Protecting
Trade Secrets
6406_Oranburg_Protecting Trade Secrets_1pp.indb 1 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 2 10/16/25 9:25 PM Protecting Trade Secrets First edition
Seth C. Oranburg
Pro --- essor O --- Law
University o --- New Hampshire Franklin
Pierce School o --- Law
Director, Program on Organizations,
Business, and Markets,
NYU Law’s Classical Liberal Institute
6406_Oranburg_Protecting Trade Secrets_1pp.indb 3 10/16/25 9:25 PM Copyright © 2026 Seth C. Oranburg All Rights Reserved
ISBN: 978-1-5310-3437-5
eISBN: 978-1-5310-3438-2
LCCN: tk
Carolina Academic Press
700 Kent Street
Durham, North Carolina 27701
(919) 489-7486
www.cap-press.com
Printed in the United States o --- America
6406_Oranburg_Protecting Trade Secrets_1pp.indb 4 10/16/25 9:25 PM Contents
TK
v
6406_Oranburg_Protecting Trade Secrets_1pp.indb 5 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 6 10/16/25 9:25 PM Acknowledgments
Thanks to Ryan Vacca. Ryan is now the John D. Lawson Pro --- essor o --- Law and
Associate Dean --- or Academic A ---
airs at the University o — Missouri School o — Law. More importantly (to me), he was my cherished colleague at the University o — New Hampshire Franklin Pierce School o — Law. When I was thrust into the intellectual property world via a last-minute administrative behest to teach Trade Secret Law, Ryan generously shared his materials. His mentorship on the subject matter and its pedagogy not only helped me to survive this ordeal but also enabled me to thrive in this new doctrinal space. Ryan’s con — idence in my abilities and his passion — or the sub- ject sparked my love — or the trade secret-contract connection. Over time, I reshaped the course to re — lect my transactional — ocus, distinct — rom Ryan’s litigation-centered approach, as you will see in this book. And while our teaching styles diverged, Ryan still provided a thorough review o — this book on its own terms, o —
ering invaluable comments that greatly improved this work while preserving my vision. A great men- tor and true leader helps others shine in their unique way. Ryan, through his kindness and humility, inspires countless students and colleagues. I’m grate — ul to be numbered among them. And thank you, Ryan, — or the salsa — perhaps we’ll keep that our own trade secret.
Why This Book
This book o ---
ers a practice- — orward complement to the traditional casebook. It is built around a single, organizing insight: the best way to understand trade secret law is to design a plan that applies it. Rather than starting with abstract theory and hoping students can extrapolate practice, this book begins with a practical challenge — how to protect a company’s trade secrets — and develops deeper understanding along the way. The result is a clear, concrete, and rigorous guide to one o — the most complex and consequential areas o — modern intellectual property law. Each chapter sca —
olds learning around a speci — ic output: identi — ying secrets, devel- oping policies, allocating responsibilities, and responding to legal and ethical chal- lenges. This approach helps students grasp not only what the law says but also what it demands in real-world settings. The book draws on leading scholarship, doctrinal sources, and business strategy literature to integrate theory with application.
vii
6406_Oranburg_Protecting Trade Secrets_1pp.indb 7 10/16/25 9:25 PM viii Acknowledgments
It is especially well-suited --- or experiential courses, where students learn by doing,
but its modular structure and doctrinal --- oundations also make it adaptable --- or semi-
nars or advanced classes in intellectual property or business law. It supports a range
o --- assessment methods, --- rom traditional exams to simulation-based deliverables, and
culminates in a comprehensive capstone: a polished, port --- olio-ready Trade Secret
Protection Plan --- or a simulated client.
How This Book Works
This book is structured to support --- lexible, experiential, and simulation- --- riendly
instruction while remaining grounded in core legal doctrine. It guides students in
building a working Trade Secret Protection Plan step-by-step, applying legal princi
ples in context, and producing pro --- essional-grade work product by course’s end.
The company-side transactional planning lens o ---
ers students a coherent intro- duction to trade secret law through the perspective o — sa — eguarding a business’s pro- prietary knowledge. Although it acknowledges that practitioners may also represent employees, license trade secrets, or litigate disputes, the book deliberately — ocuses on one core aspect o — IP practice to support a learn-by-doing method and to build con-
idence be — ore branching into adjacent domains. Each chapter integrates concise doctrinal explanations, real-world examples, and application-oriented prompts. Key terms and legal tests are introduced clearly, with re — erences to — oundational cases, statutes, and scholarly debates. Case excerpts pro- vide optional depth — or students who want to explore precedent without interrupting the — low o — applied learning. Assignments, re — lection prompts, and workshop exercises are interwoven through- out, enabling instructors to use the book in — lipped, hybrid, or traditional classroom
ormats. Chapters are both modular and cumulative, allowing instructors to — ollow the — ull sequence or select only those that align with speci — ic course objectives. Though accessible in tone, the content remains grounded in legal doctrine and interdisciplinary research. By preparing students not just to understand trade secret law but also to implement it with clarity, creativity, and strategic judgment, the book serves as a bridge between classroom and practice. Trade secret law is one o — the most vital pillars o — modern intellectual property law. By anchoring doctrine in concrete outputs, this book invites students to treat trade secret protection not as a compliance task but rather as a deliberate strategy — or long- term value creation.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 8 10/16/25 9:25 PM Protecting Trade Secrets
6406_Oranburg_Protecting Trade Secrets_1pp.indb 1 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 2 10/16/25 9:25 PM Chapter 1 Understanding Trade Secret Law
Trade secrets are perhaps the most power --- ul — and the most precarious — --- orm o ---
intellectual property. They o ---
er protection without registration, without — ormal proce- dures, and without expiration. A trade secret can remain exclusive — or decades, but only i — its owner keeps it that way. The law does not create trade secrets; it recognizes and en — orces them a — ter the — act. This makes trade secret law both deceptively simple and intensely practical. It is a body o — law that rewards vigilance, structure, and — oresight. The modern de — inition o — “trade secret” is — ound in the Uni — orm Trade Secrets Act (UTSA), which has been adopted by 49 states:
De --- inition o --- “Trade Secret”
UTSA § 1(4)
“Trade secret” means in --- ormation, including a --- ormula, pattern, compilation,
program, device, method, technique, or process, that: (a) Derives independent
economic value, actual or potential, --- rom not being generally known to, and not
being readily ascertainable by proper means by, other persons who can obtain
economic value --- rom its disclosure or use; and (b) Is the subject o --- e ---
orts that are reasonable under the circumstances to maintain its secrecy.
