lynx   »   [go: up one dir, main page]

Stealing Trade Secrets and Economic Espionage: An Overview of the Economic Espionage Act

Stealing Trade Secrets and Economic Espionage: An Overview of the Economic Espionage Act

Updated October 29, 2024

Congressional Research Service

https://crsreports.congress.gov

R42681

Stealing Trade Secrets and Economic Espionage

Congressional Research Service

Summary

Stealing a trade secret is a federal crime when the information relates to a product in interstate or foreign commerce, 18 U.S.C. § 1832 (theft of trade secrets), or when the intended beneficiary is a foreign power, 18 U.S.C. § 1831 (economic espionage). Section 1832 requires that the thief be aware that the misappropriation will injure the secret’s owner to the benefit of someone else. Section 1831 requires only that the thief intend to benefit a foreign government or one of its instrumentalities.

Offenders face lengthy prison terms as well as heavy fines, and they must pay restitution. Moreover, property derived from the offense or used to facilitate its commission is subject to confiscation. The sections reach violations occurring overseas if the offender is a United States national or if an act in furtherance of the crime is committed within the United States.

Depending on the circumstances, misconduct captured in the two sections may be prosecuted under other federal statutes as well. A defendant charged with stealing trade secrets is often indictable under the Computer Fraud and Abuse Act, the National Stolen Property Act, or the federal wire fraud statute. One indicted on economic espionage charges may often be charged with acting as an unregistered foreign agent and on occasion with disclosing classified information or under the general espionage statutes. Finally, by virtue of the Defend Trade Secrets Act (P.L. 114-153), §§ 1831 and 1832 are predicate offenses for purposes of the federal racketeering and money laundering statutes.

The Defend Trade Secrets Act dramatically increased EEA civil enforcement options when it authorized private causes of action for the victims of trade secret misappropriation. In addition, the EEA now permits pre-trial seizure orders in some circumstances, counterbalanced with sanctions for erroneous seizures.

This report is available in an abridged version, without footnotes or attribution, as CRS Report R42682, Stealing Trade Secrets and Economic Espionage: An Abridged Overview of the Economic Espionage Act.

Stealing Trade Secrets and Economic Espionage

Congressional Research Service

Contents

Introduction ..................................................................................................................................... 1 Stealing Trade Secrets ..................................................................................................................... 1

Elements .................................................................................................................................... 1

Substantive Offense ............................................................................................................ 2 Attempt ............................................................................................................................... 7 Conspiracy .......................................................................................................................... 8

Consequences ............................................................................................................................ 8

Economic Espionage ....................................................................................................................... 9

Foreign Beneficiary ................................................................................................................. 10

Common Procedural Matters .......................................................................................................... 11

Protective Orders ...................................................................................................................... 11

Extraterritoriality ...................................................................................................................... 11

Prosecutorial Discretion .......................................................................................................... 12

Related Offenses ............................................................................................................................ 12

Civil Remedies .............................................................................................................................. 13

Private Cause of Action ........................................................................................................... 13

Pretrial Seizure .................................................................................................................. 13

Damages and Equitable Relief .......................................................................................... 14

Contacts

Author Information ........................................................................................................................ 15

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 1

Introduction

The Economic Espionage Act (EEA) outlaws two forms of trade secret theft: theft for the benefit of a foreign entity (economic espionage) and theft for pecuniary gain (theft of trade secrets).1 Under either proscription, the EEA’s reach extends to theft from electronic storage.2 Individual offenders face imprisonment for up to 15 years for economic espionage and up to 10 years for trade secret theft.3 Individuals also may incur fines of up to $250,000 or twice the loss or gain associated with the offense for trade secret theft, whichever is greater.4 For economic espionage, individuals face fines of up $5 million or twice the loss or gain.5 Organizations are fined more severely. They can be fined up $5 million, twice the loss or gain associated with the offense, or three times the value of the stolen trade secret, for trade secret theft.6 For economic espionage, the fines for organizations jump to a maximum of the greater of $10 million, three times the value of the trade secret, or twice the gain or loss associated with the offense.7

A court may assess the same sanctions for attempt or conspiracy to commit either offense, or for aiding or abetting the completed commission of the either offense.8 A sentencing court must order the defendants to pay victim restitution, and the government may confiscate any property that is derived from or used to facilitate either offense.9 The government may seek to enjoin violations,10 and, by virtue of amendments in the Defend Trade Secrets Act of 2016,11 victims may be entitled to sue for double damages, equitable relief, and attorneys’ fees.12

Conduct that violates the EEA’s proscriptions may also violate other federal prohibitions. Some statutes, like the Computer Fraud and Abuse Act, impose criminal penalties and also authorize victims to sue for damages and other forms of relief under some circumstances.13

Stealing Trade Secrets

Elements

The trade secrets prohibition is the more complicated of the EAA’s two criminal offenses. It prohibits three sets of actions. First, it condemns:

1 18 U.S.C. §§ 1831 (economic espionage), 1832 (theft of trade secrets).

2 “Whoever ... without authorization ... downloads, uploads ... transmits ... or conveys such [trade secret] information.” Id. §§ 1831(a)(2), 1832(a)(2).

3 Id. §§ 1832(a), 1831(a).

4 Id. §§ 1832(a), 3571(b). Here and elsewhere, 18 U.S.C. § 3571(d) provides as a general matter that the maximum for a criminal fine of any federal criminal offense is the greater of the standard amount set for the particular offense (e.g., $250,000 for individuals convicted of a felony) or twice the gain or loss resulting from the offense.

5 Id. §§ 1831(a), 3571(d).

6 Id. §§ 1832(b), 3571(d).

7 Id. §§ 1831(b), 3571(d).

8 Id. §§ 1831(a)(4) (attempt), (5) (conspiracy), 1832(a)(4) (attempt), (5) (conspiracy); 2 (aiding and abetting).

9 Id. §§ 1834 (forfeiture and restitution), 2323(c) (restitution), 2323(a) (civil forfeiture), 2323(b) (criminal forfeiture).

10 Id. § 1836.

11 P.L. 114-153, § 2, 130 Stat. 376 (2016).

12 18 U.S.C. § 1836.

