{"id":727,"date":"2021-02-17T14:49:11","date_gmt":"2021-02-17T14:49:11","guid":{"rendered":"https:\/\/www.luxurymarketreview.com\/?p=727"},"modified":"2021-02-17T14:49:13","modified_gmt":"2021-02-17T14:49:13","slug":"trade-secrets-what-fashion-and-luxury-brands-should-know","status":"publish","type":"post","link":"https:\/\/www.luxurymarketreview.com\/fr\/2021\/02\/17\/trade-secrets-what-fashion-and-luxury-brands-should-know\/","title":{"rendered":"Secrets commerciaux\u00a0: ce que les marques de mode et de luxe doivent savoir"},"content":{"rendered":"<p>Par\u00a0<a href=\"https:\/\/www.springutlaw.com\/\">Milton Springut<\/a> &#8211; Published. by <a href=\"http:\/\/luxurydaily.com\" data-type=\"URL\" data-id=\"luxurydaily.com\">luxedaily.com<\/a> Feb. 17, 2021<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><em>The World Intellectual Property Organization (WIPO) reviews various trade secrets used in the fashion industry. <\/em><\/h2>\n\n\n\n<p>Trade secrets are one of the big four recognized forms of intellectual property.<\/p>\n\n\n\n<p>Yet many fashion and luxury goods companies neglect this protection, perceiving that trade secret law only applies to companies involved in technology-driven businesses. That is a misconception.<\/p>\n\n\n\n<p>Trade secret protection can be invaluable to many companies, including fashion and luxury goods companies.<\/p>\n\n\n\n<p>In this article, we examine the basics of trade secret law: what qualifies as a trade secret, what kind of protection can be had, what steps a business can take to ensure protection, and what remedies are available if a trade secret is stolen.<\/p>\n\n\n\n<p><strong>What is a trade secret?<\/strong><\/p>\n\n\n\n<p>The Defend Trade Secrets Act (DTSA), passed in 2016, provides a federal civil remedy for trade secret theft.&nbsp; The law broadly protects trade secrets, which until then were only protected by state law.<\/p>\n\n\n\n<p>A review of its provisions is a good way to understand the basics of trade secret law.<\/p>\n\n\n\n<p>The definition of a trade secret broadly includes any financial, business, scientific, technical, economic or engineering information, if two conditions are met:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The owner has taken reasonable measures to keep such information secret<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>The information derives independent economic value from not being generally known or ascertainable by others who could obtain value from knowing it<\/li><\/ol>\n\n\n\n<p>Whenever a business gains a competitive advantage from the secrecy of its information and has taken \u201creasonable measures\u201d to keep the information secret, then it owns a trade secret. This covers many kinds of information that a business might use.<\/p>\n\n\n\n<p>While this would include secret technical information \u2013 the secret formula for Coca-Cola is probably one of the most famous trade secrets \u2013 some common examples of trade secrets that fashion businesses might own include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Customer lists and preferences<\/li><li>Identities of key suppliers<\/li><li>Marketing and other business strategies<\/li><li>Manufacturing and design methods<\/li><li>Survey methods<\/li><li>New designs for the next season<\/li><li>Negative know-how \u2013 what methods do&nbsp;<em>not&nbsp;<\/em><\/li><\/ul>\n\n\n\n<p>A report of the World Intellectual Property Organization (WIPO) reviews various trade secrets used in the fashion industry, and gives an example:<\/p>\n\n\n\n<p><em>The Spanish retail fashion chain, Zara, uses a proprietary information technology (IT) system to shorten their production cycle \u2013 i.e.m the time from identifying a new trend to delivering the finished product \u2013 to a mere 30 days. Most of their competitors take from 4 to 12 months. The company receives daily streams of email from store managers signaling new trends, fabrics and cuts, from which its designers quickly prepare new styles. The fabric selected is immediately cut in an automated facility and sent to workshops. A high-tech distribution system, with some 200 kilometers of underground traces and over 400 chutes, ensures that the finished items are shipped and arrive in stores within 48 hours.<\/em><\/p>\n\n\n\n<p>Trade secrets may include temporarily secret information. Suppose a luxury goods company has plans to release new designs next season. Before they are released, there may well be considerable value to the company in maintaining their secrecy and keeping competitors in the dark.<\/p>\n\n\n\n<p>True, trade secret protection will be lost once the new designs are released.&nbsp; But until that time, the new designs would enjoy trade secret protection \u2013 and the business would gain the value of the lead time in designing, producing and then introducing the new designs.<\/p>\n\n\n\n<p><strong>Reasonable efforts<\/strong><\/p>\n\n\n\n<p>Critical to maintaining the protection of the trade secrets is that the business has taken \u201creasonable measures\u201d to keep such information secret.