New York, the only state that has not adopted the UTSA, relies on common law
principles, as re --- lected in the Restatement (First) o --- Torts § 757, which similarly de --- ine
a trade secret as any --- ormula, pattern, device, or compilation o --- in --- ormation used in
one’s business that provides a competitive advantage and requires reasonable e ---
orts to maintain its secrecy. The key word in this de — inition is “reasonable.” Trade secret law does not demand absolute secrecy or per — ect protection. Rather, it requires sa — eguards that are appro- priate and proportionate to the context. But how much e —
ort is enough to earn legal
3
6406_Oranburg_Protecting Trade Secrets_1pp.indb 3 10/16/25 9:25 PM 4 1 • Understanding Trade Secret Law
protection? As with many legal standards, the answer is: it depends. Depends on
what? That is the question this book aims to answer by showing what businesses must
do to build, maintain, and de --- end their trade secrets in practice.
Unlike patents or trademarks, trade secrets do not depend on public notice or
overt use. Their value comes --- rom being kept quiet. A process --- or manu --- acturing
composite materials, a pricing algorithm, a customer list, or a proprietary training
manual can quali --- y as a trade secret so long as it meets the legal de --- inition and is
subject to reasonable e ---
orts to maintain its secrecy. And that is where the real chal- lenge lies: protecting what is unseen, o — ten across departments, locations, vendors, and even borders. While patent law gives patent holders broad rights to exclude others — rom independent development or reverse engineering on patented inventions, trade secret law gives trade secret holders the narrow right to sue — or “misappropriation,” which is also de — ined in the UTSA:
De --- inition o ---
“Misappropriation”
UTSA § 1(2)
“Misappropriation” means: (a) Acquisition o --- a trade secret o --- another by
a person who knows or has reason to know that the trade secret was acquired
by improper means; or (b) Disclosure or use o --- a trade secret o --- another with-
out express or implied consent by a person who: (1) Used improper means to
acquire knowledge o --- the trade secret; or (2) At the time o --- disclosure or use,
knew or had reason to know that his knowledge o --- the trade secret was derived
rom or through a person who had utilized improper means to acquire it; or acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or derived — rom or through a person who owed a duty to the person seeking relie — to maintain its secrecy or limit its use; or (3) Be — ore a material change o — his position, knew or had reason to know that it was a trade secret and that knowledge o — it had been acquired by accident or mistake.
The key word in the misappropriation de --- inition is “improper.” There are proper
means o --- acquiring, using, and disclosing others’ trade secrets, which are not pro-
hibited by trade secret law. However, upon a showing that some in --- ormation is a
trade secret that has been misappropriated by improper acquisition, improper use, or
6406_Oranburg_Protecting Trade Secrets_1pp.indb 4 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 5
improper disclosure, the court will award remedies. A common remedy --- or misap-
propriation is an injunction that stops or prevents misappropriation:
Damages
UTSA § 2
Actual or threatened misappropriation may be enjoined.
Alternatively, or additionally, courts can order a misappropriator to pay money
damages --- or the harm.
Damages
UTSA § 3(1)
. . . Damages can include both the actual loss caused by misappropriation
and the unjust enrichment caused by misappropriation . . . [or] a reasonable
royalty --- or a misappropriator’s unauthorized disclosure or use o --- a trade secret.
In cases o --- “will --- ul and malicious” misappropriation, courts may award “exem-
plary” damages o --- up to twice the amount o --- actual damages in addition to the com-
pensatory award, e ---
ectively allowing treble damages in total. Courts may also award attorneys’ — ees to the prevailing party where a misappropriation claim or de — ense was brought in bad — aith. The De — end Trade Secrets Act (DTSA) creates a — ederal civil cause o — action — or trade secret misappropriation and largely mirrors the substantive provisions o — the UTSA as adopted by most states. The DTSA also includes two notable — eatures absent — rom most state laws. First, it authorizes “ex parte civil seizure,” an extraordinary remedy that allows a court to order the seizure o — property without advance notice to the accused party but only in exceptional circumstances where standard injunctions would be inadequate to prevent the immediate and irreparable dissemination o — a trade secret. Second, the DTSA expressly provides — or extraterritorial application, permitting claims against acts o — misappropriation occurring outside the United States so long
6406_Oranburg_Protecting Trade Secrets_1pp.indb 5 10/16/25 9:25 PM 6 1 • Understanding Trade Secret Law
as the o ---
ender is a US person or the misappropriation has a su —
icient nexus to US commerce:
Extraterritoriality
18 USC § 1837
This chapter [18 USCS §§ 1831 et seq.] also applies to conduct occurring
outside the United States i --- —
(1) the o ---
ender is a natural person who is a citizen or permanent resident alien o — the United States, or an organization organized under the laws o — the United States or a State or political subdivision thereo — ; or (2) an act in — urtherance o — the o —
ense was committed in the United States.
Within this relatively straight --- orward statutory --- ramework lie two deceptively
complex and essential questions. First, what counts as improper means o --- acquiring,
using, or disclosing a trade secret? This ex post inquiry (litigated a --- ter the --- act) o --- ten
turns on business norms, industry expectations, and case-speci --- ic judgments about
airness and intent. Second, what quali — ies as reasonable e —
orts to protect a secret in the — irst place? This ex ante question (regarding steps taken be — ore any misappro- priation occurs) demands proactive sa — eguards: legal, operational, and cultural. The chapters that — ollow will equip you to navigate both dimensions with practical insight and strategic clarity. This opening chapter lays the — oundation — or understanding trade secrets as both a legal and business concept. It begins with the historical origins o — trade secret doctrine and then de — ines what quali — ies — or protection. From there, it examines the meaning o —
misappropriation and surveys the remedies available when secrecy is lost. Along the
way, it introduces key cases and legal standards that --- orm the backbone o --- modern
trade secret practice.
Above all, this chapter establishes the central premise o --- the book: trade secret
protection is not a passive entitlement. It is an active process. Everything that --- ollows
will build on this insight.
1.1. Introduction to Trade Secret Law
Trade secrets are perhaps the least known o --- the major intellectual property --- orms.
