Antitrust Liability to the Conduct of “Refusal to License” of the Standard Essential Patent

Antitrust Liability to the Conduct of “Refusal to License” of the Standard Essential Patent

2022/07/19

  The notion of Standard Essential Patent(SEP)emerges in the era when manufacturers seek ‘‘compatibility’’ and ‘‘interoperability’’ of their products. The concept of SEPs is proposed to help manufacturers ‘‘talk’’ to each other so the collective manufacturers enjoy the advantage of economies of scales. Meanwhile, the compatibility and interoperability derived from SEPs enhance the consumers’ valuation of the product which creates the ‘‘network effect’’ of the products.

  There is a long-debated issue in the field of SEP—to what extent shall the SEP holders license their patents in the various level of the supply chain. This issue has much to do with the ‘‘FRAND commitment’’, and is worthy of further analysis.

I. SEP and FRAND Commitment

  The concept of SEP is—when any certain patented technology is selected by the ‘‘Standard Setting Organization’’(SSO)as the commonly used standard, such the patented technology is categorized as a SEP. The SEP holder therefore enjoys stronger ‘‘market power’’ because market participants have no choice but to use the SEP and are required to seek license from the SEP holders.

  Therefore, to prevent the SEP holders from abusing their market power, SSOs usually require SEP holders to make the FRAND commitment; that is, to license on ‘‘fair, reasonable and non-discriminatory’’ terms. Once the SEP holder breaches the commitment, the SSOs might exclude that technique from the standard.

II. “License to all”or“Access to all”issues under FRAND Commitment

  The FRAND commitment, by textual reading incorporates the wording of ‘‘non-discriminatory’’, and can infer two co-related yet debatable concepts—the ‘‘License to all’’ or ‘‘Access to all’’ arguments.

  The ‘‘License to all’’ argument holds that all participants in the supply chain retain the access to the specified SEP, while the ‘‘Access to all’’ argument, on the contrary, contends that FRAND commitments don’t necessarily ask SEP holder to license to all practitioners, but when a SEP holder is going to license, he must license on FRAND terms.

  According to observations, there is a common phenomenon in the SEP licensing practice—most SEP holders tend to license only to the End-Product manufacturers rather than to the manufacturers of the ‘‘Smallest Saleable Patent Practicing Unit’’(SSPPU). What the SEP holders expect through ‘‘refusal to license’’ to the SSPPU manufacturers are to maximize the potential royalties. Cases inclusive of the Qualcomm case[1] and the Continental case[2] have shown such practical tendency, and only when the SSOs can well define the definitions of FRAND commitments might the issue be truly settled.

  There are some End-Product manufacturers that consider it ‘‘discriminatory’’ and against the FRAND commitments if the SEP holders refuse to negotiate with SSPPU manufacturers requesting to be the licensee. On the other hand, some consider it inappropriate for the End-Product manufacturers to refuse all negotiations when the SEP holder requests it to be the party to the licensing negotiations[3].

III. The ‘‘refusal to license’’ and the derived Anti-Trust Issue

  As generally admitted, a firm has no general duty to deal with others[4]; however, there are times when SEP holders’ ‘‘refusal to deal∕license’’ behaviors can constitute wrongful monopoly under Sherman Act section 2. The U.S. judicial practices have categorized three main ‘‘refusal to deal∕license’’ behaviors as wrongful monopoly under Sherman Act section 2; they are[5]:

1.dominant firm forces its customers not to do business with new competitors of that firm, or the dominant firm will terminate business with the customer[6];

2.dominant firm tries to abandon or alter an existing relationship[7];

3.dominant firm refuses to provide access to ‘‘essential facility’’ (the equipment or techniques that is indispensable when others would like to compete in the relevant market with the dominant firm).

  As SEP can be categorized as an ‘‘essential facility’’, this paper will only focus on the third category. The ‘‘Essential Facility Doctrine’’ is—when any monopolist withholds an essential facility and refuses to provide his competitors with the access to the said essential facility, a wrongful monopoly due to the Facility holders’ ‘‘refusal to deal∕license’’ is constituted.

  According to the leading case—the MCI case[8], four factors are to be proved by the plaintiff when seeking resort to ‘‘Essential Facility Doctrine’’; they are:(1)the monopolist’s control of an essential facility;(2)the inability of a competitor to duplicate that essential facility;(3)the monopolist’s denial of access to that essential facility to a competitor;(4)the feasibility of providing the essential facility to the competitor by the monopolist.

  As we can shortly conclude here, if a SEP holder constitute wrongful monopoly because of his ‘‘refusal to license’’ behavior, the perquisite is that the SEP holder would like to join in the ‘‘competition’’ in the relevant market himself.

IV. Conclusion—the commonly seen ‘‘refusal to license’’ behavior of SEP holders doesn’t constitute wrongful monopoly

  As mentioned before, ‘‘competition’’ serves as the prerequisite for the ‘‘Essential Facility Doctrine’’; thus, some SEP holders’ refusal to license to SSPPU manufacturers behaviors—such as Qualcomm in the Qualcomm case and Nokia in the Continental case—are not in accordance with ‘‘Essential Facility Doctrine’’ and do not constitute wrongful monopoly. Qualcomm and Nokia chose not to license to SSPPU manufacturers merely because they want to earn more royalties by licensing to End-Product manufacturers; they didn’t make this choice because themselves would like to compete in the SSPPU markets.

However, since there is no clear definition of FRAND yet, whether the SEP holders have truly breached the FRAND commitment remains unsolved puzzle and shall retain to SSO’s clearer definition and the Court’s further rulings.

 

 

[1]FTC v. Qualcomm Inc., 969 F.3d 974 (9th Cir. 2020). SEP holder Qualcomm would only like to license to the cellphone OEM manufactures rather than to other chips manufacturers.

[2]Continental Automotive Systems, Inc. v. Avanci, LLC, et al, No. 20-11032 (5th Cir. 2022). SEP holder Nokia and a licensing platform—Avanci (that Nokia had joined) would only like to license to car manufacturers rather than to Telematics Control Unit(TCU)manufacturers.

[3]Japan Patent Office [JPO], GUIDE TO LICENSING NEGOTIATIONS INVOLVING STANDARD ESSENTIAL PATENTS (2018), https://www.jpo.go.jp/e/support/general/sep_portal/document/index/guide-seps-en.pdf(last visited July 19, 2022).

[4]See United States v. Colgate & Co., 250 U.S. 300 (1919);Pacific Bell Telephone Co. v. linkLine Communications, Inc., 555 U.S. 438 (2009); Aerotec Int'l v. Honeywell Int'l, 836 F.3d 1171 (9th Cir. 2016)

[5]ANDREW I. GAVIL, WILLIAM E. KOVACIC & JONATHAN B. BAKER, ANTITRUST LAW IN PERSPECTIVE: CASES, CONCEPTS AND PROBLEMS IN COMPETITION POLICY 630-654 (2002).

