Keeping the Best Kept Secrets: Mandatory Minimum

BYRDSONG FINAL
4/21/2015 7:19 PM
Keeping the Best Kept Secrets: Mandatory
Minimum Sentencing for Trade Secret
Theft Under the Economic Espionage Act
Danielle K. Byrdsong∗
ABSTRACT
On December 28, 2012, the Theft of Trade Secrets Clarification Act of
2012 (the Act) was enacted. The Act broadens the scope of the Economic
Espionage Act by providing more protection for trade secrets. Despite the
broadened scope of the Act, criminal penalties for trade secret theft may
still be inadequate given the constant threat U.S. corporations face in light
of the global landscape in which they do business. Mandatory minimum
sentencing for the theft of trade secrets could be a practicable solution to
this problem.
I.
INTRODUCTION
Legal protection for intellectual property rights has its roots in the U.S.
Constitution.1 New technologies have overcome traditional barriers to international business and global commerce by making it easier for criminals
to steal trade secrets from anywhere in the world.2 U.S. Attorney General
Eric Holder warned: “[t]here are only ‘two categories’ of companies affected by trade secret theft—‘those that know they’ve been compromised and
those that don’t know yet.’”3 Trade secret theft costs American companies
∗
Candidate for Juris Doctor, New England Law | Boston (2015); B.S., Biology,
Chemistry Minor, Simmons College (2007). I would like to thank my husband Jermaine and
my mother Feleshia for their unwavering love and support.
1.
See U.S. CONST. art. I, § 8, cl. 8 (stating that Congress shall have the power “[t]o
promote the Progress of Science and useful Arts, by securing for limited Times to Authors
and Inventors the exclusive Right to their respective Writings and Discoveries”).
2.
Attorney General Eric Holder Speaks at the Administration Trade Secret Strategy
Rollout, U.S. DEPARTMENT OF JUST. (Feb. 20, 2013), http://www.justice.gov/iso/opa/
ag/speeches/2013/ag-speech-1302201.html [hereinafter Attorney General Holder Speaks].
3.
Id.
421
BYRDSONG FINAL
422
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
billions of dollars every year.4 Trade secret theft can also force companies
to “lay off employees, to close factories, to lose sales and profits, to experience a decline in competitive position and advantage—or even to go out of
business.”5
This Note explores the ways in which mandatory minimum sentences
could improve the effectiveness of the current protections against trade secret theft and argues that mandatory minimum sentences should be implemented as a criminal penalty for this type of crime. Part II of this Note provides a brief account of the history of mandatory minimum sentencing in
the U.S., the legislative history of the Economic Espionage Act (EEA), and
the Theft of Trade Secrets Clarification Act of 2012. Part III discusses the
importance of trade secret theft protection and provides an overview of the
current penalties for trade secret theft, while Part IV proposes a framework
in which mandatory minimum sentences can be used to supplement existing criminal penalties. Part V concludes that mandatory minimum sentencing for intellectual property crimes would become a useful weapon to combat trade secret theft.
II. THE HISTORY OF MANDATORY MINIMUM SENTENCING, THE
ECONOMIC ESPIONAGE ACT, AND THE THEFT OF TRADE SECRETS
CLARIFICATION ACT
Mandatory minimum sentences limit the discretion of a sentencing court
to impose a sentence that does not include a term of imprisonment or the
death penalty.6 There are generally three types of mandatory minimum sentences.7 The first type requires that the defendant serve “not less than” a
specified prison term, and may be triggered by the nature of the offense or
the offender’s criminal record.8 The second type is governed by “flat or
single sentence statutes,” which generally require life imprisonment.9 The
third type are those that “piggyback” onto a sentence because they are imported to the offender’s sentence due to an underlying charge that imposes
4.
Eric E. Bensen, Bensen on the Economic Espionage Act & the Uniform Trade Secret Act, LEXISNEXIS LEGAL NEWSROOM: INTELL. PROP. (June 11, 2012),
www.lexisnexis.com/legalnewsroom/intellectual-property/b/copyright-trademark-lawblog/archive/2012/06/11/bensen-on-the-economic-espionage-act-amp-the-uniform-tradesecret-act.aspx; see also Hacked: How China Is Stealing America’s Business Secrets,
THEWEEK (Feb. 16, 2012), http://theweek.com/article/index/224521/hacked-how-china-isstealing-americas-business-secrets [hereinafter Hacked].
5.
Attorney General Holder Speaks, supra note 2.
6.
CHARLES DOYLE, CONG. RESEARCH SERV., FEDERAL MANDATORY MINIMUM
SENTENCING STATUTES 7 (2013), available at http://www.fas.org/sgp/crs/misc/RL32040.pdf.
7.
Id. at 2.
8.
Id.
9.
Id. at 3.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
423
a mandatory minimum sentence.10
The first Congress enacted several mandatory minimum sentences, each
a capital offense.11 These sentences reflected the character of early criminal
law—severity and discretion.12 Throughout the nineteenth and twentieth
centuries, the sentencing discretion of federal judges was uncontrolled.13
Beginning in the 1960s, criticism of this practice led to a modification of
the federal sentencing process, which culminated in the Sentencing Reform
Act of 1984.14 Although the Sentencing Reform Act of 1984 did not remove all sentencing discretion from federal courts, it did pave the way for
regulation by the U.S. Sentencing Commission.15 In 1987, the U.S. Sentencing Commission enacted the Federal Sentencing Guidelines (Guidelines) to create uniform sentences by establishing a clear and rigid sentencing structure with narrow ranges that judges must use to sentence
offenders.16 The Guidelines established a system in which the scale of the
severity of the crime intersects with the criminal history of the offender.17
The Supreme Court upheld the constitutionality of mandatory minimum
sentences against Eighth Amendment challenges that these types of sentences constitute cruel and unusual punishment.18 Courts continue to refine
the constitutional implications of mandatory minimum sentences. For example, in United States v. Nigg, the Seventh Circuit held that mandatory
minimum sentences do not violate a defendant’s Fifth Amendment due
process right to an individualized sentence or constitute cruel and unusual
punishment under the Eighth Amendment.19 In Alleyne v. United States, the
Supreme Court held that any fact that increases the statutory mandatory
minimum sentence needs to be an element of the crime that must be submitted to the jury and found beyond a reasonable doubt.20 Despite these
rulings, questions remain as to whether mandatory minimum sentences are
10.
11.
12.
13.
Id.
Id. at 5.
Id. at 4.