They depend entirely on secrecy. Owners must protect their con --- idential business
in --- ormation --- rom public view rather than relying on government registration. I --- the
secret leaks out, the law usually cannot restore its exclusivity. Yet, when properly
6406_Oranburg_Protecting Trade Secrets_1pp.indb 6 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 7
guarded, trade secrets can preserve a signi --- icant competitive edge --- or as long as the
in --- ormation remains hidden. Examples include manu --- acturing methods, specialized
ormulas, customer lists, or other commercially valuable data that is not generally known in the industry. Historically, societies recognized that exclusive knowledge — osters innovation. Medieval guilds protected recipes, — ormulas, and skills to secure their economic posi- tions. Early American courts likewise en — orced agreements and duties not to mis- use con — idential in — ormation, well be — ore modern statutes described “trade secrets” by name. Two 19th-century Massachusetts cases — Peabody v. Nor — olk and Vickery v. Welch — are among the most in — luential o — these early decisions. They show how courts began treating secret commercial knowledge as an asset worthy o — legal protec- tion, even without a patent.
Legal Protection o --- Secret Proc esses
Peabody v. Nor --- olk
98 Mass. 452 (1868)
Peabody invented a proprietary jute-manu --- acturing process and disclosed
it to Nor --- olk under an agreement --- orbidding --- urther disclosure or use. Nor --- olk
later attempted to exploit that process himsel --- . The court granted Peabody an
injunction, ruling that keeping a process hidden (rather than patenting it) did
not --- or --- eit its protection. The court called such hidden know-how “property”
that equity would protect, and it highlighted that employees or associates who
gain knowledge under a duty o --- con --- idence cannot law --- ully disclose or pro --- it
rom it in breach o — trust.
By the time Peabody was decided, courts had already grappled with business trans-
actions that hinged on secret knowledge. Sometimes, parties tried to buy or sell exclu-
sive processes or recipes. I --- a seller re --- used to share the --- ull details, the buyer might
sue, claiming they paid --- or something they never received. In these disputes, judges
had to decide whether a secret method could be treated like any other piece o --- prop-
erty. They generally concluded that it could be, as long as both parties recognized its
con --- idential nature.
Legal Trans --- er o --- a Secret Method
Vickery v. Welch
36 Mass. (19 Pick.) 523 (1837)
Welch agreed to sell a chocolate-making process — plus his mills — to Vick-
ery, who believed he was purchasing the exclusive right to Welch’s secret. A --- ter
6406_Oranburg_Protecting Trade Secrets_1pp.indb 7 10/16/25 9:25 PM 8 1 • Understanding Trade Secret Law
the sale, Welch withheld part o --- the process and argued that the contract should
not bar him --- rom reusing or reselling it. The court sided with Vickery. It held
that a secret business method can be sold as a valuable asset, and once sold, the
ormer owner cannot continue exercising the same secret in a way that nulli-
ies the buyer’s exclusive rights. The decision — oreshadowed modern contract- based trade secret cases by con — irming that an owner may convey a hidden method as i — it were property, subject to conditions preserving con — identiality.
These 19th-century cases o ---
ered a legal — oundation: a person who develops secret knowledge can share it selectively and expect others to keep it concealed. I — a recipient violates that trust, courts may en — orce the original agreement or implied duty. In the early 20th century, judges extended these principles. They recognized that limited dis- closure, under appropriate sa — eguards, o — ten helps a business grow without destroying secrecy. For example, a — amous Supreme Court ruling in 1905 upheld the Board o —
Trade’s practice o --- restricting its grain price quotations to paying subscribers who
promised not to circulate them --- urther.
Controlled Distribution Protects
Secret In --- ormation
Board o --- Trade o --- City o --- Chicago v. Christie Grain & Stock Co.
198 U.S. 236 (1905)
The Chicago Board o --- Trade compiled real-time grain price data. It provided
that data to speci --- ic subscribers under con --- identiality conditions. A competitor
obtained the in --- ormation indirectly and published it. The Supreme Court held
that the Board had not lost its property rights by sharing its data under strict
limitations. This early decision showed how a secret could remain protected
i --- the owner maintained --- irm rules on who gets access and under what terms.
Over time, courts clari --- ied that it is the manner o --- acquisition — rather than the
mere --- act o --- possession — that o --- ten determines liability. People who independently
discover or reverse engineer an unpatented --- ormula are --- ree to use it, no matter how
much the original inventor wants to keep it hidden. But employees, partners, or out-
siders who obtain the same in --- ormation through breach o --- con --- idence --- ace potential
liability. In 1917, the Supreme Court --- amously underscored that “the breach o --- trust”
lay at the heart o --- trade secret law.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 8 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 9
Trade Secret Law Focuses on Trust
E. I. du Pont de Nemours Powder Co. v. Masland
244 U.S. 100 (1917)
Justice Holmes declined to label the misappropriated manu --- acturing in --- or-
mation as “property” in a strict sense. Instead, he stressed that disclosing or
using data given in con --- idence is a wrong in itsel --- . Once a business shares valu-
able secrets under conditions o --- trust, the recipient must not exploit them to
the owner’s detriment. This emphasis on a breach o --- con --- idence rather than on
technical de --- initions o --- property still guides trade secret disputes today.
In the mid-1900s, the UTSA codi --- ied many o --- these common law rules. Most
states have adopted some version o --- the UTSA, ensuring that secrecy, competitive
value, and reasonable e ---
orts at concealment remain the threshold elements. Then in 2016, Congress enacted the DTSA, establishing a — ederal civil cause o — action. A key Supreme Court case addressed whether opting — or secrecy con — licts with patent law:
Patent Law and Trade Secrecy Coexist
Kewanee Oil Co. v. Bicron Corp.
416 U.S. 470 (1974)
Kewanee Oil maintained industrial processes as secrets rather than seeking
patents. When ex-employees took that know-how to a competitor, the com-
petitor argued that state trade secret law was incompatible with --- ederal patent
policy. The Supreme Court disagreed. It ruled that trade secret protection does
not undermine the patent system’s goals because patents demand disclosure,
whereas trade secrets do not. Both routes can advance innovation, and each
developer decides which path to --- ollow.
