- About Pitt Law
- Welcome from the Interim Dean
- Facilities
- Dean's Office
- Faculty Directory
- Staff Directory
- History
- Board of Visitors Members
- Community Engagement
- Office of Equity & Inclusive Excellence
- Land Acknowledgement
- The Resilience and Engagement Project
- Summary
- Project Description
- Students and Faculty Talk Resilience
- How does the in-class facilitation conversation work?
- How to Facilitate In-Class Discussion
- Suggested Project Timeline and Milestone
- Tips for Leading a Discussion
- Sample Lesson Plan for Leading a Discussion Group
- Sample Student Responses and Advice
- Project Results
- Our Papers
- The Student Voice
- Helpful Resources
- Handbook
- Glossary
- Zoom Backgrounds
- Pitt Law 101
- Admissions
- Academics
- Centers & Institutes
- Career Services
- Resources
- A-Z Resources Guide
- Academic Calendar
- Dean of Students
- Student Event Calendar
- Academic Support
- Bar Exams
- Barco Law Building Hours
- Courses and Curriculum
- Courses & Curriculum Overview
- Catalog of Courses
- First-Year Curriculum
- Pitt Law Academy
- Courses by Requirement
- Departmental Consent
- Remote or Hybrid Classes
- Required Textbooks by Class
- Schedule of Classes Spring 2024
- Schedule of Intersession 2024
- Schedule of Classes Fall 2023
- Schedule of Classes Spring 2023
- Schedule of Intersession 2023
- Schedule of Classes Fall 2022
- Schedule of Classes Spring 2022
- Schedule of Intersession 2022
- Schedule of Classes Fall 2021
- Exams
- Grades and Transcripts
- Graduation and Diplomas
- Incoming Student Orientation
- Information Technology
- Marketing & Communications
- Office of Equity & Inclusive Excellence
- Ombudsperson
- Policies and Procedures
- Registration Services
- Student Bar Association (SBA)
- Student Organizations
- Alumni
Trade Secrets Law
Class Term:
Spring Term 2022-2023
Catalog Number:
5984
Professor(s):
Professor
Simulation Course
Credits:
2 (2 Contact, 0 Field)
Graduation Requirements:
Experiential Learning
Priority:
General Enrollment Course
Full Year Course:
No
Category:
Standard Courses
Grading Details
There will be a 24 hour take-home exam.
Description
This course will cover various aspects of trade secret law with an emphasis on practical considerations relevant to the business environment. Students will examine public policy considerations of trade secret law, compare the Uniform Trade Secrets Act (UTSA) to the Restatement Approach and to the Pennsylvania UTSA (as well as the law of other jurisdictions), and compare trade secret protection with other forms of intellectual property. We will review the elements of a trade secret and compare the types of information and the circumstances under which courts have recognized or denied trade secret protection. The rights of a trade secret owner relative to its employees and third parties will be examined in detail, including use of confidentiality agreements and non-competition agreements. Enforcement of trade secret rights will be surveyed and include civil and criminal proceedings including the Economic Espionage Act (EEA).
Practical issues from the business world are strongly emphasized in this course including drafting and negotiating non-compete, non-solicitation and confidentiality agreements, establishment of business policies and procedures for trade secret protection, practical considerations surrounding the bringing and settling of trade secret cases. This course will feature presentations by various trial lawyers, computer forensics experts and other professionals who are routinely engaged in litigation involving corporate espionage and the theft of competitive intelligence. Particular emphasis will be placed on the strategy behind launching and pursuing such litigation, together with an investigation of the various ways that individuals and corporations defend themselves against such claims. This course will also explore the various forms of equitable and legal relief typically requested in such cases, with a focus on certain recent damages awards in the tens of millions of dollars. Technological advancements in securing competitively sensitive information, together with novel efforts to gain access to such data, will be studied in detail, with particular attention given to the manner in which courts have tried to shape the law in a fast-changing business environment.