Evan Bernick & Paul J. Larkin, Jr., Reconsidering Mandatory Minimum Sentences: The Arguments for and Against Potential Reforms, HERITAGE FOUND. (Feb. 10, 2014),
http://www.heritage.org/research/reports/2014/02/reconsidering-mandatory-minimumsentences-the-arguments-for-and-against-potential-reforms.
14.
Id.
15.
Id.
16.
Ross Galin, Above the Law: The Prosecutor’s Duty to Seek Justice and the Performance of Substantial Assistance Agreements, 68 FORDHAM L. REV. 1245, 1245 (2000).
17.
Id. at 1251.
18.
Bernick & Larkin, supra note 13.
19.
See United States v. Nigg, 667 F.3d 929, 935 (7th Cir. 2012).
20.
See Alleyne v. United States, 133 S. Ct. 2151, 2156 (2013).
BYRDSONG FINAL
424
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
a judicious criminal justice policy.21
The EEA is a “hybrid form of legislation”—serving “both as a deterrent
to corporate competitors engaging in the theft of trade secrets and as a form
of national security legislation.”22 When signing the EEA into law, President Clinton remarked on the implications of the statute: “[t]rade secrets
are an integral part of virtually every sector of our economy and are essential to maintaining the health and competitiveness of critical industries operating in the United States. Economic espionage and trade secret theft
threaten our Nation’s national security and economic well-being.”23
The EEA was passed in 1996 to combat the increased threat to corporate
security from both international and domestic economic espionage, partly
brought on by former government spies who performed illicit work for
businesses in the private sector at the end of the Cold War.24 The purpose
of the EEA is to provide a comprehensive federal remedy for the theft of
trade secrets.25 The first and second provisions of the EEA’s nine provisions define the conduct that criminalizes the theft of trade secrets.26 Section 1831 criminalizes the theft of a trade secret for the benefit of “any foreign government, foreign instrumentality, or foreign agent.”27 Section
1832, on the other hand, broadly criminalizes the theft of a trade secret for
the benefit of anyone other than the owner.28
There are generally two types of trade secrets: customer lists and special
knowledge or information that relates to manufacturing or business operations.29 Trade secrets are defined as: “all forms and types of financial,
business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs,
prototypes, methods, techniques, processes, procedures, programs, or
codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing.”30 Classification as a trade secret requires that the
owner of the information actively “take[s] reasonable measures to keep
such information secret” and that “the information derives independent
21.
22.
Bernick & Larkin, supra note 13.
Jonathan Eric Lewis, The Economic Espionage Act and the Threat of Chinese Espionage in the United States, 8 CHI.-KENT J. INTELL. PROP. 189, 201 (2009).
23.
EXEC. OFFICE FOR U.S. ATTORNEYS, PROSECUTING INTELLECTUAL PROPERTY
CRIMES 157 (4th ed. 2013) [hereinafter PROSECUTING IP CRIMES].
24.
Bensen, supra note 4.
25.
Id.
26.
See 18 U.S.C.A. § 1831 (West 2013); 18 U.S.C.A § 1832 (West 2012).
27.
§ 1831.
28.
§ 1832.
29.
Linkco, Inc. v. Fujitsu Ltd., 230 F. Supp. 2d 492, 498 (S.D.N.Y. 2002).
30.
18 U.S.C.A. § 1839 (West 1996).
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
425
economic value, actual or potential, from not being generally known to,
and not being readily ascertainable through proper means by, the public.”31
The EEA was amended in 2012 in response to the Second Circuit’s decision in United States v. Aleynikov, where the court held that stolen computer source code was “purely intangible property” and not a trade secret under the EEA since it was not “related to or included in a product that is
produced for or placed in interstate or foreign commerce.”32 Congress
amended the language of the EEA to specifically address this loophole by
now providing that the theft of “a product or service used in or intended for
use in interstate or foreign commerce” is a violation of the Act.33 The
amendment to the EEA clarified its scope and resulted in the Theft of Trade
Secrets Clarification Act of 2012.34
While the EEA criminalizes the theft of trade secrets, it does not provide
any civil right of action.35 A party seeking civil remedies must pursue their
misappropriation claims under state law.36 Both the American Bar Association’s Intellectual Property Law Section and the Commission on the Theft
of American Intellectual Property have advocated for Congress to create a
federal civil cause of action for the misappropriation of trade secrets.37 In
2014, two bills were introduced to the House Judiciary Committee in support of a federal civil remedy for trade secret theft.38
31.
32.
Id.
United States v. Aleynikov, 676 F.3d 71, 74 (2d Cir. 2012); David S. Almeling,
Recent Trade Secret Reform—And What Else Needs to Change, LAW360 (Sept. 23, 2013,
11:24 AM), available at http://www.omm.com/files/upload/David%20Almeling%20Article
%20RE%20Trade%20Secret%20Reform.pdf.
33.
§ 1832; Theft of Trade Secrets Clarification Act of 2012, Pub. L. No. 112-236,
126 Stat. 1627 (2012).
34.
Theft of Trade Secrets Clarification Act of 2012, Pub. L. No. 112-236, 126 Stat.
1627 (2012).
35.
Jason C. Schwartz et al., 2013 Trade Secrets Litigation Round-Up, PAT.
TRADEMARK & COPYRIGHT J. 2 (BNA 2014).
36.
Id.
37.
Id.
38.
Archer & Greiner, United States: The Defend Trade Secrets Act of 2014: Bill
Would Grant Federal Protections To American Businesses, MONDAQ (June 13, 2014),
http://www.mondaq.com/unitedstates/x/320364/Trade+Secrets/The+Defend+Trade+Secrets
+Act+Of+2014+Bill+Would+Grant+Federal+Protections+To+American+Businesses; Tal
Kopan, Scoop: Trade Secrets Bill Today, POLITICO (July 29, 2014),
http://www.politico.com/morningcybersecurity/0714/morningcybersecurity14806.html; see
also Defend Trade Secrets Act of 2014, S. 2267, 113th Cong. (2014); Trade Secrets Protection Act of 2014, H.R. 5233, 113th Cong. (2014); Private Right of Action Against Theft of
Trade Secrets Act of 2013, H.R. 2466, 113th Cong. (2013).
