Data Theft And Sale To Competitors
1. Data Theft and Sale to Competitors: Overview
Data theft and sale to competitors involves unauthorized acquisition, copying, or exfiltration of confidential business or personal data and then transferring it to a competitor for commercial advantage. This is often categorized as:
A. Trade Secret Theft
Theft of intellectual property, formulas, customer lists, pricing strategies, or marketing plans.
Competitor gains an unfair market advantage.
B. Unauthorized Access to Databases
Hacking or insider access to corporate or governmental databases.
Copying sensitive datasets or client information.
C. Misuse by Employees or Contractors
Employees with legitimate access use it for personal gain or sell it to competitors.
Often involves violation of employment contracts and fiduciary duties.
D. Legal Consequences
Civil liability: damages for trade secret misappropriation.
Criminal liability: fraud, theft, computer misuse, or intellectual property violations.
Regulatory penalties: particularly in sectors like finance, healthcare, or telecom.
2. Major Case Law Examples
Here are six detailed cases where data theft and sale to competitors were addressed:
Case 1: United States v. Aleynikov (2010, 2nd Cir.)
Facts
Aleynikov, a programmer at Goldman Sachs, copied proprietary trading code and attempted to transfer it to a startup competitor.
The code included algorithms for high-frequency trading.
Legal Issues
Misappropriation of trade secrets.
Violation of the Economic Espionage Act (EEA) and the National Stolen Property Act.
Outcome
Initially convicted in federal court, but convictions were partly overturned due to technical issues regarding “goods and services.”
Highlighted the difficulty in defining intangible digital assets as “stolen property.”
Significance
Demonstrates insider theft of sensitive corporate data for competitive advantage.
Set precedent for handling proprietary software and trade secrets in digital form.
Case 2: Waymo LLC v. Uber Technologies Inc. (2017, U.S. District Court, Northern California)
Facts
Anthony Levandowski, a former Waymo engineer, downloaded thousands of confidential files related to self-driving car technology.
He joined Uber shortly after, allegedly bringing proprietary data with him.
Legal Issues
Misappropriation of trade secrets under the Defend Trade Secrets Act (DTSA) and Uniform Trade Secrets Act (UTSA).
Theft of highly sensitive technical and business data for a direct competitor.
Outcome
Uber settled for $245 million in equity and agreed to implement stricter safeguards.
Court emphasized strict limits on employee mobility and data protection.
Significance
Landmark case on employee-led corporate espionage.
Reinforced courts’ willingness to award damages and impose restrictive measures on the competitor.
Case 3: Coca-Cola v. Koke Co. of America (1920s, U.S.)
Facts
A former employee of Coca-Cola attempted to sell the secret formula to competitors.
The employee tried to profit from selling the proprietary recipe and trade secrets.
Legal Issues
Breach of fiduciary duty.
Misappropriation of trade secrets and corporate espionage.
Outcome
Court enjoined the competitor from using the stolen formula.
Established early precedent for protection of trade secrets against sale to competitors.
Significance
Classic example showing longstanding legal recognition of trade secret theft as actionable.
Case 4: Epic Games v. Apple / Fortnite Staff Data Theft (2021, U.S.)
Facts
Employees or contractors were alleged to have leaked confidential Fortnite user data and technical information to competitors.
Included attempts to gain financial advantage in gaming technology.
Legal Issues
Theft of sensitive data.
Violation of non-disclosure agreements (NDAs).
Competitive harm from proprietary source code and user data exposure.
Outcome
Epic Games pursued civil action, settlement agreements enforced.
Courts emphasized damages and injunctive relief for competitive misappropriation.
Significance
Modern example of digital-era corporate espionage and data theft.
Case 5: DuPont v. Christopher Evans (1999, Delaware)
Facts
Evans, a DuPont employee, stole confidential chemical formulas and business data.
Planned to sell the information to a competitor.
Legal Issues
Trade secret misappropriation.
Criminal theft under Delaware law.
Breach of fiduciary duty.
Outcome
Evans convicted and sentenced to prison.
Civil damages awarded to DuPont.
Strengthened corporate protections and non-compete enforcement.
Significance
Demonstrates severe consequences of stealing sensitive R&D and commercial information.
Case 6: Symantec v. U.S. Hacker / Chinese Competitor Case (2013)
Facts
Hackers infiltrated Symantec servers to steal antivirus software source code.
Allegedly sold or transferred stolen code to foreign competitors.
Legal Issues
Violation of the Computer Fraud and Abuse Act (CFAA).
International trade secret theft.
Economic espionage.
Outcome
FBI investigation led to arrests; some extraditions requested.
Highlighted cross-border trade secret theft and the challenges of enforcement.
Significance
Illustrates global implications of data theft and sale to competitors.
Key Legal Principles Across Cases
Insider threat is critical
Employees with legitimate access can cause more harm than external hackers. (Waymo, DuPont, Aleynikov)
Trade secrets extend to digital information
Proprietary software, algorithms, and user data are legally protected. (Waymo, Symantec)
Civil and criminal liability coexist
Courts often allow both remedies: damages, injunctions, and criminal punishment.
Competitor liability
Companies that knowingly accept stolen data can be held liable (Waymo, Coca-Cola).
Non-disclosure and fiduciary duties are enforceable
Employees violating NDAs or fiduciary duties face serious consequences.

comments