13 E.g., id. §§ 1030(g) (computer fraud and abuse), 2520 (interception of electronic communications), 2707 (unauthorized access to an electronic communications facility).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 2

(1) Whoever (2) with intent to convert (3) a trade secret (4) related to (5) a product or service (6)(a) used in or

(b) intended for use in

(7)(a) interstate commerce or

(b) foreign commerce

(8) to the economic benefit of anyone other than the owner thereof (9)(a) intending or

(b) knowing

(10) that the offense will injure the owner of that trade secret (11) knowingly (12)(a) steals, without authorization appropriates, takes, carries away, conceals, or by fraud, artifice, or deception obtains such information,

(b) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information; [or] (c)(i) receives, buys, or possesses such information,

(ii) knowing the same to have been stolen or appropriated, obtained, or converted without authorization.14

The statute also condemns “[w]hoever . . . attempts” to do so and “[w]hoever . . . conspires with one or more other persons to [do so], and one or more of such persons do any act to effect the object of the conspiracy.”15

Substantive Offense

Whoever

The term “whoever” encompasses both individuals and organizations. Thus, individuals and organizations may be guilty of the theft of trade secrets. Subsection 1832(b) confirms this intent by establishing a special fine for “organizations” who commit the offense. For purposes of the federal criminal code, an “organization” is any “person other than an individual.”16 The

14 18 U.S.C. § 1832; United States v. Smith, 22 F.4th 1236, 1243 (11th Cir. 2022) (“Theft of trade secrets consists of five elements: first, the defendant must intend to convert proprietary information to the economic benefit of another other than the owner; second, the proprietary information must be a trade secret; third, thew defendant must knowingly steal, take without authorization, or obtain by fraud or deception trade secret information; fourth, the defendant, must intend or know that the offense would injure the owner of the trade secret; and finally, the trade secret must be related to a product that is in interstate or foreign commerce.”); United States v. Liu, 716 F.3d 159, 169-70 (5th Cir. 2013); U.S. Dep’t of Just., CRIM. RES. MANUAL §1129 (1999) (language in italics substituted to reflect P.L. 112-235’s amendments) (“In order to establish a violation of 18 U.S.C. § 1832, the government must prove: (1) the defendant stole, or without authorization of the owner, obtained, destroyed, or conveyed information; (2) the defendant knew this information was proprietary; (3) the information was in fact a trade secret; (4) the defendant intended to convert the trade secret to the economic benefit of anyone other than the owner; (5) the defendant knew or intended that the owner of the trade secret would be injured; and (6) the trade secret was related to [a product or service used in or intended for use in] interstate or foreign commerce”).

15 18 U.S.C. § 1832(a)(4)-(5).

16 Id. § 1832.

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 3

Dictionary Act supplies examples of the type of entities that may qualify as “persons,” i.e., “the words ‘person’ and ‘whoever’ include corporations, companies, associations, firms, partnerships, societies, and joint stock companies, as well as individuals.”17

With Intent to Convert

Conversion is a common law concept which is defined as “[t]he wrongful possession or disposition of another’s property as if it were one’s own” or “an act or series of acts of willful interference, without lawful justification, with any item of property in a manner inconsistent with another’s right, whereby that other person is deprived of the use and possession of the property.”18 This “intent to steal” element, coupled with the subsequent knowledge and “intent to injure” elements, would seem to ensure that a person will not be convicted of theft for the mere inadvertent or otherwise innocent acquisition of a trade secret.

Trade Secret

An EEA trade secret is any information that “(A) the owner thereof has taken reasonable measures to keep such information secret; and (B) . . . derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the public.”19 An owner for these purposes is one “in whom or in which rightful legal or equitable title to, or license in, the trade secret is reposed.”20

Whether an owner has taken reasonable measures to ensure the secrecy of his trade information will depend upon the circumstances of the case. Such measures would ordinarily include limiting access to the information and notifying employees of its confidential nature.21 Inclusion within

17 1 U.S.C. § 1 (emphasis added).

18 Conversion, BLACK’S LAW DICTIONARY (12th ed. 2024).

19 18 U.S.C. § 1839(3) (“[T]the term ‘trade secret’ means all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if - (A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from the disclosure or use of the information”). The Defend Trade Secrets Act added the language in italics, P.L. 114-153, § 2(b)(1)(A), 130 STAT. 380 (2016).

20 18 U.S.C. § 1839(4).

21 Allstate Ins. Co. v. Fougere, 79 F.4th 172, 192 (1st Cir. 2023) (“To determine whether a company took reasonable steps to protect its trade secrets, courts have considered ‘1) the existence or absence of a [confidentiality agreement], 2) the nature and extent of precautions taken, 3) the circumstances under which the information was disclosed and 4) the degree to which the information has been placed in the public domain or rendered readily ascertainable.’”) (quoting TouchPoint Sols., Inc. v. Eastman Kodak Co., 345 F. Supp. 2d 23, 29 (D. Mass. 2004)); United States v. Chung, 659 F.3d 815, 825 (9th Cir. 2011) (citations omitted) (“[R]easonable measures for maintaining secrecy have been held to include advising employees of the existence of a trade secret, limiting access to a trade secret on a ‘need to know basis’, and controlling plant access. . . . Security measures, such as locked rooms, security guards, and document destruction methods, in addition to confidentiality procedures, such as confidentiality agreements and document labeling, are often considered reasonable measures.”) (quoting UNIF. TRADE SECRETS ACT, § 1 cmt, 14 U.L.A. 438, 439 (1990)); United States v. Howley, 707 F.3d 575, 579 (6th Cir. 2013) (“A reasonable jury could find that Goodyear took reasonable measures to keep the design of its tire-assembly machines secret. Goodyear surrounded its Topeka factory with a fence and required visitors to pass through a security checkpoint. Before [visitors] entered the factory, they had to obtain advance permission from Goodyear, sign confidentiality agreements and agree not to take photographs during their visit. And Goodyear required all of its suppliers … to keep Goodyear’s proprietary information secret. ... The ‘reasonable measures’ requirement does not mean a company must keep its own employees and suppliers in the dark about machines they need to do their work.”).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 4

the definition of “trade secret” of the instruction that the owner take “reasonable measures” to secure the confidentiality of the information does not render the statute unconstitutionally vague as applied to a defendant whose conduct clearly falls within the statute’s proscription.22

Construction of the “known or readily ascertainable” element of the secrecy definition is more perplexing. On its face, the EEA suggests that information is secret if it is unknown or undiscoverable by the general public, even if it might be known or discoverable within the industry in which the information is relevant. Congress, however, may have intended a narrower interpretation of “secret,” that is, the information is secret only if it is not known to or reasonably ascertainable either by the general public or within the industry in which the information has value.

The EEA’s definition of “trade secret” is “based largely on the definition of that term in the Uniform Trade Secrets Act.”23 The EEA definition initially referred to information known to or readily ascertainable by the “public.”24 The Uniform Trade Secrets Act (UTSA) definition, however, refers not to the public but to information known to or readily ascertainable by “other persons who can obtain economic value from its disclosure or use.”25 The Defend Trade Secrets Act replaced the original definition with the UTSA language.26

Related to a Product or Service in Commerce

The trade secret must have an interstate or foreign commerce nexus. More specifically, it must be one “that is related to a product or service used in or intended for use in” such commerce.27 Congress settled upon this phrase after an appellate court held that earlier language covered only theft of a trade secret related to a product that was, or was intended to be, sold or otherwise placed in the stream of commerce.28

22 United States v. Krumrei, 258 F.3d 535, 539 (6th Cir. 2001); see also United States v. Genovese, 409 F. Supp. 2d 253, 257 (S.D.N.Y. 2005) (rejecting the contention that the “not ... generally known ... to the public” element of the definition of a trade secret was unconstitutionally vague as applied when the evidence showed that the defendant clearly understood that the information he downloaded was not generally known).