[6]See Lorain Journal Co. v. United States, 342 U.S. 143 (1951)

[7]See Image Technical Services, Inc. v. Eastman Kodak Co., 504 U.S. 451 (1992); Aspen Skiing Co. v. Aspen Highlands Skiing Corp., 472 U.S. 585 (1985)

[8]MCI Communications Corp. v. American Tel. & Tel. Co., 708 F.3d 1081 (7th Cir. 1983)

 

 

Links
※Antitrust Liability to the Conduct of “Refusal to License” of the Standard Essential Patent,STLI, https://stli.iii.org.tw/en/article-detail.aspx?no=105&tp=2&i=171&d=8867 (Date:2025/03/23)
Quote this paper
You may be interested
South Korea’s Strategy for Reinforcing Protection of Corporate Trade Secrets-Trade Secret Protection Center

Preface In order to increase the strength of addressing issues on the infringement of intellectual property for small and medium enterprises, Korean government launched Consultative Committee for Intellectual Property Policies, leading by Presidential Council on Intellectual property and conducting with Ministry of Culture, Sports and Tourism, Korean Intellectual Property Office and Ministry of Justice, to discuss how to reinforce efficiency on handling infringement of intellecual property and work on policy for intellectual property protection. Korean government has considered trade secret as the core of corporations; however, corporations think little of it. For this reason, Korea Institute of Patent Information’s Trade Secret Protection Section, in charge of the Trade Secret Protection Center, works to avoid the outflow of business skills and trade secrets, to improve trade secret protection system, to raise awareness of trade secret protection and develops South Korea as an intellectual property power. This article aims to briefly introduce the standard management system, the diagnosis of corporate trade secret and the Trade Secret Certification Service which are schemed out by the Trade Secret Protection Center. Explanation on Major Strategies Trade Secret Diagnosis & Standard Management System In an attempt to offer a diagnosis of current problems about trade secret management in corporations for drawing up suggestions for improvements, the Trade Secret Protection Center sets up a series of questions based on the five categories: organization policy management, document access management, staff management, physical management and information technology management. There are in total 32 questions with detailed sub-questions for knowing if corporations have set up regulations and if the regulations are followed; if the regulations are not followed, if they have strategy to tackle with violation. For example, the question for internet management is to examine on how corporation manages intranet and extranet. Some possible policies are to make them separated, to do authority control or to do nothing. Here is the procedure for diagnosis: 1.Preparation Employees are asked to gather information regarding trade secret management and improvement opinions by a questionnaire. 2.Diagnosis Get the result of how well corporation has done for trade secret management by analyzing the questionnaires. 3.Plan Come up with solutions according to diagnosis. 4.Action Provide suggestions with different levels of work. Level Description A (above 81 point, Excellent) Well-formed trade secret management and great operation B (71-80 point, Good) Limited strategy with law protection for trade secret outflow C (61-70 point, Average) Weak strategy with a lack of law protection for trade secret outflow, management needed D (41-60 point, Fair ) Poor law protection for trade secret outflow, management needed badly F (below 40 point, Poor) High Risk of trade secret outflow The Trade Secret Protection Center will examine and offer staff training periodically in an effort to improve following aspects: 1.Corporation Management (1)Avoid crucial information outflow (2)Systemize issue handling and information authentication process 2.Organization Culture (1)Convey the importance of information protection (2)Decrease the incoordination among departments due to protecting key information (3)Build trade secret protection culture 3.Staff (1)Provide long-term training for trade secret protection (2)Build up ability of trade secret protection The trade secret diagnosis is considered as a way to make trade secret the key intangible asset in corporations and even to increase the competitiveness and to create profits. In addition to the trade secret diagnosis, the Trade Secret Protection Center further provides immature business with the standard management system which contains services with trade secret registration, level distinguishments, authority control, staff management, contract management and certification service. The primary goal of the standard management system is to help with production and maintenance of trade secret certification before issue occurs. When issue happens, the system is right here to submit certification of trade secret and guarantee to the court that nobody can access trade secrets except the possessor of the trade secret and the institution. In other words, the system is intended for following goals: 1.Efficientize Trade Secret Management Save time, money and manpower. Manage trade secret and related information efficiently. 2.Raise Awareness of Trade Secret Protection Among Employees Strengthen awareness and application of trade secret protection by using this system as daily work process 3.Link to the Trade Secret Certification Service Prove the original document of trade secret with the time stamp of ownership for judicial evidences. 4.Link to Information Security Solution Cooperate with various information security solutions, such as trade secret control and outflow block. Trade Secret Certification Service The Trade Secret Certification Service which is built to link to standard management system is put into practice in 2010 by Korean Intellectual Property Office. This service operates by taking the hash values from trade secret e-documents and combining them with authorized time values from trusted third-parties, thereby creating time stamps. Time stamps are then registered with the Korea Institute of Patent Information to prove the existence of original document of trade secrets, as well as and their initial dates of possession. A legal basis is built for the Trade Secret Certification Service in 2014. Amendments of Unfair Competition Prevention and Trade Secret Protection Act indicate registration and proof of the Trade Secret Certification Service and explain that an institution with more than 3 qualified staff and required facilities is eligible to be a Trade Secret Certification Service institution. The Trade Secret Certification Service is characterized by the following properties: 1.Block Trade Secret Outflow Radically Instead of the trade secret itself, this service only asks for hash value of e-records and the authorized time of ownership which make it more secure for corporations to manage trade secrets rather than maintaining under a third-party. 2.Various Electronic Records Available Various types of electronic records are available in this service, such as documents, pictures and video files which could contain production process, laboratory notebook, blueprint, marketing records, financial records, selling information and customer information and contracts. 3.Institution with Credibility It is inevitable that any piece of information could be leaked out; hence trade secret management should be executed by credible institution. For example, corporation can ask the Trade Secret Certification Service Institution to register an original document for a blueprint and get a certification. Then, the corporation can ask for new registration for modified blueprint as well. When issue occurs, the certification would be the proof of original document and time of ownership. As the Trade Secret Certification Service Institution gets legalized, the evidence of original document of trade secrets and initial dates of possession would get more convincible in court. Conclusion The trade secret diagnosis plays an essential role in understanding the level of trade secret management in corporations. The standard management system further provides with improvement and solution for trade secret protection based on diagnosis. In addition, legalized Trade Secret Certification Service also levitates the burden of proof on corporation. South Korea’s experience in trade secret management could be a good example for Taiwan to follow.

