So-called “Mutual Non-Disclosure Agreement” only protected one party’s information

mutual NDA

Eastern sued Herbalife for breach of the “Mutual Non-Disclosure Agreement” into which the parties had entered. Eastern claimed Herbalife breached the agreement by disclosing Eastern’s confidential information to a competitor. Herbalife moved for summary judgment on Eastern’s claim for breach of the NDA. The court granted the summary judgment motion.

Was there trickery in drafting?

The NDA in many respects read like an NDA that would bind both parties to protect the other party’s confidential information. Its title contained the word “mutual”. It referred to a “Disclosing Party” and a “Receiving Party”. And it defined “Confidential Information” not by referring to the parties by name, but by saying that Confidential Information was comprised of certain information that the Disclosing Party makes available to the Receiving Party. So on quick glance, one might think it bound both parties to protect the other’s information.

But one critical feature of the agreement was fatal to Eastern’s claim. The word “Disclosing Party” was defined to include only Herbalife.

But what about other parts of the agreement?

Eastern argued that the parties intended the NDA to be mutually binding by pointing to the title of the agreement, references to the obligations of the “Parties”, and discussion of the remedies section which discussed remedies to which a “non-breaching party” would be entitled. Eastern argued that these instances of language showed that a remedy for breach should not be considered as available only for Herbalife.

Plain definitions prevailed

The court rejected Eastern’s argument, looking at the plain language of the agreement and noting that the general references that Eastern emphasized did not “vitiate” the NDA’s express definitions of “Disclosing Party” and “Confidential Information”.

Herbalife Int’l of America, Inc. v. Eastern Computer Exchange Inc., 2024 WL 1158344 (C.D. Cal., March 18, 2024)

See also:

Unauthorized press release caused drone software deal to crash

drone software

Usually back in the boilerplate section, technology contracts often contain a provision saying the parties will not issue press releases without the prior written consent of the other party. Here is a recent case where failure to strictly abide by such a requirement resulted in the breakdown of an important licensing arrangement, followed by expensive and difficult litigation.

An exciting drone software collaboration

Plaintiff entered into a software licensing agreement with defendant whereby plaintiff could use defendant’s avionics software for drones. The agreement gave plaintiff a limited exclusive license to certain functionality in the software.

The licensing agreement defined confidential information to include the terms of the agreement. The parties could not use any confidential information other than as required to exercise a right or perform an obligation under the agreement. The agreement also restricted the parties from issuing press releases without the other party’s prior written approval.

Fateful quick email exchange right before vacation

On a Sunday in August 2022, an employee of defendant wrote to defendant’s CEO, letting defendant know that plaintiff was developing a press release. The message concluded with, “Let me know if you have any objections, or if you want to send us a quote or have our PR team make a quote[.]”

Three minutes later the CEO wrote back with the following:  “That sounds great. I’m on vacay all week up in the Adirondacks. You guys can make up some quote – I’m sure it will be fine or at least a great start.”

Going public with what should have stayed private

On Wednesday of that week – without further contact with defendant – plaintiff issued a press release discussing the parties’ relationship. The press release stated, in part, that under the terms of the software licensing agreement between the parties, the “software will only be made available to [plaintiff],” and that “[c]ompetitors will have to develop their own software or secure licenses from others with inferior test performance.”

On Friday (probably the last day of the CEO’s “vacay . . . up in the Adirondacks”), defendant sent a letter to plaintiff terminating the agreement. Defendant cited to a provision of the agreement enabling it to terminate immediately upon breach of the agreement’s confidentiality provision. The letter explained that plaintiff had issued the press release without defendant’s consent and that the press release included confidential information.

And then the lawsuit

Plaintiff sued, asserting breach of contract, namely, that defendant improperly declared the agreement terminated, and improperly ceased fulfilling its obligations under the agreement. Defendant moved to dismiss the claims. The court granted the motion.

Court: defendant had the right to terminate

The court found that it was “express and plain” that the definition of confidential information included the terms of the agreement. And when plaintiffs disclosed language from the agreement discussing the exclusive license, plaintiffs breached the agreement, giving defendant a right to terminate, which it exercised.

The court also rejected plaintiff’s argument that defendant’s CEO’s Sunday pre-vacation quick response email gave consent for the press release. The court found that rather than serving as approval of the press release that was issued, the consent the CEO provided was for the continued development of a press release and qualified permission to make up a quote for him as part of the development process. Moreover, the harms to defendant arising from plaintiff’s mischaracterization of the parties’ relationship were “precisely the effects that are avoided by requiring ‘prior written consent’ before publication of Confidential Information in a press release.”

Red Cat Holdings, Inc. v. Autonodyne LLC, 2024 WL 342515 (Del. Ch., January 30, 2024)

See also:

Independent contractor agreements: common mistakes to avoid

A lot of companies bring on independent contractors to develop content. They may be photographers, designers, writers, consultants, etc. who sign independent contractor agreements. Here are three common mistakes that you should not make if you are hiring an independent contractor.