23 H.R. REP. NO. 104-788, at 12 (1996); Chung, 659 F.3d at 825.

24 18 U.S.C. § 1839(3)(B).

25 UNIF. TRADE SECRETS ACT § 1(4), 14 U.L.A. 538 (2005). The UNIFORM TRADE SECRETS ACT definition of trade secrets reads in its entirety: “‘Trade Secret’ means information, including a formula, pattern, compilation, program, device, method, technique, or process that: (i) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.”

26 18 U.S.C. § 1839; H.R. REP. NO. 114-529, at 13-14 (2016) (“The intent of §2(b)(1)(A) – striking ‘the public’ and inserting ‘another person who can obtain economic value from the disclosure or use of the information’—is to bring the Federal definition of a trade secret into conformity with the definition used in the Trade Secrets Act (‘UTSA’). Both the U.S. Court of Appeals for the Seventh Circuit in United States v. Lange, 312 F.3d 263, 267 (7th Cir. 2002), and the U.S. Court of Appeals for the Third Circuit, in United States v. Hsu, 155 F.3d 189, 196 (3d Cir. 1998), have identified this difference between the UTAS and the Federal definition of a trade secret as potentially meaningful. While other minor differences between the UTSA and Federal definition of a trade secret remain, the Committee does not intend for the definition of a trade secret to be meaningfully different from the scope of that definition as understood by courts in States that have adopted the UTSA.”).

27 18 U.S.C. § 1832(a) (“Whoever, with intent to convert a trade secret that is related to a product or service used in or intended for use in interstate or foreign commerce . . . ”); United States v. Smith, 22 F.4th 1236, 1243 (11th Cir. 2023).

28 United States v. Aleynikov, 676 F.3d 71, 80-82 (2d Cir. 2012) (construing 18 U.S.C. § 1832(a), which at the time read: “Whoever, with intent to convert a trade secret that is related to or included in a product that is produced for or placed in interstate or foreign commerce ... ”). P.L. 112-236 (2021) struck the language in italics in favor of that quoted (continued...)

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 5

Economic Benefit of Another

Someone other than the trade secret’s owner must be the intended beneficiary of the theft or destruction.29 The thief may be, but need not be, the intended beneficiary.30 Moreover, a close reading of the statute argues for the proposition that no economic benefit need actually accrue; economic benefit need only be intended. Yet if no economic benefit is intended, there is no violation.31

Intent to Injure

The government must prove that the defendant intended to injure the trade secret’s owner or that he knew the owner would be injured.32 However, it need not show actual injury.33 The section “does not require the government to prove malice or evil intent, but merely that the actor knew or was aware to a practical certainty that his conduct would cause some disadvantage to the rightful owner.”34 Again, the element addresses the defendant’s state of mind, not reality. Nothing in the statute’s language demands that the government prove actual injury.35

Knowingly

The last of the section’s three mens rea requirements demands that the defendant be aware that he is stealing, downloading, or receiving a stolen trade secret. There is some dispute over whether this requires the prosecution to prove that the defendant knew that he was stealing, downloading, or receiving proprietary information or that he knew that he was stealing, downloading, or receiving a trade secret. The Department of Justice has used the section’s legislative history to reinforce its understanding of this feature of the section:

Based upon the legislative history, the government is not required to prove that the defendant knew and understood the statutory definition of a trade secret, as set forth in 18 U.S.C. § 1839(3), before acting. If the government had to prove this, the EEA would be unnecessarily narrowed in its application, which is contrary to the intent of Congress. Some violations would be nearly impossible to prosecute in a number of factual scenarios, and would amount to a willfulness mens rea requirement equivalent to that imposed for criminal copyright infringement. For example, as part of protecting and limiting a trade secret to those on a need-to-know basis, some companies do not divulge all of the reasonable measures used to protect the trade secret, even within the company. The

in italics in the previous footnote in order to overcome the implications of Aleynikov. 158 CONG. REC. 15509 (2012) (introductory remarks of Sen. Leahy).

29 18 U.S.C. § 1832(a); United States v. Xue, 42 F.4th 355, 365 (3d Cir. 2022); Smith, 22 F.4th at 1243.

30 Off. Leg. Educ., Dep’t of Just., PROSECUTING INTELLECTUAL PROPERTY CRIMES 185 (2013), available at http://www.justice.gov/criminal/cybercrime/docs/prosecuting_ip_crimes_manual_2013.pdf. (hereinafter JUSTICE REPORT) (“The recipient of the intended benefit can be the defendant, a competitor of the victim, or some other person or entity”).

31 Id. (“One who misappropriates a trade secret but who does not intend for anyone to gain economically from the theft cannot be prosecuted under [the section]”).

32 18 U.S.C. § 1832(a); Xue, 42 F.4th at 365; Smith, 22 F.4th at 1243. Cf. United States v. You, 74 F.4th 378, 392 (6th Cir. 2023).

33 United States v. Yihao Pu, 814 F.3d 818, 828 (7th Cir. 2016).

34 H.R. REP. NO. 104-788, at 11-12 (1996), quoted in Justice Report, supra note 30, at 185.

35 United States v. Jin, 733 F.3d 718, 721 (7th Cir. 2013) (“The government doesn’t have to prove that the owner of the secret actually lost money as a result of the theft. For remember that the independent economic value attributable to the information’s remaining secret need only be ‘potential,’ as distinct from ‘actual’”).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 6

individual stealing a trade secret may not know about these reasonable measures safeguarding the trade secret.

The legislative history is clear that Congress intended to extend the reach of the new federal offenses involving trade secret misappropriation. In fact, the legislative history supports a “knew or should have known” mens rea requirement:

It is not necessary that the government prove that the defendant knew his or her actions were illegal, rather the government must prove that the defendant’s actions were not authorized by the nature of his or her relationship to the owner of the property and that the defendant knew or should have known that fact.

H.R. REP. NO. 104-788, at 12 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4030-31 (emphasis added); 142 CONG. REC. 27,117 (1996) (government must show the defendant was “aware or substantially certain” he was misappropriating a trade secret); see also United States v. Genovese, 409 F. Supp. 2d 253, 258 (S.D.N.Y. 2005) (discussing circumstances that would indicate that EEA defendant knew the information was proprietary).

