Section 1. Chapter 93 of the General Laws is hereby amended by adding the following new section:
Section 115. (a) (1) Unfair competition. — Any person who manufactures any article or product while using stolen or misappropriated information technology in its business operations shall be deemed to engage in unfair competition where such article or product is sold or offered for sale in this state, either separately or as a component of another article or product, and in competition with an article or product that was manufactured without the use of such stolen or misappropriated information technology in violation of this subsection (a). Any person who engages in such unfair competition, and any articles or products manufactured by such person in violation of this subsection (a), shall be subject to the liabilities and remedial provisions of this Section, except as provided in subsections (b), (c), and (g).
(2) Evidence of stolen or misappropriated information technology. — In an action under this Section, the use of stolen or misappropriated information technology may be established from the business records of a person subject to this subsection (a), by evidence derived from techniques used by the information technology owner to establish use of stolen or misappropriated information technology, or by other competent evidence.
(3) Definitions. — For purposes of this Section:
(A) “manufacture” means to develop, manufacture, produce, or assemble an article or product subject to subsection (a), in whole or substantial part, but shall not include contracting with or otherwise engaging another person to develop, manufacture, produce, or assemble an article or product subject to subsection (a).
(B) “stolen or misappropriated information technology” means hardware or software that the person referred to in subsection (a)(1) acquired, appropriated, or used in violation of applicable law, but shall not include hardware or software that was not available for retail purchase on a standalone basis at or before the time it was acquired, appropriated, or used by such person.
(C) information technology shall be considered to be used in a person’s business operations if the person uses such technology to support in any way the design, manufacture, distribution, marketing, or sales of the articles or products subject to subsection (a).
(D) “article or product” shall exclude any services sold or offered for sale in this state.
(4) Limitations on subsection (a). -- No action may be brought under this section, and no liability shall result, where --
(A) Sale of copyrightable end products. — the end article or end product sold or offered for sale in this state and alleged to violate subsection (a)(1) is a copyrightable work under the U.S. Copyright Act;
(B) Claims based on patent or trade secret infringement. — the allegation that the information technology is stolen or misappropriated is based on a claim that such information technology infringes a patent or trade secret under applicable law or that could be brought under any provision of Title 35 of the United States Code; or
(C) Claims involving open-source licenses. -- the allegation that the information technology is stolen or misappropriated is based on a claim that the defendant’s use of the information technology violates the terms of a license that allows users to modify and re-distribute any source code associated with the technology free of charge.
(b) (1) Notice and opportunity to cure. — No action may be brought under subsection (a) unless the person subject to subsection (a) received written notice of its alleged use of the stolen or misappropriated information technology from the owner of the information technology or the owner’s authorized representative and the person failed to cease use of the owner’s stolen or misappropriated information technology within 90 days after receiving such notice, subject to any extension approved in writing by the information technology owner or its authorized representative.
(2) Notice requirements. — To satisfy the requirements of this subsection, a written notice must: (A) identify the stolen or misappropriated information technology; (B) identify the lawful owner of the information technology; (C) state that the notifier has a reasonable belief that the person has acquired, appropriated, or used the information technology in question in violation of applicable law; and (D) if known by the notifier, state the manner in which such information technology is being used by the defendant.
(c) Affirmative defense to claims based on de minimis uses of stolen information technology. — In an action under subsection (a), a person shall avoid liability by proving by a preponderance of the evidence that (i) the aggregate retail value of the stolen or misappropriated information technology at the time of the alleged violation is less than $10,000. The “retail value” of stolen or misappropriated information technology is the retail price of the information technology in this state, multiplied by the number of stolen or misappropriated items used in the business operations of the person alleged to have violated subsection (a).
(d) Right to inspect. — In any action under this Section, the court shall, pursuant to applicable rules of discovery, permit the plaintiff or its representative or, where appropriate, a judicially appointed designee, to enter onto the defendant’s business premises to inspect any information technology, records, files, or other evidence relevant to the alleged use of stolen or misappropriated information technology in violation of subsection (a)(1). Any discovery taken pursuant to this subsection (d) shall be in addition to, and shall not limit, any other discovery permitted under the applicable rules, including rules providing for entry onto land or other property for inspection and other purposes.
(e) (1) Remedies. — No earlier than 90 days after the provision of notice in accordance with subsection (b), the Attorney General, or any person injured by reason of a violation of subsection (a), or any association of businesses representing any such person, may bring an action against any person, article, or product that is subject to subsection (a):
(A) Injunctive relief. — to enjoin violation of subsection (a), including by enjoining any such person from selling or offering to sell in this state articles or products that are subject to subsection (a).
(B) Actual or statutory damages. — to recover the greater of:
(i) actual damages; or
(ii) statutory damages of no more than three times the retail value of the stolen or misappropriated information technology, which shall be available only if the court finds that the value of the stolen or misappropriated information technology at issue was material.
(C) In any action for injunctive relief under this Section, irreparable harm and interim harm to the plaintiff shall be presumed where the court finds that articles or products subject to subsection (a) are being sold or offered for sale in this state.