Mainland China changes domestic regulation for game consoles

In 2000, the General Office of the State Council of the People’s Republic of China issued “the Notice on Launching a Special Campaign against Illegal Electronic Game Rooms”(國務院辦公廳轉發文化部等部門關於開展電子遊戲經營場所專項治理意見的通知). From then on, Mainland China has strictly enforced prohibition on gaming consoles, however in December 21, 2013, “the State Council released the Comprehensive Plan for the China (Shanghai) Pilot Free Trade Zone, the State Council’s Decision to Temporarily Adjust Relevant Administrative Laws and State Council Regulated Special Administrative Measures for Approval or Access in the China (Shanghai) Pilot Free Trade Zone”(國務院關於在中國(上海)自由貿易試驗區內暫時調整有關行政法規和國務院文件規定的行政審批或者准入特別管理措施的決定). As a result of the thirteen year long prohibition on game consoles, the development of the game consoles market has been limited in Mainland China, while mobile phone and online games have dominated the video games market in the country. Mainland China’s lifting of the ban on game consoles will lead to a reshuffling of the gaming market, and is certainly worth a deeper look. This following article will review the evolution of the gaming regulatory policy in Mainland China over the recent years, and identifies the changes and problems that may arise during the deregulation process. The sale of game consoles has been prohibited in Mainland China since 2000 According to “The Notice on Launching a Special Campaign against Illegal Electronic Game Rooms” issued by General Office of the State Council in 2000, “companies and individuals were prohibited from the manufacture or sale of game consoles, as well as the production or sale of related accessories”. As a result, the mobile game consoles and the television game consoles both lost their legitimacy in the video game industry in Mainland China. The stated intent of the ban against video arcades was to protect the youth and ensure public order. And yet, in spite of potentially impacting youth in a similar manner, the online game sector has been listed as a key industry for development and has been strongly supported by the government. This has clearly contradicted the reason of banning the game consoles. Thus, the major console manufacturers, Sony, Microsoft, and Nintendo, have been trying in various ways to enter the Chinese market, and have called on the Mainland China government to open their domestic market for the sale of game consoles. Announcement of reopening the sale of game consoles in China (Shanghai) Free Trade Zone in 2013. After thirteen long years, the State Council issued the “the Comprehensive Plan for the China (Shanghai) Pilot Free Trade Zone”, permitting foreign enterprises to produce and sell game equipment in the Free Trade Zone. Five days later, Blockbuster that under Shanghai Media Group announced a cooperation with Microsoft in a joint venture company within the Free Trade Zone, claiming their main business as " design, development, production games, entertainment applications and derivative products; sales, licensing, marketing and production for third-party games and entertainment applications software; technical advice and services related to video games ". In December 21, 2013, “the State Council released the Comprehensive Plan for the China (Shanghai) Pilot Free Trade Zone, the State Council’s Decision to Temporarily Adjust Relevant Administrative Laws and State Council Regulated Special Administrative Measures for Approval or Access in the China (Shanghai) Pilot Free Trade Zone”, officially lifted the prohibition on game consoles in the Free Trade Zone, and also opened the gates to investors. Potential problems facing China’s game consoles market As the case study above describes, Microsoft chose to enter the Mainland China market through a joint venture, the main reason being that foreign investment in entities engaged in internet data operations is still prohibited in China (Shanghai) Free Trade Zone. Thus, Microsoft will need to rely heavily on Blockbuster for the data operation and set-top box business license, which was the main subject as the Internet service content provider. In addition, apart from the joint venture between Blockbuster and Microsoft, there are two other companies in the industry: Sony and Nintendo, which retain a large part of the game consoles market, but have not taken action at the moment. These two companies have a pivotal position in the game consoles industry, and therefore it is predicted they will likely follow the Blockbuster and Microsoft example to look for a license holder vendor as a way to enter the mainland China market. On the other hand, at the end of June 2014 the updated announcement regarding the China (Shanghai) Free Trade Zone “negative list”, still clearly stated that foreign enterprises in the Free Trade Zone are “prohibited from direct or indirect participation in online game operations and services”. Due to the trend among game consoles towards online connectivity, the classification of related games as online games, and prohibition of foreign enterprises from entering this space, domestic game developers have enjoyed a safe monopoly over the industry in Mainland China. But if the industry is not restricted under the scope of foreign operation of online games, and foreign enterprises may be allowed involvement in the management of their operations directly or indirectly, “fully localized” online game industry in Mainland China may be challenged in a noticeable way. In addition, although Mainland China has begun to loosen control over game consoles, the publication of electronic publications licensed by a foreign copyright owner (including online gaming works) will be determined under the General Administration of Press and Publication (新聞出版廣電總局). An enterprise who wishes to enter the Mainland China market has to create content which is able to pass a content review, at the same time maintaining the original integrity of the game. Moreover, consumers in Mainland China have long been accustomed to "cheap" or "free" Internet games, so are they going to change their behavior and be willing to pay for their games? These are big obstacles to be overcome by the industry.

The Introduction to the Trade Secret Management System Standard

The Introduction to the Trade Secret Management System Standard 2024/02/06 The “Trade Secret Management System”, released by the Science & Technology Law Institute of Institute for Information Industry on March 1, 2023, is a standard to guide organizations developing a systematic trade secret management system in alignment with relevant regulations and their operation objectives. Its aim is to assist the organizations reducing the risks of trade secret leakage while improving organizational competitive advantages. The Trade Secret Management System standard provides a framework for organizations to design, implement, and continuously improve their trade secret management performance. As defined in Article 2 of the Trade Secrets Act, "trade secret" could be any method, technique, process, formula, program, design, or other information that may be used in the course of production, sales, or operations, meeting following requirements: 1. It is not known to persons generally involved in the information of this type; 2. It has economic value, actual or potential, due to its secretive nature; and 3. Its owner has taken reasonable measures to maintain its secrecy. The Trade Secret Management System standard comprises a total of 10 chapters. The following is a brief overview of each chapter: Chapter 1: This chapter indicates the standard is applicable to all organizations regardless of their types, sizes, and the products or services they provide. It mentions that the organization can determine their management approached to meet the requirements of the standard. Chapter 2: This chapter provides the definitions of specific terms used in the standard. Chapter 3: This chapter introduces the top management’s responsibility to ensure the establishment, continuous appropriateness, completeness, and effectiveness of the trade secret management system. Chapter 4: This chapter requires the organization to define the scope of its trade secrets and ensure the defined trade secrets can be identified. This chapter also requires organization set up the permission to restrict access to personnel who need to know or use the trade secrets. Chapter 5: This chapter introduces the organization shall control the use of trade secrets, including actions such as copying, destruction, etc. Additionally, organization shall preserve the records of the aforementioned use of trade secrets and detect if any abnormal usage exists. Chapter 6: This chapter discusses measures the organization shall take for internal personnel control. These measures include regular training on trade secret-related requirements, signing of confidentiality agreements, and various management actions the organization should take throughout the processes of personnel recruitment, employment, and departure. Chapter 7: This chapter demonstrates the organization’s management of environments, equipment and internet involving its trade secrets. It requires the implementation of access control measures for places where trade secrets are stored or processed. It also stipulates controls on the use of record media and devices which can access trade secrets, as well as controlling the transmission of trade secrets via network. Chapter 8: This chapter introduces the management measures the organization shall take when interacting with other parties. These measures include signing non-disclosure agreement (NDAs) with the party who will access trade secrets and requiring such party not to hold the trade secrets once the corporation ends. Chapter 9: This chapter introduces that the organization shall establish a trade secret dispute resolution procedure to prevent or mitigate damages to the organization caused by disputes. Chapter10: This chapter outlines the supervision and the improvement of the trade secret management system of the organization. Organizations can follow the standard to build their own trade secret management system based on the Plan-Do-Check-Act (PDCA) concept. The trade secret management system would include defining trade secrets to be managed, establishing protocols for the use of trade secrets, managing employees, controlling of internet, devices and environment related to trade secrets, regulating external activities, developing trade secret dispute resolution procedure, and regularly monitoring the effectiveness to improve trade secret management performance. This standard could serve as a benchmark for the organization or third parties to evaluate compliance with expected trade secret managements.