Congress did not require the government to show that the defendant specifically was aware of each element of the definition of a trade secret under § 1839(3) (e.g., that the defendant knew of specific reasonable measures employed by the trade secret owner to protect the trade secret). An opportunistic defendant, such as a company outsider, may not be fully aware of all of the company measures used to safeguard a trade secret, but does know the proprietary information has value which he intends to use to injure the owner of the trade secret. In other words, the defendant knowingly misappropriated property (or proprietary information) belonging to someone else without permission. In fact, in recognizing this point, the Sixth Circuit has held that the “defendant need not have been aware of the particular security measures taken by [the trade secret owner]. Regardless of his knowledge of those specific measures, defendant knew the information was proprietary.” Krumrei, 258 F.3d at 539 (affirming denial of motion to dismiss indictment as void for vagueness); see also United States v. Roberts, No. 3:08-CR-175, 2009 WL 5449224, at *7 (E.D. Tenn. Nov. 17, 2009) (holding that “a defendant must know that the information he or she seeks to steal is proprietary, meaning belonging to someone else who has an exclusive right to it, but does not have to know that it meets the statutory definition of a trade secret”), report and recommendation adopted by, 2010 WL 56085 (E.D. Tenn. Jan. 5, 2010) (quoting H.R. Rep. No. 104-788, at 12 (1996)).36

The courts have not always agreed. Some insist that the prosecution show that the defendant knew the information “had the general attributes of a trade secret.”37

36 Justice Report, supra note 30, at 177-79; see also United States v. Chung, 633 F. Supp. 2d 1134, 1143 (C.D. Cal. 2009), aff’d, 659 F.3d 815 (9th Cir. 2011) (“It is not explicitly clear from the language of section 1831(a)(3) [which corresponds to section 1832(a)(3)] whether the word ‘knowingly’ modifies the ‘trade secret’ element of the offense. The Government argues that it does not, and therefore it does not have to prove that Mr. Chung knew that the information he possessed was a trade secret. Mr. Chung contends that the Government must prove that he had such knowledge. The Court agrees with Mr. Chung.”).

37 United States v. Jin, 833 F. Supp. 2d 977, 1012 (N.D. Ill. 2012) ), aff’d, 733 F.3d 718 (7th Cir. 2013); United States v. You, 74 F.4th 378, 393-94 (6th Cir. 2023) (“You did not need to know the technical particulars of the stolen information to know enough for a conviction under the EEA. Knowing that the information was proprietary was enough for a conviction, even if the jury did not expressly find that You knew the value of keeping this information secret or the specific measures used to protect it.”).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 7

Stealing and the Like

A person may be guilty of the theft of a trade secret only if he “knowingly” steals a trade secret, replicates a trade secret, destroys or alters a trade secret, or receives a stolen trade secret. Each of the alternative means of deprivation is cast in a separate subsection. The first subsection covers not only stealing a trade secret, but also concealing it or acquiring it by fraud.38

Trade secrets are information and thus can be simultaneously held by an owner and a thief. As a result, the second subsection covers situations where the owner is not necessarily deprived of the information, but is denied control over access to it. It proscribes unauthorized copying, downloading, uploading, or otherwise conveying the information. It also outlaws alteration or destruction of a trade secret.39 The Justice Department has argued that this second means of misappropriation includes instances where a faithless employee, former employee, or cyber intruder commits the trade secret to memory and subsequently acts in a manner necessary to satisfy the other elements of the offense.40 It makes the point with some caveats, however:

This is not to say, however, that any piece of business information that can be memorized is a trade secret. As noted, the EEA does not apply to individuals who seek to capitalize on their lawfully developed knowledge, skill, or abilities. When the actions of a former employee are unclear and evidence of theft has not been discovered, it may be advisable for a company to pursue its civil remedies and make another criminal referral if additional evidence of theft is developed. Where available, tangible evidence of theft or copying is helpful in all cases to overcome the potential problem of prosecuting the defendant’s “mental recollections” and a defense that “great minds think alike.”41

The third subsection outlaws the knowing receipt of stolen trade secret information.42 Conviction requires proof that a trade secret was stolen or converted in violation of one of the other subsections and that the defendant knew it.43

Attempt

Defendants who attempt to steal a trade secret face the same penalties as those who succeed.44 Attempt consists of intent to commit the offense and a substantial step toward the attainment of

38 18 U.S.C. § 1832(a)(1).

39 Id. § 1832(a)(2).

40 Justice Report, supra note 29 at 175-76. See James H.A. Pooley et al., Understanding the Economic Espionage Act of 1996, 5 TEX. INTELL. PROP. L.J. 177 (1997). In this respect, as in others, the EEA echoes civil law and some pre-EEA case law. See, e.g. , 4 Roger M. Milgrim, MILGRIM ON TRADE SECRETS §15.01[e]; Stampede Tool Warehouse v. May, 651 N.E.2d 209, 217 (Ill. App. Ct. 1995) (‘A trade secret can be misappropriated by physical copying or by memorization.’) (citations omitted). Trade secret cases to the contrary that do not involve the EEA are thus not persuasive authority on this point”). See also Thirty-Eighth Annual Survey of White Collar Crime: Intellectual Property Crimes, 60 AM. CRIM. L. REV. 1003 (2023).

41 Justice Report, supra note 30, at 155.

42 18 U.S.C. § 1832(a)(3).

43 Id.; United States v. Jin, 833 F. Supp. 2d 977, 1015 (N.D. Ill. 2012), aff’d, 733 F.3d 718 (7th Cir. 2013).

44 18 U.S.C. § 1832(a).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 8

that goal.45 This would indicate that the information which the defendant seeks to steal need not be a trade secret, as long as he believes it is.46

Conspiracy

Defendants who conspire to steal a trade secret also face the same penalties as those who commit the substantive offense.47 “In order to find a defendant guilty of conspiracy, the prosecution must prove . . . that the defendant possessed both the intent to agree and the intent to commit the substantive offense. In addition, the government must prove that at least one conspirator committed an overt act, that is, took an affirmative step toward achieving the conspiracy’s purpose.”48 It is no defense that circumstances, unbeknownst to conspirators, rendered success of the scheme unattainable, as for example when the defendants plotted to steal information that was not in fact a trade secret.49

Consequences

Individual offenders face imprisonment for up to 10 years and fines of up to $250,000.50 The court may fine an organization up to $5 million upon conviction.51 Individuals face a higher maximum fine if twice the gain or loss associated with the offense exceeds the statutory maximum (i.e., $250,000).52 The corresponding increase for organizations is the greater of the statutory amount ($5,000,000) or three times the gain realized by the defendant.53 A sentencing court must also order the defendant to pay restitution to the victims of the offense.54 Property derived from, or used to facilitate, commission of the offense may be subject to confiscation under either civil or criminal forfeiture procedures.55 The Attorney General may sue for injunctive relief, and owners may sue for damages, equitable relief, and attorneys’ fees.56 Finally, the offense

45 United States v. Hsu, 155 F.3d 189, 202-203 (3d Cir. 1998); United States v. Lange, 312 F.3d 263, 268 (7th Cir. 2002); United States v. Yang, 281 F.3d 534, 543 (6th Cir. 2002); United States v. O’Rourke, 417 F. Supp. 3d 996, 1002 (N.D. Ill. 2019).

