Professional services vendors that develop custom software or technology to the specifications of their customers often face demands to indemnify and defend their customers from infringement claims of any and all intellectual property rights. “If I’m sued because of your deliverable,” the argument goes, “then you should step up and take responsibility for your failure to respect third party IP rights.”
This stance, though common, fails to appreciate the unique danger posed by “strict liability” IP rights for such vendors, in which liability for infringement attaches regardless of whether the accused infringer knew of the existence of the protected subject matter, and regardless of any intention or knowledge. Utility patents, design patents, trademarks, trade dress, and, in the EU, design registrations, represent strict liability IP rights.
On the other hand, copyrights, EU design rights, and trade secrets, where copying or misappropriation is an integral element of proof of infringement, are for this reason not strict liability IP rights. Buyers of custom deliverables are justified in holding their vendors to account if they failed to exhibit the necessary professionalism to prevent copyright infringement or trade secret theft. Plagiarists and thieves should have no place in product development.
Strict liability IP rights are quite different. Studies have demonstrated that it’s impossible to write software that doesn’t infringe a utility patent somewhere in the world. Design patents (which can apply to user interfaces) are particularly hazardous: they are granted automatically without review, and in the US, require disgorgement of all profits attributable to an infringing product or component.
Demanding that custom-development service vendors indemnify for strict liability rights infringements is problematic. The customer typically controls the specification, and the work is often iterative, driven by customer feedback that takes no account of potential infringements. Generally, there’s no time or budget, during the crunch of the project, for strict liability IPR clearance searches or freedom-to-operate opinions. The customer says, “please add this, and do it this way,” and the vendor complies, without asking questions about patents or trademarks. Such searches are not within the vendors’ core competency in any case.
In the custom development context, knowledge qualifiers connected to a non-infringement warranty, or a shared liability allocation, might be more appropriate with respect to strict liability IP rights. Strategies for drafting and negotiating relevant work product in this regard can be found here at Redline.
Redline is a dynamic collaboration environment for a select cadre of lawyers worldwide.Watch the trailer Lawyers with Mojo or click here to learn more.
The intended audience for this post is licensed and practicing lawyers, not laypersons seeking legal advice for their situation. If you are not a lawyer, hire one before using or relying on any information contained here. This post is: (1) informational only and not intended as advertising or as solicitation for legal services, (2) not intended to render legal advice to you, and (3) not a substitute for obtaining legal advice from a qualified attorney to assess your exact situation. The information here is subject to change and may not be applicable or correct in your jurisdiction. The views and opinions expressed here are Sean’s alone and do not necessarily represent the positions of Sean’s present or former employers, law firms, or clients.
Professor Tanya J. Monestier, in a thought-provoking piece entitled, Damages for Breach of a Forum Selection Clause, 59 Am. Bus. J. (forthcoming 2021), available here, quite ably goes through the incentives for those inclined to breach mandatory forum selection clauses, and how little some courts do to redress the harm caused by such breach:
Why would a party sue in (ostensible) contravention of a forum selection clause? It stands to reason that most parties sue in a non-chosen forum for strategic reasons. For instance, a party may perceive that a non-chosen forum provides it with a leg up in litigation—perhaps because it offers better law, a better jury pool, better judges, and so on. …
In a related vein, a party may also violate a forum selection clause to protract litigation, to cause the other party to expend resources, and to secure a favorable legal or settlement result. Here, the goal is not so much actually litigating in the alternate forum, but instead placing strategic obstacles in the way of one’s opponent right from the beginning. The non-breaching party may decide that the light is simply not worth the candle and proceed in the non-designated forum.
Why do some courts refuse to award damages for breach of such clauses?
First, some courts reason that by enforcing a forum selection clause through a dismissal or transfer, an innocent party has been made whole, thereby precluding a suit for damages. These courts usually refer to the forum selection clause being ‘specifically performed’ and that an order for specific performance is incongruent with an order for damages. For instance, in Hydrogen Master Rights, Ltd. v. Weston, the court noted that it was not aware of any case ‘where plaintiffs were allowed to recoup damages in addition to their remedy of specific performance.’