BYRDSONG FINAL
426
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
III. TRADE SECRET THEFT
Trade secret theft frequently occurs in the United States in industries
with high concentrations of technology and research and development activities.39 The most visible fields that are targeted are: aerospace, biotechnology, computer software and hardware, transportation and engine technology, defense technology, telecommunications, energy research,
advanced materials and coatings, stealth technologies, lasers, manufacturing processes, and semiconductors.40 Victims of trade secret theft range
from unsophisticated corporate entities to corporate giants like DuPont,
Dow Chemical, Corning, Lockheed Martin, and Boeing.41
One major reason for the prevalence of trade secret theft is the almost
universal use of computers in daily business operations.42 The reliance on
computers and the Internet has enabled criminals to instantaneously steal
massive quantities of sensitive information while simultaneously evading
detection.43 For employees, the use of computers is one of the most innovative workplace transformations.44 For employers, computers in the workplace confer substantial benefits by allowing for greater connectivity between enterprises and individuals.45 Increased connectivity is a doubleedged sword. While the use of passwords, firewalls, and encryption to protect network data is certainly advised where applicable, these measures
cannot safeguard confidential and proprietary information in every instance.46
A. Is Trade Secret Theft Really a Big Deal?
“In order to protect American innovation globally, trading partners must
treat trade secret theft as a serious issue.”47 In Europe for instance, trade
secret theft often goes unpunished because of the lack of infrastructure to
39.
40.
41.
HEDIEH NASHERI, ECONOMIC ESPIONAGE AND INDUSTRIAL SPYING 8 (2005).
Id. at 9.
Id.; Peter J. Toren, An Analysis of Economic Espionage Act Prosecutions: What
Companies Can Learn From It and What the Government Should Be Doing About It!, PAT.
TRADEMARK & COPYRIGHT J. 7 (BNA 2012).
42.
NASHERI, supra note 39, at 9.
43.
PROSECUTING IP CRIMES, supra note 23, at 3.
44.
Thomas E. Booms, Note, Hacking into Federal Court: Employee “Authorization”
Under the Computer Fraud and Abuse Act, 13 VAND. J. ENT. & TECH. L. 543, 545 (2011).
45.
Id.
46.
Id.
47.
Administration Strategy on Mitigating the Theft of U.S. Trade Secrets, EXECUTIVE
OFF. OF THE PRESIDENT OF THE U.S. 3 (Feb. 2013), https://www.hsdl.org/?view&did=731453
[hereinafter Administration Strategy].
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
427
support adequate trade secret protection.48 Some European countries lack
the resources, investigative experience, and express statutory prohibitions
to protect against trade secret theft.49
Over the past year, the majority of criminal trade secret theft cases were
brought against Chinese nationals alleged to have stolen trade secrets for
the benefit of Chinese companies.50 In United States v. Cao, a grand jury in
the Southern District of Indiana returned a superseding indictment on August 14, 2013, against Guoqing Cao and Shuyu “Dan” Li for their alleged
multi-year plot to steal Eli Lilly trade secrets and transfer those secrets to
Jiangsu Hengrui Medicine Co., Ltd., one of Eli Lilly’s Chinese-based competitors located in Shanghai, China.51 Cao, Li, and an unnamed former Eli
Lilly scientist were charged with stealing nine separate trade secrets from
2011 to 2013 relating to Eli Lilly’s work on cardiovascular disease prevention, diabetes treatment, and cancer treatment.52 Cao and Li were accused
of downloading trade secret information allegedly worth $55 million dollars from their own Eli Lilly computers and emailing Eli Lilly’s trade secrets away through their own Eli Lilly email addresses.53
In United States v. Zhao, research scientist Hua Jun Zhao was charged
for the theft of an anti-cancer compound developed by his former employer, the Medical College of Wisconsin, in violation of the EEA.54 Zhao was
placed on administrative leave following the disappearance of three vials of
C-25, a cancer fighting powder worth $8000.55 After the suspension, Zhao
allegedly attempted to access his work computer in an effort to delete in48.
Joseph V. DeMarco, Europe’s Weaker Laws Against Trade Secret Theft Means
Corporate Espionage Often Goes Unpunished, BUS. INSIDER (Aug. 5, 2011),
http://www.businessinsider.com/europes-lack-of-trade-secret-theft-protection-laws-meanscoprorate-espionage-often-goes-unpunished-2011-8.
49.
Id.
50.
Schwartz et al., supra note 35, at 3.
51.
Justin K. Beyer, Two Former Eli Lilly Scientists Accused of Stealing $55 Million
in Trade Secrets on Behalf of Chinese Pharmaceutical Company in Southern District of Indiana Indictment, TRADESECRETSLAW (Oct. 28, 2013), http://www.tradesecretslaw.com/
2013/10/articles/trade-secrets/two-former-eli-lilly-scientists-accused-of-stealing-55-millionin-trade-secrets-on-behalf-of-chinese-pharmaceutical-company-in-southern-district-ofindiana-indictment/.
52.
Id.
53.
Id.
54.
Defendant Charged with Attempting to Damage a Protected Computer,
DEPARTMENT
OF
JUST.
(Apr.
11,
2013),
http://www.justice.gov/usao/wie/news/2013/pr20130411_Protected_Computer_Damage_Ch
arge.html [hereinafter Attempting to Damage a Protected Computer].
55.
Dinesh Ramde & M.L. Johnson, Prosecutor: Huajun Zhao, Medical College of
Wisconsin Researcher, Stole Cancer Data for China, HUFFINGTON POST (Apr. 2, 2013),
http://www.huffingtonpost.com/2013/04/02/huajun-zhao-china-cancer_n_2998777.html.
BYRDSONG FINAL
428
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
formation relating to the compound.56 On April 11, 2013, the Department
of Justice charged Zhao with computer fraud for tampering with a federally-protected computer and for lying to the Federal Bureau of Investigation
in connection with the ongoing EEA investigation.57 Zhao ultimately pled
guilty to the computer fraud charge and was sentenced to time served and
two years of supervised release.58
In United States v. Huang, the Defendants, Ji Li Huang and Xiao Guang
Qi, two Chinese nationals, pled guilty to stealing trade secrets from Pittsburgh Corning Corporation (Pittsburgh Corning) in January 2013.59 The
Defendants unsuccessfully attempted to pay $100,000 for stolen trade secrets for the purpose of opening a plant in China to compete with Pittsburgh Corning.60 After the Defendants were unable to physically access the
plant, they placed a newspaper ad soliciting someone with Pittsburgh Corning experience “to lead a project to build up a foam glass factory with continuous research on new formulas” in Asia.61 A Pittsburgh Corning employee cooperated with federal agents to correspond with the Defendants to
arrange a meeting for payment of the trade secrets.62 Huang was sentenced
to eighteen months imprisonment and assessed a $250,000 fine, while Qi
was sentenced to time served, assessed a $20,000 fine, and agreed to leave
the United States.63
In United States v. Liu, Sixing Liu, a Chinese national was sentenced in
March of 2013 to seventy months in prison after being convicted on charges that included unlawful possession of trade secrets and violations of the
Export Control Act.64 Prior to leaving his employment as a U.S. defense
contractor, Liu copied thousands of electronic files related to guidance systems for missiles, drones, and other airborne technology, and took them to
China.65 This case is now pending before the Third Circuit.66
China’s poor enforcement of foreign intellectual property interests is
considered a by-product of its reliance on administrative instead of criminal
56.