<\/p>\n\n\n\n<p>One critical step to have in place is agreements with actors to whom the secrets are revealed, requiring them to maintain confidentiality. Most prominently, this includes employees.<\/p>\n\n\n\n<p>The vast majority of trade secret cases involve employees who \u201cjump ship\u201d to a competitor and take valuable information. Agreements with such employees should be in place, providing a duty to maintain the company\u2019s trade secrets and confidential information.<\/p>\n\n\n\n<p>Agreements with other actors are also important. Companies generally often have vendors, suppliers, shipping agents and others as part of their business.&nbsp; If trade secret information is revealed to these actors as part of the business relationship, then contractual agreements to maintain secrecy are a must.<\/p>\n\n\n\n<p>Cybersecurity is another critical area where \u201creasonable measures\u201d must be taken.<\/p>\n\n\n\n<p>Virtually all business information today resides in computer systems. This means that, to maintain the trade secret protection for any such information, reasonable efforts must be made to keep it secure.<\/p>\n\n\n\n<p>In a few cases, courts have rejected trade secret claims because the owner\u2019s cybersecurity efforts were inadequate.<\/p>\n\n\n\n<p>Among other things to consider when assessing cybersecurity:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Is the confidential information robustly protected with passwords?<\/li><li>Is access limited to key employees with a \u201cneed to know\u201d the information?<\/li><li>Where is the information stored? In a secure server?&nbsp; The cloud?<\/li><li>If the information is being conveyed through email communications, are they secure? And, again, limited to those with a need to know? Watch the indiscriminate \u201creply all.\u201d<\/li><li>Does the information reside on portable devices, such as an employee\u2019s laptop or smartphone? What happens if the employee loses that \u2013 is there a protocol to disable access remotely and, if needed, retrieve the information?<\/li><\/ol>\n\n\n\n<p>Many companies conduct trade secret audits, so they can assess what trade secrets they have and what measures are being taken to protect them. This often overlaps substantially with cybersecurity assessments, so it is well advisable to do them at the same time.<\/p>\n\n\n\n<p><strong>Trade secrets are misappropriated, not infringed<\/strong><\/p>\n\n\n\n<p>The technical term for theft of a trade secret is \u201cmisappropriation,\u201d different from \u201cinfringement,\u201d the usual term used in intellectual property. This is more than just a semantic difference.<\/p>\n\n\n\n<p>Misappropriation means that \u201cimproper means\u201d have to be used to obtain the information. \u201cImproper means\u201d could include theft, bribery, fraud, breaching or inducing another to breach a duty of confidentiality (typically an employee), computer hacking, or electronic espionage.<\/p>\n\n\n\n<p>The DTSA extends misappropriation to acquiring information that one knows was acquired through improper means or knowing that the information was acquired with a duty to maintain secrecy.<\/p>\n\n\n\n<p>Thus, a competitor who acquires information from someone else it knows used improper means is itself guilty of \u201cmisappropriation.\u201d<\/p>\n\n\n\n<p>What misappropriation does&nbsp;<em>not&nbsp;<\/em>include, however, is legitimate development of the same information. Someone who independently creates the same information is not guilty of misappropriation.<\/p>\n\n\n\n<p>Misappropriation also does not include \u201creverse engineering.\u201d<\/p>\n\n\n\n<p>If a product is sold to the public, a competitor is free to buy samples, analyze them, learn what it can from them, and then use that information for its own business.<\/p>\n\n\n\n<p>Likewise, a competitor could review and analyze a company\u2019s advertising and promotions released to the public and use what it learns for its own business.<\/p>\n\n\n\n<p>In this way, trade secrets are more limited than patents \u2013 someone can always develop the same information independently, or learn what it can from publicly available sources, and then use that in its business.<\/p>\n\n\n\n<p>Thus, trade secret protection is only useful when the information is not easily learned without improper access to the trade secret.<\/p>\n\n\n\n<p>Cybersecurity can sometimes be helpful in showing misappropriation.\u00a0 <\/p>\n\n\n\n<p>In one trade secret case brought by Nike against adidas, Nike alleged that three designers who left its employment to work for Adidas copied sensitive design and business documents from their computers, including drawings for an unreleased shoe made for one of Nike&#8217;s sponsored athletes.<\/p>\n\n\n\n<p>Nike also alleged that the designers tried to hide their tracks by erasing incriminating emails and text messages from their work-issued mobile phones and laptops, which it had been able to trace.