Second, some courts rest their analysis entirely on the American Rule. For instance, in Alexsam, Inc. v. Mastercard International Inc., the court refused to award attorneys’ fees, reasoning that ‘Plaintiff’s demand for damages comprising attorneys’ fees it sustained in [enforcing the forum selection clause] is an impermissible attempt to circumvent the American Rule.’ Similarly, in Steel City Landscape, Inc. v. SMS Assist, LLC, the court noted that even though the plaintiff pled and arguably proved damages in the form of attorneys’ fees, the plaintiff would not be able to recover them because Illinois follows the American Rule whereby each side must pay its own attorneys’ fees.
In any case, losses incurred in enforcing mandatory forum selection clauses can be significant:
Regardless of the reason for suing in contravention of the clause, the net effect on the non-violating party is the same: they must spend time and money convincing a court to give effect to the forum selection clause. This will usually require a party to go to the non-designated forum and seek to have that court enforce the clause. This process may take months—or even years—depending on the complexity of the case, scheduling considerations, delays, and the like.
The monetary losses incurred in enforcing a forum selection clause tend to be significant. …. For instance, in Allendale Mutual Insurance Co. v. Excess Insurance Co., the plaintiff incurred $234,633.99 in litigation expenses associated with enforcing a forum selection clause.
As Prof. Monestier points out, agreeing to a forum selection clause is an agreement not to sue in other forums. “If damages are not awarded for breaching a forum selection clause—for specifically doing what one promised not to do—the promise is an illusory one that can be breached with no legal consequences.”
The intended audience for this post is licensed and practicing lawyers, not laypersons seeking legal advice for their situation. If you are not a lawyer, hire one before using or relying on any information contained here. This post is: (1) informational only and not intended as advertising or as solicitation for legal services, (2) not intended to render legal advice to you, and (3) not a substitute for obtaining legal advice from a qualified attorney to assess your exact situation. The information here is subject to change and may not be applicable or correct in your jurisdiction.
Consider the following scenario. Your startup client, a developer of a popular app recommendation engine, is running low on cash, and further investment is not in the cards. The shareholders decide it’s time to sell.
Excitement ensues as a massive personal technology lifestyle company takes an interest. After completion of due diligence, however, enthusiasm wanes. Soon the discussion focuses on a potential “acqui-hire,” meaning, a purchase of the company, not to exploit the company’s technology or market share, but simply to hire away the top engineering talent—with a commensurately lower valuation.
Too low for the shareholders, in fact, so negotiations end.
The story doesn’t, however. BigCo turns around and hires away the startup’s top engineering and marketing talent. The startup is now dead in the water and of no interest to any other potential suitors.
These are essentially the facts in Hooked Media Group v. Apple (Cal. Ct. App. 2020). Hooked Media Group sued Apple (BigCo) for interference with contract and prospective economic advantage, misappropriation of trade secrets, and aiding and abetting breach of fiduciary duty, among other claims.
The claims went nowhere at either the lower court or on appeal—despite evidence demonstrating that the hired-away engineers developed a recommendations system substantially similar to Hooked’s version, down to the source code. The staff were expressly hired to build what Apple refused to buy from Hooked, but the courts held that mere possession of a trade secret is insufficient to impose liability unless acquisition of that secret was somehow wrongful.
Ultimately, the absence of an enforceable anti-poaching clause in a due diligence NDA or term sheet proved fatal. Such clauses can be tricky, however, due to recent developments casting doubt on the enforceability of employee non-solicit clauses. But proceeding without them in M&A discussions invites disaster for small private companies relying on a handful of talented people to survive.
Join the discussion on Redline for strategies and clauses that mitigate this risk.
Redline has emerged from beta and is now live, with private guilds, an enhanced member experience, and more. Watch the trailer Lawyers with Mojo or click here to learn more.
