Not a Member? Get access to HR news and resources that you can trust.
We asked HR professionals to tell us about their time in HR. Here are their stories.
Is your employee handbook keeping up with the changing world of work? With SHRM's Employee Handbook Builder get peace of mind that your handbook is up-to-date.
Instructor-led guidance for your SHRM-CP/SHRM-SCP exam, no travel or time out of the office required.
#SHRM18 will expand your perspective – on your organization, on your career, and on the way you approach HR. Join us in Chicago June 17-20, 2018
Utah has enacted two new laws of importance to employers concerned about trade secrets, customer relationships and other protectable interests in its 2016 legislative session. The first statute, the Post-Employment Restrictions Act (Utah Code § 34-51-101 and following sections), sets a one-year time limit on noncompetition agreements entered into on or after May 10, 2016.
The second statute, the Computer Abuse and Data Recovery Act (Utah Code § 63D-3-103 and following), establishes a state cause of action with an arguably broader reach than the Computer Fraud and Abuse Act (18 U.S.C. § 1030).
Post-Employment Restrictions Act
The Post-Employment Restrictions Act is the result of a limited consensus in the Utah legislature following extensive attention from the Utah business community. The Post-Employment Restrictions Act applies only to noncompetition agreements and specifically exempts nonsolicitation agreements, nondisclosure agreements and confidentiality agreements from the definition of a post-employment restrictive covenant. Additionally, the act excepts severance agreements entered into at or after discharge or restrictions that arise out of the sale of a business. An employer that seeks to enforce an unenforceable noncompetition agreement is liable for the attorneys’ fees and actual damages of the employee.
Initially, the Utah House of Representatives had enacted a version of the Post-Employment Restrictions Act that would have prohibited noncompetition agreements entirely. Following passage by the Utah House, the act received extensive attention and dozens of witnesses testified in Utah Senate hearings regarding the bill. Following the hearings, the proposed act was significantly changed and ultimately imposed merely a one-year time limit on such agreements and a provision allowing employees to recover attorneys’ fees and damages if a court determines the noncompetition agreement is unenforceable.
Computer Abuse and Data Recovery Act
The Computer Abuse and Data Recovery Act was passed without significant attention from the business community, but it affords potentially substantial help to employers. While the statute provides a broad range of damages in the event of generic unauthorized access to a computer, such as by a hacker or in a divorce setting, it also contains provisions of interest to employers.
The act defines permission to access a computer “only to the extent or for the specific purpose the protected computer’s owner authorizes.” Utah Code § 6D-3-103(2). This language apparently was intended to create a state cause of action consistent with the broad construction of the federal Computer Fraud and Abuse Act as interpreted by the 1st, 5th, 7th and 11th U.S. Circuit Courts of Appeals, rather than the narrow construction as interpreted by the 2nd, 4th and 9th Circuits. See 2nd Circuit Adopts Narrow Construction of Federal Computer Fraud Statute, Joins Circuit Split.
The Computer Abuse and Data Recovery Act permits the recovery of actual damages, lost profits, economic damages and injunctive relief. The Computer Abuse and Data Recovery Act certainly will provide an important supplement to the protection available under the Utah Uniform Trade Secrets Act (Utah Code § 13-24-1, et seq.), see Utah Supreme Court Adopts Presumption of Harm in Trade Secret Litigation.
Broader Trade Secret Protection Approach
These two statutes highlight the importance of a broader trade secret protection approach that incorporates tailored and enforceable agreements, computer usage and access policies, and access restrictions. Such agreements and policies often will deter employees from engaging in inappropriate conduct. When deterrence fails, employers will have a mix of remedies available under common law for enforcement of restrictive covenants and under statutory law for computer abuse or theft of trade secrets.
Clifford R. Atlas is an attorney in Jackson Lewis’ New York office. Conrad S. Kee is an attorney in Jackson Lewis’ Salt Lake City office. Republished with permission. © 2016 Jackson Lewis. All rights reserved.
You have successfully saved this page as a bookmark.
Please confirm that you want to proceed with deleting bookmark.
You have successfully removed bookmark.
Please log in as a SHRM member before saving bookmarks.
Your session has expired. Please log in again before saving bookmarks.
Please purchase a SHRM membership before saving bookmarks.
An error has occurred
Recommended for you
Refer a Friend to SHRM
SHRM’s HR Vendor Directory contains over 3,200 companies