{
  "id": 4136235,
  "name": "LIEBERT CORPORATION et al., Plaintiffs-Appellants, v. JOHN MAZUR, an Indiv., et al., Defendants-Appellees",
  "name_abbreviation": "Liebert Corp. v. Mazur",
  "decision_date": "2005-04-05",
  "docket_number": "No. 1-04-2794",
  "first_page": "265",
  "last_page": "290",
  "citations": [
    {
      "type": "official",
      "cite": "357 Ill. App. 3d 265"
    }
  ],
  "court": {
    "name_abbreviation": "Ill. App. Ct.",
    "id": 8837,
    "name": "Illinois Appellate Court"
  },
  "jurisdiction": {
    "id": 29,
    "name_long": "Illinois",
    "name": "Ill."
  },
  "cites_to": [
    {
      "cite": "379 N.E.2d 1228",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1978,
      "opinion_index": 0
    },
    {
      "cite": "62 Ill. App. 3d 671",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        5622478
      ],
      "weight": 3,
      "year": 1978,
      "pin_cites": [
        {
          "page": "682"
        },
        {
          "page": "682"
        },
        {
          "page": "682"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/62/0671-01"
      ]
    },
    {
      "cite": "486 N.E.2d 1306",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1985,
      "pin_cites": [
        {
          "parenthetical": "irreparable harm likely if the defendant was not enjoined from soliciting the plaintiffs customers"
        }
      ],
      "opinion_index": 0
    },
    {
      "cite": "138 Ill. App. 3d 1045",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        8499889
      ],
      "year": 1985,
      "pin_cites": [
        {
          "page": "1055",
          "parenthetical": "irreparable harm likely if the defendant was not enjoined from soliciting the plaintiffs customers"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/138/1045-01"
      ]
    },
    {
      "cite": "806 N.E.2d 1074",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 2004,
      "opinion_index": 0
    },
    {
      "cite": "346 Ill. App. 3d 957",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        3832940
      ],
      "year": 2004,
      "pin_cites": [
        {
          "page": "965"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/346/0957-01"
      ]
    },
    {
      "cite": "696 N.E.2d 839",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1998,
      "opinion_index": 0
    },
    {
      "cite": "297 Ill. App. 3d 211",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        910210
      ],
      "year": 1998,
      "pin_cites": [
        {
          "page": "219"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/297/0211-01"
      ]
    },
    {
      "cite": "54 F.3d 1262",
      "category": "reporters:federal",
      "reporter": "F.3d",
      "case_ids": [
        7413175
      ],
      "weight": 7,
      "year": 1995,
      "pin_cites": [
        {
          "page": "1269"
        },
        {
          "page": "1269"
        },
        {
          "page": "1269"
        },
        {
          "page": "1269-71"
        },
        {
          "page": "1271"
        },
        {
          "page": "1270"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/f3d/54/1262-01"
      ]
    },
    {
      "cite": "259 F.3d 587",
      "category": "reporters:federal",
      "reporter": "F.3d",
      "case_ids": [
        9499434
      ],
      "year": 2001,
      "opinion_index": 0,
      "case_paths": [
        "/f3d/259/0587-01"
      ]
    },
    {
      "cite": "381 Md. 288",
      "category": "reporters:state",
      "reporter": "Md.",
      "case_ids": [
        89835
      ],
      "weight": 4,
      "year": 2004,
      "pin_cites": [
        {
          "page": "313-15",
          "parenthetical": "misappropriation by \"improper means\" acquisition where employee copied his employer's computer files to a CD for personal use before resigning"
        },
        {
          "page": "466-67",
          "parenthetical": "misappropriation by \"improper means\" acquisition where employee copied his employer's computer files to a CD for personal use before resigning"
        },
        {
          "page": "315"
        },
        {
          "page": "467",
          "parenthetical": "applying Maryland's version of the Uniform Trade Secret Act"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/md/381/0288-01"
      ]
    },
    {
      "cite": "212 N.E.2d 865",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1965,
      "opinion_index": 0
    },
    {
      "cite": "33 Ill. 2d 379",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        2884827
      ],
      "year": 1965,
      "opinion_index": 0,
      "case_paths": [
        "/ill-2d/33/0379-01"
      ]
    },
    {
      "cite": "546 N.E.2d 41",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1989,
      "opinion_index": 0
    },
    {
      "cite": "190 Ill. App. 3d 535",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        2518307
      ],
      "weight": 3,
      "year": 1989,
      "pin_cites": [
        {
          "page": "538"
        },
        {
          "page": "538"
        },
        {
          "page": "538"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/190/0535-01"
      ]
    },
    {
      "cite": "76 F. Supp. 2d 919",
      "category": "reporters:federal",
      "reporter": "F. Supp. 2d",
      "case_ids": [
        11502515
      ],
      "year": 1999,
      "pin_cites": [
        {
          "page": "927"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/f-supp-2d/76/0919-01"
      ]
    },
    {
      "cite": "740 N.E.2d 1166",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 2000,
      "opinion_index": 0
    },
    {
      "cite": "317 Ill. App. 3d 1054",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        1025957
      ],
      "weight": 7,
      "year": 2000,
      "pin_cites": [
        {
          "page": "1068"
        },
        {
          "page": "1070-71",
          "parenthetical": "the court ultimately reversed dismissal of the claim based on the inevitable disclosure doctrine"
        },
        {
          "page": "1070"
        },
        {
          "page": "1070"
        },
        {
          "page": "1070-71"
        },
        {
          "page": "1071"
        },
        {
          "page": "1071"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/317/1054-01"
      ]
    },
    {
      "cite": "177 F. Supp. 2d 859",
      "category": "reporters:federal",
      "reporter": "F. Supp. 2d",
      "case_ids": [
        9454926
      ],
      "weight": 9,
      "year": 2001,
      "pin_cites": [
        {
          "page": "875",
          "parenthetical": "confidentiality agreements and employee handbooks advised of the confidential nature of the plaintiffs information"
        },
        {
          "page": "868"
        },
        {
          "page": "866-67"
        },
        {
          "page": "875"
        },
        {
          "page": "875"
        },
        {
          "page": "877"
        },
        {
          "page": "876"
        },
        {
          "page": "870"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/f-supp-2d/177/0859-01"
      ]
    },
    {
      "cite": "625 N.E.2d 338",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1993,
      "opinion_index": 0
    },
    {
      "cite": "253 Ill. App. 3d 129",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        5421972
      ],
      "weight": 3,
      "year": 1993,
      "pin_cites": [
        {
          "page": "134"
        },
        {
          "page": "134"
        },
        {
          "page": "134"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/253/0129-01"
      ]
    },
    {
      "cite": "653 N.E.2d 809",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1995,
      "pin_cites": [
        {
          "parenthetical": "\"the standards to establish a customer list as a trade secret under the Act parallel the common law standards\""
        }
      ],
      "opinion_index": 0
    },
    {
      "cite": "274 Ill. App. 3d 59",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        291657
      ],
      "weight": 2,
      "year": 1995,
      "pin_cites": [
        {
          "page": "68",
          "parenthetical": "\"the standards to establish a customer list as a trade secret under the Act parallel the common law standards\""
        },
        {
          "page": "67-69",
          "parenthetical": "no trade secret because the plaintiff did not meet either of the statutory requirements - its customers were not secret, and there was no evidence any security measures were used to protect the customer list"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/274/0059-01"
      ]
    },
    {
      "cite": "273 N.E.2d 393",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1971,
      "opinion_index": 0
    },
    {
      "cite": "49 Ill. 2d 88",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        2909735
      ],
      "weight": 3,
      "year": 1971,
      "pin_cites": [
        {
          "page": "93"
        },
        {
          "page": "97-98"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-2d/49/0088-01"
      ]
    },
    {
      "cite": "651 N.E.2d 209",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1995,
      "opinion_index": 0
    },
    {
      "cite": "272 Ill. App. 3d 580",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        251531
      ],
      "weight": 7,
      "year": 1995,
      "pin_cites": [
        {
          "page": "588"
        },
        {
          "page": "582"
        },
        {
          "page": "582"
        },
        {
          "page": "587"
        },
        {
          "page": "589"
        },
        {
          "page": "589",
          "parenthetical": "employees signed confidentiality agreements"
