assets were the lifeblood of most businesses, but they have now been relegated to the supporting role of tools. Many businesses sell information, others market concepts, and still others sell identity. Thus, fewer new businesses are involved in the sale of tangible items, at least in the traditional, "bricks and mortar" sense

Moreover, for all businesses, even those involved in traditional inventory-based industries, knowledge and relationships are increasingly proving to be the core value of organizations. Sales personnel with a large network of contacts and designers and engineers possessing "know how" commonly hold in their hands the key to the value of the entire enterprise (or at least a critical part of it). The law has attempted to keep up with these fundamental changes. That attempt is often through the concepts of trade secrecy and covenants not to compete. This article addresses a number of those developments, with an emphasis on the law of Colorado.

The first part of this two-part article focuses on trade secrets. The second part, to be published in the May 2001 issue, will discuss covenants not to compete. These articles have two purposes: (1) to afford Colorado practitioners a greater understanding of the substantive law in the areas of intangible asset misappropriation and competition; and (2) to provide practical drafting and litigation tips on issues that may arise in these areas.

HISTORY OF GOVERNANCE OF INTANGIBLES

Many facets of the law impact the general area of intangible assets. At the federal level, statutes governing patent, trademark, and copyright have existed for many years. In a product-driven, industrial economy, the systems arising under these statutory schemes proved adequate to protect much of the intellectual property issues of the day. However, over the past twenty years, the rapid rise of "soft" assets to the fore of the nation's economy has rendered much of the protection offered by these statutes ineffective or misplaced. Patent covers "invention," which historically has connoted a tangible item. Copyright protects expression only, not ideas or concepts. Trademark protects identification of the source of goods or services. Thus, while the scope of the federal statutory scheme is fairly broad, it does not cover many key aspects of business in today's world, including a great deal of research and development information, technical innovation, processes, business strategy, customer identity information, and "relationship capital" with existing suppliers and customers.

As business has increasingly recognized the real world value of such information, the law has developed to govern many of the issues that arise outside of the historical areas covered by federal statute. The two major areas falling outside the patent, copyright, and trademark scheme are trade secrecy and competitive restrictions. Both have seen rapid development in the United States in the recent past.

Because states such as Colorado (which has enjoyed a large increase of technology-based business activity) have seen a disproportionately large number of issues in this arena, they have led the way in the development of law to cover these areas. Much of this legal development has been via the typical common-law vehicles, but statutory attempts to deal with these areas have occurred as well. This is especially true in Colorado, which has not only adopted the Uniform Trade Secrets Act ("UTSA"),1 along with the majority of other states, but has taken the unique step of enacting a statute that governs issues arising as to covenants not to compete (to be discussed in Part II of this article).2

THE MODERN LAW OF TRADE SECRECY

Colorado has long recognized and protected trade secrets. With the adoption of the UTSA in 1986, the law of trade secrecy in Colorado underwent significant revision.

Common-Law Misappropriation

Prior to the adoption of the UTSA by the Colorado General Assembly, effective July 1, 1986, Colorado adhered to the common-law rule of trade secrecy. At common law, a six-part analysis, set forth as follows in Porter Industries, Inc. v. Higgins,3 determined the existence of a trade secret:

(1) the extent to which the information is known outside the business, (2) the extent to which it is known to those inside the business, i.e., by the employees, (3) the precautions taken by the holder of the trade secrets to guard the secrecy of the information, (4) the savings effected and the value to the holder in having the information as against competitors, (5) the amount of effort or money expended in obtaining and developing the information, and (6) the amount of time and expense it would take for others to acquire and duplicate the information. . . .The most commonly accepted definition of trade secrets is restricted to confidential information which is not disclosed in the normal course of exploitation.4

Misappropriation Under the UTSA

By its express terms, the UTSA sets forth four elements necessary to establish a claim for trade secret misappropriation: secrecy, value, protective measures, and improper means of appropriation. The first three of these elements are set forth in the definition of trade secret, and the fourth is included in the definition of misappropriation.

Definition of "Trade Secret"

Section 102(4),5 which defines trade secret for purposes of the UTSA, varies significantly from the common-law test:

"Trade secret" means the whole or any portion or phase of any scientific or technical information, design, process, procedure, formula, improvement, confidential business or financial information, listing of names, addresses, or telephone numbers, or other information relating to any business or profession which is secret and of value. To be a "trade secret" the owner thereof must have taken measures to prevent the secret from becoming available to persons other than those selected by the owner to have access thereto for limited purposes.

Three elements exist in this statutory definition - secrecy, value, and protective measures. While these elements are factors in the common-law test, they are requirements under the UTSA. Despite this distinction, Colorado courts have continued to cite authoritatively to the common-law test in cases determined after the adoption of the UTSA.6 The existence and scope of protective measures as a requirement has served as the key issue in at least two cases decided after the UTSA's adoption.7 From these cases, as well as from the language of the UTSA itself, it is clear that secrecy, value, and protective measures are all required for a trade secret to be found.

Secrecy: The "laundry list" of candidates for trade secrecy in the UTSA includes: "any scientific or technical information, design, process, procedure, formula, improvement, confidential business or financial information, listing of names, addresses, or telephone numbers, or other information,"8 provided that such items are truly secret.9 Secrecy is often the key issue under the UTSA. In turn, the UTSA puts great weight on protective measures as a means of establishing secrecy.

Although the UTSA nowhere requires a written agreement to preserve trade secrecy, enforcement of an oral agreement is by no means a certainty, because an oral agreement may not be an adequate protective measure, except perhaps as to highly technical, clearly proprietary information. If a written employment agreement is entered into that does not set forth trade secrecy language, an attempt at imposing a trade secrecy restriction may be barred by the parol evidence rule, especially if the written agreement includes an integration clause. As a matter of general contract law, such clauses typically bar the introduction of evidence in addition to the express terms of the written agreement itself.10

Protective Measures: For a trade secret to arise under the UTSA, the owner of the information must adopt "measures to prevent the secret from becoming available to persons other than those selected by the owner to have access thereto for limited purposes."11 In Network Telecommunications, Inc. v. Boor-Crepeau,12 the plaintiff's complaint alleged that "contact lists" used by telemarketers were handed out on a weekly basis, telemarketers were prohibited from sharing their lists with co-workers, and the lists were collected and shredded on a regular basis. This was found at least to merit the presentation of evidence on a motion for preliminary injunction.

Conversely, in Colorado Supply Co. v. Stewart,13 neither a written trade secrecy agreement nor any other appreciable measures were used to safeguard secrecy. Moreover, the "employee" at issue (in fact an independent contractor sales representative) developed much of the information himself, and the information compiled by the "employer" was routinely given to him. As the court stated:

Here, the trial court concluded that plaintiff's...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT