Startups

Failures are valuable IP: Protect your startup’s negative trade secrets

Comment

A close-up photo of a broken egg with a brown shell against a white background
Image Credits: dem10 (opens in a new window) / Getty Images

Eugene Y. Mar

Contributor

Eugene Y. Mar is a partner with Farella Braun + Martel LLP in San Francisco, leading the firm’s Technology Industry Group.

Tech companies and startups are familiar with protecting their inventions with patents, and their secret formulas, source code and algorithms as trade secrets.

But they may not be aware of another powerful form of IP protection in California: “Negative trade secrets” are intended to protect a company’s secret know-how gained from extensive research investment about what does not work.

Consider Thomas Edison’s quote about his lightbulb experiments: “I haven’t failed, I’ve just found 10,000 ways that won’t work.” Imagine that Edison’s assistant quit and was hired by a competitor. The former assistant’s “negative know-how” from Edison’s 10,000 failed attempts would allow his new employer to start on attempt 10,001.

But while a trade secret is a company’s intellectual property, an employee’s general knowledge, skill and experience acquired in his or her former employment is not. Where does one draw this line? Does Edison’s former assistant really have to retry all 10,000 prior failures that he knows won’t work?

In a high-profile intellectual property case regarding self-driving technology (Waymo v. Uber), Judge William Alsup asked rhetorically, “Is an engineer really supposed to get a frontal lobotomy before they go to the next job?”

The answer to this question is obviously no, but companies have other ways to protect this information. Companies and employees should bear in mind some general best practices when protecting and navigating around negative trade secrets.

Define the breadth of negative trade secrets clearly

Courts sometimes scrutinize the breadth of alleged negative trade secrets to determine if they prevent others from competing in a particular field altogether. The broader the effect of the trade secret is and the greater its preemptive effect, the more likely a court will refuse to recognize that secret.

In one case, a court found that “Plaintiff’s designation of ‘technical know-how’ regarding what does and does not work in [ … ] digital media management software is simply too nebulous a category of information to qualify for trade secret protection.” The court criticized the plaintiff for failing to “identify any specific design routes,” and instead seeking to prevent the defendants from designing any software at all.

Any company seeking to protect this type of IP should sufficiently narrow the negative trade secret’s breadth so it doesn’t overlap with an entire field or industry.

Documentation can be used protectively

Negative trade secret claims most often succeed when a company can identify specific documents or data that included negative knowledge and were taken.

Such specificity is likely what allowed Genentech’s claims to go forward in a recent pharmaceutical case against JHL. Genentech included specific allegations that the defendants “downloaded and provided to JHL hundreds of confidential Genentech documents filled with proprietary negative know-how.”

JHL argued that its protocols differed from Genentech’s, but the court said this did not foreclose JHL’s possible use of Genentech’s negative trade secrets. This negative know-how “would confer JHL the benefit of steering clear of fruitless development pathways, thereby saving precious time and resources.”

So if a pharmaceutical manufacturer can identify data that was taken, which contained failed formulas, those failed formulas could be protectable negative trade secrets.

For software companies, claims for negative know-how misappropriation may require specific examples of the failed code that was taken.

Negative trade secrets can be the flip side of positive secrets

Companies should bear in mind that courts sometimes enforce a negative trade secret as the flip side of a positive trade secret.

In a case where a customer list was misappropriated, a court stated that “[i]f a customer list is acquired by lengthy and expensive efforts, which, from a negative viewpoint, indicate those entities that have not subscribed to plaintiff’s services, it deserves protection as a trade secret.”

The court meant that by acquiring a list of those who had purchased, defendants had “acquire[d] a list which has already screened out uninterested consumers and thereby saved ‘themselves comparable efforts in screening out those entities who declined [their] patronage…’”

In other words, the defendants acquired a customer list and could now avoid calling uninterested people, which the court characterized as a negative trade secret.

Below, we provide a list of general trade secret best practices as well as tips you can apply for negative trade secrets. Combining these lists can improve a company’s chances of maximizing their IP protection.

General trade secret tips

Treat it like a secret

Like the rules laid out by Tyler Durden in the movie “Fight Club,” the first and second rule of protecting a trade secret is: “You do not talk about [the trade secret].”

Keep it secret. Circulate trade-secret information only on a need-to-know basis among employees or internal teams. Avoid distributing the trade secret to anyone who doesn’t need to know about it, especially anyone outside the company.

