18 June 2016

Assaults

'The Legal Assault on Australian Democracy' by George Williams in (2016) 16(2) QUT Law Review comments 
Recent years have seen fierce public debate on whether Australia’s parliaments are passing laws that undermine fundamental democratic values, such as freedom of speech and freedom of association. Such debate has tended to focus on a few contentious laws, including s 18C of the Racial Discrimination Act 1975 (Cth), s 35P of the Australian Security Intelligence Organisation Act 1979 (Cth) and Queensland’s anti-bikie legislation. This article conducts a survey of the federal, state and territory statute books in order to determine whether such examples are isolated, or indicative of a broader trend. It identifies 350 instances of laws that arguably encroach upon rights and freedoms essential to the maintenance of a healthy democracy. Most of these laws have entered onto the statute book since September 2001. The article finds that the terrorist attacks of that month marked a watershed moment in the making of Australian laws, and that since that time parliamentarians have been less willing to exercise self-restraint by not passing laws that undermine Australia’s democratic system.

17 June 2016

Neuroscience Commons

'The Greatest Generational Impact: The Open Neuroscience Movement as an Emerging Knowledge Commons' by Maja Larson and Margaret Chon in Brett Frischmann, Michael Madison and Katherine Strandburg (eds), Medical Commons (Cambridge University Press, 2017) describes
what some in the neuroscience research community are calling the “open neuroscience movement.” By focusing on the enabling conditions for cooperation, this case study of neuroscience data sharing may be particularly useful in illuminating the dynamics of commons formation in research environments dominated by an ethos of competitive, individual lab-based achievement. It also can shed light on the emergence of these types of governance arrangements where non-profit organizations are among the principal actors. Forthcoming in a collection of commons case studies analyzed under the Institutional Analysis and Development (IAD) framework, it is situated within the intersecting scholarly literatures on knowledge infrastructure and knowledge commons, both of which are related to open innovation research.

16 June 2016

Patents

'The Surprising Resilience of the Patent System' (Stanford Public Law Working Paper No. 2784456) by Mark A. Lemley comments
 The patent system seems in the midst of truly dramatic change. The last twenty years have seen the rise of a new business model – the patent troll – that grew to become a majority of all patent lawsuits. They have seen a significant expansion in the number of patents granted and a fundamental change in the industries in which those patents are filed. They have seen the passage of the most important legislative reform in the last sixty years, a law that reoriented legal challenges to patents away from courts and toward the Patent and Trademark Office (PTO). And they have seen remarkable changes in nearly every important legal doctrine, from patent eligibility to obviousness to infringement to remedies. 
These changes have prompted alarm in a number of quarters. From the 1990s to the 2000s, as the number of patents and patent troll suits skyrocketed, technology companies and academics worried about the “crisis” in the patent system – a crisis of overprotection that might interfere with rather than promote innovation. By 2015, as patent reform took effect and the Supreme Court undid many of the Federal Circuit’s expansions of patent rights, it was patent owners who were speaking of a crisis in the patent system – a crisis of underprotection that might leave innovators without adequate protection. Depending on one’s perspective, then, the sky seems to have been falling on the patent system for some time. 
Despite the undeniable significance of these changes in both directions, something curious has happened to the fundamental characteristics of the patent ecosystem during this period: very little. Whether we look at the number of patent applications filed, the number of patents issued, the number of lawsuits filed, the patentee win rate in those lawsuits, or the market for patent licenses, the data show very little evidence that patent owners and challengers are behaving differently because of changes in the law. The patent system, then, seems surprisingly resilient to changes in the law. This is a puzzle. In this article, I document this phenomenon and give some thought to why the fundamental characteristics of the patent system seem resistant to even major changes in patent law and procedure. The results pose some profound questions not only for efforts at patent reform but for the role of the patent system in society as a whole.

ALRC Elder Abuse Inquiry

Questions from the ARLC issues paper regarding its inquiry into elder abuse -
What is elder abuse? 
Q 1 To what extent should the following elements, or any others, be taken into account in describing or defining elder abuse: harm or distress; intention; payment for services? 
Q 2 What are the key elements of best practice legal responses to elder abuse? 
Q 3 The ALRC is interested in hearing examples of elder abuse to provide illustrative case studies, including those concerning: Aboriginal and Torres Strait Islander people; people from culturally and linguistically diverse communities; lesbian, gay, bisexual, transgender or intersex people; people with disability; or people from rural, regional and remote communities. 
Q 4 The ALRC is interested in identifying evidence about elder abuse in Australia. What further research is needed and where are the gaps in the evidence? 
Social security 
Q 5 How does Centrelink identify and respond to people experiencing or at risk of experiencing elder abuse? What changes should be made to improve processes for identifying and responding to elder abuse? 
Q 6 What changes should be made to laws and legal frameworks relating to social security correspondence or payment nominees to improve safeguards against elder abuse? 
Q 7 What changes should be made to the laws and legal frameworks relating to social security payments for carers to improve safeguards against elder abuse? 
Q 8 What role is there for income management in providing protections or safeguards against elder abuse? 
Q 9 What changes should be made to residence requirements or waiting periods for qualification for social security payments, or the assurance of support scheme, for people experiencing elder abuse? 
Q 10 What other risks arise in social security laws and legal frameworks with regard to elder abuse? What other opportunities exist for providing protections and safeguards against abuse? 
Aged care 
Q 11 What evidence exists of elder abuse committed in aged care, including in residential, home and flexible care settings? 
Q 12 What further role should aged care assessment programs play in identifying and responding to people at risk of elder abuse? 
Q 13 What changes should be made to aged care laws and legal frameworks to improve safeguards against elder abuse arising from decisions made on behalf of a care recipient?   
Q 14 What concerns arise in relation to the risk of elder abuse with consumer directed aged care models? How should safeguards against elder abuse be improved? 
Q 15 What changes to the requirements concerning quality of care in aged care should be made to improve safeguards against elder abuse? 
Q 16 In what ways should the use of restrictive practices in aged care be regulated to improve safeguards against elder abuse? 
Q 17 What changes to the requirements for reporting assaults in aged care settings should be made to improve responses to elder abuse? 
Q 18 What changes to aged care complaints mechanisms should be made to improve responses to elder abuse? 
Q 19 What changes to the aged care sanctions regime should be made to improve responses to elder abuse? 
Q 20 What changes to the role of aged care advocacy services and the community visitors scheme should be made to improve the identification of and responses to elder abuse? 
Q 21 What other changes should be made to aged care laws and legal frameworks to identify, provide safeguards against and respond to elder abuse? 
The National Disability Insurance Scheme 
Q 22 What evidence exists of elder abuse being experienced by participants in the National Disability Insurance Scheme? 
Q 23 Are the safeguards and protections provided under the National Disability Insurance Scheme a useful model to protect against elder abuse? 
Superannuation 
Q 24 What evidence is there of older people being coerced, defrauded, or abused in relation to their superannuation funds, including their self-managed superannuation funds? How might this type of abuse be prevented and redressed? 
Financial institutions 
Q 25 What evidence is there of elder abuse in banking or financial systems? 
Q 26 What changes should be made to the laws and legal frameworks relating to financial institutions to identify, improve safeguards against and respond to elder abuse? For example, should reporting requirements be imposed? 
Family agreements 
Q 27 What evidence is there that older people face difficulty in protecting their interests when family agreements break down? 
Q 28 What changes should be made to laws or legal frameworks to better safeguard the interests of older people when family agreements break down? 
Appointed decision-makers 
Q 29 What evidence is there of elder abuse committed by people acting as appointed decision-makers under instruments such as powers of attorney? How might this type of abuse be prevented and redressed? 
Q 30 Should powers of attorney and other decision-making instruments be required to be registered to improve safeguards against elder abuse? If so, who should host and manage the register? 
Q 31 Should the statutory duties of attorneys and other appointed decision-makers be expanded to give them a greater role in protecting older people from abuse by others? 
Q 32 What evidence is there of elder abuse by guardians and administrators? How might this type of abuse be prevented and redressed? 
Public advocates 
Q 33 What role should public advocates play in investigating and responding to elder abuse? 
Q 34 Should adult protection legislation be introduced to assist in identifying and responding to elder abuse? 
Health services 
Q 35 How can the role that health professionals play in identifying and responding to elder abuse be improved? 
36 How should professional codes be improved to clarify the role of health professionals in identifying and responding to elder abuse? 
Q 37 Are health-justice partnerships a useful model for identifying and responding to elder abuse? What other health service models should be developed to identify and respond to elder abuse? 
Q 38 What changes should be made to laws and legal frameworks, such as privacy laws, to enable hospitals to better identify and respond to elder abuse? 
Forums for redress 
Q 39 Should civil and administrative tribunals have greater jurisdiction to hear and determine matters related to elder abuse? 
Q 40 How can the physical design and procedural requirements of courts and tribunals be improved to provide better access to forums to respond to elder abuse? 
Q 41 What alternative dispute resolution mechanisms are available to respond to elder abuse? How should they be improved? Is there a need for additional services, and where should they be located? 
Criminal law 
Q 42 In what ways should criminal laws be improved to respond to elder abuse? For example, should there be offences specifically concerning elder abuse? 
Q 43 Do state and territory criminal laws regarding neglect offer an appropriate response to elder abuse? How might this response be improved? 
Q 44 Are protection orders being used to protect people from elder abuse? What changes should be made to make them a better safeguard against elder abuse? 
Q 45 Who should be required to report suspected elder abuse, in what circumstances, and to whom? 
Q 46 How should the police and prosecution responses to reports of elder abuse be improved? What are best practice police and prosecution responses to elder abuse? 
Q 47 How should victims’ services and court processes be improved to support victims of elder abuse? 
Q 48 How should sentencing laws and practices relating to elder abuse be improved? 
49 What role might restorative justice processes play in responding to elder abuse? 
Q 50 What role might civil penalties play in responding to elder abuse?