        },
        {
          "page": "590-91"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/272/0580-01"
      ]
    },
    {
      "cite": "819 N.E.2d 734",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 2004,
      "opinion_index": 0
    },
    {
      "cite": "212 Ill. 2d 441",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        2444184
      ],
      "year": 2004,
      "pin_cites": [
        {
          "page": "464"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-2d/212/0441-01"
      ]
    },
    {
      "cite": "564 N.E.2d 881",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1990,
      "opinion_index": 0
    },
    {
      "cite": "206 Ill. App. 3d 184",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        2561490
      ],
      "weight": 9,
      "year": 1990,
      "pin_cites": [
        {
          "page": "188"
        },
        {
          "page": "189"
        },
        {
          "page": "190-91"
        },
        {
          "page": "191-92"
        },
        {
          "page": "190-91"
        },
        {
          "page": "191-92"
        },
        {
          "page": "192"
        },
        {
          "page": "192"
        },
        {
          "page": "188"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/206/0184-01"
      ]
    },
    {
      "cite": "440 N.E.2d 117",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1982,
      "opinion_index": 0
    },
    {
      "cite": "91 Ill. 2d 518",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        3091586
      ],
      "year": 1982,
      "pin_cites": [
        {
          "page": "524"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-2d/91/0518-01"
      ]
    },
    {
      "cite": "628 N.E.2d 647",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1993,
      "opinion_index": 0
    },
    {
      "cite": "256 Ill. App. 3d 779",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        5383107
      ],
      "weight": 3,
      "year": 1993,
      "pin_cites": [
        {
          "page": "786"
        },
        {
          "page": "787"
        },
        {
          "page": "787",
          "parenthetical": "under Illinois law, an employer's trade secrets are a protectible interest"
        }
      ],
      "opinion_index": 0,
      "case_paths": [
        "/ill-app-3d/256/0779-01"
      ]
    },
    {
      "cite": "10 Ill. 2d 157",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        2725887
      ],
      "year": 1956,
      "pin_cites": [
        {
          "page": "166"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/ill-2d/10/0157-01"
      ]
    },
    {
      "cite": "468 N.E.2d 797",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1984,
      "opinion_index": 1
    },
    {
      "cite": "127 Ill. App. 3d 423",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        3563188
      ],
      "year": 1984,
      "pin_cites": [
        {
          "page": "431"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/ill-app-3d/127/0423-01"
      ]
    },
    {
      "cite": "793 N.E.2d 110",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 2003,
      "opinion_index": 1
    },
    {
      "cite": "341 Ill. App. 3d 992",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        5573877
      ],
      "year": 2003,
      "pin_cites": [
        {
          "page": "997"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/ill-app-3d/341/0992-01"
      ]
    },
    {
      "cite": "752 N.E.2d 1030",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 2001,
      "opinion_index": 1
    },
    {
      "cite": "196 Ill. 2d 181",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        351282
      ],
      "year": 2001,
      "pin_cites": [
        {
          "page": "208"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/ill-2d/196/0181-01"
      ]
    },
    {
      "cite": "163 N.E.2d 518",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1959,
      "opinion_index": 1
    },
    {
      "cite": "18 Ill. 2d 94",
      "category": "reporters:state",
      "reporter": "Ill. 2d",
      "case_ids": [
        5328220
      ],
      "year": 1959,
      "pin_cites": [
        {
          "page": "102"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/ill-2d/18/0094-01"
      ]
    },
    {
      "cite": "719 F.2d 42",
      "category": "reporters:federal",
      "reporter": "F.2d",
      "case_ids": [
        1899121
      ],
      "year": 1983,
      "pin_cites": [
        {
          "page": "45"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/f2d/719/0042-01"
      ]
    },
    {
      "cite": "295 F.3d 206",
      "category": "reporters:federal",
      "reporter": "F.3d",
      "case_ids": [
        9410278
      ],
      "year": 2002,
      "pin_cites": [
        {
          "page": "214",
          "parenthetical": "showing of irreparable harm is perhaps the \" 'single most important prerequisite for the issuance of a preliminary injunction' \""
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/f3d/295/0206-01"
      ]
    },
    {
      "cite": "308 N.E.2d 313",
      "category": "reporters:state_regional",
      "reporter": "N.E.2d",
      "year": 1974,
      "opinion_index": 1
    },
    {
      "cite": "17 Ill. App. 3d 545",
      "category": "reporters:state",
      "reporter": "Ill. App. 3d",
      "case_ids": [
        2509841
      ],
      "year": 1974,
      "pin_cites": [
        {
          "page": "550"
        }
      ],
      "opinion_index": 1,
      "case_paths": [
        "/ill-app-3d/17/0545-01"
      ]
    }
  ],
  "analysis": {
    "cardinality": 1849,
    "char_count": 60155,
    "ocr_confidence": 0.743,
    "pagerank": {
      "raw": 2.2006454933545428e-07,
      "percentile": 0.7751121783547998
    },
    "sha256": "60a4a783ac215819950c675183a0a671dc13b196da17c0bd9d94c9fe77c44db7",
    "simhash": "1:b993988e336c55d5",
    "word_count": 9512
  },
  "last_updated": "2023-07-14T22:31:24.775353+00:00",
  "provenance": {
    "date_added": "2019-08-29",
    "source": "Harvard",
    "batch": "2018"
  },
  "casebody": {
    "judges": [],
    "parties": [
      "LIEBERT CORPORATION et al., Plaintiffs-Appellants, v. JOHN MAZUR, an Indiv., et al., Defendants-Appellees."
    ],
    "opinions": [
      {
        "text": "JUSTICE WOLFSON\ndelivered the opinion of the court:\nPlaintiffs Liebert Corporation (Liebert) and Zonatherm Products, Incorporated (Zonatherm), sought to enjoin several of Zonatherm\u2019s former employees from using alleged trade secrets in their new competing business, Aerico, Incorporated (Aerico). Plaintiffs alleged defendants misappropriated confidential customer lists, historical bids, quotations, sales history, and price books. The trial court denied plaintiffs\u2019 motion for a preliminary injunction. Plaintiffs appeal. We affirm in part, reverse in part, and reverse and remand in part.\nFACTS\nI. History of the Parties\nLiebert is an Ohio corporation engaged in the manufacture and sale of computer network protection equipment that provides uninterrupted network power and climate control technologies. Ninety percent of Liebert\u2019s sales consist of engineered or applied systems for uninterrupted power or network air-conditioning systems.\nZonatherm is an Illinois corporation that, among other things, sells products manufactured by Liebert. Zonatherm has been the exclusive Liebert representative in the Chicago area since it was founded in 1969. On October 1, 2003, Liebert and Zonatherm entered into a representative agreement providing for the confidential treatment of Liehert\u2019s confidential, proprietary, and trade secret information, with restrictions on disclosure, use, and dissemination.\nDefendants John Mazur (Mazur), Gregory N. Schwabe (Schwabe), Jerome Mazur (Jerome), and Mario Belluomini (Belluomini) are former Zonatherm employees and sales representatives for Liebert. Mazur was a territory sales manager for Zonatherm and was responsible for 25% of Zonatherm\u2019s sales of Liebert\u2019s products. Mazur and Schwabe resigned from Zonatherm on January 20, 2004, and began to work at Aerico on January 22, 2004. Belluomini and Jerome resigned from Zonatherm and began work at Aerico on January 26 and 30, 2004, respectively. Defendant Laurence Bergfalk (Bergfalk) became a shareholder in Aerico along with Mazur and Schwabe.\nAerico is in the business of marketing and selling products manufactured by American Power Conversion Corporation (APC), a direct competitor of plaintiffs. Mazur and Schwabe incorporated Aerico on November 12, 2003 \u2014 two months before they resigned from Zonatherm \u2014 and signed a representative agreement with APC on January 19, 2004. APC, a Massachusetts corporation, designs products similar to Liebert\u2019s and is one of Liebert\u2019s direct competitors.\nII. Plaintiffs\u2019 Alleged Trade Secrets\nThe information defendants allegedly misappropriated was stored electronically and could be accessed through two e-commerce websites maintained by Liebert.\nA. Liebert\u2019s and Zonatherm\u2019s Electronic Storage of the Alleged Trade Secrets\nPhilip Jan Barnett, Liebert\u2019s director of e-commerce, testified regarding the confidential information and how it was stored. Through the \u201cvar.liebert.net\u201d website, Liebert\u2019s approximately 800 value-added resellers could access his or her own electronic work area with price quotes, pricing level, and products information. Each of the 72 offices within Liebert\u2019s domestic organization had its own virtual space to store and view customer information, quotations, orders, and other information.