Intellectual property ownership mistakes in independent contractor agreements

The first common mistake is to leave out language that ensures you as the hiring party own the intellectual property in the deliverables. Did you know that unless the contract specifically says otherwise, the independent contractor will retain ownership of the copyright in the deliverables? Many companies have been surprised to learn, after spending a lot of money on an independent contractor, that they do not own the rights in the content they thought they had paid for.

The agreement should have a work made for hire provision. And since the definition of work made for hire is specific, some things that the contractor may do will not qualify as work made for hire. So the agreement should also say that to the extent the deliverables are not work made for hire, the independent contractor assigns the intellectual property to the party that hired it.

independent contractor agreement

Confidential information mistakes

The second common mistake that you should avoid in engaging with an independent contractor is being vague or loose when it comes to confidentiality. The independent contractor could learn a lot about your business – its vendors, its customers, its plans, and how the company operates. The confidentiality provision should adequately restrict how the independent contractor discloses that information or uses it outside of the engagement with the company. If not, that information may lose its trade secret protection. Or the contractor could take the information it learns about your company and use it while working for one of your competitors.

Indemnification mistakes

A third common mistake that you should avoid in independent contractor agreements is being silent on defense and indemnification. If a third party sues you over something that the independent contractor has done, you would likely want to look to the independent contractor to pick up the costs of defense and pay the amount of any judgment that results. Say, for example, the independent contractor copies a photograph from somewhere else and then provides that to you as his or her original work. If the true owner of the copyright in that work sues you for using the photo, it is only fair that you can turn to the contractor for relief. The agreement should say that.

See also: Independent contractor’s email was key factor in finding he had apparent authority to bind principal

About the author: Evan Brown is a technology and intellectual property attorney in Chicago. Follow him on Twitter and Instagram. Subscribe to his YouTube channel. 

Daughter’s Facebook post costs dad $80,000

A recent case illustrates why (1) it is important for parties to abide by the confidentiality provisions of settlement agreements, and (2) people who learn confidential information should keep their social media mouths shut.

Plaintiff sued his former employer (a private school) for age discrimination and retaliation. The parties later settled the case and entered an agreement containing the following provision:

13. Confidentiality … [T]he plaintiff shall not either directly or indirectly, disclose, discuss or communicate to any entity or person, except his attorneys or other professional advisors or spouse any information whatsoever regarding the existence or terms of this Agreement … A breach … will result in disgorgement of the Plaintiffs portion of the settlement Payments.

After the parties signed the settlement agreement, plaintiff’s college-age daughter posted this on Facebook:

Mama and Papa Snay won the case against Gulliver. Gulliver is now officially paying for my vacation to Europe this summer. SUCK IT.

facepalmDefendant school district refused to pay a portion of the settlement payments ($80,000), claiming plaintiff’s disclosure of the settlement to his daughter violated the confidentiality provision. Plaintiff asked the trial court to enforce the settlement agreement, which it did. Defendant sought review with the Court of Appeal of Florida. On appeal, the court agreed with the school and reversed.

The court found that “before the ink was dry on the [settlement] agreement, and notwithstanding the clear language of section 13 mandating confidentiality, [plaintiff] violated the agreement by doing exactly what he had promised not to do.” And his daughter “then did precisely what the confidentiality agreement was designed to prevent, advertising . . . that plaintiff had been successful in his age discrimination and retaliation case against the school.”

Gulliver Schools, Inc. v. Snay, — So.3d —, 2014 WL 769030 (Fla.App. 3 Dist. Feb 26, 2014)

Photo credit Flickr user haikus under this Creative Common license.

IBM’s Siri ban underscores important business concern over trade secrets

IBM doesn’t let its employees use Siri, out of concern Apple may store and use sensitive IBM data. This decision on IBM’s part underscores an important business concern that companies of all sizes — not just behemoths like IBM — either have or should have.

internet anonymity

Apple’s data usage policy that governs how it treats Siri inquiries says that Apple can use the information it collects to, among other things, improve the service. That’s a pretty broad grant of authority. Because the system that makes Siri available is so complex and multifaceted, Apple could reasonably justify extracting and using the information contained in just about any question people ask Siri. When that information comes from another major player in the competitive space, the implications of the appropriation of proprietary information become obvious.

IBM’s big concern is likely focused squarely on the protection of its trade secrets. State law provides the contours of trade secrets law, so the elements vary from state to state. But in general, a company can enforce its exclusive rights to possess and use information that (1) gives that company a competitive advantage, and (2) which is subject to efforts to keep secret. That latter part — keeping the information secret — is a big reason for nondisclosure agreements, password protected servers, and sensible restrictions on employee use of third party technologies (like social media and search tools like Siri).

