Taiwan Supreme Court rules former TSMC exec leaked chip secrets to Samsung

Ex-R&D boss banned from working for Korean firm


Taiwan Semiconductor Manufacturing Company (TSMC) has reportedly won a lawsuit against a former employee over claims that he leaked details of the chip fabber's 28-nanometer process technology to archrival Samsung.

As a result of the judgment, Liang Mong-song, a former top R&D man at TSMC, has been barred from working for Samsung through the end of the year, according to a report in Taiwanese newspaper The China Post.

The ruling by Taiwan's Supreme Court overturned a lower court's ruling that preventing Liang from taking a job at Samsung violated his right to work.

The Supreme Court's rationale was that allowing Liang to work at the Korean firm now would severely impair TSMC's market competitiveness.

Among TSMC's accusations is that Liang gave Samsung its 28nm process tech at a time when TSMC was leading the semiconductor industry. Its claim is that the leaked secrets gave Samsung the advantage it needed to later leapfrog TSMC to the 16nm and 14nm process nodes.

Liang spent 17 years at TSMC, during which he reportedly earned a salary and bonuses of more than NT$36m ($1.1m/£704,000) per year, on average.

When he left the company in 2009, he told TSMC that he planned to go into academia and soon took a job at Taiwan's National Tsing Hua University. But six months later he turned up at a different institution: Sungkyunkwan University, in South Korea. Sungkyunkwan is a private research university with campuses in Seoul and Suwon, and Samsung is its major backer.

The move raised red flags within TSMC almost immediately, but it didn't file suit against Liang until 2011, by which time he had already officially accepted a job at Samsung proper. Still, in its complaint, the Taiwanese firm alleged Liang was "already leaking TSMC trade secrets to Samsung" by the time he joined Sungkyunkwan.

Liang has denied the charges, saying he would never do anything to harm TSMC. But he has admitted in court that he left the Taiwanese chipmaker because he was dissatisfied with a recent promotion, and he has reportedly since brought five more former TSMC execs over to Samsung.

TSMC has further alleged that microscopic examination of features of Samsung's recent generations of silicon reveal shocking similarities to its own. According to an independent report it commissioned, "Simply by analyzing the structure, it is hard to differentiate which was made by Samsung or TSMC."

By comparison, the report said, the features on chips made by IBM had completely different structures than those used by either Samsung or TSMC.

Such allegations are nothing new to the hotly contested Asian chip-fabbing industry. In 2003, TSMC sued mainland Chinese rival Semiconductor Manufacturing International Corporation (SMIC), accusing it of industrial espionage and IP theft. SMIC eventually settled for $175m.

The China Post reports that the Taiwanese Supreme Court's ruling against Liang is the first of its kind, and that no court has ever forbidden a former senior manager of a company from working for a competitor, particularly after the non-compete clause of his contract has run out.

Samsung has declined to comment on the ruling, and it was not named in TSMC's suit, presumably because TSMC hopes to avoid a protracted legal battle of the kind that has embroiled Apple.

Liang's attorney said he plans to issue a statement once he gets a written judgment from the court. ®

Similar topics


Other stories you might like

  • Experts: AI should be recognized as inventors in patent law
    Plus: Police release deepfake of murdered teen in cold case, and more

    In-brief Governments around the world should pass intellectual property laws that grant rights to AI systems, two academics at the University of New South Wales in Australia argued.

    Alexandra George, and Toby Walsh, professors of law and AI, respectively, believe failing to recognize machines as inventors could have long-lasting impacts on economies and societies. 

    "If courts and governments decide that AI-made inventions cannot be patented, the implications could be huge," they wrote in a comment article published in Nature. "Funders and businesses would be less incentivized to pursue useful research using AI inventors when a return on their investment could be limited. Society could miss out on the development of worthwhile and life-saving inventions."

    Continue reading
  • Declassified and released: More secret files on US govt's emergency doomsday powers
    Nuke incoming? Quick break out the plans for rationing, censorship, property seizures, and more

    More papers describing the orders and messages the US President can issue in the event of apocalyptic crises, such as a devastating nuclear attack, have been declassified and released for all to see.

    These government files are part of a larger collection of records that discuss the nature, reach, and use of secret Presidential Emergency Action Documents: these are executive orders, announcements, and statements to Congress that are all ready to sign and send out as soon as a doomsday scenario occurs. PEADs are supposed to give America's commander-in-chief immediate extraordinary powers to overcome extraordinary events.

    PEADs have never been declassified or revealed before. They remain hush-hush, and their exact details are not publicly known.

    Continue reading
  • Stolen university credentials up for sale by Russian crooks, FBI warns
    Forget dark-web souks, thousands of these are already being traded on public bazaars

    Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.

    According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.

    "The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.

    Continue reading

Biting the hand that feeds IT © 1998–2022