EOT International, Inc. (ECTI) challenges the circuit court's grant of summary judgment to its former product manager, John Zwerlein. ECTI contends that Zwerlein misappropriated trade secrets, including knowledge of the workings of "promis.e" software and its customer and prospects lists. We affirm. We hold that a party asserting a pro-tectible trade secret must describe it with sufficient particularity to identify the specific trade secret at risk and ECTI failed to do so. We also hold that in imposing a one-year period, after termination of employment, during which an employee could not divulge trade secrets, ECTI manifested an intent that after the expiration of that period a former employee is under no restrictions. Zwerlein's demonstration of a program that could translate or convert files came more than thirteen months after he left ECTI.
ECTI is the exclusive North American distributor for "promis.e" software used in the design and documentation of electrical control systems. "[P]romis.e" is marketed as software that allows the user to generate control system schematics, panel layouts, bills of material, wire lists, terminal plans, etc. At the same time, the software completes other necessary tasks, including ID assignment, cross-referencing, wire numbering and list generation. ECTI also offers complete technical training and support for "promis.e," including the development of specialized or custom program applica
As the sole North American distributor, ECTI has a proprietary interest in "promis.e." In order to use a fully functioning copy of the software, a user must have an "ADS key" supplied by ECTI. The "ADS key" is a piece of hardware, no bigger than a coaster, that is attached to a computer's parallel port. Without the "ADS key" the "promis.e" software can only be used in a limited demonstration mode.
Zwerlein started working for ECTI as an application specialist in October 1990. He was promoted to product manager in 1994 and was responsible for training the users, answering technical questions, and customizing and enhancing the software. On June 23, 1996, Zwerlein left ECTI and went to work as the "promis.e" administrator for Quad Tech, a customer of ECTI. In August 1997, Zwerlein left Quad Tech and founded a consulting firm called Synergy Solutions, Inc.
As a consultant, Zwerlein would investigate a customer's needs and present the best software to fulfill those needs. For some customers, "promis.e" was the solution; for other customers, a rival product, Toolbox WD, was the solution. Zwerlein had an arrangement with the developer of Toolbox WD to receive a commission on all sales of the software. Toolbox WD used a different process but reached the same result as "promis.e," the design of electrical control systems. The two programs were incompatible — a file created in "promis.e" could not be opened in Toolbox WD.
In the summer of 1997, Zwerlein invited James Baker to see Zwerlein's home office. Baker, at one time a product manager at ECTI and familiar with "promis.e," was then a manager at Rockwell Software,
ECTI filed this action against Zwerlein seeking unspecified damages for his misappropriation of trade secrets. ECTI alleged that the software file system for "promis.e" and its customer and prospects lists are trade secrets. ECTI alleged that Zwerlein developed or assisted in the development of a program that can translate "promis.e" files into Toolbox WD files. Further, it was alleged that Zwerlein was making sales calls on companies appearing on ECTI's prospects list. Zwerlein filed a general denial and, after limited discovery, moved for summary judgment. The circuit court granted Zwerlein's motion, ruling that any translator or conversion program was created by Zwerlein from his own intelligence, knowledge and experience and not from the misappropriation of a trade secret. As to the customer and prospects lists, the circuit court noted that there was no evidence that either list had any value eighteen months after Zwerlein left ECTI and that there was no evidence that Zwerlein was using either list. Finally, the court concluded that
We review a motion for summary judgment using the same methodology as the trial court.
See M & I First Nat'l Bank v. Episcopal Homes Management, Inc.,
We begin our analysis by deciding whether ECTI has established the existence of a protectible trade secret. The definition of "trade secret" is found in § 134.90(1)(c), Stats., 1 which states:
"Trade secret" means information, including a formula, pattern, compilation, program, device, method, technique or process to which all of the following apply:
1. The information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use.
2. The information is the subject of efforts to maintain its secrecy that are reasonable under the circumstances.
The first attribute requires that the item or material ECTI asserts qualifies as a protectible trade secret must be "information" in a substantive form that is generally not known to others in the particular trade. In its complaint and submissions in opposition to the motion for summary judgment, ECTI alleges that "[t]he software file system for 'promis.e' is a trade secret in that it is a program which derives independent economic value from not being generally known or ascertainable by proper means and is the subject of efforts by ECTI to maintain its secrecy." ECTI also alleges that "customer lists and lead lists are also trade secrets in that each derives independent economic value from not being generally known or ascertainable by proper means and each is the subject of efforts by E CTI to maintain each's secrecy."
These allegations echo § 134.90, STATS., and are nothing more than legal conclusions. The allegations fail to allege the ultimate facts showing the existence of a trade secret.
See Diodes, Inc. v. H.D. Franzen,
the complainant [to] describe the subject matter of the trade secret with sufficient particularity to separate it from matters of general knowledge in the trade or of special knowledge of those persons who are skilled in the trade, and to permit the defendant [and the court] to ascertain at least the boundaries within which the secret lies.