Recent Federal Decisions and Emerging Trends in U.S. Defend Trade Secrets Act Litigation

I. Introduction   The enactment of the Defend Trade Secrets Act of 2016[1] (the “DTSA”) marks a milestone in the recent development of trade secret law in the United States (“U.S.”).[2] Recent federal decisions and emerging trends in DTSA litigation regarding the following issues deserve the attention of Taiwanese companies who might be involved in DTSA litigation in U.S. federal courts (“federal courts”): (1) whether the DTSA displaces any other civil remedies provided by the existing trade secret laws; (2) whether a plaintiff should pay attention to any pleading standard when bringing a DTSA claim in federal court; (3) whether a federal court will easily grant an ex parte application for seizure order under the DTSA (an “ex parte seizure order”); and (4) whether the DTSA applies to trade secret misappropriations that occurred before the DTSA came into effect. This article provides insights into these developments and trends, and concludes with their implications at the end. II. The DTSA does not displace any other civil remedies provided by the existing trade secret laws, and federal courts may nonetheless turn to pre-DTSA laws and decisions for guidance   The DTSA states that it does not “preempt” or “displace” any other civil remedies provided by other federal and state laws for trade secret misappropriation.[3] Prior to the enactment of the DTSA, the civil protection and remedies of trade secrets in the U.S. have traditionally been provided under state laws.[4] The DTSA provides federal courts with original jurisdiction[5] over civil actions brought under the DTSA, giving trade secret owners an option to litigate trade secret claims in federal courts.[6] As a result, the DTSA adds a layer of protection for trade secrets and creates a federal path for plaintiffs to pursue civil remedies.[7]   Some commentators point out that federal courts, when hearing DTSA claims, construing DTSA provisions or analyzing DTSA claims, oftentimes turn to state laws and decisions existing prior to the enactment of the DTSA for guidance.[8] Various decisions show that federal courts tend to look to local state laws and pre-DTSA decisions when hearing DTSA claims or making decisions.[9] This suggests that pre-DTSA trade secret laws and prior decisions remain an indispensable reference for federal courts. III. A plaintiff should pay careful attention to the plausibility pleading standard when bringing a DTSA claim in federal court   A plaintiff's pleading in his complaint must satisfy the plausibility pleading standard when the plaintiff brings a DTSA claim in federal court.[10] Otherwise, the plaintiff's complaint may be dismissed by the federal court.[11] Filing a motion requesting dismissal of the plaintiff's complaint[12] on the grounds of the plaintiff's failure of stating plausible claims for relief is thus a defense that a defendant may employ to defeat the plaintiff's claim in the early stage.[13]   The DTSA opens the door of federal courts to trade secret plaintiffs to pursue civil remedies,[14] but the DTSA does not “guarantee unfettered access to the federal courts.”[15] When filing a DTSA lawsuit in federal court, a plaintiff must state “the grounds for the court's jurisdiction,” the plaintiff's claims (entitlement to relief), and the plaintiff's “demand for the relief sought” in his complaint.[16] The claim and statement pled by the plaintiff in his complaint must meet the “plausibility” threshold.[17] In other words, at the pleading stage, a plaintiff should plead facts sufficiently demonstrating that all prerequisites of his claim (e.g., jurisdiction and venue,[18] elements of a claim required by the DTSA,[19] etc.) are satisfied when bringing a DTSA claim in federal court.[20] For instance, in addition to claiming the existence of his trade secret, a plaintiff should state how his trade secret was misappropriated through improper means.[21] However, in the context of trade secrets, the plausibility pleading standard can be challenging to a plaintiff because it is never easy to balance between “satisfying the required pleading standard” and “avoiding disclosing too much information about the trade secret in a pleading.”[22]   Let's take pleading the existence of a trade secret as an example. Under the plausibility pleading regime, a plaintiff is required to plead all relevant facts of trade secret (elements)[23] defined by the DTSA to affirmatively prove the existence of his trade secret.[24] In other words, a plaintiff needs to state sufficient facts indicating that the information in dispute has economic value while not being known to the public, and reasonable steps have been taken to maintain the secrecy of that information,[25] all of which plausibly suggest that the information in dispute qualifies as a trade secret.[26] Federal courts do not require a plaintiff to disclose his trade secret in detail in his complaint.[27] Nevertheless, a plaintiff should be able to provide the “general contour” of the alleged trade secret that he seeks to protect.[28] Federal courts would be reluctant to see that a plaintiff, merely “identify[ing] a kind of technology” or “point[ing] to broad areas of technology,” or barely asserting that the misappropriated information is confidential, then “invit[ing] the court to hunt through the details in search of items meeting the statutory definition.”[29] Instead of simply alleging that the subject matter at issue involves a trade secret, a plaintiff's complaint should contain descriptions identifying the plaintiff's trade secret.[30] For instance, in his pleading, a plaintiff has to tell what information is involved and what efforts have been made to maintain the confidentiality of such information.[31] For further example, a plaintiff should provide documents or information constituting the alleged trade secret rather than merely listing general topics or categories of information.[32] IV. Obtaining a DTSA ex parte seizure order is challenging as federal courts tend to take a conservative approach to prevent abuse of this ex parte seizure remedy   Since the DTSA came into effect, federal courts rarely grant an ex parte application for seizure order under the DTSA.[33] The provision for ex parte seizure orders is a controversial part of the DTSA[34] as it allows a court, upon ex parte application and if all DTSA requirements are met, to issue a civil order “for the seizure of property necessary to prevent the propagation or dissemination of the trade secret.”[35] So far federal courts have been hesitant to order DTSA ex parte seizures and are giving great deference to the statutory text of the DTSA seizure order provision.[36] Only when a federal court finds it “clearly appears from specific facts” that certain requirements are met[37] and only in “extraordinary circumstances”[38] may a federal court issue an ex parte seizure order.[39] When being confronted with an ex parte application for seizure order under the DTSA, federal courts tend to favor a conservative approach to prevent the abuse of this ex parte seizure remedy.