EU Trade Secrets Directive

Specific features of the EU Trade Secrets Directive (backgrounded here) are -
Ch I - Subject matter and scop
Article 1 - Subject matter and scope 
1. This Directive lays down rules on the protection against the unlawful acquisition, use and disclosure of trade secrets. Member States may, in compliance with the provisions of the TFEU, provide for more far-reaching protection against the unlawful acquisition, use or disclosure of trade secrets than that required by this Directive, provided that compliance with Articles 3, 5, 6, Article 7(1), Article 8, the second subparagraph of Article 9(1), Article 9(3) and (4), Article 10(2), Articles 11, 13 and Article 15(3) is ensured. 
2. This Directive shall not affect: (a) the exercise of the right to freedom of expression and information as set out in the Charter, including respect for the freedom and pluralism of the media; (b) the application of Union or national rules requiring trade secret holders to disclose, for reasons of public interest, information, including trade secrets, to the public or to administrative or judicial authorities for the performance of the duties of those authorities; (c) the application of Union or national rules requiring or allowing Union institutions and bodies or national public authorities to disclose information submitted by businesses which those institutions, bodies or authorities hold pursuant to, and in compliance with, the obligations and prerogatives set out in Union or national law; (d) the autonomy of social partners and their right to enter into collective agreements, in accordance with Union law and national laws and practices. 
3. Nothing in this Directive shall be understood to offer any ground for restricting the mobility of employees. In particular, in relation to the exercise of such mobility, this Directive shall not offer any ground for: (a) limiting employees' use of information that does not constitute a trade secret as defined in point (1) of Article 2; (b) limiting employees' use of experience and skills honestly acquired in the normal course of their employment; (c) imposing any additional restrictions on employees in their employment contracts other than restrictions imposed in accordance with Union or national law. 
Article 2 - Definitions 
For the purposes of this Directive, the following definitions apply: (1) ‘trade secret’ means information which meets all of the following requirements: (a) it is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question; (b) it has commercial value because it is secret; (c) it has been subject to reasonable steps under the circumstances, by the person lawfully in control of the information, to keep it secret; (2) ‘trade secret holder’ means any natural or legal person lawfully controlling a trade secret; (3) ‘infringer’ means any natural or legal person who has unlawfully acquired, used or disclosed a trade secret; (4) ‘infringing goods’ means goods, the design, characteristics, functioning, production process or marketing of which significantly benefits from trade secrets unlawfully acquired, used or disclosed. 
Ch II Acquisition, use and disclosure of trade secrets 
Article 3 Lawful acquisition, use and disclosure of trade secrets 
1. The acquisition of a trade secret shall be considered lawful when the trade secret is obtained by any of the following means: (a) independent discovery or creation; (b) observation, study, disassembly or testing of a product or object that has been made available to the public or that is lawfully in the possession of the acquirer of the information who is free from any legally valid duty to limit the acquisition of the trade secret; (c) exercise of the right of workers or workers' representatives to information and consultation in accordance with Union law and national laws and practices; (d) any other practice which, under the circumstances, is in conformity with honest commercial practices. 
2. The acquisition, use or disclosure of a trade secret shall be considered lawful to the extent that such acquisition, use or disclosure is required or allowed by Union or national law. 
Article 4 - Unlawful acquisition, use and disclosure of trade secrets 
1. Member States shall ensure that trade secret holders are entitled to apply for the measures, procedures and remedies provided for in this Directive in order to prevent, or obtain redress for, the unlawful acquisition, use or disclosure of their trade secret. 
2. The acquisition of a trade secret without the consent of the trade secret holder shall be considered unlawful, whenever carried out by: (a) unauthorised access to, appropriation of, or copying of any documents, objects, materials, substances or electronic files, lawfully under the control of the trade secret holder, containing the trade secret or from which the trade secret can be deduced; (b) any other conduct which, under the circumstances, is considered contrary to honest commercial practices. 
3. The use or disclosure of a trade secret shall be considered unlawful whenever carried out, without the consent of the trade secret holder, by a person who is found to meet any of the following conditions: (a) having acquired the trade secret unlawfully; (b) being in breach of a confidentiality agreement or any other duty not to disclose the trade secret; (c) being in breach of a contractual or any other duty to limit the use of the trade secret. 
4. The acquisition, use or disclosure of a trade secret shall also be considered unlawful whenever a person, at the time of the acquisition, use or disclosure, knew or ought, under the circumstances, to have known that the trade secret had been obtained directly or indirectly from another person who was using or disclosing the trade secret unlawfully within the meaning of paragraph 3. 
5. The production, offering or placing on the market of infringing goods, or the importation, export or storage of infringing goods for those purposes, shall also be considered an unlawful use of a trade secret where the person carrying out such activities knew, or ought, under the circumstances, to have known that the trade secret was used unlawfully within the meaning of paragraph 3. 
Article 5 - Exceptions 
Member States shall ensure that an application for the measures, procedures and remedies provided for in this Directive is dismissed where the alleged acquisition, use or disclosure of the trade secret was carried out in any of the following cases: (a) for exercising the right to freedom of expression and information as set out in the Charter, including respect for the freedom and pluralism of the media; (b) for revealing misconduct, wrongdoing or illegal activity, provided that the respondent acted for the purpose of protecting the general public interest; (c) disclosure by workers to their representatives as part of the legitimate exercise by those representatives of their functions in accordance with Union or national law, provided that such disclosure was necessary for that exercise; (d) for the purpose of protecting a legitimate interest recognised by Union or national law. 
Ch III - Measures, procedures and remedies 
Section 1 - General provisions 
Article 6 - General obligation 
1. Member States shall provide for the measures, procedures and remedies necessary to ensure the availability of civil redress against the unlawful acquisition, use and disclosure of trade secrets. 
2. The measures, procedures and remedies referred to in paragraph 1 shall: (a) be fair and equitable; (b) not be unnecessarily complicated or costly, or entail unreasonable time-limits or unwarranted delays; and (c) be effective and dissuasive. 
Article 7 - Proportionality and abuse of process 
1. The measures, procedures and remedies provided for in this Directive shall be applied in a manner that: (a) is proportionate; (b) avoids the creation of barriers to legitimate trade in the internal market; and (c) provides for safeguards against their abuse. 
2. Member States shall ensure that competent judicial authorities may, upon the request of the respondent, apply appropriate measures as provided for in national law, where an application concerning the unlawful acquisition, use or disclosure of a trade secret is manifestly unfounded and the applicant is found to have initiated the legal proceedings abusively or in bad faith. Such measures may, as appropriate, include awarding damages to the respondent, imposing sanctions on the applicant or ordering the dissemination of information concerning a decision as referred to in Article 15. Member States may provide that measures as referred to in the first subparagraph are dealt with in separate legal proceedings. 
Article 8 - Limitation period 
1. Member States shall, in accordance with this Article, lay down rules on the limitation periods applicable to substantive claims and actions for the application of the measures, procedures and remedies provided for in this Directive. The rules referred to in the first subparagraph shall determine when the limitation period begins to run, the duration of the limitation period and the circumstances under which the limitation period is interrupted or suspended. 
2. The duration of the limitation period shall not exceed 6 years. 
Article 9 - Preservation of confidentiality of trade secrets in the course of legal proceedings 
1. Member States shall ensure that the parties, their lawyers or other representatives, court officials, witnesses, experts and any other person participating in legal proceedings relating to the unlawful acquisition, use or disclosure of a trade secret, or who has access to documents which form part of those legal proceedings, are not permitted to use or disclose any trade secret or alleged trade secret which the competent judicial authorities have, in response to a duly reasoned application by an interested party, identified as confidential and of which they have become aware as a result of such participation or access. In that regard, Member States may also allow competent judicial authorities to act on their own initiative. The obligation referred to in the first subparagraph shall remain in force after the legal proceedings have ended. However, such obligation shall cease to exist in any of the following circumstances: (a) where the alleged trade secret is found, by a final decision, not to meet the requirements set out in point (1) of Article 2; or (b) where over time, the information in question becomes generally known among or readily accessible to persons within the circles that normally deal with that kind of information. 
2. Member States shall also ensure that the competent judicial authorities may, on a duly reasoned application by a party, take specific measures necessary to preserve the confidentiality of any trade secret or alleged trade secret used or referred to in the course of legal proceedings relating to the unlawful acquisition, use or disclosure of a trade secret. Member States may also allow competent judicial authorities to take such measures on their own initiative. The measures referred to in the first subparagraph shall at least include the possibility: (a) of restricting access to any document containing trade secrets or alleged trade secrets submitted by the parties or third parties, in whole or in part, to a limited number of persons; (b) of restricting access to hearings, when trade secrets or alleged trade secrets may be disclosed, and the corresponding record or transcript of those hearings to a limited number of persons; (c) of making available to any person other than those comprised in the limited number of persons referred to in points (a) and (b) a non-confidential version of any judicial decision, in which the passages containing trade secrets have been removed or redacted. The number of persons referred to in points (a) and (b) of the second subparagraph shall be no greater than necessary in order to ensure compliance with the right of the parties to the legal proceedings to an effective remedy and to a fair trial, and shall include, at least, one natural person from each party and the respective lawyers or other representatives of those parties to the legal proceedings. 
3. When deciding on the measures referred to in paragraph 2 and assessing their proportionality, the competent judicial authorities shall take into account the need to ensure the right to an effective remedy and to a fair trial, the legitimate interests of the parties and, where appropriate, of third parties, and any potential harm for either of the parties, and, where appropriate, for third parties, resulting from the granting or rejection of such measures. 
4. Any processing of personal data pursuant to paragraphs 1, 2 or 3 shall be carried out in accordance with Directive 95/46/EC. 
Section 2 - Provisional and precautionary measures 
Article 10 - Provisional and precautionary measures 
1. Member States shall ensure that the competent judicial authorities may, at the request of the trade secret holder, order any of the following provisional and precautionary measures against the alleged infringer: (a) the cessation of or, as the case may be, the prohibition of the use or disclosure of the trade secret on a provisional basis; (b) the prohibition of the production, offering, placing on the market or use of infringing goods, or the importation, export or storage of infringing goods for those purposes; (c) the seizure or delivery up of the suspected infringing goods, including imported goods, so as to prevent their entry into, or circulation on, the market. 
2. Member States shall ensure that the judicial authorities may, as an alternative to the measures referred to in paragraph 1, make the continuation of the alleged unlawful use of a trade secret subject to the lodging of guarantees intended to ensure the compensation of the trade secret holder. Disclosure of a trade secret in return for the lodging of guarantees shall not be allowed. 
