Home
Site Search
Use small fonts Use medium fonts Use large fonts Email link to page

Resources

Managing Disclosure Risk in M&A Transactions

Published: 04/24/2017

By Jason (Jake) Bullen, Xi Chen

The disclosure of confidential information during the negotiation and due diligence phases of an M&A transaction can expose the disclosing party to various risks. For example, competitors can initiate M&A discussions as a strategic tactic to gain access to sensitive proprietary information and to exploit that information at the expense of the disclosing party.  In a hyper-competitive and technology-focused business environment, the protection of confidential information (and other intellectual property) should be a priority for all businesses – particularly during a merger or acquisition.

An example of the inherent risks in M&A disclosure is found in the ongoing US litigation between Stingray Digital Group (Stingray) and Music Choice. On June 6, 2016, Stingray, a publicly-traded Canadian media and entertainment company, was accused in the courts of the Eastern District of Texas of infringing on patents owned by Music Choice, a US provider of digital music. Stingray allegedly gained access to the patents during a failed attempt to acquire Music Choice in 2013. Since June 2016, Stingray has filed a countersuit alleging that Music Choice is engaged in a “smear campaign” designed to damage Stingray’s reputation through the dissemination of misinformation.

In the M&A context, a company should consider both legal and logistical methods to minimize disclosure risk.  In particular, a company should not disclose any confidential information to a third party without first negotiating and executing an appropriate non-disclosure agreement (or, NDA).

The NDA

A strong NDA (or confidentiality agreement) includes a comprehensive and relevant definition of confidential information, a clear definition of the permitted use of such information and covenants addressing the appropriate standard of care to protect the confidential information. An NDA should also prohibit any reverse engineering, decompiling or disassembling of the information.

The importance of the definition of “confidential information” is evidenced by the judgment in Visagie v TVX Gold Inc1. The facts relate to the aftermath of a failed joint venture attempt to purchase a mine, where one party (TVX) made an independent (and successful) bid for the intended target of the proposed joint venture a few months later. At trial, TVX argued that it was free to use the information provided by the disclosing party because the information was not “confidential” and therefore was not protected by the provisions of the NDA. The Ontario Court of Appeal, as part of its analysis on the breach of confidentiality, determined that the information provided by Visagie to TVX “had the necessary quality of confidentiality to be worthy of protection in law.” The Court found that “Mr. Visagie developed new information, new theories and new presentations on existing data so that he created new information which was confidential information to him until he disclosed it to others”. Further, the court determined that TVX first became interested in acquiring the mine because of the information provided to it by Visagie and that it used this information as a springboard in the ultimate acquisition. Consequently, the Court upheld the trial judge’s decision and recognized the existence of a constructive trust over the mine. In drafting NDAs, it is therefore important to define specific types – and forms (including verbal disclosure) - of information that are considered to be confidential.

Similarly, settling a precisely crafted definition of “permitted use” is also essential to an NDA. In Certicom Corp v Research in Motion Ltd2, an NDA was signed in contemplation of a friendly acquisition. However, when Research in Motion (RIM) initiated a hostile takeover after failed negotiations, Certicom asked the Ontario Superior Court to prevent RIM from continuing its bid. The signed NDA specifically limited the use by RIM of confidential information only for certain permitted “purposes,” which was defined to mean “some form of business combination between the Parties.” The Court found that RIM’s hostile takeover bid could not be interpreted to fall within the permitted “purposes” contemplated by the agreement, as a hostile takeover bid could not be understood as a business combination “between” the parties as the word “between” connotes each party’s consent and agreement. In reaching this conclusion, the Court placed considerable emphasis on the intention of the parties as determined through the wording of the NDA.

Significant consideration should also be given – particularly in a cross-border deal – to the governing law and forum clauses in an NDA, which should clearly indicate the jurisdiction that governs the agreement and the relevant forum for dispute resolution. Well-drafted governing law and forum clauses will reduce (if not eliminate) the ability of the receiving party to argue that conflict of law principles provide that another jurisdiction and/or forum (more beneficial to such party) should apply. Where the two parties are situated in different countries, litigation concerning applicable laws and forums can quickly become complex and expensive, so disclosing parties should take the time to confirm the desired jurisdiction and forum, as well as any exceptions to the governing forum (such as injunctive relief where the recipient is breaching the NDA in another jurisdiction).

Where the confidential information pertains to formulae, code, processes or methodologies, it is prudent to include a provision prohibiting the reverse engineering, decompiling or disassembling of the disclosed information. Further, one or both parties may choose to prohibit the other from soliciting its existing employees, customers and suppliers through restrictive covenants in the NDA.