Prepare an information security policy

Documenting basic policies regarding when employees may share confidential information outside the company and in what format. Define categories of information, such as public information, internal information, confidential information and strictly confidential information.

Protect against leaks using training

Conduct organized and formal training sessions with employees on the meaning of trade secrets, how the company protects them from public disclosure and how employees are obligated to help protect them.

It is best practice to do this when onboarding new employees and to provide periodic reminders (at least annually) either individually or in group settings. It is also good practice to provide documentation that the employees can sign to assert that they attended and understood the training.

Label documents clearly

Add “Confidential” or “Highly Confidential” legends on internal documents that describe or reference trade secrets. Do not overuse these labels on documents that don’t warrant them, as overuse may cause employees to ignore the label entirely and result in courts discounting their significance.

Secure access to your servers

Implement a companywide VPN network so employees can work with copies on company servers and can’t store anything on their own computers locally. VPNs also typically add a layer of encryption to transmission and can log access.

Log product development

Tech companies should use tools such as Github to log key developments of their product, including versions of their source code. Ideally, this information should include what those developments are, when they happened and who designed them.

Use the onboarding process to introduce policies to new employees

When onboarding employees, have employees certify that they are not bringing any trade secrets from their former employer. You should also train them in the company’s information security policies, which should usually include signing a non-disclosure agreement.

Implement a process of departing employees

Conduct exit interviews with employees who are leaving the company, ensuring that all their equipment and documentation has been returned and that access to company databases has been revoked.

Include a termination certification in employment agreements that are signed during the exit interview. The certification should state that the employee has not taken any confidential information or company devices and that personal devices have been reviewed and cleared of all company trade secrets and confidential information (although such information should never be on personal devices).

Be careful when exploring M&A or partnerships

If you’re considering a merger or partnership with another company, try to limit the initial information sharing to your financial information, and only provide sensitive technical information if the potential partnership has progressed significantly. Always use a well-written non-disclosure agreement.

Negative trade secret tips

Document successes and failures

Introduce a general practice of documenting all attempts so that failed formulas, code or implementations are documented along with successful ones. Also document who worked on something and why it failed. Ensure any such documentation is well protected within the company.

Delineate negative trade secrets in your NDAs

Include a clause regarding the protection of negative trade secrets in any non-disclosure agreement that your company signs, whether it’s with an onboarding employee or a potential partner company.

Explain what constitutes a negative trade secret

Explain the concept of negative trade secrets in training sessions so employees understand that their obligation to keep proprietary information secret extends not only to positive know-how but to negative know-how as well.

Define your trade secrets clearly

If litigation occurs, describe the negative trade secret in specific terms. It’s also a good idea to couple any negative trade secret with a positive formulation of the secret, if possible.

For example, if you’re trying to protect years of unproductive sales calls with potential customers who were not interested in your product, you should also choose to protect the list of customers who were interested in the product. If the court looks askance at the negative secret, the positive one can be a great alternative.

More TechCrunch

The Series C funding, which brings its total raise to around $95 million, will go toward mass production of the startup’s inaugural products

AI chip startup DEEPX secures $80M Series C at a $529M valuation 

A dust-up between Evolve Bank & Trust, Mercury and Synapse has led TabaPay to abandon its acquisition plans of troubled banking-as-a-service startup Synapse.

Infighting among fintech players has caused TabaPay to ‘pull out’ from buying bankrupt Synapse

The problem is not the media, but the message.

Apple’s ‘Crush’ ad is disgusting

The Twitter for Android client was “a demo app that Google had created and gave to us,” says Particle co-founder and ex-Twitter employee Sara Beykpour.

Google built some of the first social apps for Android, including Twitter and others

WhatsApp is updating its mobile apps for a fresh and more streamlined look, while also introducing a new “darker dark mode,” the company announced on Thursday. The messaging app says…

WhatsApp’s latest update streamlines navigation and adds a ‘darker dark mode’

Plinky lets you solve the problem of saving and organizing links from anywhere with a focus on simplicity and customization.

Plinky is an app for you to collect and organize links easily

The keynote kicks off at 10 a.m. PT on Tuesday and will offer glimpses into the latest versions of Android, Wear OS and Android TV.