Article 11 - Conditions of application and safeguards 
1. Member States shall ensure that the competent judicial authorities have, in respect of the measures referred to in Article 10, the authority to require the applicant to provide evidence that may reasonably be considered available in order to satisfy themselves with a sufficient degree of certainty that: (a) a trade secret exists; (b) the applicant is the trade secret holder; and (c) the trade secret has been acquired unlawfully, is being unlawfully used or disclosed, or unlawful acquisition, use or disclosure of the trade secret is imminent. 
2. Member States shall ensure that in deciding on the granting or rejection of the application and assessing its proportionality, the competent judicial authorities shall be required to take into account the specific circumstances of the case, including, where appropriate: (a) the value and other specific features of the trade secret; (b) the measures taken to protect the trade secret; (c) the conduct of the respondent in acquiring, using or disclosing the trade secret; (d) the impact of the unlawful use or disclosure of the trade secret; (e) the legitimate interests of the parties and the impact which the granting or rejection of the measures could have on the parties; (f) the legitimate interests of third parties; (g) the public interest; and (h) the safeguard of fundamental rights. 
3. Member States shall ensure that the measures referred to in Article 10 are revoked or otherwise cease to have effect, upon the request of the respondent, if: (a) the applicant does not institute legal proceedings leading to a decision on the merits of the case before the competent judicial authority, within a reasonable period determined by the judicial authority ordering the measures where the law of a Member State so permits or, in the absence of such determination, within a period not exceeding 20 working days or 31 calendar days, whichever is the longer; or (b) the information in question no longer meets the requirements of point (1) of Article 2, for reasons that cannot be attributed to the respondent. 
4. Member States shall ensure that the competent judicial authorities may make the measures referred to in Article 10 subject to the lodging by the applicant of adequate security or an equivalent assurance intended to ensure compensation for any prejudice suffered by the respondent and, where appropriate, by any other person affected by the measures. 
5. Where the measures referred to in Article 10 are revoked on the basis of point (a) of paragraph 3 of this Article, where they lapse due to any act or omission by the applicant, or where it is subsequently found that there has been no unlawful acquisition, use or disclosure of the trade secret or threat of such conduct, the competent judicial authorities shall have the authority to order the applicant, upon the request of the respondent or of an injured third party, to provide the respondent, or the injured third party, appropriate compensation for any injury caused by those measures. Member States may provide that the request for compensation referred to in the first subparagraph is dealt with in separate legal proceedings. 
Section 3 - Measures resulting from a decision on the merits of the case 
Article 12 - Injunctions and corrective measures 
1. Member States shall ensure that, where a judicial decision taken on the merits of the case finds that there has been unlawful acquisition, use or disclosure of a trade secret, the competent judicial authorities may, at the request of the applicant, order one or more of the following measures against the infringer: (a) the cessation of or, as the case may be, the prohibition of the use or disclosure of the trade secret; (b) the prohibition of the production, offering, placing on the market or use of infringing goods, or the importation, export or storage of infringing goods for those purposes; (c) the adoption of the appropriate corrective measures with regard to the infringing goods; (d) the destruction of all or part of any document, object, material, substance or electronic file containing or embodying the trade secret or, where appropriate, the delivery up to the applicant of all or part of those documents, objects, materials, substances or electronic files. 
2. The corrective measures referred to in point (c) of paragraph 1 shall include: (a) recall of the infringing goods from the market; (b) depriving the infringing goods of their infringing quality; (c) destruction of the infringing goods or, where appropriate, their withdrawal from the market, provided that the withdrawal does not undermine the protection of the trade secret in question. 
3. Member States may provide that, when ordering the withdrawal of the infringing goods from the market, their competent judicial authorities may order, at the request of the trade secret holder, that the goods be delivered up to the holder or to charitable organisations. 
4. The competent judicial authorities shall order that the measures referred to in points (c) and (d) of paragraph 1 be carried out at the expense of the infringer, unless there are particular reasons for not doing so. Those measures shall be without prejudice to any damages that may be due to the trade secret holder by reason of the unlawful acquisition, use or disclosure of the trade secret. 
Article 13 - Conditions of application, safeguards and alternative measures 
1. Member States shall ensure that, in considering an application for the adoption of the injunctions and corrective measures provided for in Article 12 and assessing their proportionality, the competent judicial authorities shall be required to take into account the specific circumstances of the case, including, where appropriate: (a) the value or other specific features of the trade secret; (b) the measures taken to protect the trade secret; (c) the conduct of the infringer in acquiring, using or disclosing the trade secret; (d) the impact of the unlawful use or disclosure of the trade secret; (e) the legitimate interests of the parties and the impact which the granting or rejection of the measures could have on the parties; (f) the legitimate interests of third parties; (g) the public interest; and (h) the safeguard of fundamental rights. Where the competent judicial authorities limit the duration of the measures referred to in points (a) and (b) of Article 12(1), such duration shall be sufficient to eliminate any commercial or economic advantage that the infringer could have derived from the unlawful acquisition, use or disclosure of the trade secret. 
2. Member States shall ensure that the measures referred to in points (a) and (b) of Article 12(1) are revoked or otherwise cease to have effect, upon the request of the respondent, if the information in question no longer meets the requirements of point (1) of Article 2 for reasons that cannot be attributed directly or indirectly to the respondent. 
3. Member States shall provide that, at the request of the person liable to be subject to the measures provided for in Article 12, the competent judicial authority may order pecuniary compensation to be paid to the injured party instead of applying those measures if all the following conditions are met: (a) the person concerned at the time of use or disclosure neither knew nor ought, under the circumstances, to have known that the trade secret was obtained from another person who was using or disclosing the trade secret unlawfully; (b) execution of the measures in question would cause that person disproportionate harm; and (c) pecuniary compensation to the injured party appears reasonably satisfactory. Where pecuniary compensation is ordered instead of the measures referred to in points (a) and (b) of Article 12(1), it shall not exceed the amount of royalties or fees which would have been due, had that person requested authorisation to use the trade secret in question, for the period of time for which use of the trade secret could have been prohibited. 
Article 14 - Damages 
1. Member States shall ensure that the competent judicial authorities, upon the request of the injured party, order an infringer who knew or ought to have known that he, she or it was engaging in unlawful acquisition, use or disclosure of a trade secret, to pay the trade secret holder damages appropriate to the actual prejudice suffered as a result of the unlawful acquisition, use or disclosure of the trade secret. Member States may limit the liability for damages of employees towards their employers for the unlawful acquisition, use or disclosure of a trade secret of the employer where they act without intent. 
2. When setting the damages referred to in paragraph 1, the competent judicial authorities shall take into account all appropriate factors, such as the negative economic consequences, including lost profits, which the injured party has suffered, any unfair profits made by the infringer and, in appropriate cases, elements other than economic factors, such as the moral prejudice caused to the trade secret holder by the unlawful acquisition, use or disclosure of the trade secret. Alternatively, the competent judicial authorities may, in appropriate cases, set the damages as a lump sum on the basis of elements such as, at a minimum, the amount of royalties or fees which would have been due had the infringer requested authorisation to use the trade secret in question. 
Article 15 - Publication of judicial decisions 
1. Member States shall ensure that, in legal proceedings instituted for the unlawful acquisition, use or disclosure of a trade secret, the competent judicial authorities may order, at the request of the applicant and at the expense of the infringer, appropriate measures for the dissemination of the information concerning the decision, including publishing it in full or in part. 
2. Any measure referred to in paragraph 1 of this Article shall preserve the confidentiality of trade secrets as provided for in Article 9. 3. In deciding whether to order a measure referred to in paragraph 1 and when assessing its proportionality, the competent judicial authorities shall take into account, where appropriate, the value of the trade secret, the conduct of the infringer in acquiring, using or disclosing the trade secret, the impact of the unlawful use or disclosure of the trade secret, and the likelihood of further unlawful use or disclosure of the trade secret by the infringer. The competent judicial authorities shall also take into account whether the information on the infringer would be such as to allow a natural person to be identified and, if so, whether publication of that information would be justified, in particular in the light of the possible harm that such measure may cause to the privacy and reputation of the infringer. 
Ch IV - Sanctions, reporting and final provisions 
Article 16 - Sanctions for non-compliance with this Directive 
Member States shall ensure that the competent judicial authorities may impose sanctions on any person who fails or refuses to comply with any measure adopted pursuant to Articles 9, 10 and 12. The sanctions provided for shall include the possibility of imposing recurring penalty payments in the event of non-compliance with a measure adopted pursuant to Articles 10 and 12. The sanctions provided for shall be effective, proportionate and dissuasive. 
Article 17 - Exchange of information and correspondents 
For the purpose of promoting cooperation, including the exchange of information, among Member States and between Member States and the Commission, each Member State shall designate one or more national correspondents for any question relating to the implementation of the measures provided for by this Directive. It shall communicate the details of the national correspondent or correspondents to the other Member States and the Commission. 
Article 18 - Reports 
1. By 9 June 2021, the European Union Intellectual Property Office, in the context of the activities of the European Observatory on Infringements of Intellectual Property Rights, shall prepare an initial report on the litigation trends regarding the unlawful acquisition, use or disclosure of trade secrets pursuant to the application of this Directive. 
2. By 9 June 2022, the Commission shall draw up an intermediate report on the application of this Directive, and shall submit it to the European Parliament and to the Council. That report shall take due account of the report referred to in paragraph 1. The intermediate report shall examine, in particular, the possible effects of the application of this Directive on research and innovation, the mobility of employees and on the exercise of the right to freedom of expression and information. 
3. By 9 June 2026, the Commission shall carry out an evaluation of the impact of this Directive and submit a report to the European Parliament and to the Council. 
Article 19 - Transposition 
1. Member States shall bring into force the laws, regulations and administrative provisions necessary to comply with this Directive by 9 June 2018. They shall immediately communicate the text of those measures to the Commission. When Member States adopt those measures, they shall contain a reference to this Directive or be accompanied by such a reference on the occasion of their official publication. Member States shall determine how such reference is to be made. 
2. Member States shall communicate to the Commission the text of the main provisions of national law which they adopt in the field covered by this Directive. 
Article 20 - Entry into force 
This Directive shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.