[40] If any alternative equitable relief is available to achieve the same purpose, federal courts will likely find it unnecessary to issue an ex parte seizure order.[41] In addition, a plaintiff's mere assertion that the defendant, if given notice, would destroy evidence or evade a court order, but without showing that the defendant “had concealed evidence or disregarded court orders in the past,” will likely be insufficient to persuade the court to issue an ex parte seizure order.[42] Furthermore, federal courts will decline to order an ex parte seizure if a plaintiff fails to meet his burden demonstrating that the information in dispute constitutes a trade secret.[43] All of the foregoing suggests that one will likely face an uphill struggle in federal court when seeking to obtain an ex parte seizure order under the DTSA.[44]   Though federal courts sparingly order DTSA ex parte seizures, to date at least one federal court did issue a published DTSA ex parte seizure order, which appeared in Mission Capital Advisors, LLC v. Romaka.[45] In Romaka, the defendant allegedly downloaded the plaintiff's client and contact lists to the defendant's personal computer without the plaintiff's authorization; the plaintiff filed an ex parte motion seeking to seize some properties containing the plaintiff's trade secrets or enjoin the defendant from disclosing that information.[46] During the trial, the defendant neither acknowledged receipt of the court's prior orders[47] nor appeared before the court as ordered,[48] all of which together with other facts in Romaka convinced the court that other forms of equitable relief would be inadequate and the defendant would likely evade or otherwise disobey the court order.[49] After reviewing the facts of this case along with DTSA requirements item by item, the Romaka court found it clearly appears from specific facts that all requirements for an ex parte seizure order under the DTSA are met,[50] and thus, issued a said seizure order as requested by the plaintiff.[51] Romaka gives us some hints about what circumstances would cause a federal court to order a DTSA ex parte seizure.[52] This case tells us that evading or disregarding court-mandated actions is likely demonstrating to the court a propensity to disobey a future court order and may probably increase the likelihood of meriting a DTSA ex parte seizure order.[53] Moreover, echoing other decisions rendered by federal courts, Romaka reveals that federal courts tend to approach ex parte seizure order applications in a gingerly way.[54]   Federal courts take a conservative approach toward ex parte seizure order to curtail abuse of such order[55] does not mean that no injunctive relief is available to victims of trade secret misappropriation. Injunctive relief provided by other federal laws or state laws[56] is nonetheless available to those victims.[57] As long as the facts of the case before the court meet all elements required for injunctive relief, it is not rare for federal courts to grant injunctive relief other than an ex parte seizure order.[58] V. The DTSA might apply to a pre-DTSA trade secret misappropriation that continues after the DTSA became effective   The DTSA expressly states that it applies to any trade secret misappropriation that “occurs on or after the date of the enactment” of the DTSA.[59] Therefore, the DTSA does not apply to trade secret misappropriations that began and ended before the effective date of DTSA.[60] In practice, it is possible that a federal court will dismiss a plaintiff's DTSA claim if the plaintiff fails to state that the alleged trade secret misappropriations (either in whole or in part) took place after the DTSA came into effect.[61]   Federal courts have begun addressing or recognizing that the DTSA might apply to trade secret misappropriations that occurred prior to and continued after the enactment date of the DTSA.[62] However, a plaintiff should “plausibly” and “sufficiently” plead in his claim that some parts of the alleged continuing misappropriation of trade secrets occurred after the DTSA became effective.[63] Some critics opine that, in the case of a continuing trade secret misappropriation that took place before and continued after the DTSA was enacted, the available recovery shall be limited to “post-DTSA misappropriation.”[64]   By being mindful of the foregoing, maybe someday a plaintiff will bring a DTSA claim for a pre-DTSA misappropriation of trade secrets that continues after the DTSA is in effect.[65] In this kind of litigation, one should pay attention to whether the plaintiff has plausibly and sufficiently alleged the part of misappropriation that occurred after the enactment date of the DTSA.[66] When a plaintiff fails to plausibly and sufficiently alleges the post-DTSA misappropriation part, the defendant stands a chance to convince the court to dismiss the plaintiff's claim.[67] VI. Conclusion   To sum up, recent federal decisions and emerging trends in DTSA litigation provide the following implications to Taiwanese companies who might be involved in DTSA litigation in federal court: 1. The DTSA does not preempt or displace any other civil remedies provided by other federal laws and state laws.[68] Rather, the DTSA adds a layer of protection for trade secrets and creates a federal path for plaintiffs to pursue civil remedies.[69] Federal courts tend to turn to local state laws and pre-DTSA decisions for guidance when hearing DTSA claims or making decisions.[70] Do not ignore pre-DTSA trade secret laws or prior decisions as they remain an indispensable reference for federal court. 2. A plaintiff's pleading must satisfy the plausibility pleading standard when the plaintiff brings a DTSA claim in federal court.[71] Whether the plaintiff's pleading satisfies the plausibility pleading standard is likely one of the hard-fought battles between the parties in the early stage of the litigation. The plausibility pleading regime does not require a plaintiff to disclose his trade secrets in detail in his complaint.[72] However, a plaintiff should be able to describe and identify his trade secrets.[73] 3. Seeking to secure a DTSA ex parte seizure order in federal court will likely face an uphill battle.[74] Obtaining alternative injunctive relief would be easier than obtaining a DTSA ex parte seizure. When being confronted with an ex parte application for seizure order under the DTSA, federal courts tend to favor a conservative approach to prevent the abuse of this ex parte seizure remedy.[75] Notwithstanding the foregoing, as long as the facts of the case before the court meet all elements required for injunctive relief, it is not rare for federal courts to grant injunctive relief other than an ex parte seizure order.[76] 4. The DTSA might apply to trade secret misappropriations that occurred prior to and continued after the enactment date of the DTSA.[77] When a DTSA litigation involves this kind of continuing misappropriation, one of those hard-fought battles between the parties during litigation will likely be whether the plaintiff has plausibly and sufficiently stated the part of misappropriation that occurred after the DTSA came into effect.