In 2004, 19-year-old college sophomore Elizabeth Holmes dropped out of Stanford University to create a company that would change the world. Theranos, Inc. was going to revolutionize medicine with its proprietary blood testing devices that could detect high cholesterol, cancer, and other medical conditions with a single finger pinprick. In 2014, the company’s valuation peaked at over $9 billion, making Holmes the youngest self-made female billionaire in the world with a net worth of about $4.5 billion. Four years later, in June 2018, Holmes was indicted on eleven counts of fraud. On January 3, 2022, Holmes was convicted on one count of conspiracy to defraud investors and three counts of wire fraud. She faces a maximum sentence of twenty years in prison, and a fine of $250,000, plus restitution, for each count.
Hulu’s new limited series, The Dropout, chronicles the rise and fall of Theranos through the lens of its CEO, played by Amanda Seyfried. Episode 7, Heroes, touches on Holmes’s well-documented preoccupation with trade secrets. During its first decade, Theranos operated in stealth mode – no media communications, no public disclosures, and no product releases.
Continue Reading The Dropout: Trade Secrets in Pop Culture



On February 10, the U.S. International Trade Commission (“ITC”) issued a 
Recent United States Department of Justice (“DOJ”) indictments of Chinese hackers provide a reminder that trade secrets and other intellectual property stored on databases are attractive targets to bad actors. The DOJ
On May 22, the Eleventh Circuit clarified trade secrets misappropriation analysis under the Florida Uniform Trade Secrets Act (“FUTSA”), strengthening the trade secret protection offered by the statute. The decision vacated a magistrate judge’s finding that the defendants had not misappropriated trade secretes following a bench trial in the Compulife Software Inc. v. Newman et al. matter (No. 18-12004). The court found error in the magistrate’s failure to “consider the several alternative varieties of misappropriation” contemplated by FUTSA and the magistrate’s reasoning that the public availability of life insurance quotes on the plaintiff’s website “automatically precluded a finding that scraping those quotes constituted misappropriation.”
The COVID-19 crisis has presented an array of novel issues for companies, including new and unexpected cybersecurity threats. In addition to the now well-known security limitations of video platforms such as Zoom, we are seeing cyber-attacks in the form of COVID-19 related phishing attempts and ransomware attacks. In at least some of these attempted hacks, cybercriminals are hoping to steal trade secrets.
Companies and other organizations increasingly must face serious and complex threats to their business and infrastructure. Whether the threat is trade secret theft, rogue insiders, cybercrime adversaries, aggressive competitors, or misconduct by business and supply chain partners, companies should remain constantly vigilant and defense ready. Adversaries, including especially cybercriminals operating exclusively in the digital domain, are often highly motivated, sophisticated, resourced, and innovative. The opaque, pervasive, and global nature of modern digital networked environments presents opportunities for criminals. The sophistication and relentless creativity of these bad actors pose significant challenges to companies and law enforcement agencies in being able to detect, assess, mitigate, attribute, and deter these threats. Because available tools and real-world practices to address these threats often outpace the law, companies are called upon to develop their own comprehensive approaches to investigate and remediate these forms of risk. In doing so, companies must be willing to assume a certain level of risk to effectively investigate and obtain sufficient insight to counter the problems.