46 Hsu, 155 F.3d at 203 (“It naturally follows that the government need not prove that an actual trade secret was used during the EEA investigation, because the defendant’s culpability for a charge of attempt depends only on the ‘circumstances as he believes them to be,’ not as they really are.”); Yang, 281 F.3d at 543-44 (“The Yangs believed that the information Lee was providing was trade secrets belonging to Avery. They attempted to steal that information. The fact that they actually did not receive a trade secret is irrelevant.”). Cf. United States v. Nosal, 844 F.3d 1024, 1045 (9th Cir. 2016); O’Rourke, 417 F. Supp.3d at 1002-03. But see Lange, 312 F.3d at 269 (“But it is far less clear that [the] sale of information already known to the public could be deemed a substantial step toward the offense, just because the defendant is deluded and does not understand what a trade secret is.... We need not pursue the subject beyond noting the plausibility of the claim and its sensitivity to the facts – what kind of data did the employee think he stole, and so on. For it is not necessary to announce a definitive rule about how dangerous the completed acts must be in trade secret cases: the judge was entitled to (and did) find that Lange had real trade secrets in his possession.”).

47 18 U.S.C. § 1832(a).

48 United States v. Martin, 228 F.3d 1, 10-11 (1st Cir. 2000). Cf. United States v. Chung, 659 F.3d 815, 828-29 (9th Cir. 2011).

49 Hsu, 155 F.3d at 203-204; Yang, 281 F.3d at 544.

50 18 U.S.C. §§ 1832(a), 3571.

51 Id. § 1832(b).

52 Id. § 3571(d).

53 Id. § 1832(b).

54 Id. §§ 1834, 2323(c), 3663A(a), (c). See generally CRS Report RL34138, Restitution in Federal Criminal Cases, by Charles Doyle.

55 18 U.S.C. §§ 1834, 2332(a), (b). See generally, CRS Report 97-139, Crime and Forfeiture, by Charles Doyle.

56 18 U.S.C. § 1836.

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 9

is a predicate offense under the Racketeer Influenced and Corrupt Organizations Act (RICO)57 and consequently a money laundering predicate offense.58

Economic Espionage

The EEA’s economic espionage and theft of trade secret offenses share many of the same elements.59 There are four principal differences. The theft of a trade secret must involve the intent to benefit someone other than the owner.60 It must involve an intent to injure the owner.61 And, it must involve a trade secret “that is related to or included in a product that is produced for or placed in interstate or foreign commerce.”62 Economic espionage, on the other hand, must involve an intent to benefit a foreign entity or at least involve the knowledge that the offense will have that result.63 It does not require an intent to injure the owner.64 And, it applies to any trade secret, notwithstanding the absence of any connection to interstate or foreign commerce.65 Finally, economic espionage is punished more severely. The maximum term of imprisonment is 15 years rather than 10 years, and the maximum fine for individuals is $5 million rather than $250,000.66 For organizations, the maximum fine is the greater of $10 million or three times the value of the trade secret rather than $5 million.67 As in the case of stealing trade secrets, the maximum permissible fine may be higher if twice the amount of the gain or loss associated with the offense exceeds the otherwise applicable statutory maximum.68 And the crime is likewise a RICO69 and, consequently, a money laundering predicate offense.70

Section 1831 condemns:

(1) Whoever (2) intending or knowing the offense will benefit (3) (a) a foreign government,

(b) a foreign instrumentality, or (c) a foreign agent

(4) knowingly

57 Id. § 1961(1). RICO makes it a federal crime, among other things, to conduct the affairs of commercial enterprise through the patterned commission of a series of federal or state crimes (predicate offenses), 18 U.S.C. §§ 1961-1963. See generally CRS Report 96-950, RICO: A Brief Sketch, by Charles Doyle.

58 18 U.S.C. §§ 1956(c)(7)(A), 1957(f)(3). Section 1957 makes it a federal crime to engage in a monetary transaction using property generated by a predicate offense worth more than $10,000. Section 1956 makes it a federal crime to launder the proceeds of a predicate offense or to use them to promote further offenses. See generally CRS Report RL33315, Money Laundering: An Overview of 18 U.S.C. § 1956 and Related Federal Criminal Law, by Charles Doyle.

59 18 U.S.C. §§ 1831, 1832.

60 Id. § 1832(a).

61 Id.

62 Id.

63 Id. § 1831(a); United States v. Jin, 833 F. Supp. 2d 977, 1019 (N.D. Ill. 2012), aff’d, 733 F.3d 718 (7th Cir. 2013).

64 Id.

65 Id.; United States v. Aleynikov, 676 F.3d 71, 79 (2d Cir. 2012) (“Thus there is a limitation – [a nexus to] interstate or foreign commerce – in the statute Aleynikov is charged with violating, a limitation that does not appear in the otherwise parallel foreign espionage statute.”).

66 18 U.S.C. §§ 1831(a), 1832(a).

67 Id. §§ 1831(b), 1832(b).

68 Id. § 3571(d).

69 Id. § 1961(1).

70 Id. §§ 1956(c)(7)(A), 1957(f)(3).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 10

(5)(a) steals, without authorization appropriates, takes, carries away, conceals, or by fraud, artifice, or deception obtains a trade secret,

(b) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret; [or] (c) (i) receives, buys, or possesses a trade secret, (ii) knowing the same to have been stolen or appropriated, obtained, or converted without authorization.71

It also condemns “[w]hoever . . . attempts” to do so and “[w]hoever . . . conspires with one or more other persons to [do so], and one or more of such persons do any act to effect the object of the conspiracy.”72

Foreign Beneficiary

A casual reader might conclude that any foreign entity would satisfy Section 1831’s foreign beneficiary element.73 Section 1839’s definition of foreign agent and foreign instrumentality, however, makes it clear that an entity can only qualify if it has a substantial connection to a foreign government. The definition of foreign instrumentality refers to foreign governmental control or domination.74 The description of a foreign agent leaves no doubt that the individual or entity must be the agent of a foreign government.75

The theft of a trade secret demands an intent to confer an economic benefit.76 Economic espionage is not so confined. Here, “benefit means not only economic benefit but also reputational, strategic, or tactical benefit.”77 Moreover, unlike the theft offense, economic espionage may occur whether the defendant intends the benefit or is merely aware that it will follow as a consequence of his action.78 As in the case of trade secret theft, however, the benefit need not be realized; it is enough that defendant intended to confer it.79

71 Id. § 1831; see also United States v. Chung, 633 F. Supp. 2d 1134, 1146 (C.D. Cal. 2009), aff’d, 659 F.3d 815 (9th Cir. 2011) (“Accordingly, under section 1831(a)(3), the Government must prove five elements: (1) Mr. Chung intended to benefit a foreign government; (2) Mr. Chung knowingly possessed trade secret information; (3) Mr. Chung knew the information was obtained without authorization; (4) the information Mr. Chung possessed was, in fact, a trade secret; and (5) Mr. Chung knew the information was a trade secret.”); U.S. Dep’t of Just., CRIM. RES. MANUAL. § 1124 (1999) (“In order to establish a violation of 18 U.S.C. §1831, the government must prove: (1) the defendant stole or, without authorization of the owner, obtained, destroyed, or conveyed information; (2) the defendant knew this information was proprietary; (3) the information was in fact a trade secret; and (4) the defendant knew the offense would benefit or was intended to benefit a foreign government, foreign instrumentality, or foreign agent.”).