57.
58.
59.
60.
Schwartz et al., supra note 35, at 4.
Attempting to Damage a Protected Computer, supra note 54.
Schwartz et al., supra note 35, at 4.
Id.
Two Chinese Nationals Charged with Stealing Trade Secrets from Missouri Manufacturing Plant, FBI (Sept. 4, 2012), http://www.fbi.gov/kansascity/pressreleases/2012/two-chinese-nationals-charged-with-stealing-trade-secrets-from-missourimanufacturing-plant.
61.
Schwartz et al., supra note 35, at 4.
62.
Id.
63.
Id.
64.
Id.
65.
Id.
66.
Id.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
429
measures to combat intellectual property rights infringement, corruption,
and local protectionism at the provincial levels.67 Limited resources and
training available to enforcement officials, lack of public education regarding both the economic and social impact of intellectual property crimes, together with the protection of valuable Chinese research and development
are routinely cited as the reasons why China has not acted to protect foreign
intellectual property interests.68 The thrust of the Obama administration’s
efforts to counter trade secret theft has been directed toward China because
it is seen as the biggest threat with regard to foreign trade secret misappropriation.69 However, other recent cases show that trade secret theft was also
intended to benefit companies in India, the Dominican Republic, Korea,
South Africa, Israel, and Japan.70
B. Current Penalties for Trade Secret Theft
Title 18, section 1832 of the United States Code articulates a broad criminalization of the theft of trade secrets.71 Violations of section 1832 are
punishable by imprisonment for not more than ten years and/or a fine of not
more than $250,000 (not more than $500 million for organizations), or
both.72 The maximum fine may be higher depending on the amount of gain
or loss associated with the offense.73 Both sections 1831 and 1832 require
that the government “prove beyond a reasonable doubt that: (1) the defendant misappropriated information (or conspired or attempted to do so); (2)
the defendant knew or believed this information was proprietary and that he
had no claim to it; and (3) the information was in fact a trade secret.”74
Violations of the EEA are subject to the Mandatory Victims Restitution
Act of 1996 (MVRA).75 The MVRA applies to all convictions for, among
others, any “offense against property . . . including any offense committed
67.
Victoria F. Maroulis, China’s Evolving IP Regime and Avenues of Enforcement, in
DEFENDING INTELLECTUAL PROPERTY RIGHTS CASES IN CHINA: LEADING LAWYERS ON
PROTECTING CLIENTS’ RIGHTS IN CHINA’S EVOLVING IP ENVIRONMENT 1, 1 (2013), available
at 2013 WL 4192387.
68.
Id.
69.
Joshua R. Rich, Commentary, Obama Administration Focuses on Chinese Trade
Secret Misappropriation, WESTLAW J. COMPUTER & INTERNET (2013), available at
2013 WL 3466724, *5.
70.
Toren, supra note 41, at 6.
71.
18 U.S.C.A. § 1832 (West 1995).
72.
Id. § 1832(a)(5), (b).
73.
CHARLES DOYLE, CONG. RESEARCH SERV., STEALING TRADE SECRETS AND
ECONOMIC ESPIONAGE: AN OVERVIEW OF 18 U.S.C. 1831 AND 1832, at 6 (2013), available at
https://www.fas.org/sgp/crs/secrecy/R42681.pdf.
74.
PROSECUTING IP CRIMES, supra note 23, at 160.
75.
Lewis, supra note 22, at 225.
BYRDSONG FINAL
430
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
by fraud and deceit,” and “in which an identifiable victim or victims has
suffered a physical injury or pecuniary loss.”76 The MVRA requires in cases involving “damage to or loss or destruction of property of a victim of the
offense,” that a defendant return the property to its owner.77 If the return of
the property proves “impossible, impracticable, or inadequate,” the defendant is required to “to pay an amount equal to the property’s value on the
date of its damage, destruction, or loss, or its value at the time of sentencing, whichever is greater, less the value of any part of the property that is
returned.”78
Prior to the enactment of the EEA, federal prosecutors had difficulty tailoring trade secret cases to existing statutes so they relied on other instrumentalities of trade secret theft to prosecute these crimes.79 This was possible because section 1838 does not “preempt or displace any other remedies,
whether civil or criminal, provided by United States Federal, state, commonwealth, possession, or territory law for the misappropriation of a trade
secret.”80 As a result, defendants charged with trade secret theft are often
also indicted under the Computer Fraud and Abuse Act, the National Stolen
Property Act, and the Federal Wire Fraud Statute.81
C. Damage Determinations in Trade Secret Theft Cases
In contrast to other intellectual property crimes, for example as in copyright law, there are no statutory damages in trade secret theft cases; therefore, actual damages must be proven.82 Successful plaintiffs can elect one
of two measures of damages: the plaintiff’s losses or the defendant’s profits.83 The measure of plaintiff’s losses may include the cost of developing
the trade secret and any revenue the plaintiff would have made but for the
defendant’s misappropriation.84 Defendant’s profits are typically a measure
of unjust enrichment from using the trade secret.85
The Guidelines define loss as the greater of “the pecuniary harm that the
defendant knew or, under the circumstances, reasonably should have
76.
18 U.S.C.A § 3663A(c)(1)(A)(ii), (c)(1)(B) (West 2012); PROSECUTING IP
CRIMES, supra note 23, at 223-24.
77.
§ 3663A(b); see also PROSECUTING IP CRIMES, supra note 23, at 224.
78.
§ 3663A(b); see also PROSECUTING IP CRIMES, supra note 23, at 224.
79.
Lewis, supra note 22, at 198.
80.
18 U.S.C.A. § 1838 (West 1996); PROSECUTING IP CRIMES, supra note 23, at 224.
81.
DOYLE, supra note 74, at 13; Lewis, supra note 22, at 198.
82.
CORPORATE COUNSEL’S GUIDE TO PROTECTING TRADE SECRETS § 1:21 (Thompson
Reuters 2013) [hereinafter CORPORATE COUNSEL].
83.
Id.
84.
Id.
85.