EU Trade Secrets Directive Rationales

The EU Trade Secrets Directive (Directive 2016/943 on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure) is in effect from 5 July.

The European Parliament states
(1) Businesses and non-commercial research institutions invest in acquiring, developing and applying know-how and information which is the currency of the knowledge economy and provides a competitive advantage. This investment in generating and applying intellectual capital is a determining factor as regards their competitiveness and innovation-related performance in the market and therefore their returns on investment, which is the underlying motivation for business research and development. Businesses have recourse to different means to appropriate the results of their innovation-related activities when openness does not allow for the full exploitation of their investment in research and innovation. Use of intellectual property rights, such as patents, design rights or copyright, is one such means. Another means of appropriating the results of innovation is to protect access to, and exploit, knowledge that is valuable to the entity and not widely known. Such valuable know-how and business information, that is undisclosed and intended to remain confidential, is referred to as a trade secret. 
(2) Businesses, irrespective of their size, value trade secrets as much as patents and other forms of intellectual property right. They use confidentiality as a business competitiveness and research innovation management tool, and in relation to a diverse range of information that extends beyond technological knowledge to commercial data such as information on customers and suppliers, business plans, and market research and strategies. Small and medium-sized enterprises (SMEs) value and rely on trade secrets even more. By protecting such a wide range of know-how and business information, whether as a complement or as an alternative to intellectual property rights, trade secrets allow creators and innovators to derive profit from their creation or innovation and, therefore, are particularly important for business competitiveness as well as for research and development, and innovation-related performance. 
(3) Open innovation is a catalyst for new ideas which meet the needs of consumers and tackle societal challenges, and allows those ideas to find their way to the market. Such innovation is an important lever for the creation of new knowledge, and underpins the emergence of new and innovative business models based on the use of co-created knowledge. Collaborative research, including cross-border cooperation, is particularly important in increasing the levels of business research and development within the internal market. The dissemination of knowledge and information should be considered as being essential for the purpose of ensuring dynamic, positive and equal business development opportunities, in particular for SMEs. In an internal market in which barriers to cross-border collaboration are minimised and cooperation is not distorted, intellectual creation and innovation should encourage investment in innovative processes, services and products. Such an environment conducive to intellectual creation and innovation, and in which employment mobility is not hindered, is also important for employment growth and for improving the competitiveness of the Union economy. Trade secrets have an important role in protecting the exchange of knowledge between businesses, including in particular SMEs, and research institutions both within and across the borders of the internal market, in the context of research and development, and innovation. Trade secrets are one of the most commonly used forms of protection of intellectual creation and innovative know-how by businesses, yet at the same time they are the least protected by the existing Union legal framework against their unlawful acquisition, use or disclosure by other parties. 
(4) Innovative businesses are increasingly exposed to dishonest practices aimed at misappropriating trade secrets, such as theft, unauthorised copying, economic espionage or the breach of confidentiality requirements, whether from within or from outside of the Union. Recent developments, such as globalisation, increased outsourcing, longer supply chains, and the increased use of information and communication technology contribute to increasing the risk of those practices. The unlawful acquisition, use or disclosure of a trade secret compromises legitimate trade secret holders' ability to obtain first-mover returns from their innovation-related efforts. Without effective and comparable legal means for protecting trade secrets across the Union, incentives to engage in innovation-related cross-border activity within the internal market are undermined, and trade secrets are unable to fulfil their potential as drivers of economic growth and jobs. Thus, innovation and creativity are discouraged and investment diminishes, thereby affecting the smooth functioning of the internal market and undermining its growth-enhancing potential. 
(5) International efforts made in the framework of the World Trade Organisation to address this problem led to the conclusion of the Agreement on Trade-related Aspects of Intellectual Property Rights (the TRIPS Agreement). The TRIPS Agreement contains, inter alia, provisions on the protection of trade secrets against their unlawful acquisition, use or disclosure by third parties, which are common international standards. All Member States, as well as the Union itself, are bound by this Agreement which was approved by Council Decision 94/800/EC (3). 
(6) Notwithstanding the TRIPS Agreement, there are important differences in the Member States' legislation as regards the protection of trade secrets against their unlawful acquisition, use or disclosure by other persons. For example, not all Member States have adopted national definitions of a trade secret or the unlawful acquisition, use or disclosure of a trade secret, therefore knowledge on the scope of protection is not readily accessible and that scope differs across the Member States. Furthermore, there is no consistency as regards the civil law remedies available in the event of unlawful acquisition, use or disclosure of trade secrets, as cease and desist orders are not always available in all Member States against third parties who are not competitors of the legitimate trade secret holder. Divergences also exist across the Member States with respect to the treatment of a third party who has acquired the trade secret in good faith but subsequently learns, at the time of use, that the acquisition derived from a previous unlawful acquisition by another party. 
(7) National rules also differ as to whether legitimate trade secret holders are allowed to seek the destruction of goods produced by third parties who use trade secrets unlawfully, or the return or destruction of any documents, files or materials containing or embodying the unlawfully acquired or used trade secret. Furthermore, applicable national rules on the calculation of damages do not always take account of the intangible nature of trade secrets, which makes it difficult to demonstrate the actual profits lost or the unjust enrichment of the infringer where no market value can be established for the information in question. Only a few Member States allow for the application of abstract rules on the calculation of damages based on the reasonable royalty or fee which could have been due had a licence for the use of the trade secret existed. Additionally, many national rules do not provide for appropriate protection of the confidentiality of a trade secret where the trade secret holder introduces a claim for alleged unlawful acquisition, use or disclosure of the trade secret by a third party, thereby reducing the attractiveness of the existing measures and remedies and weakening the protection offered. 
(8) The differences in the legal protection of trade secrets provided for by the Member States imply that trade secrets do not enjoy an equivalent level of protection throughout the Union, thus leading to fragmentation of the internal market in this area and a weakening of the overall deterrent effect of the relevant rules. The internal market is affected in so far as such differences lower the incentives for businesses to undertake innovation-related cross-border economic activity, including research cooperation or production cooperation with partners, outsourcing or investment in other Member States, which depends on the use of information that enjoys protection as trade secrets. Cross-border network research and development, as well as innovation-related activities, including related production and subsequent cross-border trade, are rendered less attractive and more difficult within the Union, thus also resulting in Union-wide innovation-related inefficiencies. 
(9) In addition, there is a higher risk for businesses in Member States with comparatively lower levels of protection, due to the fact that trade secrets may be stolen or otherwise unlawfully acquired more easily. This leads to inefficient allocation of capital to growth-enhancing innovation within the internal market because of the higher expenditure on protective measures to compensate for the insufficient legal protection in some Member States. It also favours the activity of unfair competitors who, subsequent to the unlawful acquisition of trade secrets, could spread goods resulting from such acquisition across the internal market. Differences in legislative regimes also facilitate the importation of goods from third countries into the Union through entry points with weaker protection, when the design, production or marketing of those goods rely on stolen or otherwise unlawfully acquired trade secrets. On the whole, such differences hinder the proper functioning of the internal market. 
(10) It is appropriate to provide for rules at Union level to approximate the laws of the Member States so as to ensure that there is a sufficient and consistent level of civil redress in the internal market in the event of unlawful acquisition, use or disclosure of a trade secret. Those rules should be without prejudice to the possibility for Member States of providing for more far-reaching protection against the unlawful acquisition, use or disclosure of trade secrets, as long as the safeguards explicitly provided for in this Directive for protecting the interests of other parties are respected. 
(11) This Directive should not affect the application of Union or national rules that require the disclosure of information, including trade secrets, to the public or to public authorities. Nor should it affect the application of rules that allow public authorities to collect information for the performance of their duties, or rules that allow or require any subsequent disclosure by those public authorities of relevant information to the public. Such rules include, in particular, rules on the disclosure by the Union's institutions and bodies or national public authorities of business-related information they hold pursuant to Regulation (EC) No 1049/2001 of the European Parliament and of the Council (4), Regulation (EC) No 1367/2006 of the European Parliament and of the Council (5) and Directive 2003/4/EC of the European Parliament and of the Council (6), or pursuant to other rules on public access to documents or on the transparency obligations of national public authorities. 