Finally, an NDA should provide for specific performance and injunctive relief in the event of a breach by the recipient, including the actual or threatened disclosure of the confidential information.

Common Law Remedy

In many circumstances, a written NDA will not exist between the parties. For example, most venture capital funds refuse to sign NDAs.3 This is a risky situation for the disclosing party, but where an NDA is not in place, the Supreme Court of Canada has clarified that a common law remedy of “breach of confidence” can be established under certain criteria. However, the threshold is high and this is not a suggested strategy. The leading case (International Corona Resources Ltd. v LAC Minerals Ltd)4 provides that in the absence of a signed NDA, LAC’s misuse of confidential information obtained from Corona constituted a breach of confidence. However, in order to establish breach of confidence, Corona had to prove that:

a) the information conveyed was confidential5;
b) the confidential information was conveyed in confidence; and
c) the confidential information was used in an unauthorized manner by the party to whom it was communicated.

This three part analysis requires proof of subjective knowledge and requires an assessment of whether the third party knew or ought to have known that the information is confidential. In order to circumvent this complex and subjective analysis, it is much more efficient to establish through an NDA that specific obligations of confidentiality apply.

Trade Secrets

The disclosure of highly sensitive information such as trade secrets6 must be accompanied by contractual protection; otherwise the value of the information disclosed may be significantly compromised. Unlike patents, which are protected by statute upon disclosure to the relevant regulatory body, trade secrets do not enjoy legislative protection. Instead, in order for a trade secret to hold common law rights of exclusivity, it must maintain its status by being kept confidential (for example, being safeguarded by employees). Disclosure without the proper contractual framework may result in the information losing its “trade secret” status and thereby expose the information to reverse engineering and replication with no legal remedy.

The Oculus Decision

The recent (and highly publicized) February 1, 2017, decision (Texas Northern District Court) in ZeniMax Media, Inc. v. Oculus VR, LLC7 highlights the difficulty of establishing the misappropriation of trade secrets versus a breach of an NDA.  In a claim filed after Facebook offered US$2.3 billion to acquire Oculus, ZeniMax alleged (in a US$6 billion claim) that Oculus and the other defendants8 misappropriated trade secrets, breached an NDA between ZeniMax and Oculus and infringed copyright and trademarks.  The jury ultimately found Oculus guilty of copyright and trademark infringement, as well as breach of the NDA. For its infringement and breach, Oculus was found liable for US$250 million and other defendants were found liable for another US$250 million for false designation.

Although ZeniMax’s primary claim was for misappropriation of trade secrets (including the following technologies: (1) distortion correction technology; (2) chromatic aberration correction method; (3) gravity orientation and sensor drift correction technology; (4) head and neck modeling technology; (5) HMD view bypass technology; (6) predictive tracking technology; and (7) time warping methodology), the jury did not find in favour of ZeniMax on this point. Instead, after hearing the evidence, the jury determined that while Oculus had infringed both ZeniMax’s copyright in code and trademarks, ZeniMax failed to establish by a preponderance of evidence that:

(1) any trade secrets existed;
(2) the defendants acquired the trade secrets through breach of a confidential relationship or by improper means;
(3) the defendants made commercial use of the trade secrets in their business without authorization; and
(4) ZeniMax suffered damages as a result.9

Without the benefit of legislative protection, NDAs and other steps designed to preserve confidentiality are paramount to the effective protection of sensitive information constituting a trade secret. This case is ongoing as ZeniMax filed a motion dated February 23, 2017 seeking a permanent injunction to stop Oculus from using and distributing products that infringe ZeniMax’s copyrights.

Practical Tips – What and When to Disclose

Whether or not a written NDA exists, a number of practical steps are recommended for disclosing parties in the M&A context. It should be noted that courts will assess the precautions that a disclosing party took to ensure the secrecy of confidential information. Accordingly, consider the following suggestions:

  • Internal controls and risk management. Vendors should implement internal controls to ensure that a robust framework is in place to effectively identify and mitigate the threat of disclosure from within the company, including:

    o implementing policies addressing the management of confidential information (both in tangible and electronic forms) (e.g., require password protection for documents);