\nThe second website, \u201crep.liebert.com\u201d (El.net), also known as El.Net or the Electronic Liebert Network, was a \u201cvirtual office\u201d for first-channel salespeople, sales representatives, international distributors, and factory direct offices. The El.net site housed confidential customer lists, quote lists, pricing information, customer accounts receivable, order acknowledgments, and shipment information. All of the information was confidential to each exclusive representative office, like Zonatherm, and each representative was assigned a particular sales territory.\nBarnett described the organization of the El.net website: (1) the quote and order section, which shows the salesperson\u2019s personal quotes and orders as well as those of the sales office; (2) the competition section showing information on the strengths and weaknesses of the competition and what to do in direct bid situations; (3) the lead time reports showing what inventory is available in the factories and warehouses; (4) the price books; (5) the reconditioned equipment and surplus equipment sections; (6) the sales information section containing highly confidential customer information; (7) the sales reporting wizard, which inputs sales information into a spreadsheet; (8) the sales development area; (9) sales application tools; (10) leasing information; (11) a freight calculator; (12) industrial tools; (13) sales presentations; and (14) sales quotation information.\nB. The Types of Information Allegedly Misappropriated\nThree of the above-listed items are at issue in this case \u2014 customer information, sales quotation information, and the price books.\n1. Customer contact lists\nZonatherm\u2019s customer list included company names, phone numbers, addresses, customers\u2019 e-mail addresses, and the names, telephone numbers, and addresses of individual contacts within each company. Zonatherm maintained separate lists for each sales territory. The sales team assigned to a particular territory would have access to that territory\u2019s customer list on Zonatherm\u2019s server. Salespersons were not given access to other territories\u2019 customer lists. According to Stephen Izzo (Izzo), Zonatherm\u2019s president, the contact list was \u201ca valuable reference document for [salespeople] to decide how to spend their valuable time in order to create business for Zonatherm.\u201d\nAlbert Izzo (Albert), who founded Zonatherm in 1969, started his business by making cold calls to engineers and eventually calling mechanical contractors and owners. He found the names of companies in the telephone book but had to \u201cdig\u201d for the names of the actual decision-makers for the companies. Only the decision-makers had the authority to purchase Zonatherm\u2019s products. Discovering the appropriate buying authority within each customer\u2019s company was a time-consuming process. Albert said it required taking many people out to lunch to discover who was the right buyer within each company. When Albert handed the business over to his son Stephen in 1989, Zonatherm had 1,000 \u201cgood\u201d repeat customers. That number grew to 2,000 customers by the time of the preliminary injunction hearing. Zonatherm\u2019s contact lists were loaded onto the company\u2019s computer system sometime between 2000 and 2001.\n2. Buyer histories including bid and sales quotations\nZonatherm\u2019s website also stored customer orders, invoices, and billing information. The information indicated each customer\u2019s order status, shipment, spare parts lists, billing address, the date the account was opened, their last payment, and amount due. Izzo testified the buyer histories recorded how much revenue each customer generated for Zonatherm. The sales quotations, which included outstanding quotes, quotes that needed maintenance, and completed or rejected special feature authorizations, were also part of the buyer history. The data on ongoing activity and proposed bids were important in assessing the value of each customer. Zonatherm\u2019s policy required all salespeople who acquired quotes from Liebert\u2019s system to upload those quotes from their computer to Zonatherm\u2019s server. Izzo admitted once potential customers were quoted a price, Zonatherm could not control who saw the price.\n3. Price books\nThe price books, according to Barnett, are highly confidential and are not available through \u201cliebert.com,\u201d the website available to the public. The price books are very complex engineered-to-order solutions that allow salespeople to do a complete price work-up and quotation, complete with factory options. The price books have a tool that allows salespeople to build the information into a proposal they can hand to a customer. The El.net site also contains sales policy and procedure manuals telling salespeople how they can use sales multipliers and discounts when calculating a bid. Before El.net was established, salespeople would spend hours generating a quote manually.\nC. The Security Measures Liebert and Zonatherm Used to Protect the Information\nBarnett described the security measures applicable to the customer contact information, sales quotations, and the price books.\nIn order to access information on Liebert\u2019s websites, a salesperson needed a unique identification number and password. The only way a salesperson could be assigned an identification number and password was if a principal from his representative office requested it. Passwords were assigned on a need-to-know basis. Approximately 600 sales associates who are not Liebert employees have access to the El.net site, but all need a password to access its information. A confidentiality statement appeared whenever anyone accessed a price book online.\nWilliam Macaluso (Macaluso), Zonatherm\u2019s sales manager, testified it was his job to ensure employees did not take any of Zonatherm\u2019s proprietary information when they left the company. Before Zonatherm started storing its information on computers, Macaluso would collect any physical copies of contact lists or price books. Since the information is now stored on office computers which typically remain in the office after an employee leaves, Macaluso changes the access codes so the employee leaving cannot access the server. Employees were allowed to take only their personal belongings when they left the company.\nAlthough Macaluso did not delete Zonatherm files from Mazur\u2019s laptop when he left, Macaluso did delete Zonatherm documents from Belluomini\u2019s desktop computer when he resigned and took the computer with him.\nIII. The Alleged Misappropriation\nPlaintiffs\u2019 allegations of trade secret misappropriation are hinged on Mazur\u2019s computer activities before and after he resigned his position at Zonatherm. Most of the evidence regarding his activities was presented through the testimony of Mazur and plaintiffs\u2019 expert witness, Lee Neubecker (Neubecker).\nA. Mazur\u2019s Testimony\nMazur testified that on January 20, 2004, he was in Zonatherm\u2019s offices from 9 a.m. until he resigned at 3:30 p.m. Mazur admitted that on that same day, he downloaded all the price books and from 5 to 20 quotations from Zonatherm\u2019s server onto his laptop computer. He also admitted copying quite a bit of information from the system onto his laptop computer on January 19.\nAccording to Mazur, he copied the price books and quotes because he was trying to create a \u201cclose-out\u201d document for his team to ensure that the documents and quotations on order had a price reference. He did not ask another team member to collect the information he copied onto his laptop because other team members did not have access to all the information on his computer.\nMazur also copied the information to insure he would receive his proper commission for any sale pending. He received two commission sheets after he left Zonatherm \u2014 one in February and one in March. Each commission sheet listed names of Zonatherm\u2019s customers and how much money Zonatherm collected from them during the month.\nMazur did not believe the price books were confidential, although he testified he would not share price books with competitors. He did not believe he did anything improper by downloading the books, nor did he intend to use the information improperly. When he resigned, he told Izzo and Macaluso that he would be working for APC. He was not asked for his laptop when he left.\nMazur said he did not use the information from the time he copied the information until the time of the lawsuit. The price books and quotation information were saved in a zip file on his computer. On February 5, 2004, Mazur was served with plaintiffs\u2019 complaint and motion for preliminary injunction. Plaintiffs\u2019 counsel asked Mazur whether, on February 5, 2004, he put all of the information he had downloaded into a zip file, but Mazur was evasive in his answers, as illustrated in the following excerpt:\n\u201cQ. And then that same day in the afternoon or evening you took all the information that you had downloaded on January 20th, and you put it into a zip file; isn\u2019t that correct?\nA. Actually, I believe that the zip file was created before that.\nQ. Isn\u2019t it true that in the afternoon or evening of February 5, 2004, you downloaded to the Zurich Zip file all the material information that you had taken and downloaded on January 20th at Zonatherm and Liebert? Isn\u2019t that true, sir?\nA. Again, I believe, to my best knowledge, I created that prior \u2014 on or before the 5th. So the answer would be no.\nQ. No, that\u2019s not true?\nA. I believe it was done before that.\nQ. It\u2019s not a trick question.\nA. I\u2019m sorry.\nQ. Now, isn\u2019t it true, then, sir, that you then downloaded the Zip file to a CD burning file, isn\u2019t that true, on February 5th or 6th, 2004, after you were served with the notice of motion? Isn\u2019t that true, sir?\nA. That\u2019s not true.