Evan Brown is a Chicago technology and intellectual property attorney, representing businesses and individuals in a variety of situations, including matters dealing with the identification and protection of confidential business information.

Photo credit: Spec-ta-cles under this license.

Court allows discovery of competitor’s keyword purchases

Scooter Store, Inc. v. Spinlife.com, LLC, 2011 WL 2160462 (S.D. Ohio June 1, 2011)

The Scooter Store and a related company sued a competitor for trademark infringement and other causes of action for unfair competition based in part on the competitor’s purchase of keywords such as “scooter store” and “your scooter store” to trigger sponsored advertisements on the web. Defendant moved for summary judgment and also moved for a protective order that would prevent it from having to turn over information to plaintiffs concerning defendant’s purchase of the keywords. The court denied the motion for protective order.

Defendant argued that it should not have to turn over the information because plaintiffs’ trademark claims based on those keywords were without merit, as the words are generic terms for the goods and services plaintiffs provide. Defendant also asserted a need to protect the commercially sensitive nature of information about its keyword purchases.

The court rejected defendant’s arguments, ordering that the discovery be allowed. It held that “whether or not [p]laintiffs’ claims involving these terms survive summary judgment [] has no bearing on whether the discovery [p]laintiffs seek is relevant, particularly viewed in light of a party’s broad rights to discovery under Rule 26.” As for protecting the sensitivity of the information, the court found that such interests could be protected through the process of designating the information confidential, and handled accordingly by the receiving party.

Hiring subscribers to access competitor’s database gives rise to misappropriation claim

Reed Construction Data v. McGraw Hill Companies, No. 09-8578 (S.D.N.Y. September 14, 2010)

Court refuses to dismiss lawsuit in which plaintiff accused its competitor of paying others to subscribe to plaintiff’s proprietary database to get confidential information.

Plaintiff and defendant are fierce competitors that provide project news and information to the construction industry. (Really the parties are the only nationwide providers in this market space.) The companies sell subscriptions to their respective databases. Plaintiff requires its subscribers to sign a nondisclosure agreement, making them promise not to share information obtained from the database with others outside the subscriber’s company.

After plaintiff figured out that a copule of its subcribers worked for sham enterprises, it got wise to the notion that defendant had hired those subscribers to access the database. Plaintiff sued, claiming, among other things, misappropriation of confidential information under New York law.

Defendant moved to dismiss for failure to state a claim. The court denied the motion.

To state a claim for misappropriation of confidential information, plaintiff had to allege that defendant used plaintiff’s confidential information for the purpose of securing a competitive advantage. Defendant argued that a tort action for misappropriation was not proper because all that had happened was a use of information in violation of the nondisclosure agreements with the individuals allegedly hired by defendant to access plaintiff’s database.

The court rejected this argument for two reasons. First, plaintiff had not alleged that defendant was a party to the contract. So the liability could not be constrained to just breach of contract. Moreover, the court found, that the tortious conduct of misappropriation had a separate and additional existence apart from any contractual relationship, even if such a relationship did exist. The misappropriation sprang from circumstances extraneous to, and not constituting elements of, the subscription agreements with the parties defendant allegedly hired to access plaintiff’s information.

Court allows Wal-Mart to subpoena Facebook and MySpace

Ledbetter v. Wal-Mart Stores, Inc., 2009 WL 1067018 (D.Colo. April 21, 2009)

A couple of electricians were severely burned when the electrical system they were working on in an Aurora, Colorado Wal-Mart shorted out. They sued Wal-Mart over their injuries. One of the plaintiffs’ wives brought a claim for loss of consortium.

During discovery, Wal-Mart sent subpoenas to Facebook, MySpace and Meetup.com seeking information about the plaintiffs. The plaintiffs filed a motion for protective order which would have prevented the social networking sites from providing the requested information. The plaintiffs claimed that the information should be protected by the physician-patient privilege or, as for the loss of consortium claim, the spousal privilege. The court denied the motion and allowed the subpoenas.

The court held that an earlier protective order entered in the case (to which the parties had agreed) protected the confidentiality of the information. And the plaintiffs had put the purported confidential facts, i.e., the extent of the injuries and the nature of the consortium, at issue by bringing the suit. Moreover, the information sought by the subpoenas was reasonably calculated to lead to the discovery of admissible evidence and was relevant to the issues in the case.

It’s worth noting that the court might have had other reasons to deny the motion for protective order that it did not mention. A privilege of confidentiality is usually destroyed when it is disclosed to a third party. How could information on Facebook or MySpace still be secret? Unless Wal-Mart was only seeking private messages sent either between the spouses or one of the plaintiffs and a doctor, it would seem that most everything these sites would have would not be confidential in the first place.

Scroll to top