Id.
Because ECTI's complaint repeats statutory language we cannot separate what is a trade secret from what is general knowledge in this niche of the CAD (computer aided design) software industry or what is the special knowledge of CAD software programmers and product managers like Zwerlein. Further, none of ECTI's submissions in opposition to the summary judgment motion go beyond the generalizations found in its complaint.
The requirement that the party asserting a trade secret include with some specificity the nature of the trade secret has been extended to require the party to present evidence of the nature of the trade secret. In
AMP, Inc. v. Fleischhacker,
Other courts that have decided whether a trade secret has been described with sufficient specificity have all required more than a generalized allegation that there was a protectible secret.
See Trandes Corp. v. Guy F. Atkinson Co.,
A computer program generally "includes source code, which is the developer's tool in creating software, object code, and other technical information, including program architecture, design definitions or specifications, flow diagrams and flow charts, data structures, data compilations, formulae and algorithms embodied
The second attribute — an independent economic value available from only one source — is present in the "promis.e" software. "Without question, computer software can be protected under trade secret law. Indeed, each software-oriented company may have a body of information that is not generally known to its competitors and which gives it a competitive advantage in the marketplace." Scheinfeld
&
Butter,
supra
at 382-83 (footnotes omitted). In the area of CAD of electrical control systems, "promis.e" competes with Toolbox WD and RSWire Designer, to list just two.
2
In an affidavit filed in opposition to Zwerlein's motion for summary judgment, the president of ECTI explained that the inability to convert "promis.e" files to other formats protected the commercial value of the program. The president went on to explain, "[T]he commercial advantage of this is obvious because once a user commits to [our software], it is not easy to switch to a competitor's software because [our software's] files
The second attribute is also present in the customer and prospects lists. Because Wisconsin adopted the Uniform Trade Secrets Act as § 134.90, Stats., in 1986, a customer list can be afforded protection.
See Minuteman, Inc. v. Alexander,
The third attribute — ECTI took reasonable efforts to maintain its secrecy — is not present in any of the three items. ECTI had all employees, including
that certain information in the possession of the COMPANY in the nature of, but not limited to, customer lists, price lists, new products in the course of development, blueprints, patterns, and information as to suppliers, is considered confidential information by the COMPANY and/or trade secrets of a character which are valuable to the COMPANY, (hereafter Information) and I agree not to make use of, nor divulge, such Information to anyone . . . either during or for a period of one year after the termination of my employment....
Zwerlein signed this agreement in December 1993.
Courts are realists and recognize that it is almost impossible to prevent an employee from discovering an employer's trade secrets; therefore, courts have held that confidentiality agreements are sufficient evidence of reasonable efforts to maintain secrecy if the agreements plainly informed the employees that all of the employer's information is confidential.
4
See Aries Info. Sys., Inc. v. Pacific Management Sys. Corp.,
366
The existence of a confidentiality agreement is not always enough. In this case, the Patent and Confidential Information Agreement ECTI required Zwerlein to sign does not preserve ECTI's intent that "promis.e" and the customer list and prospects list remain secret. The confidentiality agreement contains a time limit; Zwerlein agreed not to divulge any trade secret "during or for a period of
one year after the termination of my employment."
(Emphasis added.) Zwerlein terminated his employment with ECTI on June 23, 1996; Baker reported that Zwerlein's demonstration of converting files from "promis. e" to Toolbox WD occurred in August of 1997, more than thirteen months after Zwerlein left ECTI. By limiting the period in which an employee agreed not to divulge trade secrets ECTI manifested its intent that after one year there was no need to maintain the secrecy of any sensitive and confidential information Zwerlein learned while employed.
See Baystate Techs., Inc. v. Bentley Sys.,
Inc.,
In conclusion, we affirm the circuit court's granting of summary judgment to Zwerlein. ECTI has failed
By the Court. — Judgment affirmed.
Notes
Section 134.90, STATS., Wisconsin's version of the Uniform Trade Secrets Act, was enacted by 1985 Wis. Act 236.
In
Baystate Technologies, Inc. v. Bentley Systems, Inc.,
In general, data translators are common in the CAD [computer aided design] market because users of CAD products commonly employ more than one CAD system to perform their necessary tasks and, as a result, often transfer information between various CAD systems. This need has created a demand for translators of all kinds in the CAD market....
"[A] competitive benefit that the trade secret owner enjoys must derive from it not being generally known or readily ascertainable through proper means by competitors." Ari B. Good, Trade Secrets and the New Realities of the Internet Age, 2 Marq. Intell. Prop. L. Rev. 51, 68 (1998).
Compounding the problem of preventing former employees from revealing trade secrets is the right of the employee to use his or her skills, experience and general knowledge.
See Integrated Cash Management Servs., Inc. v. Digital Transactions, Inc.,