______________
The intended audience for this post is licensed and practicing lawyers, not laypersons seeking legal advice for their situation. If you are not a lawyer, hire one before using or relying on any information contained here. This post is: (1) informational only and not intended as advertising or as solicitation for legal services, (2) not intended to render legal advice to you, and (3) not a substitute for obtaining legal advice from a qualified attorney to assess your exact situation. The information here is subject to change and may not be applicable or correct in your jurisdiction.
Redline has emerged from beta and is now live, with private guilds, an enhanced member experience, and more. Watch the trailer Lawyers with Mojoor click here to learn more.
Among the nearly infinite variety of legal agreements in use today, the non-disclosure agreement for general bilateral business discussions is by far the most ubiquitous. If measured only by the frequency of its use and the significance of its impact, a company’s NDA template is arguably its most important. The $200 million verdict against Oculus for breach of a rather simple NDA speaks volumes as to how critical such an agreement can be.
Every company has its own unique general use NDA template; paradoxically, many companies sign the opposite party’s template more often than not. The party larger in size, reputation, market cap, or perceived importance usually wins the battle of the NDA form. This NDA ritual takes place hundreds of times a day all over the world.
Fundamentally the purpose of the NDA is straightforward: protect confidential information from unauthorized use and disclosure. Both parties have an equal and legitimate interest in protecting their own information, and each party usually recognizes the other side’s interest as well. The best general purpose NDAs are those that are short, simple, clear, and mutual. The worst are those that are complex, lengthy, and lack basic mutuality.
The model NDA template accomplishes what should be the primary objective of any NDA: establish a balanced legal framework for the protection of each party’s confidential information in a simple, clear and direct manner. All of the terms and obligations should be reciprocal. Neither side should be advantaged. There should be no unexpected provisions. And ideally the NDA should be a modest one or two pages in length.
Effective Date
The “Effective Date” can be a date that’s inserted on the date of signature, or it can be expressed as the date of the last signature. The problem with leaving the date blank is that it often remains blank after both parties have signed. That said, if the NDA protects information whether disclosed before or after the effective date, then there’s little significance to the effective date, other than clarifying when the agreement came into being and, thus, the term of the agreement.
Definition of Confidential Information
Typically, NDAs define “Confidential Information” to include written as well as orally disclosed information, so long as marked or designated as confidential. Oral information is often protected only if it is summarized in writing within a certain period of time after disclosure. The issue of orally disclosed information is a challenging one. Many companies, especially larger ones with active and sizable legal departments, are reluctant to tie themselves to confidentiality obligations with respect to any orally disclosed information that is not summarized in writing later. The problem of course is that such summaries are rarely completed. Without the summary, no protection applies.
The ideal template attempts to strike a balance between the two extremes, by extending protection not only if it’s summarized in writing, but by extending protection to certain specifically enumerated categories of information (for example, “contemplated product or service plans, marketing or business strategies, vulnerabilities, third party relationships, or pricing or financial information”). Few would argue that oral information about a company’s publicly unreleased product plans or strategies, vulnerabilities, or financial information should not be protected as confidential. For oral information that falls outside of these protected categories, the written summary requirement applies.
Yet another possible variant is to protect orally disclosed information falling into these categories only if “the information, given its nature and the details of its disclosure, should reasonably be considered as confidential in nature” or the like. This may ease the concerns of those who insist that all orally disclosed information should be protected only if summarized in writing. Yet, this concession may not be enough to satisfy some corporate legal departments that will insist on the written summary requirement.
Ultimately, the requirement that oral disclosures be summarized is so commonplace that to oppose it in every case would unjustifiably impede the transacting of necessary business. Educating the client to ensure that important conversations are memorialized is the best solution; refusing to sign a NDA due to opposition to this requirement is not.
One final point about orally disclosed information is that the ideal template should preserve the confidential nature of the information pending the production of the written summary. Without this clarification, the information may never be confidential unless and until the disclosing party produces the written summary. This may take time. Meanwhile, the receiving party could literally publish highly sensitive orally-disclosed information within hours of the parties’ meeting, in the absence of such a clause.