[78] When a plaintiff fails to plausibly and sufficiently alleges the post-DTSA misappropriation part, the defendant stands a chance to convince the court to dismiss the plaintiff's claim.[79] [1] The Defend Trade Secrets Act of 2016, Pub. L. No. 114-153, 130 Stat. 376 (May 11, 2016) (mostly codified in scattered sections of 18 U.S.C. §§1836-1839 [hereinafter the “DTSA”]. [2] Mark L. Krotoski, Greta L. Burkholder, Jenny Harrison & Corey R. Houmand, The Landmark Defend Trade Secrets Act of 2016, at 3 (May 2016); Bradford K. Newman, Jessica Mendelson & MiRi Song, The Defend Trade Secret Act: One Year Later, 2017-Apr Bus. L. Today 1, 1 (2017). [3] 18 U.S.C. §1838. [4] S. Rep. No. 114-220, at 2 (2016) [hereinafter “S. Rep.”]; Kaylee Beauchamp, The Failures of Federalizing Trade Secrets: Why the Defend Trade Secrets Act of 2016 Should Preempt State Law, 86 Miss. L.J. 1031, 1033, 1045 (2017); Zoe Argento, Killing the Golden Goose: The Dangers of Strengthening Domestic Trade Secret Rights in Response to Cyber-Misappropriation, 16 Yale J. L. & Tech. 172, 177 (2014); James Pooley, The Myth of the Trade Secret Troll: Why the Defend Trade Secrets Act Improves the Protection of Commercial Information, 23 Geo. Mason L. Rev. 1045, 1045 (2016); John Conley, New Federal Trade Secret Act and Its Impact on Life Sciences, Genomics L. Rep. (Aug. 12, 2016), https://www.genomicslawreport.com/index.php/2016/08/12/new-federal-trade-secret-act-and-its-impact-on-life-sciences/; Newman, Mendelson & Song, supra note 2, at 1. [5] 18 U.S.C. §1836(c). [6] Krotoski, Burkholder, Harrison & Houmand, supra note 2, at 7; Beauchamp, supra note 4, at 1033, 1045, 1072; Lily Li & Andrea W. Paris, Help! What Are My (Immediate) Defenses to a Federal Trade Secret Claim?, 58-Sep Orange County Law. 52, 52 (2016); Newman, Mendelson & Song, supra note 2, at 1. [7] Conley, supra note 4. [8] William M. Hensley, Post-Enactment Case Law Developments under the Defend Trade Secrets Act, 59-Jul Orange County Law. 42, 44 (2017); Robert B. Milligan & Daniel Joshua Salinas, Emerging Issues In the Defend Trade Secrets Act's Second Year, Seyfarth Shaw LLP: Trading Secrets (June 14, 2017), https://www.tradesecretslaw.com/2017/06/articles/dtsa/emerging-issues-in-the-defend-trade-secrets-acts-second-year/; Jeffrey S. Boxer, John M. Griem, Jr., Alexander G. Malyshev & Dylan L. Ruffi, The Defend Trade Secrets Act – 2016 In Review, Carter Ledyard & Milburn LLP (Jan. 19, 2017), http://www.clm.com/publication.cfm?ID=5579; Rajiv Dharnidharka, Andrew D. Day & Deborah E. McCrimmon, The Defend Trade Secrets Act One Year In – Four Things We've Learned, DLA Piper (May 30, 2017), https://www.dlapiper.com/en/us/insights/publications/2017/05/defend-trade-secrets-act-four-things-learned/; Joshua R. Rich, The DTSA After One Year: Has the Federal Trade Secrets Law Met Expectations?, McDonnell Boehnen Hulbert & Berghoff LLP, Vol. 15 Issue 3 Snippets 6, 7 (Summer 2017). [9] HealthBanc International, LLC v. Synergy Worldwide, 208 F.Supp.3d 1193, 1201 (D.Utah 2016); Phyllis Schlafly Revocable Trust v. Cori, No. 4:16CV01631 JAR, 2016 WL 6611133, at *2-5 (E.D. Mo. Nov. 9, 2016); Panera, LLC v. Nettles, No. 4:16-cv-1181-JAR, 2016 WL 4124114, at *4 fn.2 (E.D. Mo. Aug. 3, 2016); Henry Schein, Inc. v. Cook, 191 F.Supp.3d 1072, 1077, 1079-1080 (N.D.Cal. 2016); Engility Corp. v. Daniels, No. 16-cv-2473-WJM-MEH, 2016 WL 7034976, at *8-10 (D. Colo. Dec. 2, 2016); M.C. Dean, Inc. v. City of Miami Beach, Florida, 199 F. Supp. 3d 1349, 1353-1357 (S.D. Fla. 2016); GTO Access Systems, LLC v. Ghost Controls, LLC, No. 4:16cv355-WS/CAS, 2016 WL 4059706, at *1 fn.1, *2-4 (N.D. Fla. June 20, 2016); Earthbound Corp. v. MiTek USA, Inc., No. C16-1150 RSM, 2016 WL 4418013, at *9-10 (W.D. Wash. Aug. 19, 2016); Kuryakyn Holdings, LLC v. Ciro, LLC, 242 F.Supp.3d 789, 797-800 (W.D. Wisc. 2017). [10] Michelle Evans, Plausibility under the Defend Trade Secrets Act, 16 J. Marshall Rev. Intell. Prop. L. 188, 190 (2017); Eric J. Fues, Maximilienne Giannelli & Jon T. Self, Practice Tips for the Trade Secret Holder: Preparing a Complaint Under the Defend Trade Secrets Act, Inside Counsel (June 14, 2017), https://www.finnegan.com/en/insights/practice-tips-for-the-trade-secret-holder-preparing-a-complaint.html; David R. Fertig & Michael A. Betts, The Defend Trade Secrets Act: Jurisdictional Considerations—Part I, 29 No. 7 Intell. Prop. & Tech. L.J. 3, 3-5 (2017) [hereinafter “Considerations—Part I”]. [11] M.C. Dean, 199 F. Supp. 3d at 1357; Chatterplug, Inc. v. Digital Intent, LLC, No. 1:16-cv-4056, 2016 WL 6395409, at *3 (N.D. Ill. Oct. 28, 2016); Raben Tire Co. v. McFarland, No. 5:16-CV-00141-TBR, 2017 WL 741569, at *2-3 (W.D. Ky. Feb. 24, 2017). [12] Fed. R. Civ. P. 12(b). [13] Jessica Engler, The Defend Trade Secrets Act at Year One, 12 No. 4 In-House Def. Q. 20, 22 (2017). [14] Conley, supra note 4. [15] Fertig & Betts, Considerations—Part I, supra note 10, at 3. [16] Pleading the grounds for the court's jurisdiction, the plaintiff's claim (entitlement to relief), and the plaintiff's demand for the relief sought are requirements for the pleading under Article 8 of the Federal Rules of Civil Procedure (the “FRCP”). Fed. R. Civ. P. 8(a). The FRCP applies to “all civil actions and proceedings in the United States district courts.” Fed. R. Civ. P. 1. Thus, the FRCP requirements also apply to DTSA civil actions brought in federal courts. Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-4. [17] In Bell Atlantic Corporation v. Twombly, the U.S. Supreme Court interpreted Article 8(a) of the FRCP, introduced the concept of “plausibility pleading,” and established the plausibility pleading standard. Bell Atlantic Corporation v. Twombly, 550 U.S. 544, 547, 570 (2007). Under the plausibility pleading standard, a plaintiff is not required to provide “detailed factual allegations” in his complaint, but he needs to state the grounds of his claim (entitlement to relief), which should be “more than labels and conclusions.” Id. at 555, 570. At least, the plaintiff's complaint should contain enough facts showing that the plaintiff's claim is “plausible on its face.” Id. Two years after Twombly, in Ashcroft v. Iqbal the U.S. Supreme Court expressly affirmed that the plausibility pleading standard established in Twombly applies to “all civil actions.” Ashcroft v. Iqbal, 556 U.S. 662, 684 (2009). Accordingly, the plausibility pleading standard applies to all DTSA claims brought in federal courts. Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. It is worth mentioning that some commentators are of the opinion that federal pleading stands are often higher than those required under state laws. Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [18] Gold Medal Prods. Co. v. Bell Flavors & Fragrances, Inc., No. 1:16-CV-00365, 2017 WL 1365798, at *5-8 (S.D. Ohio, Apr. 14, 2017). See also Fertig & Betts, Considerations—Part I, supra note 10, at 4; David R. Fertig & Michael A. Betts, The Defend Trade Secrets Act: Jurisdictional Considerations—Part II, 29 No. 8 Intell. Prop. & Tech. L.J. 12, 12 (2017) [hereinafter “Considerations—Part II”]. [19] McFarland, 2017 WL 741569, at *2-3; M.C. Dean, 199 F. Supp. 3d at 1357; Digital Intent, 2016 WL 6395409, at *3. See also Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. [20] Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 5; Fertig & Betts, Considerations—Part II, supra note 18, at 13-14. [21] Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [22] Id. [23] 18 U.S.C. §1839(3). [24] McFarland, 2017 WL 741569, at *2. [25] Fues, Giannelli & Self, supra note 10. [26] Engler, supra note 13, at 21-22. Providing help in identifying the trade secret in question by requesting as much detail as possible is a common point shared by the plausibility pleading standard in the U.S., and the “Case Detail Explanation Form” (to be filled out by the complainant or the victim) attached to Article 6 of the “Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority” in Taiwan. However, they apply to different circumstances: 1. The plausibility pleading standard in the U.S. sets forth the threshold requirements to be met by a plaintiff in his pleading when the plaintiff brings a civil claim in federal court and applies to all federal civil actions. On the other hand, the aforementioned Case Detail Explanation Form in Taiwan is a form to be filled out by the complainant or the complainant's agent. This Form provides a reference to prosecutors for the investigation of major trade secret cases (criminal cases), but it does not serve as the basis for a prosecutor to determine whether to prosecute a case. 2. The plausibility pleading standard is not only followed by those bringing a federal civil action but also adopted by federal courts when hearing civil cases. Contrarily, the aforementioned Case Detail Explanation Form in Taiwan is provided to prosecutors as a reference for investigation. A prosecutor is not bound to prosecute a case simply based on the information provided in this Form. Likewise, this Form and the information provided therein are not binding on any court in Taiwan. A commentator noted that the Ministry of Justice in Taiwan referred to the “Prosecuting Intellectual Property Crimes (Manual)” of the U.S. Department of Justice when adopting the “Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority” on April 19, 2016. “Article 6 indicates that the complainant or the victim should first fill out the Case Detail Explanation Form, which would help the prosecution authority not only figures out whether the allegedly misappropriated trade secret meets the elements of secrecy, economic value, and secrecy measures under law, but also evaluates whether it is necessary to resort to compulsive measures”. Ti-Chu Chen (陳砥柱), Guideline for Handling Major Trade Secret Cases in the Prosecuting Authority, Louis & Charles Attorneys at Law (遠東萬佳法律事務所) (July 14, 2016), http://www.louisilf.com/zh-tw/posts/2016-07-14 (last visited Dec. 31, 2017). See also Prosecuting Intellectual Property Crimes (Manual) (4th ed. 2013), available at: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/03/26/prosecuting_ip_crimes_manual_2013.pdf. However, the cover of the “Prosecuting Intellectual Property Crimes (Manual)” expressly states that its contents are provided as “internal suggestion to Department of Justice attorneys.” Id. Therefore, the contents of this manual theoretically are not binding on any federal court. [27] Mission Measurement Corp. v. Blackbaud, Inc, 216 F.Supp.3d 915, 921 (N.D.Ill. 2016). [28] Digital Intent, 2016 WL 6395409, at *3. [29] McFarland, 2017 WL 741569, at *2; Blackbaud, 216 F.Supp.3d at 921; Ciro, 242 F.Supp.3d at 798. [30] Evans, supra note 10, at 191. Some federal court decisions show that requesting the plaintiff to provide sufficient facts describing the trade secret in question is not something newly developed following the enactment of the DTSA. Rather, it has been the position held by federal courts before the DTSA came into effect. AWP, Inc. v. Commonwealth Excavating, Inc., Civil Action No. 5:13cv031., 2013 WL 3830500, at *5 (W.D. Va. July 24, 2013); Events Media Network, Inc. v. Weather Channel Interactive, Inc., Civil No. 1:13–03 (RBK/AMD), 2013 WL 3658823, at *3 (D. N.J. July 12, 2013); Council for Educational Travel, USA v. Czopek, Civil No. 1:11–CV–00672, 2011 WL 3882474, at *4 (M.D. Pa. Sept. 2, 2011); DLC DermaCare LLC v. Castillo, No. CV–10–333–PHX–DGC, 2010 WL 5148073, at *4 (D. Ariz. Dec. 14, 2010). [31] Blackbaud, 216 F.Supp.3d at 921. [32] Ciro, 242 F.Supp.3d at 800. [33] Engler, supra note 13, at 21; Hensley, supra note 8, at 44. [34] Hensley, supra note 8, at 44; Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Engler, supra note 13, at 20. [35] 18 U.S.C. §1836(b)(2)(A). [36] Newman, Mendelson & Song, supra note 2, at 3. [37] Under the DTSA, a court may, only in “extraordinary circumstances,” issue an ex parte seizure order when “find[ing] that it clearly appears from specific facts that”: (1) “an order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate to achieve the purpose of this paragraph because the party to which the order would be issued would evade, avoid, or otherwise not comply with such an order;” (2) “an immediate and irreparable injury will occur if such seizure order is not issued;” (3) “the harm to the applicant of denying the application outweighs the harm to the legitimate interests of the person against whom seizure would be ordered of granting the application and substantially outweighs the harm to any third parties who may be harmed by such seizure;” (4) “the applicant is likely to succeed in showing that the information is a trade secret and the person against whom seizure would be ordered misappropriated the trade secret of the applicant by improper means or conspired to use improper means to misappropriate the trade secret of the applicant;” (5) “the person against whom seizure would be ordered has actual possession of the trade secret and any property to be seized;” (6) “the application describes with reasonably particularity the matter to be seized and, to the extent reasonable under the circumstances, identifies the location where the matter is to be seized;” (7) “the person against whom seizure would be ordered, or persons acting in concert with such person would destroy, move, hide, or otherwise make such matter inaccessible to the court, if the applicant were to proceed on notice to such person;” and (8) “the applicant has not publicized the requested seizure”. 