\nQ. And isn\u2019t it true, sir, that after you were served on February 5, 2004, you proceeded to download all that information to a CD?\nA. I attempted to create a CD with that information, that is correct.\nQ. And isn\u2019t it true, sir, that some of the information got on the disks; isn\u2019t that true?\nA. That is what I\u2019m not aware of.\u201d\nPlaintiffs\u2019 counsel then referred to Mazur\u2019s deposition testimony, where when asked if he put any information on disks, Mazur answered, \u201cThere was some information on disks.\u201d\nMazur said he attempted to save the zip file on a compact disk (CD) and that he intended to give the CD to another Zonatherm employee to give to Steve Izzo, his former boss at Zonatherm. Mazur thought the information might answer any questions that could arise concerning a job he quoted. He did not believe he successfully saved the files on the CD, also known as \u201cburning,\u201d because when he put the CD back into the computer, he could not access any information from it. Mazur then deleted anything associated with Zonatherm or Liebert from his laptop computer\u2019s memory. He said he deleted the information because it was no longer needed.\nB. Neubecker\u2019s Testimony\nThe trial court qualified Neubecker to testify as an expert in computer forensics. On February 25, 2004, plaintiffs retained Neubecker to examine the hard drive on Mazur\u2019s laptop computer. Neubecker made an exact copy of Mazur\u2019s hard drive and then performed extensive searches of the hard drive for any information related to Liebert or Zonatherm. He found evidence that showed Mazur accessed the Liebert website on January 20, 2004, and downloaded files. Plaintiffs provided copies of files from their websites so Neubecker could compare that information with the contents of Mazur\u2019s laptop. Neubecker found five files on Mazur\u2019s computer exactly matched five price book files provided by plaintiffs.\nNeubecker testified Mazur downloaded the files and put them into a zip file entitled \u201ca 12 bypass and distribution.doc.\u201d Mazur then moved that file into another zip file called \u201cZurich zip.\u201d The \u201cZurich zip\u201d file contained most of the price book documents.\nOn February 5, 2004, at 5:35 p.m., Mazur added \u201cnewfolder.zip\u201d to the \u201cZurich zip\u201d file. \u201cNewfolder.zip\u201d contained a lot of Liebert and Zonatherm documents, including quote histories and budgets. Three minutes later, \u201cZurich zip\u201d was copied to the \u201cCD burning\u201d folder. Neubecker testified when a computer user chooses to copy files from the hard drive to a CD, the computer automatically copies the files and places them in the \u201cCD burning\u201d folder on the hard drive. That way, the computer only has to access one folder when it copies, or \u201cburns,\u201d the information onto the CD. Neubecker said most computer users are not aware of the \u201cCD burning\u201d folder. One file in the CD burning folder contained \u201csomewhere in the realm of 40 banker boxes or more\u201d of information belonging to Liebert. The only place Neubecker found the \u201cZurich zip\u201d file was in the \u201cCD burning\u201d folder because Mazur deleted it from its original source. The zip files Neubecker discovered in the \u201cCD burning\u201d folder \u201cwere destroyed and irrecoverable off the computer with the exception of a few files.\u201d\nNeubecker said the fact that the \u201cZurich zip\u201d file was in the \u201cCD burning\u201d folder three minutes after the \u201cnewfolder.zip\u201d file had been copied into it made it more likely than not that Mazur successfully burned the CD.\nOn February 6, 2004, the day after the \u201cZurich zip\u201d file was copied to the \u201cCD burning\u201d file, a \u201cmass wave of deletion\u201d began. Over the next few days, Mazur deleted approximately 12,000 files from his computer.\nOn February 8, 2004, Mazur deleted 4,000 files, including the \u201c12 bypass and distribution\u201d zip file which contained price books. That file also had existed in the \u201cZurich zip\u201d file. The fact that the \u201c12 bypass and distribution\u201d file was deleted on February 8 indicated Mazur was going back to look for and delete any remaining files.\nNeubecker discovered Mazur also purged his computer\u2019s application log sometime on February 9. The application log tracks when different programs, such as the CD-ROM program, are used. It records when the program to burn a CD starts and finishes. The log records how many CDs were successfully burned. Because Mazur deleted the application log from his computer, Neubecker could not determine with certainty whether Mazur successfully created a CD.\nNeubecker said it was possible for a computer to delete information in the \u201cCD burning\u201d folder after a CD was burned successfully. He also described several situations where the information would remain in the \u201cCD burning\u201d folder after a successful burn:\n\u201cWithin the Windows program, *** you can choose to keep the file there, burn another [CD], leave the session open, or if you just close the program and if your power were lost on a laptop *** [the file in the \u2018CD burning\u2019 folder] would remain.\u201d\nIV The Trial Court\u2019s Ruling\nThe trial court denied the plaintiffs\u2019 motion for a preliminary injunction. The court found the plaintiffs did not establish a clearly ascertainable right to an injunction or a likelihood of success on the merits. First, the court found the plaintiffs did make a prima facie case that the price books were trade secrets because they contained information that was not readily available. The court found that the customer lists were not trade secrets because they were easily duplicated and available in a competitive industry. Although the plaintiffs showed Mazur downloaded price books onto his computer, the court found that Mazur erased all of the information he took, and there was not a \u201cfair chance from the evidence presented\u201d that the price books still existed or that anyone else took price books. The court further found there was no fair chance of succeeding on the question of whether defendants used the price books before they were destroyed. The court found plaintiffs\u2019 allegations of irreparable harm were speculative.\nOn appeal, plaintiffs contend the trial court abused its discretion when: (1) it found the customer lists were not trade secrets; (2) it failed to decide whether the sales quotations were trade secrets; (3) it found plaintiffs did not present a fair question on the likelihood of success on their trade secret misappropriation claims because defendants no longer had the information; (4) it found no fair question that defendants would inevitably use the trade secrets; and (5) it found plaintiffs\u2019 allegations of irreparable harm were speculative.\nDECISION\nI. Scope of the Appeal\nFirst, we want to clearly identify which categories of information are the subject of this appeal.\nIn this case, plaintiffs based their motion for a preliminary injunction on their claim that defendants misappropriated their trade secrets in violation of the Illinois Trade Secrets Act (Act) (765 ILCS 1065/1 et seq. (West 2002)). The trial court limited its examination of the alleged trade secrets to two types of information: plaintiffs\u2019 customer lists and their price books. The trial court found plaintiffs presented a fair question that the price books contained trade secrets. The trial court reached the opposite conclusion with respect to the customer lists.\nPlaintiffs contend the trial court abused its discretion when it failed to consider the bids and quotations, while defendants contend plaintiffs waived any claim to protect the bid history and quotations for two reasons: (1) they failed to produce the information during discovery, and (2) they limited their claim to contact information and the price books at a pretrial proceeding.\nWe agree with plaintiffs and find no reason for the exclusion of the bids and quotation data: defendants knew the issue was included in the motion and, for the most part, did not object when plaintiffs presented evidence and argument concerning the bids and quotations. When defendants\u2019 attorney did object, the trial court allowed the evidence to come in as long as plaintiffs\u2019 attorney kept on schedule.\nWe believe the trial court abused its discretion by failing to decide whether the sales quotations and bids are trade secrets. Both parties have addressed this question in their briefs, and we have found sufficient evidence in the record to allow us to decide the issue on review.\nNext, we examine whether the customer lists, bids, and sales quotations are trade secrets. We will not review whether plaintiffs\u2019 price books are trade secrets because defendants did not cross-appeal the trial court\u2019s finding that they are.\nII. Standard of Review\nA trial court grants a preliminary injunction when it wants to preserve the status quo until it decides the case on its merits. George S. May International Co. v. International Profit Associates, 256 Ill. App. 3d 779, 786, 628 N.E.2d 647 (1993); Dixon Ass\u2019n for Retarded Citizens v. Thompson, 91 Ill. 2d 518, 524, 440 N.E.2d 117 (1982). A party seeking a preliminary injunction must show: (1) it has a \u201cclearly ascertain[able] right\u201d which must be protected; (2) it is likely to succeed on the merits; (3) no adequate remedy at law exists; and (4) it will suffer irreparable harm absent an injunction. Gillis Associated Industries, Inc. v. Cari-All, Inc., 206 Ill. App. 3d 184, 188, 564 N.E.2d 881 (1990).