Google I/O 2024: How to watch

For cancer patients, medicines administered in clinical trials can help save or extend lives. But despite thousands of trials in the United States each year, only 3% to 5% of…

Triomics raises $15M Series A to automate cancer clinical trials matching

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation. Sign up here for free — just click TechCrunch Mobility! Tap, tap.…

Tesla drives Luminar lidar sales and Motional pauses robotaxi plans

The newly announced “Public Content Policy” will now join Reddit’s existing privacy policy and content policy to guide how Reddit’s data is being accessed and used by commercial entities and…

Reddit locks down its public data in new content policy, says use now requires a contract

Eva Ho plans to step away from her position as general partner at Fika Ventures, the Los Angeles-based seed firm she co-founded in 2016. Fika told LPs of Ho’s intention…

Fika Ventures co-founder Eva Ho will step back from the firm after its current fund is deployed

In a post on Werner Vogels’ personal blog, he details Distill, an open-source app he built to transcribe and summarize conference calls.

Amazon’s CTO built a meeting-summarizing app for some reason

Paris-based Mistral AI, a startup working on open source large language models — the building block for generative AI services — has been raising money at a $6 billion valuation,…

Sources: Mistral AI raising at a $6B valuation, SoftBank ‘not in’ but DST is

You can expect plenty of AI, but probably not a lot of hardware.

Google I/O 2024: What to expect

Dating apps and other social friend-finders are being put on notice: Dating app giant Bumble is looking to make more acquisitions.

Bumble says it’s looking to M&A to drive growth

When Class founder Michael Chasen was in college, he and a buddy came up with the idea for Blackboard, an online classroom organizational tool. His original company was acquired for…

Blackboard founder transforms Zoom add-on designed for teachers into business tool

Groww, an Indian investment app, has become one of the first startups from the country to shift its domicile back home.

Groww joins the first wave of Indian startups moving domiciles back home from US

Technology giant Dell notified customers on Thursday that it experienced a data breach involving customers’ names and physical addresses. In an email seen by TechCrunch and shared by several people…

Dell discloses data breach of customers’ physical addresses

Featured Article

Fairgen ‘boosts’ survey results using synthetic data and AI-generated responses

The Israeli startup has raised $5.5M for its platform that uses “statistical AI” to generate synthetic data that it says is as good as the real thing.

19 hours ago
Fairgen ‘boosts’ survey results using synthetic data and AI-generated responses

Hydrow, the at-home rowing machine maker, announced Thursday that it has acquired a majority stake in Speede Fitness, the company behind the AI-enabled strength training machine. The rowing startup also…

Rowing startup Hydrow acquires a majority stake in Speede Fitness as their CEO steps down

Call centers are embracing automation. There’s debate as to whether that’s a good thing, but it’s happening — and quite possibly accelerating. According to research firm TechSci Research, the global…

Retell AI lets companies build ‘voice agents’ to answer phone calls

TikTok is starting to automatically label AI-generated content that was made on other platforms, the company announced on Thursday. With this change, if a creator posts content on TikTok that…

TikTok will automatically label AI-generated content created on platforms like DALL·E 3

India’s mobile payments regulator is likely to extend the deadline for imposing market share caps on the popular UPI (unified payments interface) payments rail by one to two years, sources…

India likely to delay UPI market caps in win for PhonePe-Google Pay duopoly

Line Man Wongnai, an on-demand food delivery service in Thailand, is considering an initial public offering on a Thai exchange or the U.S. in 2025.

Thai food delivery app Line Man Wongnai weighs IPO in Thailand, US in 2025

Ever wonder why conversational AI like ChatGPT says “Sorry, I can’t do that” or some other polite refusal? OpenAI is offering a limited look at the reasoning behind its own…

OpenAI offers a peek behind the curtain of its AI’s secret instructions

The federal government agency responsible for granting patents and trademarks is alerting thousands of filers whose private addresses were exposed following a second data spill in as many years. The…

US Patent and Trademark Office confirms another leak of filers’ address data

As part of an investigation into people involved in the pro-independence movement in Catalonia, the Spanish police obtained information from the encrypted services Wire and Proton, which helped the authorities…

Encrypted services Apple, Proton and Wire helped Spanish police identify activist

Match Group, the company that owns several dating apps, including Tinder and Hinge, released its first-quarter earnings report on Tuesday, which shows that Tinder’s paying user base has decreased for…

Match looks to Hinge as Tinder fails

Private social networking is making a comeback. Gratitude Plus, a startup that aims to shift social media in a more positive direction, is expanding its wellness-focused, personal reflections journal to…

Gratitude Plus makes social networking positive, private and personal

With venture totals slipping year-over-year in key markets like the United States, and concern that venture firms themselves are struggling to raise more capital, founders might be worried. After all,…

Can AI help founders fundraise more quickly and easily?