Permitted Recipients
Typically, disclosure of Confidential Information is limited to the receiving party’s employees, but oftentimes disclosure to affiliates and agents is permitted. Care should be taken to ensure that such agents and affiliates are tightly defined. Virtually any person or entity can be an agent or affiliate, including, obviously, competitors of the disclosing party (even those with an ostensible “need to know”).
Exceptions
The exceptions component of the NDA is the most important. Any balanced NDA should exclude from the confidentiality obligation any information that is (a) known to the receiving party prior to its disclosure by the disclosing party; (b) is or becomes generally known or available, or is in or becomes part of the public domain, other than through breach of confidentiality; (c) disclosed to the receiving party by a third party without any apparent breach of confidentiality; or (d) independently developed by the receiving party without use of any of the disclosing party’s confidential information.
One exception occasionally found in NDA forms is “disclosed by the disclosing party to a third party without restriction on disclosure. ” Whichever party to the NDA has a stronger incentive to protect confidentiality may object to the inclusion of such an exception, particularly if the NDA form already contains the public domain/generally known exception. If interpreted in conjunction with the latter, this exception is not logically redundant only in the situation in which the information owner’s dissemination of its own information has not reached the level of being generally known, but has been selectively revealed to a certain few. While an argument can certainly be made that if the owner has been selectively disclosing the information in question to a select few, it should not be entitled to confidentiality protection at all, the sensitive information owner will argue that such intermittent disclosure may have been inadvertent, or under circumstances indicative of apparent, even if ultimately non-existent, confidentiality. Such party will argue that the public domain exception should suffice.
Top 5 NDA Pet Peeves
1. Blank “Purpose” Requirement
It is quite common for NDA templates to specify a “purpose” of the information exchange; less commonly, some NDAs require that information protected under the NDA be relevant or germane to, or disclosed solely in furtherance of, a defined purpose in order to qualify for protection. Oftentimes the purpose definition is blank, requiring the business people involved in the discussions to complete what they believe the purpose should be. Business clients from either side may specify an inordinately narrow purpose, or the discussions may evolve beyond what is defined in the NDA’s purpose statement. In such case, legal cycles are again consumed in order to amend the purpose statement or enter into a new NDA. Worst case, the parties will fail to realize that the discussions have evolved beyond the purpose statement set out in the NDA, thus resulting in no confidentiality protections whatsoever.
Realistically, after the NDA is signed, it is forgotten, and it is extremely unlikely that representatives from either side will be closely monitoring the discussions to make sure they do not deviate from the scope of the expressed purpose. And, whether a given item of information is germane to the purpose may not be clear, thus inviting disputes in the future.
Any information that is designated as confidential should be protected. The confidentiality exceptions are the best defense against assuming unnecessary or unrelated confidentiality obligations. Consequently, if a purpose requirement is unavoidable, then the best purpose articulation should be as broad as possible (eg, “to evaluate whether to enter into a transaction”; or “to fulfill the mutual obligations and purposes of a mutual business relationship”).
2. Documentary or Clear and Convincing Proof Requirement
Variants of the confidentiality exclusions clause may require that applicability of the exceptions be proven by documentary evidence (for example, removing “independently developed by the receiving party without use of any of the disclosing party’s confidential information, as established by documentary evidence”). The hidden premise behind such a requirement is that testimonial evidence is inherently untrustworthy or at least not as reliable as documentary evidence. This premise is questionable as an empirical matter. In any case, oftentimes it may be impossible to find documentary proof of prior knowledge or independent development for a given piece of information.
For example, it is easy to envision how a large company with R&D facilities all over the world could quite readily develop technology independently of any access to or use of the confidential information protected by the NDA and disclosed in a remote locale. Yet if the documentary proof requirement applies, it’s not clear what type of proof would satisfy the requirement. Would documents proving the existence of the development of the same information in a far-flung R&D center be sufficient? Or would a court require documents affirmatively proving that the developers of the information specifically refused to expose themselves to the NDA-protected information?