Id.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
431
known, was a potential result of the offense” and “the pecuniary harm that
was intended to result from the offense . . . includ[ing] intended pecuniary
harm that would have been impossible or unlikely to occur.”86 The Guidelines define a defendant’s profit or gain as an “alternative measure of loss
only if there is a loss but it reasonably cannot be determined.”87 The sentencing judge is only required to make a reasonable estimate of the loss,
and this determination is given deference due to the unique position the
sentencing judge has in assessing the evidence.88 To the extent a court has
calculated a plaintiff’s loss under the Guidelines, the same loss determination could be used for the restitution analysis under the MVRA.89
Courts have diverged from the lost profit analysis where a plaintiff’s
losses and a defendant’s profits cannot be easily computed.90 In that instance, a court may find that the appropriate method to calculate damages is
a “reasonable royalty.”91 A reasonable royalty attempts to measure, as of
the time of the misappropriation, a hypothetically agreed upon value of the
property that the defendant wrongfully obtained.92 As compared to other
measures, reasonable royalties are a more detailed and accurate reflection
of damages and require an extensive sentencing proceeding, including the
use of expert witnesses.93 To measure a reasonable royalty, the court “calculates what the parties would have agreed to as a fair licensing price at the
time the misappropriation occurred.”94
The courts may also rely on a number of other factors in calculating
damages.95 For example, a court can consider: the prices that prior pur86.
U.S. SENTENCING GUIDELINES MANUAL § 2B1.1 (2012) [hereinafter GUIDELINES
MANUAL].
87.
Id.
88.
Id.
89.
PROSECUTING IP CRIMES, supra note 23, at 224.
90.
Linkco, Inc. v. Fujitsu Ltd., 230 F. Supp. 2d 492, 503 (S.D.N.Y. 2002).
91.
Id.
92.
Id.
93.
Marc J. Zwillinger & Christian S. Genetski, Calculating Loss Under the Economic
Espionage Act of 1996, 9 GEO. MASON L. REV. 323, 343 (2000).
94.
CORPORATE COUNSEL, supra note 82.
95.
Id. Additional factors which the court can consider are: the resulting and foreseeable changes in the parties’ competitive posture; any other unique factors in the particular
case that might have affected the parties’ agreement, such as the ready availability of alternative processes; the royalties received by the plaintiff for the licensing of the trade secrets
to others, which may prove an established royalty; the rates paid by the defendant for the
use of other trade secrets comparable to the trade secret at issue in the lawsuit; the nature
and scope of the license, as exclusive or nonexclusive or as restricted or nonrestricted, in
terms of the territory or with respect to whom the manufactured product may be sold; the
commercial relationship between the plaintiff and the defendant, such as whether they are
competitors in the same territory in the same line of business, or whether they are inventors
BYRDSONG FINAL
432
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
chasers or licensees have paid; the total value of the secret to the plaintiff,
including the plaintiff’s development costs and the importance of the secret
to the plaintiff’s business; the nature and extent of the use that the defendant intended for the secret; and the plaintiff’s established policy and marketing program to maintain its trade secret by not licensing others to use the
invention or by granting licenses under special conditions designed to preserve the trade secret.96 Notwithstanding the abundance of factors a court
can consider in its loss calculation, the goal of damage determinations is to
arrive at a loss figure that corresponds to the relevant conduct of the offense which is used to decide the adjusted offense level based on the
Guidelines.97
IV. INTRODUCING MANDATORY MINIMUM SENTENCING TO TRADE
SECRET THEFT
The success of nineteenth century trade secret cases largely depended on
the existence of confidentiality agreements, either express or implied, as
and promoters; the effect of selling the trade secret product in promoting sales of other
products of the defendant, the existing value of the trade secret to the plaintiff as a generator
of sales of its nontrade secret items, and the extent of such derivative, connected, or conveyed sales; the duration of the trade secret and the term of the license; the established profitability of the product made with the trade secret, its commercial success, and its current
popularity; the utility and advantages of the trade secret over the old modes or devices, if
any, that had been used for working out similar results; the nature of the trade secret, the
character of the commercial embodiment of it as owned or produced by the plaintiff, and the
benefits to those who have used the trade secret; the extent to which the defendant made use
of the trade secret, and whether there is any evidence probative of the value of that use; the
portion of the profit or of the selling price that may be customary in the particular business
or in comparable businesses to allow for the use of the trade secret or analogous trade secrets; the portion of the realizable profit that should be credited to the invention as distinguished from nontrade secret elements, the manufacturing process, business risk, or significant features or improvements added by the defendant; the opinion testimony of qualified
experts; the amount that the plaintiff and the defendant would have agreed to (at the time the
misappropriation began) if both had been reasonably and voluntarily trying to reach an
agreement; and the amount that a prudent licensee, who desired as a business proposition to
obtain a license to manufacture and sell a particular article embodying the trade secret,
would have been willing to pay as a royalty to make a reasonable profit, and the amount that
would have been acceptable to a prudent licensor who was willing to grant a license. Id.
96.
Id.
97.
GUIDELINES MANUAL, supra note 86, § 2B1.1(b)(3)-(5). The base offense level for
sections 1831-1832 is six and can be raised by two levels if the offense “involve[s] a theft
from the person of another,” the offense “involve[s] receiving stolen property, and the defendant was a person in the business of receiving and selling stolen property,” or the offense
“involve[s] misappropriation of a trade secret and the defendant knew or intended that the
offense would benefit a foreign government, foreign instrumentality, or foreign agent.” Id.;
see Zwillinger & Genetski, supra note 93, at 327.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
433
courts were unwilling to find a property interest in secret information.98 At
that time, courts were free to rely on a varied combination of property, contract, and tort law to decide trade secret cases.99 In 1868, a Massachusetts
state court decided, in what is thought to be one of the earliest trade secret
cases, to recognize the existence of a property right in an employer’s trade
secret information.100 “If a man establishes a business and makes it valuable by his skill and attention, the good will of that business is recognized by
the law as property.”101 Indeed, as far back as 1690, philosopher John
Locke recognized the inherent property right every person has by virtue of
his labor when he declared: “[w]hatsoever, then, he removes out of the
state that Nature hath provided and left it in, he hath mixed his labour with
it and joined to it something that is his own, and thereby makes it his property.”102 The Supreme Court has previously declined to limit the scope of
intangible property rights and reaffirmed the property right in “confidential
information.”103 On this basis, both intellectual property and real property
crimes should have similar criminal implications.104
A. Arguments for Mandatory Minimum Sentencing
Proponents of mandatory minimum sentencing assert that these sentences are a reflection of a societal belief that certain crimes demand a specified
sanction to ensure that perpetrators of the crime cannot escape the appropriate punishment.105 A company invests years of research and development along with its associated costs in developing trade secrets that may
represent a substantial portion of the company’s worth.106 If a trade secret
is stolen, exposure to the public can potentially render it valueless because
recovery of the trade secret may not cure the effect of the theft due to the
intangible nature of trade secrets.107 Likewise, if a company’s notoriety in
98.