72 18 U.S.C. § 1831(a)(4)-(5).

73 Id. § 1831(a).

74 Id. § 1839(1); United States v. You, 74 F.4th 378, 396 (6th Cir. 2023).

75 18 U.S.C. § 1839(1) (“As used in this chapter . . . (2) the term ‘foreign agent’ means any officer, employee, proxy, servant, delegate, or representative of a foreign government.”).

76 18 U.S.C. § 1832(a) (“Whoever, with the intent to convert a trade secret . . . to the economic benefit of anyone other than the owner . . . ”).

77 H.R. REP. NO. 104-788, at 11 (1996).

78 18 U.S.C. §§ 1832(a) (“Whoever, with the intent to convert a trade secret . . . to the economic benefit of anyone other than the owner . . . ”), 1831(a) (“Whoever, intending or knowing that the offense will benefit . . . ”).

79 Id.

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 11

Common Procedural Matters

Protective Orders

It would be self-defeating to disclose a victim’s trade secrets in the course of the prosecution of a thief. Consequently, the EEA authorizes the trial court to issue orders to protect the confidentiality of trade secrets during the course of a prosecution and permits the government to appeal its failure to do so.80 The government may not appeal an order to reveal information it has already disclosed to the defendant.81 Nevertheless, in such instances, appellate review of a district court’s disclosure order may be available through a writ of mandamus.82

Extraterritoriality

The Supreme Court has said on a number of occasions that “[i]t is a longstanding principle of American law ‘that legislation of Congress, unless a contrary intent appears, is meant to apply only within the territorial jurisdiction of the United States.’”83 With this in mind, Congress specifically identified the circumstances under which it intended the economic espionage and theft of trade secrets provisions to apply overseas.84 Either offense may be prosecuted as long as the offender is a U.S. national or an act in furtherance of the offense is committed within this country.85

80 Id. § 1835; United States v. Hsu, 155 F.3d 189, 193-94 (3d Cir. 1998).

81 United States v. Ye, 436 F.3d 1117, 1120-121 (9th Cir. 2006) (“The plain language of the EEA indicates that the government can file an interlocutory appeal pursuant to § 1835 only where a district court’s order actually directs or authorizes the disclosure of a trade secret. . . . Here, the district court’s order did not provide for the disclosure of any trade secret materials. In its opening brief in this court, the government acknowledges that it had already turned over all relevant trade secret materials and documents.... Because the purpose of the district court’s order was only to clarify exactly which materials the government contends constitute the protected trade secrets, and all relevant materials had already been turned over, the district court’s order does not direct or authorize the ‘disclosure’ of trade secrets as required by the plain language of § 1835.”); see also Janssen Prod., L.P. v. eVenus Pharm. Lab. Inc., 85 F.4th 147, 152 (3d Cir. 2023) (noting the interlocutory appellate feature of § 1835a)).

82 Ye, 436 F.3d. at 1121-24. Mandamus relief is a discretionary remedy ordinarily only available when the petitioner can show: the absence of any other form of relief, a clear right to issuance of the writ, and that recourse to this extraordinary form of relief is appropriate under the circumstances, Cheney v. United States District Court, 542 U.S. 367, 380-81 (2004). The lower federal appellate courts sometimes describe these requirements in greater detail. See e.g., Lewis v. Ayers, 681 F.3d 992, 998 (9th Cir. 2012) (“In Bauman, we established five guidelines to determine whether mandamus is appropriate in a given case: (1) whether the petitioner has no other means, such as a direct appeal to obtain the desired relief; (2) whether the petitioner will be damaged or prejudiced in any way not correctable on appeal; (3) whether the district court’s order is clearly erroneous as a matter of law; (4) whether the district court’s order is an oft repeated error or manifests a persistent disregard of the federal rules; and (5) whether the district court’s order raises new and important problems or issues of first impression.”); In re Jones, 680 F.3d 640, 642 (6th Cir. 2012).

83 RJR Nabisco v. Eur. Cmty, 579 U.S. 325, 335 (2016) (“When a statute gives no clear indication of an extraterritorial application, it has none.”); Morrison v. Nat. Austl. Bank Ltd., 561 U.S. 247, 255 (2010) (quoting EEOC v. Arabian Am. Oil Co., 449 U.S. 244, 248 (1991) and Foley Bros., Inc. v. Filardo, 336 U.S. 281 (1949)). See generally, CRS Report 94-166, Extraterritorial Application of American Criminal Law, by Charles Doyle.

84 H.R. REP. NO. 104-788, at 14 (1996).

85 18 U.S.C. § 1837 (“This chapter also applies to conduct occurring outside the United States if - (1) the offender is a natural person who is a citizen or permanent resident alien of the United States, or an organization organized under the laws of the United States or a State or political subdivision thereof; or (2) an act in furtherance of the offense was committed in the United States.”).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 12

The legislative history indicates that these are the only circumstances under which violations abroad may be prosecuted.86 This may mean that foreign conspirators may not be charged unless some overt act in furtherance of the scheme occurs in the United States.87

Prosecutorial Discretion

For five years after passage of the Economic Espionage Act, neither economic espionage nor trade secret violations of its provisions could be prosecuted without the approval of senior Justice Department officials. Prosecutors must still secure approval before bringing charges of economic espionage, but approval is no longer necessary for the prosecution of theft of trade secret charges.88

Related Offenses

Conduct that violates the Economic Espionage Act may violate other federal criminal provisions as well. In the case of trade secret offenses, potentially corresponding offenses include violations of the Computer Fraud and Abuse Act, the National Stolen Property Act, and the federal mail and wire fraud statutes.89 The Computer Fraud and Abuse Act outlaws accessing certain computers or computer systems without authorization or in excess of authorization, with the intent to defraud.90 The National Stolen Property Act outlaws the interstate transportation of tangible stolen property or the knowing receipt of such property.91 The federal mail and wire fraud statutes outlaw the use of mail or wire communications in execution of a scheme to defraud.92

86 H.R. REP. NO. 104-788, at 14 (1996) (emphasis added) (“To ensure that there is some nexus between the ascertaining of such jurisdiction and the offense, however, extraterritorial jurisdiction exists only if [an overt act occurs within the United States or the offender is a U.S. national]”).

87 18 U.S.C. § 1837 (“This chapter also applies to conduct occurring outside the United States if - (1) the offender is a natural person who is a citizen or permanent resident alien of the United States, or an organization organized under the laws of the United States or a State or political subdivision thereof; or (2) an act in furtherance of the offense was committed in the United States”) (emphasis added).