(2) Award of enhanced damages and attorney’s fees. —In an action under this Section, a court may:
(A) increase the damages up to three times the damages authorized by subsection (e)(1)(B) where the court finds that the defendant’s use of the stolen or misappropriated information technology was willful; and
(B) award costs and reasonable attorney’s fees to (i) a prevailing plaintiff in all actions brought under subsection (a); or (ii) a prevailing defendant in actions brought by an injured person.
(3) Injured persons defined. — A person shall be deemed to have been injured by the sale or offer for sale of an article or product subject to subsection (a) if the person establishes by a preponderance of the evidence that:
(A) the person manufactures articles or products that are sold or offered for sale in this state in competition with articles or products that are subject to subsection (a); and
(B) the person’s articles or products were not manufactured using such stolen or misappropriated information technology in violation of subsection (a).
(4) Enforcement of injunctive relief. — If the court determines that a person found to have violated subsection (a) lacks sufficient attachable assets in this state to satisfy a judgment rendered against it, the court shall enjoin the sale or offering for sale in this state of any articles or products subject to subsection (a), except as provided in subsection (g) below. Any third party who is served with or otherwise subject to an order for injunctive relief issued hereunder shall be afforded reasonable notice of at least 90 days and opportunity to plead any of the affirmative defenses set forth in subsection (g) below, and no injunction may be enforced against such third party until its eligibility for such affirmative defense is resolved.
(f) In rem jurisdiction. — The court may proceed in rem against any articles or products alleged to be subject to subsection (a), including any articles or products sold or offered for sale in this state. Except as provided in subsection (g), all such articles or products shall be subject to attachment at or after the time of filing a complaint, regardless of the availability or amount of any monetary judgment and regardless of who has title to the articles or products. If the court determines that any such articles or products violate subsection (a), the court shall, acting in rem, enjoin the sale or offering for sale in this state of such articles or products, except as provided in subsection (g) below. Any third party who is served with or is otherwise subject to an order for attachment or an injunction acting in rem shall be afforded reasonable notice of at least 90 days and opportunity to plead any of the affirmative defenses set forth in subsection (g) below, and no attachment order may be enforced against such third party until its eligibility for such affirmative defense is resolved.
(g) Affirmative defenses for third parties. — A court may not enforce an order for attachment or injunctive relief under subsection (e)(4) or subsection (f) against a person (other than the manufacturer of such articles or products) who has an interest in an article or product subject to subsection (a) where such person establishes by a preponderance of the evidence that —
(1) End consumers. — such person is the end-consumer of an article or product subject to such order, or acquired the article or product after its sale to an end-consumer;
(2) Small or medium enterprises. — such person is a business with annual revenues not in excess of $50 million;
(3) Products acquired in good faith. — the person acquired the articles or products in good-faith reliance on either (1) a code of conduct or similar written document that governs the person’s commercial relationships with the manufacturer alleged to have violated subsection (a)(1) and which includes commitments that prohibit use of the stolen or misappropriated information technology at issue by such manufacturer, or (2) written assurances from the manufacturer or supplier of such articles or products that such articles or products, to the best of the manufacturer’s or supplier’s knowledge, were manufactured without the use of stolen or misappropriated information technology in the manufacturer’s or supplier’s business operations; provided, however, that within 180 days of receiving service under subsection (e)(4) or (f) or receiving a written notice that satisfies the requirements of subsections (b)(1) and (b)(2), the person uses commercially reasonable efforts to implement commercially reasonable practices and procedures to: (i) cause such manufacturer or supplier to cease such theft or misappropriation; or (ii) to prevent future acquisition of articles or products from such manufacturer or supplier subject to subsection (a);
(4) Implementation of responsible supply chain practices. — the person has made commercially reasonable efforts to prevent the acquisition of articles or products subject to this subsection (a) by: (i) acting in good faith to require its manufacturers and suppliers not to use stolen or misappropriated information technology in a manner that would violate subsection (a); and (ii) using commercially reasonable efforts to implement such practices and procedures to prevent acquisition of such articles and products. A person may satisfy this subparagraph (4) by demonstrating that its contracts with direct manufacturers, or any code of conduct or similar written document to which the person adheres and which is applicable to such direct manufacturers, prohibit the use of the stolen or misappropriated information technology at issue by such manufacturer, subject to a general right of audit, and such person has a practice of auditing its direct manufacturers on a periodic basis in accordance with generally accepted industry standards; or
(5) No contractual relationship. -- the person does not have a contractual relationship with the person alleged to have violated subsection (a) respecting the manufacture or supply of the articles or products alleged to have been manufactured in violation of subsection (a).
(h) Transition period. -- A court may not enforce an order issued pursuant to subsection (e)(4) or (f) of this section against a third party for a period of eighteen months from the date of enactment of this Act.
(i) Severability. — If any subsection, clause, sentence, paragraph, or part of this Section shall be adjudged by any court of competent jurisdiction to be invalid, that judgment shall not affect, impair, or invalidate the remainder thereof, but shall be confined in its operation to the clause, sentence, paragraph, section or part thereof directly involved in the controversy in which the judgment shall have been rendered.
The information contained in this website is for general information purposes only. The General Court provides this information as a public service and while we endeavor to keep the data accurate and current to the best of our ability, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.