\nOn appeal, the decision to grant or deny a preliminary injunction will not be disturbed unless the trial court abused its discretion. Gillis, 206 Ill. App. 3d at 189. A trial court abuses its discretion when its findings are against the manifest weight of the evidence. George S. May, 256 Ill. App. 3d at 787. \u201cA finding is against the manifest weight of the evidence only if the opposite conclusion is clearly evident.\u201d In re Arthur H., 212 Ill. 2d 441, 464, 819 N.E.2d 734 (2004).\nIII. Protecting Trade Secrets With Preliminary Injunctions\nWe must determine whether plaintiffs presented a fair question as to a clearly ascertainable right \u2014 specifically, that the customer lists, bids, and sales quotations that defendants allegedly misappropriated are trade secrets under the Act. See George S. May, 256 Ill. App. 3d at 787 (under Illinois law, an employer\u2019s trade secrets are a protectible interest).\nThe Act, in relevant part, provides:\n\u201c \u2018Trade secret\u2019 means information, including but not limited to, technical or non-technical data, a formula, pattern, compilation, program, device, method, technique, drawing, process, financial data, or list of actual or potential customers or suppliers that:\n(1) is sufficiently secret to derive economic value, actual or potential, from not being generally known to other persons who can obtain economic value from its disclosure or use; and\n(2) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy or confidentiality.\u201d 765 ILCS 1065/2(d) (West 2002).\nIn other words, plaintiffs must meet two requirements to show their information is a trade secret under the Act. First, they must show the information was sufficiently secret to give them a competitive advantage. 765 ILCS 1065/2(d)(l) (West 2002); Gillis, 206 Ill. App. 3d at 190-91. Second, they must show they took affirmative measures to prevent others from acquiring or using the information. 765 ILCS 1065/2(d)(2) (West 2002); Gillis, 206 Ill. App. 3d at 191-92.\nIn addition to the Act\u2019s requirements, courts often consider six common law factors when deciding whether a trade secret exists. See Stampede Tool Warehouse, Inc. v. May, 272 Ill. App. 3d 580, 588, 651 N.E.2d 209 (1995), citing ILG Industries, Inc. v. Scott, 49 Ill. 2d 88, 273 N.E.2d 393 (1971); Jackson v. Hammer, 274 Ill. App. 3d 59, 68, 653 N.E.2d 809 (1995) (\u201cthe standards to establish a customer list as a trade secret under the Act parallel the common law standards\u201d). Those factors are:\n\u201c \u2018(1) the extent to which the information is known outside [the plaintiff\u2019s] business; (2) the extent to which it is known by employees and others involved in [the plaintiffs] business; (3) the extent of measures taken by [the plaintiff] to guard the secrecy of the information; (4) the value of the information to [the plaintiff] and to [the plaintiff\u2019s] competitors; (5) the amount of effort or money expended by [the plaintiff] in developing the information; [and] (6) the ease or difficulty with which the information could be properly acquired or duplicated by others.\u2019 \u201d ILG Industries, 49 Ill. 2d at 93, citing Restatement of Torts \u00a7 757, Comment b, at 6 (19_).\nA. Customer Lists\nWhether customer lists are trade secrets depends on the facts of each case. We believe an examination of other cases is instructive.\nIn Stampede Tool, 272 Ill. App. 3d at 582, the plaintiff sold tools to automotive jobbers and developed its customer list by calling service stations and tool dealers to acquire customer names. The court referred to this process as \u201cprospecting.\u201d Stampede Tool, 272 Ill. App. 3d at 582. Although the service stations and other end users were listed in telephone directories, no one source was available to find jobbers. Once a new customer was found, the information was entered into the plaintiffs computer. Only two key employees had access to the computer. Customer information was given to other employees on a need-to-know basis. All hard copies of the customer list were locked in an office, and salespeople were not allowed to remove customer cards from that office. The plaintiffs also used security cameras, required employees to sign confidentiality agreements, and constantly reminded employees about the list\u2019s confidentiality. Stampede Tool, 272 Ill. App. 3d at 587. Based on the \u201claborious method\u201d of creating the customer list and the security efforts used to protect the information, the court decided the customer list met the Act\u2019s two requirements and was a trade secret. Stampede Tool, 272 Ill. App. 3d at 589.\nIn Elmer Miller, Inc. v. Landis, 253 Ill. App. 3d 129, 134, 625 N.E.2d 338 (1993), the plaintiff, a custom tailoring business, contended its list of over 500 active and repeat customers was a trade secret. The court found the list met the Act\u2019s first requirement due to the significant efforts and expense required to duplicate the list:\n\u201cUsing a telephone directory, one can easily achieve moderate suecess in finding restaurants or businesses that need cleaning services or office support. The custom tailoring business caters to a far larger pool of individuals with more particular needs ***. The difficulty of developing a cadre of over 500 active, repeat customers for tailored shirts and suits should not be underestimated.\u201d Elmer Miller, 253 Ill. App. 3d at 134.\nThe plaintiff also met the second requirement because the customer information was kept in a closed file drawer and salespeople had limited access to it. Salespeople were informed that the customer list was confidential when they joined and left the company. Elmer Miller, 253 Ill. App. 3d at 134. After satisfying both statutory requirements, the court found the list was a trade secret.\nThe court reached the opposite conclusion in Gillis, where the plaintiff met only the first of the two statutory requirements. In that case, the plaintiff derived economic value from its list of 3,000 customers who needed its shelving products. Gillis, 206 Ill. App. 3d at 190-91. Nonetheless, the customer list was not a trade secret because the plaintiff did not take reasonable measures to protect it. Although only three key employees had access to the list on the plaintiffs computer, there was no evidence physical copies of the list were subject to any restrictions. The copies were not locked in the office; they were not marked confidential; and employees were not instructed on the list\u2019s confidentiality Gillis, 206 Ill. App. 3d at 191-92. As a result, the court found the plaintiffs did not present sufficient evidence of a trade secret to warrant a preliminary injunction. Gillis, 206 Ill. App. 3d at 192; see Jackson, 274 Ill. App. 3d at 67-69 (no trade secret because the plaintiff did not meet either of the statutory requirements \u2014 its customers were not secret, and there was no evidence any security measures were used to protect the customer list).\nIn this case, we believe Zonatherm\u2019s contact list met the first requirement of a trade secret under the Act. Albert Izzo testified the customer contact list was generated over a span of 35 years by calling contractors and engineers. Defendant contends Zonatherm\u2019s customer list can be easily duplicated because contractor contact information is listed in an online industry directory called \u201cTheBlueBook.com.\u201d Although the contractors\u2019 names and telephone numbers were listed in telephone directories and directories like \u201cTheBlueBook.com,\u201d Zonatherm\u2019s sales staff had to conduct additional research through phone calls and lunch meetings to discover the appropriate contacts or authorized buyers within each company\nWe believe Zonatherm\u2019s method of building its large customer database by discovering and developing relationships with the appropriate buyers is similar to the prospecting done in Stampede Tool, and any attempt to duplicate its contact list from scratch would require significant time, effort, and expense. As a result, we conclude the customer list was sufficiently secret and Zonatherm derived economic value from it.\nThis finding does not end our analysis. We still must apply the second part of the trade secret definition and assess Zonatherm\u2019s security measures. This is where its case flounders. Zonatherm\u2019s contact lists were stored on its server. Each salesperson also had an electronic copy of the contact list for his or her assigned territory stored on his or her office computer. Much like Gillis, computer access to Zonatherm\u2019s customer list was limited on a need-to-know basis, but Zonatherm took no steps to restrict any physical copies of the list. The best evidence of any such restriction was Macaluso\u2019s efforts to prevent employees from taking Zonatherm\u2019s proprietary information when they left the company. He disabled their access codes and deleted any Zonatherm files from salespersons\u2019 computers if they wished to take their computers with them.\nRestricting access to sensitive information by assigning employees passwords on a need-to-know basis is a step in the right direction. Nonetheless, we are troubled by Zonatherm\u2019s failure to either require employees to sign confidentiality agreements, advise employees that its records were confidential, or label the information as confidential. In all of the cases relied on by plaintiffs where the courts found the trade secrets met the \u201creasonable steps\u201d test, there was evidence the plaintiffs advised their employees, verbally or in writing, about the information\u2019s confidentiality. See, e.g., Stampede Tool, 272 Ill. App. 3d at 589 (employees signed confidentiality agreements); RKI, Inc. v. Grimes, 177 F. Supp. 2d 859, 875 (N.D. Ill. 2001) (confidentiality agreements and employee handbooks advised of the confidential nature of the plaintiffs information). When such evidence is absent from the record, the plaintiff must show, at a minimum, that its employees understood the information was to be kept confidential. Gillis, 206 Ill. App. 3d at 192.