(12) This Directive should not affect the right of social partners to enter into collective agreements, where provided for under labour law, as regards any obligation not to disclose a trade secret or to limit its use, and the consequences of a breach of such an obligation by the party subject to it. This should be on the condition that any such collective agreement does not restrict the exceptions laid down in this Directive when an application for measures, procedures or remedies provided for in this Directive for alleged acquisition, use or disclosure of a trade secret is to be dismissed. 
(13) This Directive should not be understood as restricting the freedom of establishment, the free movement of workers or the mobility of workers as provided for in Union law. Nor is it intended to affect the possibility of concluding non-competition agreements between employers and employees, in accordance with applicable law. 
(14) It is important to establish a homogenous definition of a trade secret without restricting the subject matter to be protected against misappropriation. Such definition should therefore be constructed so as to cover know-how, business information and technological information where there is both a legitimate interest in keeping them confidential and a legitimate expectation that such confidentiality will be preserved. Furthermore, such know-how or information should have a commercial value, whether actual or potential. Such know-how or information should be considered to have a commercial value, for example, where its unlawful acquisition, use or disclosure is likely to harm the interests of the person lawfully controlling it, in that it undermines that person's scientific and technical potential, business or financial interests, strategic positions or ability to compete. The definition of trade secret excludes trivial information and the experience and skills gained by employees in the normal course of their employment, and also excludes information which is generally known among, or is readily accessible to, persons within the circles that normally deal with the kind of information in question. 
(15) It is also important to identify the circumstances in which legal protection of trade secrets is justified. For this reason, it is necessary to establish the conduct and practices which are to be regarded as unlawful acquisition, use or disclosure of a trade secret. 
(16) In the interest of innovation and to foster competition, the provisions of this Directive should not create any exclusive right to know-how or information protected as trade secrets. Thus, the independent discovery of the same know-how or information should remain possible. Reverse engineering of a lawfully acquired product should be considered as a lawful means of acquiring information, except when otherwise contractually agreed. The freedom to enter into such contractual arrangements can, however, be limited by law. 
(17) In some industry sectors, where creators and innovators cannot benefit from exclusive rights and where innovation has traditionally relied upon trade secrets, products can nowadays be easily reverse-engineered once in the market. In such cases, those creators and innovators can be victims of practices such as parasitic copying or slavish imitations that free-ride on their reputation and innovation efforts. Some national laws dealing with unfair competition address those practices. While this Directive does not aim to reform or harmonise the law on unfair competition in general, it would be appropriate that the Commission carefully examine the need for Union action in that area. 
(18) Furthermore, the acquisition, use or disclosure of trade secrets, whenever imposed or permitted by law, should be treated as lawful for the purposes of this Directive. This concerns, in particular, the acquisition and disclosure of trade secrets in the context of the exercise of the rights of workers' representatives to information, consultation and participation in accordance with Union law and national laws and practices, and the collective defence of the interests of workers and employers, including co-determination, as well as the acquisition or disclosure of a trade secret in the context of statutory audits performed in accordance with Union or national law. However, such treatment of the acquisition of a trade secret as lawful should be without prejudice to any obligation of confidentiality as regards the trade secret or any limitation as to its use that Union or national law imposes on the recipient or acquirer of the information. In particular, this Directive should not release public authorities from the confidentiality obligations to which they are subject in respect of information passed on by trade secret holders, irrespective of whether those obligations are laid down in Union or national law. Such confidentiality obligations include, inter alia, the obligations in respect of information forwarded to contracting authorities in the context of procurement procedures, as laid down, for example, in Directive 2014/23/EU of the European Parliament and of the Council (7), Directive 2014/24/EU of the European Parliament and of the Council (8) and Directive 2014/25/EU of the European Parliament and of the Council (9). 
(19) While this Directive provides for measures and remedies which can consist of preventing the disclosure of information in order to protect the confidentiality of trade secrets, it is essential that the exercise of the right to freedom of expression and information which encompasses media freedom and pluralism, as reflected in Article 11 of the Charter of Fundamental Rights of the European Union (‘the Charter’), not be restricted, in particular with regard to investigative journalism and the protection of journalistic sources. 
(20) The measures, procedures and remedies provided for in this Directive should not restrict whistleblowing activity. Therefore, the protection of trade secrets should not extend to cases in which disclosure of a trade secret serves the public interest, insofar as directly relevant misconduct, wrongdoing or illegal activity is revealed. This should not be seen as preventing the competent judicial authorities from allowing an exception to the application of measures, procedures and remedies in a case where the respondent had every reason to believe in good faith that his or her conduct satisfied the appropriate criteria set out in this Directive. 
(21) In line with the principle of proportionality, measures, procedures and remedies intended to protect trade secrets should be tailored to meet the objective of a smooth-functioning internal market for research and innovation, in particular by deterring the unlawful acquisition, use and disclosure of a trade secret. Such tailoring of measures, procedures and remedies should not jeopardise or undermine fundamental rights and freedoms or the public interest, such as public safety, consumer protection, public health and environmental protection, and should be without prejudice to the mobility of workers. In this respect, the measures, procedures and remedies provided for in this Directive are aimed at ensuring that competent judicial authorities take into account factors such as the value of a trade secret, the seriousness of the conduct resulting in the unlawful acquisition, use or disclosure of the trade secret and the impact of such conduct. It should also be ensured that the competent judicial authorities have the discretion to weigh up the interests of the parties to the legal proceedings, as well as the interests of third parties including, where appropriate, consumers. 
(22) The smooth-functioning of the internal market would be undermined if the measures, procedures and remedies provided for were used to pursue illegitimate intents incompatible with the objectives of this Directive. Therefore, it is important to empower judicial authorities to adopt appropriate measures with regard to applicants who act abusively or in bad faith and submit manifestly unfounded applications with, for example, the aim of unfairly delaying or restricting the respondent's access to the market or otherwise intimidating or harassing the respondent. (23) In the interest of legal certainty, and considering that legitimate trade secret holders are expected to exercise a duty of care as regards the preservation of the confidentiality of their valuable trade secrets and the monitoring of their use, it is appropriate to restrict substantive claims or the possibility of initiating actions for the protection of trade secrets to a limited period. National law should also specify, in a clear and unambiguous manner, from when that period is to begin to run and under what circumstances that period is to be interrupted or suspended. 
(24) The prospect of losing the confidentiality of a trade secret in the course of legal proceedings often deters legitimate trade secret holders from instituting legal proceedings to defend their trade secrets, thus jeopardising the effectiveness of the measures, procedures and remedies provided for. For this reason, it is necessary to establish, subject to appropriate safeguards ensuring the right to an effective remedy and to a fair trial, specific requirements aimed at protecting the confidentiality of the litigated trade secret in the course of legal proceedings instituted for its defence. Such protection should remain in force after the legal proceedings have ended and for as long as the information constituting the trade secret is not in the public domain. 
(25) Such requirements should include, as a minimum, the possibility of restricting the circle of persons entitled to have access to evidence or hearings, bearing in mind that all such persons should be subject to the confidentiality requirements set out in this Directive, and of publishing only the non-confidential elements of judicial decisions. In this context, considering that assessing the nature of the information which is the subject of a dispute is one of the main purposes of legal proceedings, it is particularly important to ensure both the effective protection of the confidentiality of trade secrets and respect for the right of the parties to those proceedings to an effective remedy and to a fair trial. The restricted circle of persons should therefore consist of at least one natural person from each of the parties as well as the respective lawyers of the parties and, where applicable, other representatives appropriately qualified in accordance with national law in order to defend, represent or serve the interests of a party in legal proceedings covered by this Directive, who should all have full access to such evidence or hearings. In the event that one of the parties is a legal person, that party should be able to propose a natural person or natural persons who ought to form part of that circle of persons so as to ensure proper representation of that legal person, subject to appropriate judicial control to prevent the objective of the restriction of access to evidence and hearings from being undermined. Such safeguards should not be understood as requiring the parties to be represented by a lawyer or another representative in the course of legal proceedings where such representation is not required by national law. Nor should they be understood as restricting the competence of the courts to decide, in conformity with the applicable rules and practices of the Member State concerned, whether and to what extent relevant court officials should also have full access to evidence and hearings for the exercise of their duties. 