18 U.S.C. §1836(b)(2)(A)(ii). [38] 18 U.S.C. §1836(b)(2)(A)(i). [39] Engler, supra note 13, at 21; Michael T. Renaud & Nick Armington, DTSA and Ex Parte Seizure – Lessons from the First Ex Parte Seizure Under The DTSA, Mintz Levin Cohn Ferris Glovsky and Popeo PC (Aug. 21, 2017), https://www.globalipmatters.com/2017/08/21/dtsa-and-ex-parte-seizure-lessons-from-the-first-ex-parte-seizure-under-the-dtsa; Matthew Werdegar & Warren Braunig, One Year On: the Federal Defend Trade Secrets Act, Daily J. (Apr. 26, 2017), available at: https://www.keker.com/Templates/media/files/Articles/Keker%20(DJ-4_26_17).pdf. [40] Newman, Mendelson & Song, supra note 2, at 3; Dharnidharka, Day & McCrimmon, supra note 8; Werdegar & Braunig, supra note 39. [41] OOO Brunswick Rail Mgmt. v. Sultanov, No. 5:17-cv-00017, 2017 WL 67119, *2 (N.D. Cal., Jan. 6, 2017); Magnesita Refractories Company v. Mishra, CAUSE NO. 2:16-CV-524-PPS-JEM, 2017 WL 365619, at *2 (N.D. Ind. Jan. 25, 2017). [42] Baleriz Carribean Ltd. Corp. v. Calvo, Case 1:16-cv-23300-KMW, at 7 (S.D.Fla. Aug. 5, 2016). See also Renaud & Armington, supra note 39. A commentator opines that federal courts are reluctant to issue an ex parte seizure order against someone who has never concealed evidence or disregarded court orders before. Engler, supra note 13, at 21. [43] Digital Assurance Certification, LLC v. Pendolino, Case No: 6:17-cv-72-Orl-31TBS, at *1-2 (M.D.Fla. Jan. 23, 2017). [44] Engler, supra note 13, at 21; Dharnidharka, Day & McCrimmon, supra note 8. [45] Mission Capital Advisors, LLC v. Romaka, No. 16-cv-05878-LLS (S.D.N.Y. July 29, 2016). Some commentators consider Romaka the very first case in which a federal court ordered a DTSA ex parte seizure after the DTSA became effective. Renaud & Armington, supra note 39. [46] Romaka, No. 16-cv-05878-LLS, at 1-3. [47] Id. at 2. [48] Id. [49] Id. [50] In Romaka, the federal district court found the followings after reviewing the facts of this case along with the requirements under the DTSA: (1) “[a]n order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate because [the defendant] would evade, avoid, or otherwise not comply with such an order;” (2) “[a]n immediate and irreparable injury to [the plaintiff] would occur if such seizure is not ordered;” (3) “[t]he harm to [the plaintiff] of denying the application outweighs the harm to the legitimate interests of [the defendant];” (4) “[the plaintiff] is likely to succeed in showing that the information at issue is a trade secret based on [the plaintiff's] averments;” (5) “[the plaintiff] is likely to succeed in showing that [the defendant] has misappropriated [the plaintiff's trade secret] by improper means;” (6) “[the plaintiff] is likely to succeed in showing that the [defendant] has actual possession of the [plaintiff's trade secrets]; (7) “[d]espit the risk that [the defendant] would make the [plaintiff's trade secret] inaccessible to the court, or retain unauthorized copies, [the plaintiff] is proceeding on notice;” and (8) “[the plaintiff] is likely to succeed in showing, and has represented, that it has not publicized the requested seizure.” Id. at 2-4. [51] Id. at 4. In Romaka, the plaintiff also applied for the seizure of its proprietary information other than its client and contact lists. However, the Romaka court denied the plaintiff's request for the seizure of other proprietary information because the plaintiff failed to describe “with sufficient particularity” such information and related facts, such as “confidentiality and irreparable harm.” Id. [52] Renaud & Armington, supra note 39. [53] Id. [54] Newman, Mendelson & Song, supra note 2, at 3; Engler, supra note 13, at 21; Renaud & Armington, supra note 39. [55] Newman, Mendelson & Song, supra note 2, at 3. [56] For instance, the injunctive remedies available under the DTSA. 18 U.S.C. §1836(b)(3). For further example, a preliminary injunction or a temporary restraining order available under the FRCP. Fed. R. Civ. P. 65(a), (b). [57] As stated above, the DTSA does not preempt or displace any other remedies provided by other federal laws and state laws for trade secret misappropriation. 18 U.S.C. §1838. [58] Cook, 191 F.Supp.3d at 1077, 1076-1077, 1079; Daniels, 2016 WL 7034976, at *10-11, 14; Nettles, 2016 WL 4124114, at *4. See also Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [59] DTSA §2(e), Pub. L. No. 114-153, 130 Stat. 376, 381-382. [60] Werdegar & Braunig, supra note 39; Krotoski, Burkholder, Harrison & Houmand, supra note 2, at 14; Engler, supra note 13, at 21. [61] Avago Technologies U.S. Inc. v. Nanoprecision Products, Inc., Case No. 16-cv-03737-JCS, 2017 WL 412524, at *9 (N.D.Cal. Jan. 31, 2017); Cave Consulting Group, Inc. v. Truven Health Analytics Inc., Case No. 15-cv-02177-SI, 2017 WL 1436044, at *5 (N.D. Cal. Apr. 24, 2017); Physician's Surrogacy, Inc. v. German, Case No.: 17CV0718-MMA (WVG), 2017 WL 3622329, at *8-9 (S.D. Cal. Aug. 23, 2017). See also Tara C. Clancy, April Boyer & Michael R. Creta, Emerging Trends in Defend Trade Secrets Act Litigation, National Law Review (Sept. 26, 2017), https://www.natlawreview.com/article/emerging-trends-defend-trade-secrets-act-litigation; Milligan & Salinas, supra note 8. [62] Cook, 191 F.Supp.3d at 1076-1079; Allstate Insurance Company v. Rote, No. 3:16-cv-01432-HZ, 2016 WL 4191015, at *1-5 (D. Or. Aug. 7, 2016); Syntel Sterling Best Shores Mauritius Limited v. Trizetto Group, Inc., 15-CV-211 (LGS) (RLE), 2016 WL 5338550, at *6 (S.D.N.Y. Sept. 23, 2016); Adams Arms, LLC v. Unified Weapon Systems, Inc., Case No. 8:16-cv-1503-T-33AEP, 2016 WL 5391394, at *6 (M.D. Fla. Sept. 27, 2016); Brand Energy & Infrastructure Services, Inc. v. Irex Contracting Group, CIVIL ACTION NO. 16-2499, 2017 WL 1105648, at *3-8 (E.D. Pa. Mar. 24, 2017); Sleekez, LLC v. Horton, CV 16–09–BLG–SPW–TJC, 2017 WL 1906957, at *5-6 (D. Mont. Apr. 21, 2017). See also Rich, supra note 8, at 8. [63] Unified Weapon Systems, 2016 WL 5391394, at *6; Horton, 2017 WL 1906957, at *5-6. See also Milligan & Salinas, supra note 8; Werdegar & Braunig, supra note 39. A recent federal court decision reveals that federal courts will likely dismiss a DTSA claim if a plaintiff makes no specific allegations other than a “conclusory allegation” of the continuing trade secret misappropriation. Hydrogen Master Rights, Ltd. v. Weston, 228 F.Supp.3d 320, 338 (D.Del. 2017). See also Engler, supra note 13, at 23. [64] Unified Weapon Systems, 2016 WL 5391394, at *6. See also Rich, supra note 8, at 8. [65] Engler, supra note 13, at 23. [66] Milligan & Salinas, supra note 8. [67] Engler, supra note 13, at 23. [68] 18 U.S.C. § 1838. [69] Conley, supra note 4. [70] Synergy Worldwide, 208 F.Supp.3d at 1201; Cori, 2016 WL 6611133, at *2-5; Nettles, 2016 WL 4124114, at *4 fn.2; Cook, 191 F.Supp.3d at 1077, 1079-1080; Daniels, 2016 WL 7034976, at *8-10; M.C. Dean, 199 F. Supp. 3d at 1353-1357; Ghost Controls, 2016 WL 4059706, at *1 fn.1, *2-4; MiTek USA, 2016 WL 4418013, at *9-10; Ciro, 242 F.Supp.3d at 797-800. [71] Evans, supra note 10, at 190; Fues, Giannelli & Self, supra note 10; Fertig & Betts, Considerations—Part I, supra note 10, at 3-5. [72] Blackbaud, 216 F.Supp.3d at 921. [73] Digital Intent, 2016 WL 6395409, at *3. See also Evans, supra note 10, at 191. [74] Engler, supra note 13, at 21; Dharnidharka, Day & McCrimmon, supra note 8. [75] Sultanov, 2017 WL 67119, at *2; Mishra, 2017 WL 365619, at *2; Calvo, Case 1:16-cv-23300-KMW, at 7; Pendolino, 2017 WL 320830, at *1-2. See also Newman, Mendelson & Song, supra note 2, at 3; Engler, supra note 13, at 21; Renaud & Armington, supra note 39; Werdegar & Braunig, supra note 39. [76] Newman, Mendelson & Song, supra note 2, at 2-3; Rich, supra note 8, at 6; Boxer, Griem, Jr., Malyshev & Ruffi, supra note 8. [77] Cook, 191 F.Supp.3d at 1076-1079; Rote, 2016 WL 4191015, at *1-5; Trizetto Group, 2016 WL 5338550, at *6; Unified Weapon Systems, 2016 WL 5391394, at *6; Irex Contracting Group, 2017 WL 1105648, at *3-8; Horton, 2017 WL 1906957, at *5-6. See also Rich, supra note 8, at 8. [78] Milligan & Salinas, supra note 8. [79] Engler, supra note 13, at 23.

TOP