\nBased on Zonatherm\u2019s limited security measures, we conclude the trial court\u2019s finding that the customer lists were not trade secrets was not against the manifest weight of the evidence.\nWe believe the same is true of the business cards Schwabe took when he left Zonatherm and joined Aerico. Zonatherm presented no evidence that it made any effort to prevent employees from removing customer business cards from the premises or advised them the contact information they acquired was confidential.\nB. Bids and Sales Quotations\nWe apply the same analysis to decide whether Zonatherm\u2019s bids and sales quotations are trade secrets. As with the customer contact lists, we believe plaintiffs failed to show reasonable security measures.\nThe record contains no evidence showing Zonatherm\u2019s salespersons understood the sales and quotation information was confidential. They did not sign confidentiality agreements, the information was not labeled \u201cconfidential,\u201d and none of Zonatherm\u2019s managers testified that they advised salespersons that the information was confidential. Although the Izzos considered the information confidential and valuable, there is no evidence they ever communicated that fact to their employees.\nPlaintiffs failed to meet the first requirement for a preliminary injunction with respect to their sales quotations and customer lists: they failed to show the information was a trade secret.\nAs a result, we confine our review of the remaining issues to the price books. Their status as trade secrets is uncontested.\nIV Plaintiffs\u2019 Likelihood of Success on Its Misappropriation Claim\nPlaintiffs contend they raised a fair question as to their likelihood of success on the trade secret misappropriation claim. Defendants contend the trial court\u2019s finding was not against the manifest weight of the evidence because the trial court concluded defendants did not use the alleged trade secrets.\nThe Act defines misappropriation as the:\n\u201c(1) acquisition of a trade secret of a person by another person who knows or has reason to know that the trade secret was acquired by improper means; or\n(2) disclosure or use of a trade secret of a person without express or implied consent by another person who:\n(A) used improper means to acquire knowledge of the trade secret; or\n(B) at the time of disclosure or use, knew or had reason to know that knowledge of the trade secret was:\n(I) derived from or through a person who utilized improper means to acquire it;\n(II) acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or\n(III) derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use[.]\u201d 765 ILCS 1065/2(b) (West 2002).\nIn Strata Marketing, Inc. v. Murphy, 317 Ill. App. 3d 1054, 1068, 740 N.E.2d 1166 (2000), citing Magellan International Corp. v. Salzgetter Handel GmbH, 76 F. Supp. 2d 919, 927 (N.D. Ill. 1999), this court said, \u201cTo set forth a cause of action for violation of the Act, a plaintiff must allege facts that the information at issue was: (1) a trade secret; (2) misappropriated; and (3) used in the defendant\u2019s business.\u201d\nWe do not believe Strata requires those claiming trade secret misappropriation to show use in every case. First, the above-quoted language can be traced back to American Antenna Corp. v. Amperex Electronic Corp., 190 Ill. App. 3d 535, 538, 546 N.E.2d 41 (1989). The court in American Antenna said use is one way to show misappropriation occurred:\n\u201cA misappropriation of trade secrets occurs when a person acquires or discovers a trade secret by improper means or discloses or uses a trade secret in breach of a duty of confidentiality imposed on him by the nature of his relationship with the owner of the trade secret or reposed in him by the owner in disclosing the information, and the owner of the trade secret is damaged by this improper acquisition, disclosure or use.\u201d (Emphasis added.) American Antenna, 190 Ill. App. 3d at 538, citing Schulenberg v. Signatrol, Inc., 33 Ill. 2d 379, 212 N.E.2d 865 (1965).\nWe believe the three elements of trade secret misappropriation according to American Antenna are: (1) a trade secret existed; (2) the secret was misappropriated through improper acquisition, disclosure, or use; and (3) the owner of the trade secret was damaged by the misappropriation. American Antenna, 190 Ill. App. 3d at 538.\nSecond, Strata is easily distinguished from this case. There, the plaintiff did not allege the defendant misappropriated its trade secrets by wrongful acquisition. The plaintiff relied solely on a theory of misappropriation by wrongful disclosure. Strata, 317 Ill. App. 3d at 1070-71 (the court ultimately reversed dismissal of the claim based on the inevitable disclosure doctrine); see 765 ILCS 1065/2(b)(2) (West 2002).\nMisappropriation can be shown one of three ways \u2014 by improper acquisition, unauthorized disclosure, or unauthorized use. 765 ILCS 1065/2(b) (West 2002). Based on the statute and the earlier cases, we believe use is just one theory that can be pursued under the Act; it is not the only theory.\nAccordingly, we turn our discussion to whether plaintiff presented a fair question of misappropriation under any of the available theories \u2014 acquisition by improper means, unauthorized disclosure, or unauthorized use.\nAccording to the Act, misappropriation by \u201c \u2018[ijmproper means\u2019 includes theft, bribery, misrepresentation, breach or inducement of a breach of a confidential relationship or other duty to maintain secrecy or limit use, or espionage through electronic or other means.\u201d 765 ILCS 1065/2(a) (West 2002).\nIn RKI, 177 F. Supp. 2d 859, defendant Steven Grimes agreed to work for the plaintiffs (his employer) competitor before resigning. Two days before he resigned, he used his password to download 60 megabytes of data from the plaintiffs limited access server to his home computer. RKI, 177 F. Supp. 2d at 868. While working for the plaintiff, Grimes signed an employment agreement, which stated he would not disclose his employer\u2019s proprietary information. His employee handbook also contained a provision describing the confidential nature of the company\u2019s files and information. RKI, 177 F. Supp. 2d at 866-67. At some point after the plaintiff filed its complaint, Grimes deleted the information he had downloaded and defragmented his computer in a effort to prevent the plaintiff from discovering his actions.\nBased on direct and \u201cstrong\u201d circumstantial evidence, the United States District Court for the Northern District of Illinois found Grimes improperly acquired the trade secrets by downloading and copying the data for purposes other than serving his employer. RKI, 177 F. Supp. 2d at 875. Grimes misappropriated trade secrets under section 2(b)(1) of the Act (765 ILCS 1065/2(b)(l) (West 2002)). RKI, 177 F. Supp. 2d at 875; see also LeJeune v. Coin Acceptors, Inc., 381 Md. 288, 313-15, 849 A.2d 451, 466-67 (2004) (misappropriation by \u201cimproper means\u201d acquisition where employee copied his employer\u2019s computer files to a CD for personal use before resigning).\nIn this case, we believe plaintiffs proved Mazur acquired their trade secrets by improper means. Mazur admitted downloading several price books onto his laptop computer on January 20, 2004, just hours before resigning and after agreeing to work for a competitor. When the price books were accessed online, a confidentiality statement appeared advising whoever opened the books that the information was proprietary and confidential and \u201cshall be utilized only by current Liebert representatives for the sole purpose of promoting and securing sales of Liebert products.\u201d (Emphasis added.) The fact that Mazur attempted to destroy any indication of his downloading activities when plaintiffs filed suit also suggests improper acquisition.\nMazur gives two explanations for his downloading and deletion campaigns, but neither fits the rest of the evidence. The first reason he gives for downloading files \u2014 preserving a record for his outstanding commissions \u2014 relates only to the bids and quotes he downloaded and shines no light on why he would need to take price books with him.\nSecond, Mazur said he downloaded the price books so other team members would know which price book he used to prepare each bid or quote. He contends he \u201cwas not certain that his former colleagues would know which revisions of the various price books corresponded with each bid or quote in the close-out document or whether the particular price books would still be on the Liebert server.\u201d\nIf Mazur could acquire the necessary price books online, so could his teammates who had the same access. Furthermore, Zonatherm kept physical copies of the price books in its office, including outdated versions. We see no reason for Mazur to copy the price books onto his personal laptop.\nEven more telling is the fact Mazur never actually handed the information over to his teammates before or after he left Zonatherm, and we believe his subsequent deletion efforts contradict any alleged intention to do so. When Mazur received plaintiffs\u2019 complaint on February 5, 2004, he also received notice plaintiffs requested the court to order him to return \u201cany and all *** computer disks, diskettes, databases and/or retrievable data *** which reflect, refer or relate to the subject trade secrets, and any copies thereof that may be in defendants\u2019 possession.