    o fragmenting confidential information and restricting access; and

    o entering into appropriate NDAs with employees and independent contractors, and conducting entry and exit interviews with these individuals to ensure compliance with obligations of confidentiality.
  • Clean Teams. Where transacting parties are competing firms, competition law considerations become relevant to the due diligence process. In order to facilitate the safe transmission of confidential competitively sensitive information, parties should assemble “Clean Teams” to a) exchange and retain information without disclosing it to others within the organization and b) filter and sanitize information for targeted consumption. Clean Teams can consist of both external advisors and internal business people and the composition of the team should evolve as the transaction progresses.
  • Staged disclosure. As important as contractual provisions are for the protection of confidential information, once the information is disclosed, the proverbial genie is out of the bottle and the recipient will have knowledge of the contents. It may be difficult to prove that the recipient used the information in an unauthorized manner (for example, in learning of the disclosing party’s business strategy, the recipient may simply alter its own strategy) so it is crucial to consider staggering the disclosure of information. The vendor should first assess the information that purchasers will want and need to know. Critical information should be separated from the balance, and the most sensitive information (for example, information that could be patentable or is considered a trade secret, or customer lists and customer contracts that show pricing details) should not be disclosed until as late as possible in the deal process. As noted above, a trade secret should never be disclosed without an NDA in place. 
  • Personal Information. The Personal Information Protection and Electronic Documents Act10 (or PIPEDA) restricts the collection, use and disclosure of an individual’s personal information (as defined under the Act) in the context of “commercial activity” without the consent of the individual. PIPEDA was amended in June of 2015 and now permits organizations to use and disclose personal information without consent in the context of a business transaction (inclusive of due diligence in M&A, a partial sale of assets or transfer upon insolvency). The exemption only applies, however, if the parties enter into an agreement to: a) only use and disclose personal information for purposes related to the proposed transaction, b) protect the information with appropriate security safeguards and c) return or destroy the information if the transaction does not proceed. Once the transaction is complete, Section 7.2(2) of PIPEDA requires either party to a transaction to notify affected individuals, within a reasonable amount of time after closing, that the transaction is complete and that their personal information was disclosed pursuant to the exemption.11 In order to comply with PIPEDA requirements and in keeping with the objectives of preserving confidentiality and minimizing unintentional disclosure, it is advisable for vendors to anonymize any personal information (at least in the early stages of disclosure).
  • Initial due diligence on the bidder. Performing due diligence to understand a bidder’s business profile, transaction strategy and litigation history can be an effective way to filter out companies seeking access to information for misuse.
  • Security precautions. Where highly sensitive information is to be disclosed, the vendor may consider further security precautions, such as only providing hard copies with watermarks and possibly a hidden mark and/or individually numbering each copy provided and restricting copies from being made.
  • Cybersecurity. Given that most documents are shared and exchanged electronically through virtual data rooms (VDRs), vendors should carefully evaluate data room providers to utilize only secure services. Competitive VDRs should offer data encryption upon upload and deploy effective firewalls to keep the information safe once uploaded. Desirable features include the automatic watermarking of documents and selective print/ save functionalities to restrict document dissemination. Beyond the data room, parties should also negotiate and build into the deal documents risk allocation provisions in the form of representations and warranties, indemnities and holdbacks that will allocate the costs of cyberbreaches, whether discovered before or after closing.

________________________________
1 Visagie v. TVX Gold Inc., [2000] OJ No. 1992, 49 OR (3d) 198 (Ont CA). (“Visagieb v TVX”)
2 Certicom Corp. v. Research In Motion Limited, [2009] OJ No. 252, 94 OR (3d) 511 (Ontario Superior Court).
3 Indeed, some funds and technology companies require companies that intend to disclose information to sign “Non-confidentiality Agreements” that make it clear the recipient can use the information received - since it is likely that similar information is being generated within the recipient’s business. 
4 Lac Minerals Ltd. v. International Corona Resources Ltd., [1989] 2 SCR 574 (SCC).
5 For a discussion on the nature of “confidential information”, see Visagie v TVX at para. 42-46.
6 A formula, process, device, or other business information that is kept confidential to maintain an advantage over competitors; information — including a formula, pattern, compilation, program, device, method, technique, or process — that (1) derives independent economic value, actual or potential, from not being generally known or readily ascertainable by others who can obtain economic value from its disclosure or use, and (2) is the subject of reasonable efforts, under the circumstances, to maintain its secrecy. Black’s Law Dictionary, 10th ed, sub verbo “trade secret”.
7 Zenimax Media Inc et al v. Oculus VR Inc et al, 166 F.Supp.3d 697 (N.D. Tex.).
8 Defendants included Facebook, Inc., Palmer Luckey and Samsung Electronics America, Inc.
9 Max Hooper and Brian Sommer, Verdict Analysis: Why the Jury Awarded ZeniMax $500 Million in Oculus Lawsuit, Online: Road To VR (February 2, 2017) <http://www.roadtovr.com/verdict-analysis-why-jury-awarded-zenimax-500-million-oculus-vr-lawsuit-facebook-id-software/>
10 Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5.
11 Ibid.