Hence, the modern body o --- trade secret law began taking shape well be --- ore the
20th century, propelled by cases like Peabody, Vickery, Board o --- Trade, and Masland,
and later re --- ined by Kewanee and statutory re --- orms. Together, these authorities con-
irm that secret in — ormation can be protected i — (1) it is kept con — idential with rea- sonable diligence, (2) it has value precisely because it is not generally known, and (3) others acquire it improperly or in breach o — a duty o — trust when disputes arise. Modern technology and remote collaboration make secrecy both more challenging
6406_Oranburg_Protecting Trade Secrets_1pp.indb 9 10/16/25 9:25 PM 10 1 • Understanding Trade Secret Law
and more critical. The next sections will situate trade secrets within the larger intel-
lectual property landscape (Section 1.2) and explain how courts de --- ine and sa --- eguard
this oldest-yet-ever-evolving --- orm o --- IP.
1.2. Trade Secrets Within the
Intellectual Property Framework
Trade secrets occupy one corner o --- a larger intellectual property landscape that
also includes patents, copyrights, and trademarks. These other --- orms o --- IP typically
rely on some measure o --- public disclosure or visible use to secure rights. Patents
require public disclosure o --- an invention in exchange --- or a time-limited monopoly.
Copyrights protect expressions and o --- ten assume wide distribution o --- those works.
Trademarks --- ocus on public identi --- ication and distinctiveness in commerce. By con-
trast, trade secrets demand silence. They require no registration or government --- il-
ing. Their protection continues --- or as long as the in --- ormation remains con --- idential
and yields economic value to its owner. This section compares and contrasts trade
secrets with each o --- the other IP types, highlighting why some businesses choose
secrecy while others lean on patents, copyrights, or trademarks — or on a mixture
o --- them all.
1.2.1. Trade Secret vs. Patent
Patents and trade secrets shield innovation but adopt opposing approaches. A
patent discloses the technology behind an invention so the public can learn --- rom it,
in return --- or an exclusive right — generally lasting 20 years — to block others --- rom
making, using, selling, or importing that invention. Trade secrets, on the other
hand, demand that you hide the critical details. I --- the innovation is discovered
independently or reverse engineered, you cannot stop the new user by citing trade
secret law. I --- someone simply --- igures out the recipe, you are out o --- luck. By contrast,
a patent can block even innocent third parties who arrive at the same invention on
their own.
Whether to pursue a patent or keep a process hidden is a strategic choice. I --- an
invention is easy to reverse engineer, secrecy may not help because competitors can
unlock the idea by studying the --- inal product. In that scenario, a patent might be
better — disclosure is --- orced, but it stops copycats --- or a limited term. Conversely,
i --- the invention can --- easibly stay hidden (like a --- actory process or an internal algo-
rithm) and has potential value beyond 20 years, secrecy could be advantageous.
Owners then skip the cost and wait o --- patent prosecution and avoid revealing details
to the public. However, they do --- ace the downside that i --- someone else discovers the
same method independently, there is no recourse under trade secret law.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 10 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 11
A practical compromise involves patenting certain core aspects o --- a technol-
ogy while still treating re --- inements, negative data, or unpatentable --- eatures as trade
secrets. This approach ensures some exclusive rights via patent law while other
knowledge stays con --- idential within the --- irm. However, care is needed when dra --- ting
patent applications or marketing materials so that you do not accidentally disclose
too much and destroy your secrecy.
1.2.2. Trade Secret vs. Copyright
Copyright law sa --- eguards creative expression — such as novels, music, --- ilms, com-
puter code, or even a painting’s speci --- ic arrangement o --- lines and shapes. It arises
immediately upon creation and does not require secrecy at all. In --- act, copyrighted
works are o --- ten widely published and distributed to reach an audience. The copy-
right owner can sue anyone who makes unauthorized copies or adaptations o --- the
expression.
Trade secrets revolve around maintaining con --- identiality. They protect what lies
behind the visible expression, such as the undisclosed logic in a so --- tware algorithm
or the unshared sections o --- a manual that might contain unique methods or inter-
nal data structures. Once you release a copyrighted work to the public, you cannot
claim that its core contents remain hidden — even i --- the public --- aces license restric-
tions, the expression itsel --- is “out there.” For trade secret status to endure, you must
show that you took real steps to keep the relevant details --- rom becoming general
knowledge.
Even so, you can combine both systems. A developer might copyright a --- inished
program’s user inter --- ace and compiled object code, then keep the source code a secret.
I --- a competitor obtains that source code via improper means — say, by hacking or by
betrayal o --- an NDA — both copyright in --- ringement (i --- they literally copied the text)
and trade secret misappropriation (i --- they exploited the hidden logic) could apply.
But i --- a rival writes its own --- unctionally similar code that uses the same ideas but not
the same expression, copyright might not help at all, while trade secret law could still
address whether those ideas were gained improperly.
1.2.3. Trade Secret vs. Trademark
Trademarks help consumers identi --- y a product or service. Their entire value --- lows
rom public visibility: a brand name, a logo, or a slogan must be “out in the open” so customers see it and distinguish it — rom competing marks. Trade secrets thrive in concealment. Yet, in practice, trademarks and trade secrets o — ten coexist: a — amous trademark can rest on a well-promoted brand name while the process that creates that brand’s distinctive product remains hidden. One iconic example is Coca-Cola: the name and logo are trademarks known worldwide, while the secret — ormula is protected only by corporate silence.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 11 10/16/25 9:25 PM 12 1 • Understanding Trade Secret Law
Trademark and Trade-S ecret
Formula Together
Coca-Cola Bottling Co. v. The Coca-Cola Co.
269 F. 796 (D. Del. 1920)
In this early dispute, independent bottlers challenged The Coca-Cola Com
pany’s trademark and exclusive control o --- its secret syrup --- ormula. The court
recognized that Coca-Cola’s name and logo --- unctioned as a --- amous trade-
mark, even while the syrup’s exact recipe remained a protected secret. Coca-
Cola had never publicly disclosed the precise blend o ---
lavoring oils and other ingredients. By keeping the — ormula hidden and requiring strict con — idential- ity among bottlers, Coca-Cola preserved a trade secret that complemented its strong brand identity. The ruling emphasized that trademark law protects the public- — acing symbol o — a product, whereas trade secret law shields the behind- the-scenes method or recipe. As a result, Coca-Cola could leverage both — orms o — intellectual property: the trademark drew consumers to a recognizable bev- erage, while the undisclosed — ormula kept rivals — rom duplicating the drink’s taste. This combination o — secrecy and branding became a — oundational model
or other companies seeking dual protection.