(26) The unlawful acquisition, use or disclosure of a trade secret by a third party could have devastating effects on the legitimate trade secret holder, as once publicly disclosed, it would be impossible for that holder to revert to the situation prior to the loss of the trade secret. As a result, it is essential to provide for fast, effective and accessible provisional measures for the immediate termination of the unlawful acquisition, use or disclosure of a trade secret, including where it is used for the provision of services. It is essential that such relief be available without having to await a decision on the merits of the case, while having due respect for the right of defence and the principle of proportionality, and having regard to the characteristics of the case. In certain instances, it should be possible to permit the alleged infringer, subject to the lodging of one or more guarantees, to continue to use the trade secret, in particular where there is little risk that it will enter the public domain. It should also be possible to require guarantees of a level sufficient to cover the costs and the injury caused to the respondent by an unjustified application, particularly where any delay would cause irreparable harm to the legitimate trade secret holder. 
(27) For the same reasons, it is also important to provide for definitive measures to prevent unlawful use or disclosure of a trade secret, including where it is used for the provision of services. For such measures to be effective and proportionate, their duration, when circumstances require a limitation in time, should be sufficient to eliminate any commercial advantage which the third party could have derived from the unlawful acquisition, use or disclosure of the trade secret. In any event, no measure of this type should be enforceable if the information originally covered by the trade secret is in the public domain for reasons that cannot be attributed to the respondent. 
(28) It is possible that a trade secret could be used unlawfully to design, produce or market goods, or components thereof, which could be spread across the internal market, thus affecting the commercial interests of the trade secret holder and the functioning of the internal market. In such cases, and when the trade secret in question has a significant impact on the quality, value or price of the goods resulting from that unlawful use or on reducing the cost of, facilitating or speeding up their production or marketing processes, it is important to empower judicial authorities to order effective and appropriate measures with a view to ensuring that those goods are not put on the market or are withdrawn from it. Considering the global nature of trade, it is also necessary that such measures include the prohibition of the importation of those goods into the Union or their storage for the purposes of offering or placing them on the market. Having regard to the principle of proportionality, corrective measures should not necessarily entail the destruction of the goods if other viable options are present, such as depriving the good of its infringing quality or the disposal of the goods outside the market, for example, by means of donations to charitable organisations. 
(29) A person could have originally acquired a trade secret in good faith, but only become aware at a later stage, including upon notice served by the original trade secret holder, that that person's knowledge of the trade secret in question derived from sources using or disclosing the relevant trade secret in an unlawful manner. In order to avoid, under those circumstances, the corrective measures or injunctions provided for causing disproportionate harm to that person, Member States should provide for the possibility, in appropriate cases, of pecuniary compensation being awarded to the injured party as an alternative measure. Such compensation should not, however, exceed the amount of royalties or fees which would have been due had that person obtained authorisation to use the trade secret in question, for the period of time for which use of the trade secret could have been prevented by the original trade secret holder. Nevertheless, where the unlawful use of the trade secret would constitute an infringement of law other than that provided for in this Directive or would be likely to harm consumers, such unlawful use should not be allowed. 
(30) In order to avoid a person who knowingly, or with reasonable grounds for knowing, unlawfully acquires, uses or discloses a trade secret being able to benefit from such conduct, and to ensure that the injured trade secret holder, to the extent possible, is placed in the position in which he, she or it would have been had that conduct not taken place, it is necessary to provide for adequate compensation for the prejudice suffered as a result of that unlawful conduct. The amount of damages awarded to the injured trade secret holder should take account of all appropriate factors, such as loss of earnings incurred by the trade secret holder or unfair profits made by the infringer and, where appropriate, any moral prejudice caused to the trade secret holder. As an alternative, for example where, considering the intangible nature of trade secrets, it would be difficult to determine the amount of the actual prejudice suffered, the amount of the damages might be derived from elements such as the royalties or fees which would have been due had the infringer requested authorisation to use the trade secret in question. The aim of that alternative method is not to introduce an obligation to provide for punitive damages, but to ensure compensation based on an objective criterion while taking account of the expenses incurred by the trade secret holder, such as the costs of identification and research. This Directive should not prevent Member States from providing in their national law that the liability for damages of employees is restricted in cases where they have acted without intent. 
(31) As a supplementary deterrent to future infringers and to contribute to the awareness of the public at large, it is useful to publicise decisions, including, where appropriate, through prominent advertising, in cases concerning the unlawful acquisition, use or disclosure of trade secrets, on the condition that such publication does not result in the disclosure of the trade secret or disproportionally affect the privacy and reputation of a natural person. 
(32) The effectiveness of the measures, procedures and remedies available to trade secret holders could be undermined in the event of non-compliance with the relevant decisions adopted by the competent judicial authorities. For this reason, it is necessary to ensure that those authorities enjoy the appropriate powers of sanction. 
(33) In order to facilitate the uniform application of the measures, procedures and remedies provided for in this Directive, it is appropriate to provide for systems of cooperation and the exchange of information as between Member States on the one hand, and between the Member States and the Commission on the other, in particular by creating a network of correspondents designated by Member States. In addition, in order to review whether those measures fulfil their intended objective, the Commission, assisted, as appropriate, by the European Union Intellectual Property Office, should examine the application of this Directive and the effectiveness of the national measures taken. 
(34) This Directive respects the fundamental rights and observes the principles recognised in particular by the Charter, notably the right to respect for private and family life, the right to protection of personal data, the freedom of expression and information, the freedom to choose an occupation and right to engage in work, the freedom to conduct a business, the right to property, the right to good administration, and in particular the access to files, while respecting business secrecy, the right to an effective remedy and to a fair trial and the right of defence. 
(35) It is important that the rights to respect for private and family life and to protection of personal data of any person whose personal data may be processed by the trade secret holder when taking steps to protect a trade secret, or of any person involved in legal proceedings concerning the unlawful acquisition, use or disclosure of trade secrets under this Directive, and whose personal data are processed, be respected. Directive 95/46/EC of the European Parliament and of the Council (10) governs the processing of personal data carried out in the Member States in the context of this Directive and under the supervision of the Member States' competent authorities, in particular the public independent authorities designated by the Member States. Thus, this Directive should not affect the rights and obligations laid down in Directive 95/46/EC, in particular the rights of the data subject to access his or her personal data being processed and to obtain the rectification, erasure or blocking of the data where it is incomplete or inaccurate and, where appropriate, the obligation to process sensitive data in accordance with Article 8(5) of Directive 95/46/EC. 
(36) Since the objective of this Directive, namely to achieve a smooth-functioning internal market by means of the establishment of a sufficient and comparable level of redress across the internal market in the event of the unlawful acquisition, use or disclosure of a trade secret, cannot be sufficiently achieved by Member States but can rather, by reason of its scale and effects, be better achieved at Union level, the Union may adopt measures in accordance with the principle of subsidiarity as set out in Article 5 of the Treaty on European Union. In accordance with the principle of proportionality, as set out in that Article, this Directive does not go beyond what is necessary in order to achieve that objective. 
(37) This Directive does not aim to establish harmonised rules for judicial cooperation, jurisdiction, the recognition and enforcement of judgments in civil and commercial matters, or deal with applicable law. Other Union instruments which govern such matters in general terms should, in principle, remain equally applicable to the field covered by this Directive. 
(38) This Directive should not affect the application of competition law rules, in particular Articles 101 and 102 of the Treaty on the Functioning of the European Union (‘TFEU’). The measures, procedures and remedies provided for in this Directive should not be used to restrict unduly competition in a manner contrary to the TFEU. 
(39) This Directive should not affect the application of any other relevant law in other areas, including intellectual property rights and the law of contract. However, where the scope of application of Directive 2004/48/EC of the European Parliament and of the Council (11) and the scope of this Directive overlap, this Directive takes precedence as lex specialis. 
Specific features of the Directive are here.