88 U.S. Dep’t of Just., CRIM. RES. MANUAL § 1122 (1999) (“Prior to passage of the EEA, the Attorney General assured Congress in writing that for a period of five years, the Department of Justice would require that all prosecutions brought under the EEA must first be approved by the Attorney General, the Deputy Attorney General, or the Assistant Attorney General to the Criminal Division. . . .This requirement expired on October 11, 2001. Subsequently, the Attorney General renewed the prior requirement for initiating prosecutions under 18 U.S.C. § 1831. . . . The requirement was not extended for cases under 18 U.S.C. § 1832. . . .”).

89 Another provision, 18 U.S.C. § 1905 (“Trade Secrets Act”), exposes federal employees who disclose confidential government information to misdemeanor liability. The provision has been used primarily to ensure the confidentiality of government-contractor information held by the government, Thirty-Eighth Annual Survey of White Collar Crime: Intellectual Property Crimes, 60 AM. CRIM. L. REV. 1003, 1017 (2023).

90 18 U.S.C. § 1030(a)(4), (e)(2); e.g., United States v. Nosal, 844 F.3d 1024, 1028 (9th Cir. 2016) (defendant convicted computer fraud and theft of trade secrets); United States v. Koo, 770 F. Supp. 2d 1115, 1118 (D. Or. 2011) (defendant indicted for computer fraud and abuse and for trade secrets violations); United States v. Pu, 15 F. Supp. 3d 846, 849 (N.D. Ill. 2014) (defendant indicted for trade secret, computer fraud and wire fraud violations). See generally CRS Report R47557, Cybercrime and the Law: Primer on the Computer Fraud and Abuse Act and Related Statutes, by Peter G. Berris.

91 18 U.S.C. §§ 2314, 2315; see also United States v. Aleynikov, 676 F.3d 71, 76-79 (2d Cir. 2012) (stolen, intangible computer source code is neither a good, ware, nor merchandise for purposes of the National Stolen Property Act); United States v. Agrawal, 726 F.3d 235, 262 (2d Cir. 2013) (affirming trade secrets and stolen property convictions under 18 U.S.C. §§ 1832 and 2314).

92 18 U.S.C. § 1343 (“Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits or (continued...)

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 13

In addition, in the case of economic espionage violations, a defendant may be subject to prosecution under the general espionage statutes, the espionage component of the computer fraud statute, or for failure to register as the agent of a foreign power. Foreign agents, other than diplomatic personnel, must register with the Attorney General; failure to do so is generally a felony.93 The Computer Fraud and Abuse Act outlaws computer intrusions launched for espionage purposes.94 The general espionage laws are only likely to be triggered if the trade secret information is also classified information or national defense information.95

Civil Remedies

For some time, the EEA authorized the Attorney General to bring a civil action to enjoin violations of its provisions, but it did not authorize a corresponding private cause of action.96 The Defend Trade Secrets Act created a private cause of action.97

Private Cause of Action

The EEA now provides that “[a]n owner of a trade secret that is misappropriated may bring a civil action under this subsection if the trade secret is related to a product or service used in, or intended for use in, interstate or foreign commerce.”98 Not just anyone who suffers damage as the result of trade secret misappropriation; only “owners” may sue. EEA, however, defines the term “owners” to include licensees.99 The trade secrets protected by civil suit are the same as those protected by the criminal proscriptions.100 The definition of the action that gives rise to liability— “misappropriation”—is taken from the Uniform Trade Secrets Act.101 The term encompasses acquiring, disclosing, or using a trade secret taken from its owner by scurrilous (“improper”) means.102

Pretrial Seizure

Perhaps EEA’s most distinctive feature is its pre-trial seizure procedure. It allows an owner who alleges that his trade secret has been appropriated to apply to the court for an ex parte order

causes to be transmitted by means of wire . . . any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or imprisoned not more than 20 years, or both . . . .”). The mail fraud statute, 18 U.S.C. § 1341, is comparably worded. See generally, CRS Report R41930, Mail and Wire Fraud: A Brief Overview of Federal Criminal Law, by Charles Doyle.

93 18 U.S.C. § 951(a); see also United States v. Chung, 659 F.3d 815, 819 (9th Cir. 2011) (defendant indicted for economic espionage and unregistered foreign agent violations).

94 18 U.S.C. § 1030(a).

95 18 U.S.C. § 798 outlaws the unauthorized disclosure of classified information relating to communications intelligence; 18 U.S.C. § 1924 outlaws the unauthorized retention of classified information; and 18 U.S.C. §§ 793, 794 outlaw the unauthorized gathering or transmitting of national defense information. See generally, CRS Report RS21900, The Protection of Classified Information: The Legal Framework, by Jennifer K. Elsea.

96 P.L. 104-294, § 101, 110 Stat. 3490 (1996), codified, as amended, 18 U.S.C. § 1836(a).

97 P.L. 114-153, § 2, 130 Stat. 376 (2016), codified at 18 U.S.C. § 1836(b).

98 Id.

99 18 U.S.C. § 1839(4) (“[T]he term ‘owner’, with respect to a trade secret, means the person or entity in whom or in which rightful legal or equitable title to, or license in, the trade secret is reposed. . . .”).

100 Id. § 1839.

101 H.R. REP. NO. 114-529, at 14 (2016) (“‘[M]isappropriation’ is defined identically in all relevant respects to the definition of misappropriation in §1(2) of the UTSA”).

102 18 U.S.C. § 1839.

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 14

seizing the purported trade secret.103 The procedure is replete with restrictions on its use, some reminiscent of the limitations on a temporary restraining order (TRO) in federal civil actions: inadequacy of alternatives; a threat of immediate and irreparable harm; a likelihood of success on the merits; and a favorable balance of harms.104 Yet, the procedure is confined to instances where a TRO is insufficient.105 “The ex parte seizure provision is expected to be used in instances in which a defendant is seeking to flee the country or planning to disclose the trade secret to a third party immediately or is otherwise not amenable to the enforcement of the court’s orders.”106

The party from whom the trade secret is seized is entitled to a hearing within seven days, at which the owner of the trade secret bears the burden justifying the seizure order.107 Anyone injured by a “wrongful or excessive” seizure may sue for the relief described in the Trademark Act;108 that is, for “damages for lost profits, cost of materials, loss of good will, and punitive damages in instances where the seizure was sought in bad faith, and, unless the court finds extenuating circumstances, to recover a reasonable attorney’s fee.”109

Damages and Equitable Relief

Relying heavily on the UTSA, EEA empowers district courts to award an aggrieved owner equitable relief;110 damages;111 and in the case of willful and malicious misappropriation, double damages and attorneys’ fees.112 The court may also award attorneys’ fees to a party who prevails

103 Id. § 1836(b)(2)(A)(i).

104 Id. § 1836(b)(2)(A)(ii).

105 Id. § 1836(b)(2)(A)(ii) (“The court may not grant an application under clause (i) unless the court finds that it clearly appears from specific facts that - (I) an order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure [relating to preliminary injunctions and temporary restraining orders] or another form of equitable relief would be inadequate to achieve the purpose of this paragraph. . . .”).

