Welcome!

News Feed Item

Preliminary Injunction in Corning MobileAccess, Inc. Case Bolsters Corporate Non-Compete Clauses, Says Attorney

--LeClairRyan lawyer offers insights after the entry of a preliminary injunction related to a non-compete and trade secret information

RICHMOND, Va., March 19, 2014 /PRNewswire/ -- A federal district court in Miami recently issued a preliminary injunction in a non-compete case involving a narrowly tailored restriction under Virginia law.  The ruling enjoining the continued employment of a former employee offers guidance to companies that hire employees subject to narrowly drawn non-compete agreements, according to Steven D. Brown, a Richmond-based shareholder in national law firm LeClairRyan.

On March 13, U.S. District Court Judge Marcia G. Cooke issued a preliminary injunction sought by Corning MobileAccess, Inc. (CMA), which filed suit against its former sales manager Cindy Torres and her current employer, Reach Holdings LLC d/b/a SOLiD Technologies ("SOLiD"), alleging breach of contract (non-competition and confidentiality covenants), misappropriation of trade secrets and other claims.  CMA is headquartered in Herndon, Va.; and Torres lives in the Miami area.  Judge Cooke considered Virginia law in her ruling in  Corning Mobile Access, Inc. v. Cindy Torres et al (13-24463-Civ-COOKE, U.S. DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA).

"Judge Cooke's opinion in this case strengthens the ability of companies to enforce narrowly tailored covenants not to compete at the preliminary injunction stage," said Brown, who represents CMA and focuses his practice on labor, employment and business issues.

The preliminary injunction means that Torres will be unable to work for SOLiD from March 13 until the earlier of December 31 or until the final disposition of this matter, whichever occurs first.  Further, the defendants are enjoined from using CMA's proprietary and confidential information and from directly or indirectly contracting with, soliciting, or otherwise doing business with CMA's customers and prospective customers where such business may have been obtained by the improper use of CMA's trade secrets or proprietary or confidential information until the earlier of December 31 or until the final disposition of the case.  The preliminary injunction order also requires Torres to disclose any CMA trade secrets she allegedly improperly accessed and also to disclose to whom they were distributed.

CMA is engaged nationally in the business of developing, marketing, distributing, installing and supporting converged wireless indoor networks that support multiple wireless voice and data services, also known as Distributed Antenna Systems, or DAS.  Reach Holdings LLC engages in business under the name SOLiD Technologies and is one of seven companies nationally in the DAS industry.

In 2009, Torres signed an employment agreement with CMA that included a confidentiality clause and a non-compete provision that specifically enjoined her from working with SOLiD and other named direct competitors for a period of 12 months after the date that she ceased working with CMA for any reason other than termination by the company without cause.  During her employment with CMA, Torres was provided with extensive confidential client and pricing lists, and other sensitive, trade-secret protected and highly valuable information.

The lawsuit against Torres and her employer arose after she left the company around November 8, 2013, having accepted employment as SOLiD's director of carrier accounts on October 31, 2013.

Under Virginia law, a non-compete agreement "is enforceable if it 'is narrowly drawn to protect the employer's legitimate business interest, is not unduly burdensome on the employee's ability to earn a living, and is not against public policy'" noted Judge Cooke's opinion.  "CMA's restrictive covenant is not unduly harsh or oppressive to Ms. Torres insofar that it does not prohibit or preclude Ms. Torres from finding employment in her field."

"Companies that hire employees should be very diligent in determining whether the employee is bound by a valid restrictive covenant (non-compete or non-solicitation agreement) and also whether the applicant has accessed or taken proprietary or confidential information from the former employer," said Brown.  "Employers that are careful during the interview process can save themselves thousands of dollars by eliciting detailed information about the applicant's conduct while working for the soon-to-be former employer.  In this digital age, many employees download information from company computers without permission to do so.  Many employees are under the mistaken belief that the work product they prepared for a current or former employer is actually their personal data that can be taken to a new job."

About LeClairRyan
As a trusted advisor, LeClairRyan provides business counsel and client representation in corporate law and litigation.  In this role, the firm applies its knowledge, insight and skill to help clients achieve their business objectives while managing and minimizing their legal risks, difficulties and expenses.  With offices in California, Colorado, Connecticut, Maryland, Massachusetts, Michigan, New Jersey, New York, Pennsylvania, Virginia and Washington, D.C., the firm has approximately 350 attorneys representing a wide variety of clients throughout the nation.  For more information about LeClairRyan, visit www.leclairryan.com.

SOURCE LeClairRyan

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...