Sometimes, a company keeps an upcoming brand identity a secret until a prod-
uct’s launch. That pre-launch name or logo might --- unction as a “trade secret” to pre-
vent early leaks. But once the trademark is revealed publicly, any secrecy behind it
ends. Meanwhile, the brand might represent a product whose special --- eatures remain
locked away --- rom the competition. In that sense, trademarks and trade secrets work
side by side: one is broadcast to the marketplace, and the other is guarded within the
organization.
1.2.4. Trade Secrets in the IP Landscape
Patents, copyrights, trademarks, and trade secrets each protect di --- --- erent kinds
o --- value. Patents reward inventors --- or disclosing new inventions. Copyrights grant
exclusive rights in creative works. Trademarks cultivate brand recognition and con-
sumer trust. Trade secrets preserve hidden methods or data that yield an advantage
by virtue o --- not being generally known.
Some businesses patent or trademark the public- --- acing aspects o --- their products
while keeping behind-the-scenes practices secret. Others --- orgo the patent system
entirely i --- they believe they can maintain secrecy longer than a 20-year patent term.
Still others rely on copyrights --- or expression but retain trade secret protection --- or
the knowledge behind that expression. The choice depends on many --- actors, includ-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 12 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 13
ing how easily competitors might reverse engineer a product, whether the inven-
tion meets patentability standards, and whether disclosure could spur unwanted
competition.
In the --- ollowing sections, we will examine exactly how law de --- ines a trade secret
(Section 1.3), how misappropriation arises (Section 1.4), and how businesses can
orti — y their con — idential in — ormation against improper exposure. Understanding trade secrets in this broader IP — ramework lets you see why companies might choose silence as part o — their innovation strategy — and why that silence must be accompa- nied by consistent, care — ully managed e —
orts to keep the secret — rom escaping.
1.3. De --- ining a Trade Secret:
The Three Essential Elements
Trade secret law hinges on three essential requirements. First, the subject matter
must quali --- y as “in --- ormation.” Second, that in --- ormation must hold independent eco-
nomic value precisely because it is not generally known and not readily ascertainable
by proper means. Third, the business that seeks protection must undertake reason-
able e ---
orts to keep the in — ormation con — idential. Although these elements appear straight — orward, courts weigh them care — ully. Each — actor plays a crucial part in deter- mining whether knowledge genuinely deserves legal sa — eguards as a trade secret. This section explores these requirements step by step, examining what kinds o —
“in --- ormation” can receive protection, how businesses can prove that their in --- orma-
tion remains unknown and o ---
ers a competitive edge, and why only those who actively guard their secrets can invoke the protections o — trade secret law. Understanding these criteria illuminates the care — ul balancing that courts per — orm between promot- ing — air competition and punishing dishonest acts o — the — t or breach o — con — idence.
1.3.1. In --- ormation
A trade secret claim begins with the assertion that speci --- ic content quali --- ies as
“in --- ormation.” Statutes such as the UTSA and the --- ederal DTSA de --- ine this term
in broad, inclusive language encompassing --- ormulas, patterns, compilations, pro-
grams, devices, methods, techniques, processes, and similar intangible knowledge.
Consequently, “in --- ormation” may re --- er to anything --- rom chemical --- ormulas or
advanced algorithms to marketing plans or specialized data sets. The key point is
that courts --- ocus on the intangible content, not on a physical object or an employee’s
personal skill.
Many companies rely on technical trade secrets, such as manu --- acturing processes,
recipes, or engineering designs. A company might also have business trade secrets,
including strategic plans, sales tactics, or curated customer lists. O --- ten, a single
6406_Oranburg_Protecting Trade Secrets_1pp.indb 13 10/16/25 9:25 PM 14 1 • Understanding Trade Secret Law
enterprise relies on multiple types o --- con --- idential knowledge to stay ahead o --- rivals.
For example, a pharmaceutical --- irm might keep one set o --- secrets tied to a produc-
tion process, another set related to the identity o --- specialized suppliers, and a third
set involving results --- rom negative research. All o --- these might quali --- y as protected
“in --- ormation,” provided they are both novel to outsiders and deliberately hidden --- rom
general circulation.
Trade secret law does not treat broad, nebulous concepts as “in --- ormation.” I --- the
alleged secret is merely an idea that any skilled person in the --- ield would conceive,
courts will reject it as too abstract. The owner must show that the knowledge is su ---
i- ciently concrete and detailed. In some cases, a single concept or notion might straddle the line between a protectable method and an unprotectable idea. Courts will look to see whether the claimant can articulate precise steps, — ormulas, or data that di —
erenti- ate the secret — rom everyday industry knowledge.
Separating Concepts --- rom Concrete Data
Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
226 Cal. App. 4th 26 (2014)
Altavion alleged that a general idea --- or embedding secure barcodes in docu-
ments was a trade secret. The court distinguished between broad conceptual
statements (such as “use barcodes --- or authentication”) and the speci --- ic under
lying algorithms, designs, and implementations that Altavion kept con --- iden-
tial. The general concept alone was deemed too vague --- or protection. However,
the court --- ound that once Altavion provided detail on how exactly it coded and
integrated the barcodes, that narrower, concrete content quali --- ied as in --- orma-
tion. This ruling shows that courts demand de --- inable --- acts or methods, not
merely a creative notion or aspiration.
A second point o --- emphasis is that employees’ general know-how or skill is not
“in --- ormation” in the sense o --- a trade secret. Over time, workers accumulate exper-
tise, develop pro --- essional judgment, and learn standard techniques. Courts will not
prevent employees --- rom using their accumulated competencies, even i --- they sharp-
ened them while working --- or one employer. What counts as a secret must go beyond
typical skill or routine knowledge. I --- a departing worker takes a con --- idential --- ormula
or proprietary blueprint, that crosses the line. But i --- they merely recall and use typi-
cal design principles known throughout the industry, courts treat it as part o --- their
general skillset.
Finally, trade secret law does not require the alleged secret to be recorded on
paper or stored in a database. An individual might hold the knowledge purely in
6406_Oranburg_Protecting Trade Secrets_1pp.indb 14 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 15
memory, and as long as the method or --- ormula remains genuinely undisclosed, it
can still be protectable. Many older precedents re --- erence trade secrets passed ver-
bally between employees under an implicit or explicit expectation o --- con --- idential-
ity. Today’s world mostly uses digital repositories, but the principle remains that
intangible substance — the actual data, design, or process — matters more than the
medium. What remains crucial is that the owner can later de --- ine and describe it with
enough speci --- icity --- or a court to see how it di ---
ers — rom everyday skill and unpro- tected knowledge.