Sharon K. Sandeen, The Evolution of Trade Secret Law and why Courts Commit
Error when They Do Not Follow the Uniform Trade Secrets Act, 33 HAMLINE L. REV. 493,
499 (2010).
99.
Alan J. Tracey, The Contract in The Trade Secret Ballroom—A Forgotten Dance
Partner?, 16 TEX. INTELL. PROP. L.J. 47, 54 (2007).
100.
Id. at 54-55.
101.
Peabody v. Norfolk, 98 Mass. 452, 457 (1868).
102.
John Locke, Concerning the True Original Extent and End of Civil Government,
in TWO TREATISES OF GOVERNMENT 105, 116 (1690).
103.
Carpenter v. United States, 484 U.S. 19, 25 (1987).
104.
Id. (inferring that because the Supreme Court treats property rights one way, the
same treatment should be given to intellectual and real property crimes).
105.
Bernick & Larkin, supra note 13.
106.
PROSECUTING IP CRIMES, supra note 23, at 3.
107.
H.R. REP. NO. 104-788, at 13 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4022
(“The intent of this section is to preserve the confidential nature of the information and,
BYRDSONG FINAL
434
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
the market was vested in the propriety nature of a trade secret, exposure to
the public would be devastating.108 Imagine if, as a real-life example, that
PepsiCo acquired Coca-Cola’s secret recipe—it would ruin sales of the soft
drink.109 In the fictional sense, imagine if Arthur Slugworth was able to
steal Willy Wonka’s secret formula for the Everlasting Gobstopper: not only would the Oompa Loompas be out of a job, but Mr. Wonka’s candy
sales would be shattered.110
The need for strict criminal penalties for intellectual property crimes can
be described as follows:
[I]ntellectual property crimes are serious crimes in their own right, not
because they inflict physical injury or death upon a person, but rather
because they steal a creative work from its owner. Intellectual property
theft is rampant, but largely silent, so corporations and law enforcement
alike have trouble grasping its enormous impact on profitability—not to
mention on national economies. Although civil remedies may provide
compensation to wronged intellectual property rights holders, criminal
sanctions are often warranted to ensure sufficient punishment and deterrence of wrongful activity. Indeed, because violations of intellectual
property rights often involve no loss of tangible assets and, for infringement crimes, do not even require any direct contact with the rights
holder, the rights holder often does not know it is a victim until a defendant’s activities are specifically identified and investigated.111
Mandatory minimum sentences are a sentencing mechanism that can be
used to administer the proper punishment for intellectual property crimes.
Mandatory minimums also guarantee uniform sentences in the federal system and provide punishment that is commensurate with the crime.112 Additionally, proponents argue that certain and severe punishment has a deterrent effect.113 Mandatory minimum sentences in trade secret cases may
serve as a powerful deterrent because many offenders intend to abscond to
another country with the stolen information.114 The threat of a mandatory
hence, its value. Without such a provision, owners may be reluctant to cooperate in prosecution for fear of further exposing their trade secrets to public view, thus further devaluing or
even destroying their worth.”).
108.
See Ivana Kottasova, Does Formula Mystery Help Keep Coke Afloat?, CNN (Feb.
19, 2014), http://edition.cnn.com/2014/02/18/business/coca-cola-secret-formula/.
109.
See Mike Esterl, Coke Sticks to Its Strategy While Soda Sales Slide, WALL ST. J.
(Apr. 9, 2014), http://online.wsj.com/news/articles/SB10001424052702303910404579485
442244343248.
110.
WILLY WONKA & THE CHOCOLATE FACTORY (Paramount Pictures 1971).
111.
NASHERI, supra note 39, at 2.
112.
Bernick & Larkin, supra note 13.
113.
Id.
114.
See, e.g., United States v. Jin, 733 F.3d 718, 720 (7th Cir. 2013) (noting that De-
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
435
minimum sentence that would have to be served in the U.S. might cause a
potential thief to reconsider stealing a trade secret. The certainty of a mandatory minimum sentence for trade secret theft is critical to deterring future
offenders and holding the most egregious offenders accountable for their
conduct.115
B. Arguments Against Mandatory Minimum Sentencing
Opponents of mandatory minimum sentencing argue that mandatory
minimum sentences merely shift discretion from judges to prosecutors but
do not eliminate sentencing disparities.116 The Guidelines are not only criticized for being mechanical and extremely complicated, but also because
the sentence range for specific categories of offenses is exceptionally
high.117 In addition, shifting the discretion to prosecutors is more harmful
than unlimited judicial discretion because prosecutors are not trained in
sentencing and do not exercise discretion transparently.118 Further, prosecutors lack an incentive to exercise discretion responsibly where the potential for professional gain from successful convictions is likely.119 For example, a prosecutor’s assessment of a case could become corrupted if a
high-profile victim of a trade secret theft puts an overwhelming amount of
pressure on the District Attorney’s Office to prosecute the offender.120 In
one case, New York Supreme Court Judge Jeffrey K. Oing questioned
whether the hedge fund, Two Sigma Investments, LLC, had gone “over the
top” in their pursuit to have a former analyst, Kang Gao, jailed over alleged
trade secret theft.121 Judge Oing cautioned that: “[w]e may be going down
a slippery slope . . . . If this case continues, there perhaps may be an opening of the door for all employers to say ‘you know what, we’re going to put
these guys in jail now.’”122
fendant was arrested while attempting to board a flight to China with a one-way ticket, and
was carrying $31,000 in cash and confidential documents from her former employer,
Motorola); see also Complaint at 7, United States v. Maniar, Mag. No. 13-6085 (SCM)
(D.N.J. June 4, 2013) (during the execution of a search warrant for trade secret information,
Defendant confirmed that he intended to relocate to India in two days).
115.
See PROSECUTING IP CRIMES, supra note 23, at 4.
116.
Bernick & Larkin, supra note 13.
117.
ANGELA J. DAVIS, ARBITRARY JUSTICE: THE POWER OF THE AMERICAN
PROSECUTOR 105 (2007).
118.
Bernick & Larkin, supra note 13.
119.
Id.
120.
See Stewart Bishop, NY Judge Questions Rare Arrest in Trade Secret Theft Case,
LAW360 (Mar. 12, 2014), http://www.law360.com/articles/517850/ny-judge-questionsrarearrest-in-trade-secret-theft-case.