\u201d\nThat same day he compressed the files he downloaded, including the price books, and attempted to copy them onto a CD. He contends his \u201cCD burning\u201d efforts were unsuccessful. Apparently, Mazur\u2019s ability to copy material is surpassed by his ability to delete it. Although Mazur attempted to explain many things, he never explained why he deleted an application log that would have conclusively shown whether he burned the price books onto a CD. If Mazur believed he had a valid reason to copy the information for his former teammates, why would he attempt to hide his efforts to do so?\nHis explanation that he deleted thousands of files because they weren\u2019t needed anymore rings hollow. By his own testimony, he was not able to make a copy of the information for his former teammates\u2014 information Mazur claimed they would need after he left. Apparently their need, and his reason for downloading the price books in the first place, evaporated with the filing of plaintiffs\u2019 complaint. Accepting Mazur\u2019s testimony at face value requires more gullibility than we are willing to provide.\nWe can infer from Mazur\u2019s spoliation of the evidence on the laptop that he destroyed evidence of misappropriation (RKI, 177 F. Supp. 2d at 877, citing Minnesota Mining & Manufacturing Co. v. Pribyl, 259 F.3d 587, 606 n.5 (7th Cir. 2001)), leading us to believe Mazur acquired the price books through improper means. Accordingly, we believe plaintiffs presented a fair question on the likely success of their trade secret misappropriation claim against Mazur, and the trial court\u2019s findings are against the manifest weight of the evidence.\nV Remaining Requirements for a Preliminary Injunction\nA. Section 3 of the Act\nFinding plaintiffs presented a fair question on misappropriation against Mazur does not end our inquiry into whether preliminary injunctive relief is appropriate. \u201cInjunctive relief, by its nature, addresses only what could happen in the future and cannot remedy misconduct, such as the improper acquisition of trade secrets, that occurred in the past.\u201d LeJeune, 381 Md. at 315, 849 A.2d at 467 (applying Maryland\u2019s version of the Uniform Trade Secret Act). For this reason, plaintiffs seeking preliminary injunctions must show the danger of irreparable harm and the absence of an adequate remedy at law. Gillis, 206 Ill. App. 3d at 188.\nIn actions under the Act, the statute specifies \u201c[ajctual or threatened misappropriation may be enjoined.\u201d 765 ILCS 1065/3 (West 2002). Under Illinois law, courts may also grant injunctive relief to prevent the inevitable use or disclosure of misappropriated trade secrets. Strata, 317 Ill. App. 3d at 1070; Pepsico, Inc. v. Redmond, 54 F.3d 1262, 1269 (7th Cir. 1995).\nIn this case, plaintiffs seek a preliminary injunction to prevent further or inevitable disclosure or use of the trade secrets Mazur misappropriated. Plaintiffs contend there is a real threat Mazur copied the price books onto at least one CD and will continue to use the pricing information to underbid Zonatherm and Liebert.\nUsing the theory of inevitable disclosure, \u201ca plaintiff may prove a claim of trade secret misappropriation by demonstrating that defendant\u2019s new employment will inevitably lead him to rely on the plaintiffs trade secrets.\u201d Pepsico, 54 F.3d at 1269. If a former employee fulfills a substantially similar position with the plaintiffs competitor, the plaintiff has abetter chance of succeeding under this theory. Strata, 317 Ill. App. 3d at 1070. The fact that a former employee accepted a similar position with a competitor, without more, will not demonstrate inevitable disclosure. Pepsico, 54 F.3d at 1269. Courts will also consider the level of competition between the parties and the new employer\u2019s actions to prevent unlawful disclosure of trade secrets. RKI, 177 F. Supp. 2d at 876.\nIn Strata, 317 Ill. App. 3d at 1070-71, the plaintiff alleged the defendant, a former employee, had detailed knowledge of its trade secrets, including customer needs, problems, planned product upgrades, and existing contracts. The plaintiff also alleged the defendant was working as a salesperson for its competitor, and the information she acquired was \u201c \u2018exactly the type of information that any salesperson needs and must use to effectively compete for customers against [the plaintiff] on behalf of a competitor.\u2019 \u201d Strata, 317 Ill. App. 3d at 1071. The employee could have utilized the information to underbid the plaintiff, among other things. On appeal, this court held the plaintiffs allegations adequately supported the theory of inevitable disclosure under the Act, and its complaint was sufficient to withstand a motion to dismiss. Strata, 317 Ill. App. 3d at 1071, citing Pepsico, 54 F.3d 1262. In Pepsico, the district court found defendant learned plaintiff\u2019s secret pricing, distribution, packaging, and marketing strategies while working as its employee. The defendant began working for a competitor, and the court found he would inevitably use his knowledge of the plaintiffs strategies to make decisions at his new job. On appeal, the Seventh Circuit concluded the trial court\u2019s findings were supported by the evidence. Pepsico, 54 F.3d at 1269-71.\nAlthough the defendant asserted he did not intend to use the knowledge he acquired while working for the plaintiff, the court was not convinced, in part because he demonstrated a lack of candor when he failed to tell his employer he had been hired to work for a competitor. The fact that the competitor had \u201can unnatural interest in hiring [the plaintiffs] employees\u201d also weighed against the defendant. Pepsico, 54 F.3d at 1271. The court said the defendant \u201ccould not be trusted to act with the necessary sensitivity and good faith under the circumstances in which the only practical verification that he was not using plaintiffs secrets would be [defendant\u2019s] word to that effect.\u201d Pepsico, 54 F.3d at 1270.\nIn this case, the trial court found no fair question on inevitable disclosure based solely on Mazur\u2019s testimony that he destroyed his copies of the price books. The court determined Mazur could not disclose Liebert\u2019s pricing structure without a copy because the books were too complex.\nWhile a decision regarding a witness\u2019s credibility ordinarily is best left to the trial court, that finding can be overturned if the reviewing court believes it is against the manifest weight of the evidence. Reinneck v. Taco Bell Corp., 297 Ill. App. 3d 211, 219, 696 N.E.2d 839 (1998). We believe this case meets the exception and we reverse the trial court\u2019s finding on inevitable use.\nPlaintiffs\u2019 expert witness testified the information on the laptop indicated Mazur attempted and probably succeeded in copying the price books to a CD. Neubecker also described several scenarios in which information would remain in the \u201cCD burning\u201d folder after a successful burn. Mazur\u2019s questionable testimony was the only evidence disputing the expert\u2019s findings. Had plaintiffs been able to show Mazur successfully burned the CD, the trial court well may have reached a different outcome, which leads us to Mazur\u2019s destruction of the evidence on his laptop\u2019s hard drive. Although Mazur\u2019s deletion of all the Zonatherm and Liebert files was problematic, we find his decision to purge the application log particularly suspicious.\n\u201cWhere a party has deliberately destroyed evidence, a trial court will indulge all reasonable presumptions against the party.\u201d R.J. Management Co. v. SRLB Development Corp., 346 Ill. App. 3d 957, 965, 806 N.E.2d 1074 (2004). Whether Mazur successfully made CD copies of the price books is a key issue in this case, and, for some unexplained reason, he deleted the application log which would have decisively answered the question. Because Mazur destroyed this crucial piece of evidence, we presume it would have showed he successfully copied the price books onto a CD.\nIn addition to this presumption against Mazur, the circumstances surrounding his departure from Zonatherm cast doubt on his denials. Not only did Mazur accept a substantially similar sales position with a competitor while working for Zonatherm, he started a competing business two months before resigning and never informed Zonatherm of his intentions until the day he quit. The parties do not dispute Aerico and Zonatherm, and the manufacturers they represent, APC and Liebert, are direct competitors. There is no question Mazur downloaded a substantial amount of Zonatherm\u2019s confidential information one day after he signed the agreement with APC. Plaintiffs also presented evidence that APC executives wanted to \u201ccripple Liebert in Chicago for at least six months\u201d by convincing its sales representatives to switch companies. Although Mazur signed an agreement with APC that he would not use Zonatherm\u2019s information on behalf of APC, an e-mail from an APC executive indicated that just before Mazur started working for APC he told a Liebert customer that he would approach it with an APC offering. We believe that e-mail supports a finding of inevitable use.\nBased on all the evidence presented at the hearing, we reject the trial court\u2019s finding on inevitable use.\nB. Irreparable Harm and Inadequate Remedy at Law\nBriefly, we also address the remaining requirements for a preliminary injunction \u2014 irreparable harm and lack of an adequate remedy at law. The trial court found any harm due to the misappropriation was speculative.\nWe find nothing \u201cspeculative\u201d in defendants\u2019 intention to \u201cconvert existing business from Liebert,\u201d as indicated in numerous exhibits of defendants\u2019 e-mails, letters, and business plans. Zonatherm and Liebert presented evidence that although overall sales increased in 2004, they did not meet their sales projections in Zonatherm\u2019s territory. Plaintiffs also presented Izzo\u2019s testimony that the price books would allow defendants to strategically underbid Zonatherm when competing for contracts. A 3% to 4% loss in contract prices would compromise Zonatherm\u2019s profitability.