1.3.2. Independent Economic Value --- rom
Not Being Generally Known and Not
Readily Ascertainable
The second prong captures two closely connected requirements. The secret must
possess value because it is not generally known, and it must not be so easily discov-
erable by law --- ul means that secrecy con --- ers no real advantage. Courts usually group
these concepts by asking whether the owner truly gains a meaning --- ul competitive
edge by keeping others in the dark or whether a rival could law --- ully replicate the
in --- ormation with trivial e ---
ort. I — the secrecy does not matter to the in — ormation’s economic utility or i — a competitor can reverse engineer the solution with minimal trouble, the law sees no cause — or trade secret protection.
1.3.2.1. Independent Economic Value
Trade secret law requires that the in --- ormation at issue derive independent eco-
nomic value --- rom remaining con --- idential. This means the in --- ormation must be
valuable precisely because other potential users do not know it. I --- everyone in the
ield already understands or can — reely access the same content, secrecy cannot add anything to its economic worth. Thus, many businesses highlight how exclusive knowledge saves costs, enables better products, or opens new markets. They might show how a trade secret shortens development time, yields superior per — ormance, or protects pricing strategies, all o — which translate to a head start or competitive advantage. Conversely, i — the knowledge does not meaning — ully advance the owner’s e —
iciency or revenue, or i — it is trivial, the law sees no strong reason to treat it as a protectable secret. Owners typically demonstrate “independent economic value” by explaining how competitors would gain a signi — icant bene — it i — they learned the secret or how the owner would su —
er losses i — the in — ormation leaked. Courts o — ten accept direct testi- mony supported by some — actual demonstration, like development costs, special pro- duction methods, or time saved by skipping trial-and-error phases, that the secrecy grants a real business edge.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 15 10/16/25 9:25 PM 16 1 • Understanding Trade Secret Law
Economic Value in Nonpro --- it Contexts
Religious Tech. Ctr. v. Lerma
908 F. Supp. 1353 (E.D. Va. 1995)
The Church o --- Scientology sued over internet postings o --- its “Operating
Thetan” materials, claiming that they were valuable trade secrets. The court noted
that the Church sold the esoteric teachings only to quali --- ied adherents who paid
ees and pledged con — identiality. By limiting access, the Church maintained that these texts derived monetary worth — rom remaining undisclosed. Critics argued that the spiritual nature o — the content made it ill-suited — or commercial protec- tion. The court, however, evaluated the alleged “independent economic value” by examining the Church’s business model o — licensing and — ees, indicating that intangible or non-technical material can still quali — y i — it con — ers a tangible ben- e — it — rom secrecy. Although the ultimate dispute involved constitutional and
air-use arguments, the case underscored how an organization’s care — ul restric- tion o — potentially “religious” content can — all under the umbrella o — trade secret law i — it demonstrates economic importance linked to con — identiality.
In short, the heart o --- “independent economic value” is the link between secrecy
and commercial bene --- it. A company may show that the secret knowledge is expensive
or time-intensive to replicate, that only a --- ew insiders have it, and that disclosing it
would hand rivals a shortcut. As soon as other players can obtain and use the same
in --- ormation, its exclusivity — and thus its competitive worth — evaporates. This prong
ensures that only meaning --- ul secrets o --- genuine commercial signi --- icance, rather than
general or incidental knowledge, earn the shield o --- trade secret protection.
1.3.2.2. Not Generally Known
“Not generally known” means the in --- ormation is not widely recognized or pub-
lished in the relevant --- ield. Courts do not require absolute invisibility. A small circle
o --- people might be aware o --- the data, yet it can still be a secret i --- they learn it under
con --- identiality obligations or i --- the group remains too small to nulli --- y the owner’s
advantage. However, i --- many competitors independently use the same approach or i ---
the technique appears in readily accessible industry re --- erences, the knowledge ceases
to be a secret.
This --- ocus on “not generally known” underlies the principle that trade secret law
rewards businesses that keep a competitive insight to themselves. I --- the insight is
already spreading --- reely, secrecy is not what makes it valuable. In practice, the lines
can blur. One enterprise might share certain details selectively with partners under
strict NDAs or present partial glimpses to potential investors. These controlled dis-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 16 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 17
closures do not automatically destroy secrecy i --- they preserve con --- identiality. But i ---
the in --- ormation appears widely — --- or instance, in a patent --- iling or a public regulatory
submission — the law deems it general knowledge.
Courts also ask whether a competitor, upon hearing vague re --- erences, could locate
the same data in public sources. I --- the answer is yes, the material is e ---
ectively known. Some owners attempt to hide an innovation behind licensing or restricted distribu- tion. But i — the product is widely sold and includes enough clues or is accompanied by manuals that detail the innovation, a court might conclude that the knowledge is
unctionally public. The key consideration is whether the secrecy e —
ectively keeps the knowledge restricted to a small, controlled circle that cannot — reely pass it along.
Value --- rom Limited Circulation
Board o --- Trade o --- City o --- Chicago v. Christie Grain & Stock Co.
198 U.S. 236 (1905)
In the early 1900s, the Board o --- Trade compiled grain price quotations and
shared them only with paying subscribers under con --- identiality-like condi-
tions. A competitor tried to publish these quotes, arguing they were not truly
secret. The Supreme Court disagreed, emphasizing that the Board’s practice o ---
limiting the data to authorized users preserved secrecy and value. Although
some subscribers possessed the in --- ormation, it was not “generally known”
because the Board never released it into a --- ully open --- orum. The Board’s care-
ul control sustained the advantage arising — rom restricted access, which sup- ported the conclusion that the data was protectable.
To show that the in --- ormation is not generally known, owners o --- ten present evi-
dence o --- their internal security policies, limited distribution, and explicit instructions
to recipients about con --- identiality. This helps persuade courts that the knowledge
remains in a de --- ined circle rather than having spilled across the entire industry.
Equally important is demonstrating that no legitimate publication or public discus-
sion has sur --- aced which might de --- eat a secrecy claim.
1.3.2.3. Not Readily Ascertainable
Closely related to being “not generally known” is the question o --- whether the
in --- ormation is “not readily ascertainable.” I --- a competitor can law --- ully discover the
secret with minimal e ---
ort, the secrecy advantage collapses. Common law — ul meth- ods include independent creation, reverse engineering, or research using public data. Trade secret law is built around the idea that no one can be prevented — rom stum-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 17 10/16/25 9:25 PM 18 1 • Understanding Trade Secret Law
bling on the same insight i --- they do so honestly. It only punishes the --- t, deception, or
breaches o --- con --- idence.