106 S. REP. NO. 114-220, at 6 (2016).

107 18 U.S.C. §§ 1836(b)(2)(B)(v), 1836(b)(2)(F)(ii).

108 Id. § 1836(b)(2)(G).

109 15 U.S.C. § 1116(d)(11).

110 18 U.S.C. §§ 1836(c), 1836(b)(3) (“In a civil action brought under this subsection with respect to the misappropriation of a trade secret, a court may - (A) grant an injunction - (i) to prevent any actual or threatened misappropriation described in paragraph (1) on such terms as the court deems reasonable, provided the order does not - (I) prevent a person from entering into an employment relationship, and that conditions placed on such employment shall be based on evidence of threatened misappropriation and not merely on the information the person knows; or (II) otherwise conflict with an applicable State law prohibiting restraints on the practice of a lawful profession, trade, or business; (ii) if determined appropriate by the court, requiring affirmative actions to be taken to protect the trade secret; and (iii) in exceptional circumstances that render an injunction inequitable, that conditions future use of the trade secret upon payment of a reasonable royalty for no longer than the period of time for which such use could have been prohibited”); see Janssen Prod., L.P. v. Evenus Pharm. Lab. Inc., 85 F.4th 147, 152 (3d Cir. 2023) (ex parte seizure authority).

111 18 U.S.C. § 1836(b)(3)(B). See also S. REP. NO. 114-220, at 9 & n.17 (“It is not the Committee’s intent to encourage the use of reasonable royalties to resolve trade secret misappropriation. Rather, the Committee prefers other remedies that, first, halt the misappropriator’s use and dissemination of the misappropriated trade secret and, second, make available appropriate damages. [n.17.The Committee notes that courts interpreting the UTSA’s analogous provision have held that the award of reasonable royalties is a remedy of last resort].”). See, e.g., Motorola Solutions, Inc. v. Hytera Comm. Corp. Ltd, 108 F.4th 458, 489-90 (7th Cir. 2024).

112 18 U.S.C. § 1836(b)(3)(C) (“In a civil action brought under this subsection with respect to the misappropriation of a trade secret, a court may . . . (C) if the trade secret is willfully and maliciously misappropriated, award exemplary damages in an amount not more than 2 times the amount of the damages awarded under subparagraph (B); and (D) if . . . the trade secret was willfully and maliciously misappropriated, award reasonable attorney’s fees to the prevailing party.”); e.g., Syntel Sterling Best Shores Mauritius Ltd. v. The Trizetto Group, Inc., 68 F.4th 792, 814 (2d Cir. 2023). Such punitive damage awards do not exceed constitutional due process limitations. Motorola Solutions, Inc., 108 F.4th at 496.

Stealing Trade Secrets and Economic Espionage

Congressional Research Service 15

against a bad faith claim of misappropriation.113 Equitable relief may also include a preliminary injunction where the movant has shown (1) a likelihood of success on the merits, (2) a likelihood of irreparable harm to the movant absent an injunction, (3) the balance of equities tips in the movant’s favor, and (4) an injunction is in the public interest.114

An action for the misappropriation must be brought within three years of when it is discovered or would have been discovered with the exercise of reasonable diligence,115 although the contracting parties may agree to a shorter period for filing claims.116

Like criminal misappropriation prosecutions, civil misappropriation actions under 18 U.S.C. § 1836 are subject to extraterritoriality provisions. Section 1837 states that Title 18, Chapter 90 of the U.S. Code applies to conduct occurring outside the United States if “the offender” is a U.S. national or an act in furtherance of the offense is committed within the United States. Section 1836 is found in Chapter 90. Thus, Section 1836 applies to conduct occurring outside the United States if the offender is a U.S. national or an act in furtherance of the offense is committed within the United States.117 In the absence of a Section 1837-like statement of congressional intent, the Supreme Court has shown a great reluctance to recognize private causes of action based on conduct abroad.118

Author Information

Charles Doyle Senior Specialist in American Public Law

113 18 U.S.C. § 1836(b)(3)(D) (“In a civil action brought under this subsection with respect to the misappropriation of a trade secret, a court may . . . (D) if a claim of the misappropriation is made in bad faith, which may be established by circumstantial evidence, a motion to terminate an injunction is made or opposed in bad faith, or the trade secret was willfully and maliciously misappropriated, award reasonable attorney’s fees to the prevailing party.”); Allstate Ins. Co. v. Fougere, 79 F.4th 172, 196 n.25 (1st Cir. 2023) (only parties who prevail on their misappropriation claims may recover fees under this provision).

114 Winter v. Nat. Resources Def. Council, 555 U.S. 7, 20, 22 (2008).

115 18 U.S.C. § 1836(d); e.g., Insulet Corp. v. EOFlow, Co. Ltd, 104 F.4th 873, 880 (Fed. Cir. 2024); Emer. Recovery, Inc. v. Hufnagle, 77 F.4th 1317, 1324 n.1 (11th Cir. 2023); Espire Ads LLC v. Tapp Influencers Corp.,655 F. Supp. 3d 223, 253 (S.D.N.Y. 2023).

116 E.g., Beijing Neu Cloud Oriental Sys. Tech. Co., Ltd. v. IBM, 110 F.4th 106, 111-12 (2d Cir. 2024).

117 E.g., Motorola Solutions, Inc., 108 F.4th at 488 (“Section 1837(2)’s requirement of ‘an act in furtherance of’ the misappropriation does not require a completed act of domestic misappropriation, nor does it impose a specific causation requirement”); dmarcian, Inc. v. dmarcian Eur. BV, 60 F.4th 119, 142 (4th Cir. 2023) (“dInc only needed to show that ‘an act’ occurred in the United States, not the entire ‘offense.’ 18 U.S.C.§ 1837(2).”); vPersonalize Inc. v. Magnetize Consultants Ltd., 437 F. Supp.3d 860, 878 (W.D. Wash. 2020) (“First, the extraterritoriality provision of § 1837(2) requires only that ‘an act in furtherance of the offense was committed in the United States.’ It pointedly (and the Court must assume intentionally) does not require the defendant to have committed such act”) (emphasis in the original).

118 E.g., RJR Nabisco, Inc. v. Eur. Cmty, 579 U.S. 325, 346 (2016) (civil racketeering statute does not apply to injuries inflicted overseas); Kiobel v. Royal Dutch Petroleum Co., 569 U.S. 108, 124 (2013) (holding that the Alien Tort Statute does not apply extraterritorially); Morrison v. Nat’l AustL Bank Ltd., 561 U.S. 247, 273 (2010) (holding that Section 10(b) of the Securities Exchange Act of 1934, which creates a civil cause of action of misconduct relating to securities trading, does not apply to misconduct occurring abroad and relating to securities not listed on an American exchange).

Stealing Trade Secrets and Economic Espionage

Congressional Research Service R42681 · VERSION 10 · UPDATED 16

Disclaimer

This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role. CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However, as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the permission of the copyright holder if you wish to copy or otherwise use copyrighted material.

Лучший частный хостинг