<\/p>\n\n\n\n<p>Thus, Nike was able to follow the \u201ccyber-trail\u201d to document how the faithless employees had both stolen the secret information and then tried to hide their tracks.<\/p>\n\n\n\n<p>A company would be well advised to consult with its IT department to see if tracking and like software could be implemented to follow such misdeeds.<\/p>\n\n\n\n<p><strong>Remedies<\/strong><\/p>\n\n\n\n<p>So, what happens if trade secrets are misappropriated? The DTSA provides for extensive remedies.<\/p>\n\n\n\n<p>A court can issue a preliminary or permanent injunction against use of the trade secrets. It can award money damages \u2013 both losses to the trade secret owner, and an award of the wrongful profits gained by the misappropriator.&nbsp; Punitive damages and attorney\u2019s fees may also be awarded.<\/p>\n\n\n\n<p>One remedy that the DTSA introduced is seizure of property \u2013 typically computers, but also documents \u2013 to prevent trade secret misappropriation.&nbsp; This was modeled after the seizure provisions of the Trademark Act, which many luxury goods companies have used to seize counterfeit goods and records of their sales from counterfeiters.<\/p>\n\n\n\n<p>Like trademark counterfeiting seizures, a court may order this&nbsp;<em>ex parte<\/em>, meaning without notice to the other side. And, like counterfeiting seizures, Congress set out rigorous requirements that a court must find before ordering a seizure, lest the provisions be abused.<\/p>\n\n\n\n<p>In extreme cases, one might be able to convince a court to order seizure of laptops and other computers to prevent use of the stolen trade secrets. Of course, one must act quickly before the information is copied, rendering the seizure ineffective.<\/p>\n\n\n\n<p><strong>Whistleblower immunity<\/strong><\/p>\n\n\n\n<p>The DTSA also enacted \u201cwhistleblower\u201d immunity, a broad immunity from liability to someone who discloses trade secrets, in confidence, to a government official or attorney, and made solely for the purpose of reporting suspected violations of the law, or in a sealed legal filing.<\/p>\n\n\n\n<p>Congress also required that this be disclosed to employees in any contract that governs the use of trade secrets. Failure to do so limits the available remedies under the DTSA. So, companies should make sure this is included in their employment agreements.<\/p>\n\n\n\n<p>TRADE SECRETS CAN be as valuable to fashion and luxury goods companies as the other forms of intellectual property.<\/p>\n\n\n\n<p>Trade secrets are different from all other intellectual property in that there is no governmental involvement at all in securing the rights.<\/p>\n\n\n\n<p>Patents are issued by the Patent Office. Trademarks and copyrights are registered with their respective government offices. But trade secrets are secured solely through due diligence of the business that uses them.<\/p>\n\n\n\n<p>So, understanding how trade secrets work, and how to effectively implement a trade secret strategy, is crucial to gaining the business value of these rights.<\/p>\n\n\n\n<p><img fetchpriority=\"high\" decoding=\"async\" width=\"465\" height=\"262\" src=\"https:\/\/cache.luxurydaily.com\/wp-content\/uploads\/2017\/03\/Milton-Springut.jpg\" alt=\"Milton Springut is a partner at Springut Law PC\"><\/p>\n\n\n\n<p>Milton Springut is a partner at Springut Law PC<\/p>\n\n\n\n<p><em>Milton Springut is a partner at\u00a0<a href=\"http:\/\/www.springutlaw.com\/\">Springut Law PC<\/a>, New York. Reach him at ms@springutlaw.com. Mr. Springut&#8217;s opinions are solely his.<\/em><\/p>\n\n\n\n<p>For more Luxury News subscribe to <a href=\"http:\/\/luxurydaily.com\" data-type=\"URL\" data-id=\"luxurydaily.com\">luxedaily.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>By\u00a0Milton Springut &#8211; Published. by luxurydaily.com Feb. 17, 2021 The World Intellectual Property Organization (WIPO) reviews various trade secrets used in the fashion industry. Trade secrets are one of the big four recognized forms of intellectual property. Yet many fashion and luxury goods companies neglect this protection, perceiving that trade secret law only applies to [&hellip;]<\/p>","protected":false},"author":2,"featured_media":729,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":{"0":"post-727","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-haute-couture"},"_links":{"self":[{"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/posts\/727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/comments?post=727"}],"version-history":[{"count":0,"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/posts\/727\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/media\/729"}],"wp:attachment":[{"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/media?parent=727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/categories?post=727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.luxurymarketreview.com\/fr\/wp-json\/wp\/v2\/tags?post=727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}