Reverse engineering has become a central --- ocal point in technology-driven indus-
tries. Purchasing a competitor’s widget, disassembling it, and analyzing its compo-
nents are considered --- air game. I --- doing so reveals the competitor’s once-hidden
design, that design is not a protected secret in the eyes o --- the law. The same logic
applies to so --- tware decompilation or cryptanalysis, though license agreements may
place additional contractual restrictions. Courts generally hold that i --- the average
skilled competitor could replicate the process or outcome through public channels
and standard investigative methods, it is readily ascertainable and does not quali --- y
or trade secret protection. Yet i — the relevant method remains buried so deeply that an adversary would need extraordinary guesswork or a major research project to replicate it, the secrecy stands. A manu — acturing technique that requires specialized knowledge or extremely involved trial and error may remain secure — or years, even i — the — inal product is sold openly. This situation o — ten arises with intangible “know-how” embedded in pro cesses that do not mani — est on the product’s sur — ace.
Novel Combinations Can Be Trade Secrets
Hertz v. Luzenac Group
576 F.3d 1103 (10th Cir. 2009)
Luzenac produced a talc product using common steps in a speci --- ic sequence
that yielded superior per --- ormance. Former employees took that knowledge to
a rival. At --- irst, the court dismissed the claim, reasoning that each individual
step was known in the industry. On appeal, the Tenth Circuit concluded that
combining these steps in that particular way was not readily ascertainable.
Since no competitor had success --- ully pieced the steps together on their own,
the synergy o --- steps held legitimate secrecy value. This highlights that even i ---
the pieces are public, the unique assembly can remain protected i --- it is not easy
or outsiders to deduce.
In e ---
ect, “not readily ascertainable” means that the secret-owner does not rely on broad ignorance alone but also on the — act that legitimate channels o — discovery would be signi — icantly challenging. A rival’s inability to replicate the knowledge, short o — unethical or illegal conduct, supports the notion that secrecy has real worth. Con- versely, i — an opponent can replicate the in — ormation with a minimal investment o —
time or capital, secrecy cannot be said to drive the knowledge’s economic value.
When evaluating this prong, courts consider the cost, complexity, and typical capa-
bilities o --- industry players. They do not require that a secret be absolutely impossible
6406_Oranburg_Protecting Trade Secrets_1pp.indb 18 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 19
to --- igure out. Rather, the standard is that acquiring the secret --- airly would require
unusual or burdensome e ---
ort beyond what is considered routine or trivial. I — acquir- ing it is so easy that a competitor merely needs to buy the product and do a simple test, the owner cannot claim trade secret status — or that data or design.
1.3.3. Subject to Reasonable E ---
orts to Maintain Secrecy The — inal requirement embodies a — undamental principle: to deserve legal pro- tection, an owner must treat the in — ormation as secret. Courts do not automatically guard knowledge that a business — ails to secure. Rather, the law expects the claimant to adopt consistent, practical measures to ensure the in — ormation stays hidden. Failing to do so signals that the business itsel — did not regard the data as con — idential, so the public policy interest in protecting it diminishes. One common example is the use o — nondisclosure agreements (NDAs) — or any- one who might gain access to the knowledge. While NDAs alone are not a panacea, they re — lect a recognition that the in — ormation is special and must be shielded. Other
requent methods are labeling documents or — iles as “con — idential”; restricting physi- cal access to sensitive areas; implementing digital controls, like password-protected servers; and keeping distribution on a “need-to-know” basis. The speci — ic steps vary widely depending on industry, scale, and the nature o — the secret. A small — amily res- taurant might keep one copy o — its sauce recipe in a locked drawer, while a global tech company invests in advanced cybersecurity. Nevertheless, courts want a consistent story. I — an owner brandishes NDAs but then — reely distributes the purported secret in brochures or marketing materials, that owner undermines the argument — or secrecy. Judges examine whether the business’s internal culture, training, and policy en — orcement align with the concept o — con — iden- tiality. When a leak occurs, the owner’s swi — t and decisive response can prove to the court that secrecy truly matters to the organization.
An NDA Is Not Enough
nClosures Inc. v. Block & Co.
770 F.3d 598 (7th Cir. 2014)
nClosures developed a metal iPad case and had a nondisclosure agreement
with a manu --- acturer. Despite this paperwork, the company publicly showcased
designs and shared them widely without additional security measures. The
court re --- used to recognize trade secret status, explaining that simply having
an NDA is not enough when the owner’s actual conduct does not rein --- orce
secrecy. By --- ailing to consistently limit access or label materials as con --- iden-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 19 10/16/25 9:25 PM 20 1 • Understanding Trade Secret Law
tial, nClosures e ---
ectively treated its design as public in — ormation, so the law declined to treat it as protected.
Reasonable e ---
orts also must adapt over time. A data security approach that su —
iced years ago might be woe — ully inadequate today, especially in — ields prone to hacking or digital espionage. Companies that rely heavily on trade secrets o — ten update security protocols, run internal audits, and ensure that employees remain mind — ul o — con — i- dentiality obligations. Courts look — avorably on periodic training sessions that educate sta —
on how to avoid accidental disclosures and on clear policies — or employees who depart the company. I — a large — irm — ails to maintain even basic cybersecurity, it is more likely that a court will conclude the — irm did not truly act to keep the data secret. Some owners worry that excessive secrecy can hamper collaboration or market- ing e —
orts. Yet the law’s requirement is not total lockdown but rather reasonableness. Limited disclosures to potential investors or licensees do not kill a trade secret so long as those disclosures are controlled by NDAs and explicit con — identiality rules. Distribution within the — irm is acceptable i — the recipients indeed need the in — orma- tion — or legitimate tasks and i — internal controls prevent casual sharing. The overarch- ing question is whether the business systematically indicates that the in — ormation is private and invests proportionate resources in keeping it out o — unauthorized hands. When a trade secret lawsuit arises, de — endants o — ten argue that the alleged secret was not “reasonably” protected. They may point to large numbers o — employees with unlimited access, a lack o — con — identiality markings on documents, or anecdotal evi- dence that managers openly discussed the knowledge in public — orums. Plainti —
s counter by documenting the steps they took, such as locked o —
ices, restricted server permissions, mandatory NDAs, and immediate action against suspicious behavior. This — actual clash o — ten decides whether the court deems the secrecy claim genuine or per — unctory. The bottom line is that trade secret law rewards diligence. Owners who use NDAs, restrict access, mark documents, and swi — tly respond to potential leaks can demon- strate that they truly rely on secrecy. This approach, in combination with the other two elements, establishes the strong — oundation needed to seek injunctions and damages i —
the secret is later stolen or misappropriated. Without these measures, a court is likely
to hold that the business did not do its part and thus cannot invoke legal protection.