Data Breach in US Common Law

'Uncertain Standing: Normative Applications of Standing Doctrine Produce Unpredictable Jurisdictional Bars to Common Law Data Breach Claims' by Michael Jones in (2016) 95(1) North Carolina Law Review comments
 In the absence of federal mandates, data breach litigation should help to establish data security standards to guide corporations and reassure consumers. Regrettably, too many consumers who bring these claims are denied standing under the injury-in-fact requirement before those claims can proceed to the merits. Relatedly, the Supreme Court affirmed the “certainly impending” standard for satisfying the injury-in-fact element of standing on the basis of an increased risk of future harm in a 2013 data collection case, Clapper v. Amnesty International
Since Clapper, much of the disagreement among federal courts in data breach litigation has concerned the requisite imminence of identity theft that a consumer’s allegations must demonstrate in order for the consumer to establish injury. However, Clapper should be inapposite in these cases because the Court has only applied the exacting injury inquiry that it applied in Clapper to other causes of action that present separation of powers concerns. 
More broadly, the application of the injury-in-fact requirement in data breach litigation forces courts to make at least two normative choices that lead to doctrinal unpredictability. In applying the factual injury test, courts enjoy discretion to identify the factual harm at issue and determine the minimum degree of risk necessary to render that harm “imminent.” Imposing either of these choices allows courts to dismiss claims on jurisdictional grounds that may well be compensable under substantive law. Moreover, this result is irreconcilable with the Court’s modern theoretical justification for the injury-in-fact requirement as a restraint on the unconstitutional expansion of judicial power. 
Courts could reduce doctrinal confusion in data breach litigation and thus encourage more predictable outcomes by remedying either of these two normative choices: selecting the factual injury or determining the minimum probability of that injury’s occurrence necessary to render that harm imminent.

Data Exceptionalism

'Against Data Exceptionalism' by Andrew Keane Woods in (2016) 68 Stanford Law Review comments
 One of the great regulatory challenges of the Internet era — indeed, one of today’s most pressing privacy questions — is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state’s authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “un-territorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. 
This Article challenges this view. The Article argues that the jurisdictional challenges presented by the global cloud are not conceptually as novel as they seem. Despite the technological wizardry of modern life, the “cloud” is actually a network of storage drives bolted to a particular territory, and there is a substantial body of case law suggesting that courts think of data as a physical object. Moreover, even if the cloud were a free-floating ether, data can be thought of as an intangible asset, like money or debt, which flows easily across borders; courts have been adjudicating jurisdictional disputes over intangible assets for centuries. These precedents suggest a number of distinct legitimate grounds for states to assert jurisdiction over data — not a single test, as major Internet service providers have claimed. 
After showing that these jurisdictional problems are not unprecedented, the Article turns more practical. Drawing from these precedents, the Article outlines steps that courts, Congress, and the President can take to alleviate jurisdictional conflicts over the cloud. As the recent Microsoft Ireland case works its way through the courts, the President negotiates a treaty with the United Kingdom regarding cross-border access to the cloud, and Congress rewrites the Electronic Communications Privacy Act, finding a grounded approach to addressing this problem — one rooted in longstanding jurisdictional and conflicts principles — has never been more critical.
'Data Institutionalism: A Reply to Andrew Woods' by Zachary D. Clopton in (2016) 69 Stanford Law Review Online responds
In Against Data Exceptionalism, Andrew K. Woods explores “one of the greatest societal and technological shifts in recent years,” which manifests in the “same old” questions about government power. The global cloud is an important feature of modern technological life that has significant consequences for individual privacy, law enforcement, and governance. Yet, as Woods suggests, the legal challenges presented by the cloud have analogies in age-old puzzles of public and private international law. 
Identifying these connections is a conceptual advance, and this contribution should not be understated. But, to my mind, the most telling statement in Woods’s excellent article comes early on: “Showing that the jurisdictional challenges presented by the global cloud are not conceptually novel does not resolve those problems.” Data may not be exceptional, and the legal puzzles posed by data sound in existing notions of jurisdiction and conflict of laws. The problem, however, is that existing answers to these puzzles are unsatisfying. They are unsatisfying in that they do not provide clear answers, but instead pose even more challenging normative questions. And they are unsatisfying because some consensus answers sit on shaky normative footing. More satisfying answers, I contend, require attention to institutions, not just laws.

