Data Theft And Sale To Competitors

1. Data Theft and Sale to Competitors: Overview

Data theft and sale to competitors involves unauthorized acquisition, copying, or exfiltration of confidential business or personal data and then transferring it to a competitor for commercial advantage. This is often categorized as:

A. Trade Secret Theft

Theft of intellectual property, formulas, customer lists, pricing strategies, or marketing plans.

Competitor gains an unfair market advantage.

B. Unauthorized Access to Databases

Hacking or insider access to corporate or governmental databases.

Copying sensitive datasets or client information.

C. Misuse by Employees or Contractors

Employees with legitimate access use it for personal gain or sell it to competitors.

Often involves violation of employment contracts and fiduciary duties.

D. Legal Consequences

Civil liability: damages for trade secret misappropriation.

Criminal liability: fraud, theft, computer misuse, or intellectual property violations.

Regulatory penalties: particularly in sectors like finance, healthcare, or telecom.

2. Major Case Law Examples

Here are six detailed cases where data theft and sale to competitors were addressed:

Case 1: United States v. Aleynikov (2010, 2nd Cir.)

Facts

Aleynikov, a programmer at Goldman Sachs, copied proprietary trading code and attempted to transfer it to a startup competitor.

The code included algorithms for high-frequency trading.

Legal Issues

Misappropriation of trade secrets.

Violation of the Economic Espionage Act (EEA) and the National Stolen Property Act.

Outcome

Initially convicted in federal court, but convictions were partly overturned due to technical issues regarding “goods and services.”

Highlighted the difficulty in defining intangible digital assets as “stolen property.”

Significance

Demonstrates insider theft of sensitive corporate data for competitive advantage.

Set precedent for handling proprietary software and trade secrets in digital form.

Case 2: Waymo LLC v. Uber Technologies Inc. (2017, U.S. District Court, Northern California)

Facts

Anthony Levandowski, a former Waymo engineer, downloaded thousands of confidential files related to self-driving car technology.

He joined Uber shortly after, allegedly bringing proprietary data with him.

Legal Issues

Misappropriation of trade secrets under the Defend Trade Secrets Act (DTSA) and Uniform Trade Secrets Act (UTSA).

Theft of highly sensitive technical and business data for a direct competitor.

Outcome

Uber settled for $245 million in equity and agreed to implement stricter safeguards.

Court emphasized strict limits on employee mobility and data protection.

Significance

Landmark case on employee-led corporate espionage.

Reinforced courts’ willingness to award damages and impose restrictive measures on the competitor.

Case 3: Coca-Cola v. Koke Co. of America (1920s, U.S.)

Facts

A former employee of Coca-Cola attempted to sell the secret formula to competitors.

The employee tried to profit from selling the proprietary recipe and trade secrets.

Legal Issues

Breach of fiduciary duty.

Misappropriation of trade secrets and corporate espionage.

Outcome

Court enjoined the competitor from using the stolen formula.

Established early precedent for protection of trade secrets against sale to competitors.

Significance

Classic example showing longstanding legal recognition of trade secret theft as actionable.

Case 4: Epic Games v. Apple / Fortnite Staff Data Theft (2021, U.S.)

Facts

Employees or contractors were alleged to have leaked confidential Fortnite user data and technical information to competitors.

Included attempts to gain financial advantage in gaming technology.

Legal Issues

Theft of sensitive data.

Violation of non-disclosure agreements (NDAs).

Competitive harm from proprietary source code and user data exposure.

Outcome

Epic Games pursued civil action, settlement agreements enforced.

Courts emphasized damages and injunctive relief for competitive misappropriation.

Significance

Modern example of digital-era corporate espionage and data theft.

Case 5: DuPont v. Christopher Evans (1999, Delaware)

Facts

Evans, a DuPont employee, stole confidential chemical formulas and business data.

Planned to sell the information to a competitor.

Legal Issues

Trade secret misappropriation.

Criminal theft under Delaware law.

Breach of fiduciary duty.

Outcome

Evans convicted and sentenced to prison.

Civil damages awarded to DuPont.

Strengthened corporate protections and non-compete enforcement.

Significance

Demonstrates severe consequences of stealing sensitive R&D and commercial information.

Case 6: Symantec v. U.S. Hacker / Chinese Competitor Case (2013)

Facts

Hackers infiltrated Symantec servers to steal antivirus software source code.

Allegedly sold or transferred stolen code to foreign competitors.

Legal Issues

Violation of the Computer Fraud and Abuse Act (CFAA).

International trade secret theft.

Economic espionage.

Outcome

FBI investigation led to arrests; some extraditions requested.

Highlighted cross-border trade secret theft and the challenges of enforcement.

Significance

Illustrates global implications of data theft and sale to competitors.

Key Legal Principles Across Cases

Insider threat is critical
Employees with legitimate access can cause more harm than external hackers. (Waymo, DuPont, Aleynikov)

Trade secrets extend to digital information
Proprietary software, algorithms, and user data are legally protected. (Waymo, Symantec)

Civil and criminal liability coexist
Courts often allow both remedies: damages, injunctions, and criminal punishment.

Competitor liability
Companies that knowingly accept stolen data can be held liable (Waymo, Coca-Cola).

Non-disclosure and fiduciary duties are enforceable
Employees violating NDAs or fiduciary duties face serious consequences.

LEAVE A COMMENT