DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

$500,000 bond for stealing trade secrets

Posted on May 10, 2012 by Lee J

SAN JOSE, CA—A federal judge convicted a former Silicon Valley engineer of five counts of theft of trade secrets, United States Attorney Melinda Haag announced. Suibin Zhang was found guilty Monday of three counts of theft and copying of trade secrets for downloading the trade secrets from a secure database, one count of duplication of trade secrets for loading those trade secrets onto a laptop provided by his new employer, and one count of possession of stolen trade secrets. The defendant was acquitted of three counts of computer fraud and one count of unauthorized transmission of a trade secret. The guilty verdict followed a more than two-week bench trial before United States District Court Judge Ronald M. Whyte, which began October 24, 2011 and concluded November 9, 2011. “The protection of intellectual property rights is of vital importance to the economic security of our region,” United States Attorney Melinda Haag said. “The investigation and prosecution of thefts of trade secrets remain a significant priority for this office.” Evidence at trial showed that Zhang, 43, of Belmont, California, was employed as a project engineer at Netgear Inc., of San Jose, and had access to the secure database of Marvell Semiconductor Inc. by virtue of his position at Netgear. The evidence further showed that on March 8, 2005, Zhang had accepted a position at Marvell’s chief competitor, Broadcom Corporation, and that, beginning on March 9, 2005, and continuing to March 18, 2005, Zhang used his Netgear account to download and steal trade secret information found in dozens of documents, data sheets, hardware specifications, design guides, functional specifications, application notes, board designs, and other confidential and proprietary items from Marvell. The defendant then loaded the Marvell trade secrets onto a laptop issued by his new employer, Broadcom, on April 27, 2005 and was in possession of those stolen trade secrets on June 24, 2005 when the Federal Bureau of Investigation executed search warrants at his home and at Broadcom. The sentencing of Zhang is scheduled for 9 a.m. on August 27, 2012 before Judge Whyte in San Jose. The maximum statutory penalty for violation of 18 U.S.C. § 1832 is 10 years in prison and a fine of $250,000, plus restitution if the court deems appropriate. However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553. Zhang has been released by the court on $500,000 bond. Matt Parrella and Dave Callaway are the Assistant U.S. Attorneys who prosecuted the case with the assistance of Legal Tech Nina Burney-Williams. The conviction is the result of an investigation by the Federal Bureau of Investigation. Both Marvell Semiconductor Inc. and Netgear Inc. cooperated fully with the FBI in the investigation.


Related:

  • Software dev accidentally leaks Australian govt documents
  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • Massive Great Firewall Leak Exposes 500GB of Censorship Data
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach Incidents

Post navigation

← 2 teens arrested for ddos attacks
The Twitter hack that wasn’t? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.