Pathologies

The Australian Competition and Consumer Commission has accepted court enforceable divestiture undertakings from Primary Health Care Limited and Healthscope Limited following investigation by the ACCC over the past year into whether Primary’s acquisition of Healthscope’s pathology assets in Queensland breached section 50 of the Competition and Consumer Act 2010 (Cth).

The ACCC reports that "investigation included multiple statutory notices and the compulsory examination under oath of executives from both firms".
 The Primary undertaking requires the divestiture of the pathology assets that Primary acquired from Healthscope, therefore largely reversing the acquisition. The package of divestiture assets, including more than 70 collection centres, will be sold to Medlab Pathology, an experienced pathology provider based in Sydney, to enable it to establish a competitive presence in Queensland. 
“Primary and Healthscope completed the transaction without notifying the ACCC, despite being on notice that the ACCC would have serious concerns about the likely competitive effect,” ACCC Chairman Rod Sims said. “It is of considerable concern to the ACCC that well-advised firms such as Primary and Healthscope chose to complete the transaction in the way that they did.” 
“While there is no legal obligation to obtain ACCC clearance before completion of a transaction, this matter highlights the risks to companies if they complete contentious acquisitions without seeking ACCC clearance beforehand,” Mr Sims said. 
“The acquisition removed a significant third player in Queensland, leaving just two major full-service pathology providers in that state. We considered that this change in market structure would be likely to result in increased prices and reduced service levels for pathology services in Queensland.” 
“The ACCC has decided not to commence proceedings against both Primary and Healthscope seeking penalties and other remedies including divestiture. In making this decision, the ACCC’s motivation has been to restore a competitive market structure in Queensland as expeditiously as possible, and the onerous undertakings given by Primary and Healthscope should achieve that,” Mr Sims said.
The ACCC has concurrently announced that it has instituted proceedings in the Federal Court against Medibank Private Limited alleging contravention of the Australian Consumer Law by engaging in misleading conduct, making false or misleading representations and engaging in unconscionable conduct.

 The Commission's allegations relate to Medibank’s failure to notify Medibank members (and members of its subsidiary brand, ham) regarding the business's decision to limit benefits paid to members for in-hospital pathology and radiology services. Medibank allegedly did not provide members with any advance notice of the change despite previously representing that it would do so. The ACCC states that "Medibank also adopted a strategy of keeping communications about this change contained and reactive".

In characterising  Medibank’s conduct as misleading and, in all the circumstances, unconscionable the ACCC states that “Consumers are entitled to expect that they will be informed in advance of important changes to their private health insurance cover, as these changes can have significant financial consequences at a time when consumers may be vulnerable”.

 The ACCC alleges that additional circumstances in support of unconscionable conduct include that:
  • Medibank knew or expected that many members incorrectly thought all of their in-hospital medical expenses were covered, and that most members didn’t make enquiries about out-of-pocket expenses before being admitted to hospital; 
  • Medibank calculated there was a risk that, if the benefit change was disclosed, members might leave Medibank; 
  • Medibank calculated there was a risk that the publicity around the benefit change would damage Medibank’s brand and reputation, and have a negative impact on its planned initial public offering of securities; and 
  • Medibank estimated the change would lead to it making substantial financial gains, including from not paying the gaps, and from not paying the medical claims of members who left Medibank after becoming aware of the change. The members most likely to become aware of the change were members who claimed more frequently, some of whom were suffering from chronic conditions. Most of these members were then confronted with out-of-pocket expenses when in hospital receiving treatment. 
The ACCC also alleges that Medibank represented that its policies covered in-hospital pathology and radiology services, such that members would not pay any out-of-pocket expenses for these services, unless Medibank provided them with prior notice otherwise. "These representations were false or misleading from 1 September 2014, since from that time members incurred out-of-pocket expenses for such services and were not notified by Medibank".

The ACCC is seeking declarations, injunctions, compensation orders, pecuniary penalties, findings of fact, implementation of a trade practices compliance program, corrective notices and costs.

Precarity in the UK

'The Contract of Employment and the Paradoxes of Precarity' (Oxford Legal Studies Research Paper No. 37/2016) by Mark Freedland comments
In recent decades, and with increasing acceleration in the last ten years, the law and practice of the contract of employment in the United Kingdom have been dissolving themselves from a state in which a stable contract of employment represented the essential norm into a complex of precarious types of employment relation. This descent into precarity presents us with several legal and practical paradoxes. Perhaps the deepest of these is the emergence into a centrally prominent position of the so-called ‘zero-hours contract’ - a paradoxical development in the sense that, in many of its forms, this kind of employment relation should not be regarded as an employment contract at all. Another one consists of the abolition of mandatory retirement age in the name of control of age discrimination; ostensibly increasing the security of employment of the older worker, this measure, it will be argued, in fact makes employment more precarious than ever, effectively undermining the notion of ‘permanent employment’. This paper examines the legal bases, but also the profound social and economic consequences, of these ironical developments.

Death, Trusts and Taxes

'Passing Wealth on Death. Will-Substitutes in Comparative Perspective' by Alexandra Braun and Anne Röthel in Braun and Röthel (eds), Passing Wealth on Death. Will-Substitutes in Comparative Perspective (Hart, 2016) comments
 Wealth can be transferred on death in a number of different ways, most commonly by will. Yet a person can also use a variety of other means to benefit someone on death. Examples include donationes mortis causa, joint tenancies, trusts, life-insurance contracts and nominations in pension and retirement plans. In the US, these modes of transfer are grouped under the category of 'will-substitutes' and are generally treated as testamentary dispositions. Much has been written about the effect of the use of will-substitutes in the US, but little is generally known about developments in other jurisdictions. For the first time, this collection of contributions looks at will-substitutes in a comparative perspective. It examines mechanisms that pass wealth on death across a number of common law, civil law and mixed legal jurisdictions, and explores the rationale behind their use. It analyses them from different viewpoints, including those of owners of businesses, investors, as well as creditors, family members and dependants. The aims of the volume are to show the complexity and dynamics of wealth transfers on death across jurisdictions, to identify patterns between them, and to report the attitudes towards the different modes of transfer in light of their utility and potential frictions they give rise to with policies and principle underpinning current laws. 
 'Will-Substitutes in England and Wales' by  Braun in the same volume notes that
 Will-substitutes, that is to say mechanisms that are functionally equivalent to wills, are very common in the US, where much of the wealth is transferred on death by means other than wills, and thus outside traditional probate procedures. The purpose of this chapter is to investigate whether this is the case also in England and Wales. This chapter explores some of the most common mechanisms used, the rationale behind their use, as well as the consequences that arise from their proliferation. In doing so, it considers will-substitutes from different perspectives, including those of creditors and family members and dependants. It argues that the current state of the law in England and Wales is unsatisfactory and that it is time for a debate involving non-probate transfers and their relationship with current succession laws.
 'Exploring Means of Transferring Wealth on Death: A Comparative Perspective'  by Braun and Röthel in the same volume notes
 Will-substitutes are mechanisms that are functionally equivalent to wills and that allow the disposition of property on death outside the sphere of traditional succession law rules. This chapter provides an overview of the principal means through which property can be disposed of on death across a number of jurisdictions. It further offers a discussion of the rationale behind their use and explores the challenges these mechanisms present for the operation and functioning of succession law.