Some NDAs require that the exclusions be proven by “clear and convincing evidence”, a standard of proof that would make application of any exclusion quite difficult to establish. The default standard of proof, preponderance of the evidence (i.e., more likely than not), is the standard that would apply to all other issues relating to the NDA, such as the issue of whether the information in question is captured by the definition of confidential information, or whether the NDA itself was breached. The breach claimant should not have a lower standard of proof than the breach defendant.
3. Time-Limited Term of Protection
Many NDA forms contain a limited term of effectiveness. Such forms can be inconvenient if the NDA expires prior to the termination of the parties’ negotiations or relationship. Early expiration will result in the need for a renewal amendment or for a new NDA, thus consuming legal resources. If the NDA is truly balanced and limited in scope, there’s no compelling reason to require that the NDA expire, particularly if either party is free, as is often the case, to terminate the NDA at will.
Many NDA templates also limit the time period in which the confidentiality obligations apply. “The obligations of confidentiality under this agreement expire five years after termination”, for example, is a typical formulation. Arguments raised in support of an arbitrary cut-off of protection include administrative convenience; finality of obligations; and that most information should be expected to “go stale” after five years or so anyway.
Nevertheless, time-bound confidentiality obligations can be fatal to the protection of trade secrets. A trade secret derives its protection from proof that the owner has exercised reasonable efforts to safeguard its secrecy. It’s not difficult for an adverse party in any trade secrets litigation to discover and use the fact that the purported trade secret owner routinely signed time-bound NDAs, to potentially devastating effect.
4. Non-Reciprocal Terms
Language granting an enhanced degree of protection for only one party’s data, or securing a longer period of confidentiality protection for one party’s source code, or requiring one party and not the other to bear the burden of proving the applicability of confidentiality exceptions, are all common examples of non-reciprocal clauses that will inevitably invite negotiation and therefore delay. The rather limited legal benefit of such clauses should be balanced against the wasted cycles such provisions cause. The ultimate goal is to secure signatures on the NDA form as soon as possible, given that no business can take place until the NDA is closed.
5. Residual Rights
A residuals (or residual rights) clause clarifies that general knowledge or know-how that has not been intentionally memorized is not subject to the confidentiality obligations of the agreement. Example:
Nothing in this Agreement will be construed to prevent the receiving party’s employees who access Confidential Information from using Residuals for any purpose. The term “Residuals” means information of a general nature, such as general knowledge, professional skills, know-how, work experience or techniques, that is retained in the unaided memories (without conscious memorization or subsequent reference to the material in question) of the receiving party’s employees who have had access to Confidential Information.
Such a clause essentially removes confidentiality protections for any information that is retained in the unaided memories of the receiving party’s employees. At bottom, it’s a gaping hole in the non-disclosure and non-circumvention obligations of the NDA. “Anything that remains in my head” may be freely used and disclosed. Such a clause is particularly inappropriate for NDAs that cover the exchange of sensitive financial information, as such information is readily retrievable from memory.
In summary, the degree to which a bilateral non-disclosure agreement template for general business discussions can be considered “perfect” depends on the degree to which the NDA is simple, concise, and mutual. The best general-use NDAs are those that are completely unobjectionable and clear. The worst are those that invite unhelpful negotiation and attendant acrimony. Sometimes not negotiating is better than negotiating and “winning” a point or two, given that the parties must work together to forge a new relationship going forward. Crafting the perfect NDA to strike this balance is as much a science as an art, a task that requires knowledge of the law, culture, and business in which our clients operate.
The intended audience for this post is licensed and practicing lawyers, not laypersons seeking legal advice for their situation. If you are not a lawyer, hire one before using or relying on any information contained here. This post is: (1) informational only and not intended as advertising or as solicitation for legal services, (2) not intended to render legal advice to you, and (3) not a substitute for obtaining legal advice from a qualified attorney to assess your exact situation. The information here is subject to change and may not be applicable or correct in your jurisdiction. The views and opinions expressed here are Sean’s alone and do not necessarily represent the positions of Sean’s present or former employers, law firms, or clients.