\nCourts have found that the type of competitive losses alleged here often inflict irreparable injury and lack an adequate remedy at law, due to the difficulty in calculating the loss of existing and future business. See McRand, Inc. v. van Beelen, 138 Ill. App. 3d 1045, 1055, 486 N.E.2d 1306 (1985) (irreparable harm likely if the defendant was not enjoined from soliciting the plaintiffs customers). We believe the trial court\u2019s finding that any irreparable harm was speculative is against the manifest weight of the evidence.\nVI. Scope of Injunction\nWe believe the evidence against Mazur for misappropriation justifies an injunction. This court also must decide whether the injunction should extend to the other defendants. Finding little or no evidence that anyone except Mazur had possession of the price books, we cannot say the trial court abused its discretion when it found plaintiffs did not show a likelihood of success on their misappropriation claim against the remaining defendants.\nA trial court has the authority to fashion injunctive relief to the extent reasonably necessary to protect the plaintiffs\u2019 rights. See Stampede Tool, 272 Ill. App. 3d at 590-91. When imposing a preliminary injunction, courts should seek to prevent the defendant from gaining competitive advantage through the unlawful misappropriation. See ILG Industries, 49 Ill. 2d at 97-98.\nUsually, courts employ an equitable balancing test to determine whether injunctive relief is properly tailored to the facts. ABC Trans National Transport, Inc. v. Aeronautics Forwarders, Inc., 62 Ill. App. 3d 671, 682, 379 N.E.2d 1228 (1978). If the equitable doctrine applies, any harm an injunction would impose on the defendant is weighed against the benefit it would provide the plaintiff. ABC, 62 Ill. App. 3d at 682. Courts do not \u201cbalance the harms\u201d where defendants acted despite knowledge of the plaintiffs rights and understood the possible consequences. ABC, 62 Ill. App. 3d at 682.\nIn this case, the trial court did not decide whether defendants were shielded by the \u201cbalancing of the harms\u201d test. We do not believe the equitable balancing test should be applied to Mazur considering the strong evidence that he wilfully misappropriated plaintiffs\u2019 trade secrets.\nWe remand the cause to the trial court for further consideration of what form of preliminary injunction is necessary to reasonably protect plaintiffs from any adverse effects caused by Mazur\u2019s misappropriation of the price books. Only Mazur is to be enjoined.\nCONCLUSION\nWe affirm the trial court\u2019s finding that Zonatherm\u2019s customer list is not a trade secret. Although the trial court abused its discretion in failing to consider the bids and sales quotation records, we find plaintiff failed to make a fair showing that the information was a trade secret under section 2(d)(2) of the Act (765 ILCS 1065/2(d)(2) (West 2002)). We also find the trial court abused its discretion when it found plaintiffs did not show a likelihood of success on their trade secret misappropriation claim against Mazur or irreparable harm concerning the price books. We remand the cause and direct the trial court to grant plaintiffs a preliminary injunction against Mazur, reasonable in scope and duration, to prevent any actual or threatened misappropriation of the price books.\nAffirmed in part and reversed in part; cause remanded with directions.\nGARCIA, J., concurs.\n\u2018Defragmentation is *** a method to cover up deletions of data by eliminating all traces of deleted data.\u201d RKI, 177 F. Supp. 2d at 870.",
        "type": "majority",
        "author": "JUSTICE WOLFSON"
      },
      {
        "text": "JUSTICE HALL,\ndissenting:\nI respectfully dissent. I do not believe the trial court abused its discretion in finding that the plaintiffs\u2019 allegations of irreparable harm were too speculative to support the issuance of a preliminary injunction.\nA preliminary injunction is an extraordinary remedy which should be issued only where the moving party clearly shows that if the injunction is not granted, he is likely to suffer irreparable harm before a decision on the merits can be rendered. Summit Electric Co. v. Mayrent, 17 Ill. App. 3d 545, 550, 308 N.E.2d 313 (1974); see also Kamerling v. Massanari, 295 F.3d 206, 214 (2d Cir. 2002) (showing of irreparable harm is perhaps the \u201c \u2018single most important prerequisite for the issuance of a preliminary injunction\u2019 \u201d), quoting Bell & Howell Mamiya Co. v. Masel Supply Co., 719 F.2d 42, 45 (2d Cir. 1983). Plaintiffs have failed to make such a showing.\nIn this case, plaintiffs have attempted to establish irreparable harm based on the theory of \u201cinevitable disclosure.\u201d Plaintiffs contend they will suffer irreparable harm if the individual defendants are permitted to conduct business with APC because defendants would \u201cinevitably disclose\u201d plaintiffs\u2019 trade secrets to APC giving the organization an unfair competitive advantage. Much of plaintiffs\u2019 attack is directed at the credibility of defendant Mazur. Plaintiffs maintain that Mazur has demonstrated a willingness to use or disclose trade secrets and that his testimony that he no longer possesses the price books is incredible, arguing that Mazur would inevitably disclose this information in his new position at Aerico.\nLike the plaintiffs, the majority apparently does not believe in Mazur\u2019s version of events and finds that it was against the manifest weight of the evidence for the trial court to conclude that Mazur did not successfully copy trade secret pricing information onto a CD before deleting the information from his laptop. I disagree and see no reason to upset the trial judge\u2019s credibility determination.\nAlthough a trial court\u2019s finding is always subject to review, a \u201creviewing court will not substitute its judgment as to the credibility of witnesses for that of the trial court, unless the findings are manifestly against the weight of the evidence.\u201d Brown v. Zimmerman, 18 Ill. 2d 94, 102, 163 N.E.2d 518 (1959). A finding is against the manifest weight of the evidence only where the opposite conclusion is clearly evident. In re C.N., 196 Ill. 2d 181, 208, 752 N.E.2d 1030 (2001). Underlying this rule is a recognition that the trial judge, as the trier of fact, was in a position to actually see the witnesses testify, observe their demeanor, and assess their credibility. Clean World Engineering, LTD. v. MidAmerica Bank, FSB, 341 Ill. App. 3d 992, 997, 793 N.E.2d 110 (2003).\nThe manifest weight of the evidence adduced at the hearing supports the trial court\u2019s conclusion that the plaintiffs have failed to present evidence that Mazur has violated or is likely to violate his obligation to keep plaintiffs\u2019 information secret. There is no evidence that Mazur has made any disclosure of confidential information to anyone in any part of the APC organization, nor is there any evidence that he would need to do so in order to fulfill his responsibilities at Aerico. There is no evidence that Zonatherm has suffered lost sales or customers or that anyone at APC or Aerico has used plaintiffs\u2019 confidential business information. The lack of evidence of harm is not conclusive, but it tends to corroborate Mazur\u2019s testimony that no such disclosures have occurred.\nIn essence, all that is alleged is that the defendants could use or disclose plaintiffs\u2019 trade secrets while working at Aerico, and plaintiffs fear they will inevitably do so. Such allegations alone are insufficient to demonstrate irreparable harm. As stated in Smith Oil, the \u201crequirement of the showing of imminent injury is not satisfied by proof of a speculative possibility of injury and \u2018such relief will not be granted to allay unfounded fears or misapprehensions.\u2019 \u201d Smith Oil Corp. v. Viking Chemical Co., 127 Ill. App. 3d 423, 431, 468 N.E.2d 797 (1984), quoting Barco Manufacturing Co. v. Wright, 10 Ill. 2d 157, 166 (1956). At this stage of the proceedings, there is no evidence that defendants have used or disclosed plaintiffs\u2019 trade secrets, and any suggestion that they will inevitably do so is purely speculative.",
        "type": "dissent",
        "author": "JUSTICE HALL,"
      }
    ],
    "attorneys": [
      "Joseph R. Marconi, Kathryn R. Hoying, David M. Macksey, and Garrett L. Boehm, Jr., all of Johnson & Bell, Ltd., of Chicago, for appellants.",
      "Barry Levenstam, Terrence J. Truax, and Derek S. Witte, all of Jenner & Block, L.L.E, of Chicago, for appellee American Power Conversion Corporation.",
      "Paige C. Donaldson and Neal B. McQueeney, both of Sanchez & Daniels, of Chicago, for other appellees."
    ],
    "corrections": "",
    "head_matter": "LIEBERT CORPORATION et al., Plaintiffs-Appellants, v. JOHN MAZUR, an Indiv., et al., Defendants-Appellees.\nFirst District (2nd Division)\nNo. 1-04-2794\nOpinion filed April 5, 2005.\nRehearing denied March 24, 2005, and March 31, 2005.\nHALL, J., dissenting.\nJoseph R. Marconi, Kathryn R. Hoying, David M. Macksey, and Garrett L. Boehm, Jr., all of Johnson & Bell, Ltd., of Chicago, for appellants.\nBarry Levenstam, Terrence J. Truax, and Derek S. Witte, all of Jenner & Block, L.L.E, of Chicago, for appellee American Power Conversion Corporation.\nPaige C. Donaldson and Neal B. McQueeney, both of Sanchez & Daniels, of Chicago, for other appellees."
  },
  "file_name": "0265-01",
  "first_page_order": 281,
  "last_page_order": 306
}