121.
Id.
122.
Id.
BYRDSONG FINAL
436
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
The potential for widespread prosecutorial abuse could arise if mandatory minimum sentences became available in “garden variety” trade secret
disputes.123 Critics also assert that mandatory minimums do not reduce
crime; instead they “demonstrate marginal deterrent effects or short-term
effects that rapidly waste away.”124 For instance, in drug cases, a phenomenon known as the “replacement effect”—where upon incarceration, lowlevel offenders are quickly replaced in the drug operation—is quite common.125 Certainly the high financial incentive that drives trade secret theft
may also manifest a similar effect in trade secret theft cases.126 Moreover,
because most crimes, even serious ones, do not result in arrest or conviction, the deterrent effect of mandatory minimum sentences is substantially
reduced.127 Perhaps most significantly, mandatory minimum sentencing is
ineffective as a deterrent because research has shown that the general public tends to underestimate the severity of sanctions that can be imposed
mainly because they are unaware of the specifics of sentencing policies.128
C. Mandatory Minimum Sentences as an Addition to the Current
Trade Secret Theft Penalties
Economic espionage has been colorfully described as “a high-stakes
cloak-and-dagger spy game—the theft of critical American technology and
trade secrets by foreign companies and governments.”129 The high stakes at
risk warrant a high level of protection as intellectual property crimes are an
escalating and serious threat.130 To that end, Attorney General Holder has
made the investigation and prosecution of intellectual property crime a top
law enforcement priority.131 Criminal sanctions are important for educating
the public on what types of conduct are and are not acceptable.132 Certainty
that an intellectual property crime will be vigorously investigated and pros123.
124.
125.
126.
See id.
Bernick & Larkin, supra note 13.
Id.
See, e.g., Complaint at 2, United States v. Zhu, No. 13 Mag. 1309 (S.D.N.Y. May
19, 2013); Schwartz et al., supra note 35, at 4 (noting that Defendant agreed to supply a
Chinese company with confidential information about a new MRI technology in exchange
for royalty payments worth $2 million, $23 million in stock options, and a high-level position within the company).
127.
VALERIE WRIGHT, DETERRENCE IN CRIMINAL JUSTICE: EVALUATING CERTAINTY VS.
SEVERITY OF PUNISHMENT 2 (2010), available at http://www.sentencingproject.org/doc/
Deterrence%20Briefing%20.pdf.
128.
Id. at 3.
129.
Lewis, supra note 22, at 194-95.
130.
PROSECUTING IP CRIMES, supra note 23, at 3.
131.
Id. at 4.
132.
Id. at 381.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
437
ecuted makes the point clear that intellectual property theft is not acceptable.133 Because intellectual property crimes are relatively easy to commit,
some offenders are undeterred by civil liability.134 Heavy civil penalties in
addition to mandatory minimum sentences will underscore the seriousness
of trade secret theft crimes.135 Mandatory minimum sentences for intellectual property crimes, specifically trade secret theft, are appropriate because
of the physical invasiveness of the crime and because civil remedies may
not fully capture the wrongfulness of the offender’s conduct.136
1.
A Game of Cloaks and Daggers
From 2006 to 2011, the number of prosecutions under the EEA was stable.137 In fact, by September 1, 2012, there were only five indictments under the EEA for that year.138 These findings suggest that more aggressive
prosecution of EEA violations is necessary. The profile of EEA violators is
becoming more apparent, and it is evident that without the certainty of
tough criminal sanctions, the incentive to commit trade secret theft remains.139
The number of crimes that carry mandatory minimum sentences has
more than doubled since 1991 as offenses ranging from child pornography
to identity theft have become subject to mandatory minimum sentencing.140
Both intellectual property crimes and aggravated identity theft are property
crimes broadly characterized as federal white collar crimes.141 Both aggravated identity theft and trade secret theft losses are in the billions of dollars
each year.142 Offenders of both of these theft offenses are sentenced under
section 2B1.1 of the Guidelines.143 Aggravated identity theft carries a man-
133.
134.
135.
See id.
See id.
But see Jef Feeley & Christie Smythe, DuPont’s $920 Million Verdict in Kolon
Kevlar Case Tossed, BLOOMBERG (Apr. 3, 2014), http://www.bloomberg.com/news/201404-03/dupont-s-919-million-verdict-in-kolon-kevlar-case-tossed.html.
136.
See PROSECUTING IP CRIMES, supra note 23, at 384.
137.
Toren, supra note 41, at 2.
138.
Id.
139.
See generally id.
140.
Bernick & Larkin, supra note 13.
141.
See EXEC. OFFICE FOR U.S. ATTORNEYS, FISCAL YEAR 2012 UNITED STATES
ATTORNEYS’
ANNUAL
STATISTICAL
REPORT
(2012),
available
at
www.justice.gov/sites/default/files/usao/legacy/2013/10/28/12stat.rpt.pdf.
142.
Bensen, supra note 4; Hacked, supra note 4; 16.6 Million People Experienced
Identity Theft in 2012, BUREAU OF JUST. STAT. (Dec. 12, 2013),
http://www.bjs.gov/content/pub/press/vit12pr.cfm#.
143.
GUIDELINES MANUAL, supra note 86.
BYRDSONG FINAL
438
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
datory minimum sentence of two years.144 More than 50% of the judges
who responded to the U.S. Sentencing Commission survey felt that the
two-year mandatory minimum for aggravated identity theft was appropriate.145
Since 2008, the average sentence length for offenders of theft, property
destruction, and fraud offenses was twenty-two months.146 In 2010, 84.4%
of the 797 identity theft offenders were subject to a mandatory minimum
penalty.147 The average sentence for these offenders was fifty months.148
The average sentence and average guideline minimum for offenders sentenced under section 2B1.1 of the Guidelines has increased over the past
five years.149 Sentences under section 2B1.1 increased for 12.7% of offenders because the offenders used sophisticated means to execute or conceal the offense.150 Identity theft and trade secret theft are analogous crimes
in that they are both theft of property offenses;151 therefore, mandatory
minimum sentencing corresponding to the already established scheme for
identity theft would also be appropriate for trade secret theft offenses.
2.
Theft is Theft
Aggravated identity theft occurs when the offender commits the identity
theft while committing one of several other federal crimes.152 Aggravated
identity theft has a mandatory minimum sentence of two years or five years
if the predicate crime is a terrorist offense.153 Trade secret theft is often
charged with a corresponding federal offense.154 Three particular offenses
are also predicate crimes for aggravated identity theft that trigger a twoyear mandatory minimum: fraud and related activity in connection with
computers (18 U.S.C. § 1030); mail or wire fraud (18 U.S.C. §§ 1341,
144.
145.
146.
DOYLE, supra note 6, at 93.
Id.
U.S. SENTENCING COMM’N, QUICK FACTS: THEFT, PROPERTY DESTRUCTION, AND
FRAUD OFFENSES 2 (2013), http://www.ussc.gov/Quick_Facts/Quick_Facts_Theft_Property_
Destruction_Fraud.pdf.
147.
U.S. SENTENCING COMM’N, QUICK FACTS: MANDATORY MINIMUM PENALTIES 1
(2013), http://www.ussc.gov/Quick_Facts/Quick_Facts_Mandatory_Minimum_
Penalties.pdf.
148.
Id.
149.
QUICK FACTS, supra note 146.
150.
Id. at 1.
151.
See BLACK’S LAW DICTIONARY 814, 1633 (9th ed. 2009) (defining identity theft
and trade secret).
152.
DOYLE, supra note 6, at 87.
153.
Id.
154.
DOYLE, supra note 73, at 13; Lewis, supra note 22, at 198.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
439
1343); and false statements (18 U.S.C. § 1001).155
How would a mandatory minimum sentencing scheme for trade secret
theft work in practice? Take for instance defendant Zhao, whose case was
described previously in Part III. Zhao’s initial criminal complaint alleged a
violation of 18 U.S.C. § 1831(a)(1)(2)(3), but instead he was ultimately indicted on violations of 18 U.S.C. §§ 1001, 1030.156 Under the proposed
scheme, had Zhao been charged with a violation of 18 U.S.C. § 1831 as a
base offense, either of the additional charges under 18 U.S.C. § 1001 and §
1030 would serve as a predicate offense for a two-year mandatory minimum sentence. Depending on other factors relevant to the case, the minimum sentence could be adjusted to reflect the additional predicate offense.
Additionally, because violations of the EEA are subject to the MVRA,
Zhao would also be required to pay mandatory restitution. This example is
illustrative of the fact that mandatory minimum sentences are feasible in
the context of trade secret theft cases.
3.
Global Reach of the EEA
The Obama administration has continued to demonstrate a commitment
to increasing criminal prosecution of trade secret theft as part of a larger
effort to bolster protection of U.S. intellectual property.157 During the first
ten months of 2013, the Department of Justice reported fourteen new prosecutions and three new convictions under the EEA.158 These figures are
promising compared to the first three years after the EEA was enacted,
where no prosecutions were brought under the EEA.159
To assist in the domestic investigations of trade secret theft with an international element, U.S. federal law enforcement agencies use tools like
formal cooperative agreements to strengthen international relationships and
investigative efforts.160 The U.S. also strives to enhance efforts to pursue
domestic investigations of trade secret theft by foreign entities and encourage foreign law enforcement to pursue those targets themselves.161 A statutory scheme that calls for mandatory minimum sentences for trade secret
theft is advantageous for prosecuting offenders, particularly where intellectual property theft enforcement capabilities are weak in foreign locales.
155.
156.
PROSECUTING IP CRIMES, supra note 23, at 224-31.
Complaint at 1, United States v. Zhao, No. 13-m-220 (E.D. Wis. Mar. 29, 2013);
Indictment at 1, United States v. Zhao, No. 13-CR-58 (E.D. Wis. Apr. 9, 2013).
157.
Schwartz et al., supra note 35, at 3.
158.
Id.
159.
Lewis, supra note 22, at 206.
160.
Administration Strategy, supra note 47.
161.
Id.
BYRDSONG FINAL
440
4/21/2015 7:19 PM
CRIMINAL AND CIVIL CONFINEMENT
Vol. 41:421
In the European Union, for instance, trade secret protection varies widely across member states with some lacking significant protection.162 The
European Commission has proposed a directive that would require member
states “to put in place measures, procedures and remedies that are fair and
equitable, effective and dissuasive, not unnecessarily complicated, and proportionate.”163 Despite this undertaking, no criminal sanctions are available.164 Canada’s current criminal code provides equally weak protection for
victims of trade secret theft.165 Ironically, the application of the provisions
that would aid in prosecuting trade secret cases—theft and fraud—are prohibited by Canadian courts.166 Fortunately, the extraterritoriality provision
of the EEA, 18 U.S.C. § 1837, extends its reach to foreign conduct under
certain circumstances.167
Trade secret theft should be punished in proportion to the seriousness of
the loss caused by the crime. A recent study estimates that trade secret theft
costs the world’s top economies, on average, between 1% and 3% of their
gross domestic product.168 Mandatory minimum sentences for trade secret
theft would be an appropriate punishment; however, fair administration of
this type of sentence would require courts to adopt a holistic approach to
determining loss—a significant factor in sentencing.169
V. CONCLUSION
President Obama has declared that as a nation, “[w]e are going to aggressively protect our intellectual property. Our single greatest asset is the
innovation and the ingenuity and creativity of the American people. It is
essential to our prosperity and it will only become more so in this century.”170 Trade secret theft threatens American businesses, national security,
and the economy by not only putting American jobs in jeopardy, but also
by potentially stifling American innovation.171 As American business prac162.
Mark Frost et al., Trade Secrets: A Unified Approach Across the EU, PRAC. L.
(Jan. 30, 2014), http://uk.practicallaw.com/45554390?q=Trade+secrets:+a+unified+
approach+across+the+EU.
163.
Id.
164.
Id.
165.
Emir Crowne & Tasha De Freitas, Canada’s Inadequate Legal Protection Against
Industrial Espionage, 13 CHI.-KENT J. INTELL. PROP. 192, 194 (2014).
166.
Id.
167.
PROSECUTING IP CRIMES, supra note 23, at 161.
168.
Jack Ellis, New Study Tries to Put A Price on Trade Secrets Theft, INTELL. ASSET
MGMT. (Mar. 6, 2014), http://www.iam-magazine.com/ctredir.ashx?g=fb65b523-8cd2-489f990b-20985994ff56.
169.
Zwillinger & Genetski, supra note 93, at 323.
170.
Administration Strategy, supra note 47.
171.
Id.
BYRDSONG FINAL
2015
4/21/2015 7:19 PM
KEEPING THE BEST KEPT SECRETS
441
tices continue to evolve into a progressively more dynamic global landscape, so too should the laws in place to protect those practices. The option
to impose mandatory minimum sentences on those who misappropriate
trade secrets presents an opportunity to employ a powerful weapon in combating trade secret theft.