1.3.4. Synthesizing the Three Elements
In --- ormation deserving trade secret status must meet all three criteria simulta
neously. It must be detailed enough to quali --- y as “in --- ormation,” not a broad or obvi-
ous idea. It must carry genuine economic weight arising --- rom its obscurity, meaning
6406_Oranburg_Protecting Trade Secrets_1pp.indb 20 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 21
it is not generally known or readily discoverable through law --- ul methods. Finally, the
owner must actively preserve that obscurity through steady and reasonable e ---
orts rather than merely proclaiming secrecy a — ter the — act. Only when these — actors align does the law step in to penalize thieves, deter unethical ex-employees, and sa — eguard honest competition based on properly acquired knowledge. Trade secrets can last inde — initely — — ar longer than patents — precisely because the law does not — ix an expiration date. That unique advantage goes hand in hand with the owner’s ongoing obligation. A single misstep, such as a public disclosure, can instantly destroy the secrecy. Once the in — ormation becomes — reely available, the advantage dis- solves. Additionally, a competitor who stumbles on the same method independently or reverse engineers it through diligence commits no misappropriation. Thus, the entire mechanism o — trade secret law revolves around preventing wrong — ul acquisi- tion or betrayal, not halting legitimate research. By insisting on these three elements, courts balance competing policy goals. They encourage businesses to develop valuable but hard-to-patent insights while preserv- ing the — reedom o — others to discover knowledge on their own. They also require owners to show genuine responsibility: i — a business invests in secrecy, the law invests in protecting it. This relationship — osters a culture in which companies care — ully clas- si — y and handle critical data and cultivate strategies to manage risk. Once a secret is indeed recognized under these principles, the next question is how the law de — ines and polices misappropriation. That topic will be explored in the next section, where the — ocus shi — ts to the line between — air competition — such as open-market reverse engineering — and illicit acts that breach a duty o — con — identiality or rely on deceit. Understanding these elements is essential background — or seeing where courts set the boundaries and how trade secret disputes pivot on issues o — trust, wrongdoing, and commercial — airness.
1.4. Misappropriation o ---
Trade Secrets
Misappropriation is the critical --- ault line where trade secret rights meet real-world
wrongdoing. Even i --- in --- ormation quali --- ies as a valid trade secret, there is no legal
violation unless an individual or entity acquires, uses, or discloses the secret in an
improper way. This emphasis on un --- air conduct preserves legitimate competition by
allowing parties to discover the same knowledge independently or reverse engineer a
publicly available product. The law steps in, however, when someone crosses bound
aries o --- trust or deception. This section explores how the statutes de --- ine misappro-
priation, details the main categories o --- improper behavior, explains how “use” and
“disclosure” can become actionable, and concludes with the notion o --- “proper means,”
most notably reverse engineering and independent discovery.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 21 10/16/25 9:25 PM 22 1 • Understanding Trade Secret Law
1.4.1. Statutory Foundations and
Wrong --- ul Conduct
Modern US trade secret statutes, including the UTSA and the DTSA, de --- ine “mis-
appropriation” in ways that revolve around wrongdoing. These laws --- ocus on whether
the trade secret was obtained by “improper means” or whether a party who had law --- ul
access to the secret went on to breach a duty in using or disclosing it. Courts label
misappropriation as unethical, dishonest, or un --- air conduct, in contrast to harmless
or authorized ways o --- discovering the same in --- ormation.
Typically, a trade secret owner alleges misappropriation by showing that the de --- en-
dant either stole or spied on the in --- ormation (improper acquisition) or exceeded the
scope o --- authorized access (improper use or disclosure). In each instance, courts look
or the crossing o — a line — some element o — trickery, breach o — contract, or knowing violation o — the right — ul owner’s expectations. I — the de — endant’s discovery is entirely independent or arises — rom a product openly sold, liability usually cannot attach. Trade secret law’s equitable origins are crucial here. A party who knowingly sub- verts commercial morality by deceiving or betraying trust will likely — ace liability. This principle underpins the entire — ramework. It ensures that employees can gain special- ized knowledge on the job and still move within the industry, provided they do not exploit or reveal actual secrets in direct violation o — a legal or ethical duty.
1.4.2. Improper Acquisition
Improper acquisition may be the most blatant --- orm o --- misappropriation. It encom-
passes actions such as the --- t, trespass, hacking, bribery, or espionage — any deliberate
method o --- bypassing the trade secret owner’s sa --- eguards. Whether the secret was
stored physically or digitally, the question is whether the de --- endant achieved access
through deceptive or unauthorized means.
Aerial Espionage as Improper Acquisition
E. I. du Pont de Nemours & Co. v. Christopher
431 F.2d 1012 (5th Cir. 1970)
In this --- requently cited case, du Pont was constructing a chemical plant with
a partially open roo --- . Christopher took aerial photographs o --- the --- acility to
discover its manu --- acturing process. The Fi --- th Circuit condemned this con-
duct as industrial espionage, concluding that --- lying overhead to circumvent
du Pont’s reasonable security measures was an improper means o --- acquiring
the trade secret. The court’s decision underscores how even clever yet law --- ul
tactics — like renting a spy plane — can become actionable when they e ---
ectively subvert the owner’s secrecy e —
orts.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 22 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 23
Bribery or inducement to breach a nondisclosure agreement also quali --- ies as
improper acquisition. For example, a competitor might pay a current employee to
leak con --- idential documents. The competitor’s knowledge that the insider is violating
a duty su ---
ices to prove wrongdoing. A more subtle scenario might involve posing as a potential partner or investor under — alse pretenses just to extract valuable in — orma- tion. Once the — acade is exposed, a court can hold that the de — endant’s actions were illegitimate. Signi — icantly, courts look beyond the direct thie — . I — a second party knowingly receives the stolen in — ormation and exploits it, that party also commits misappro- priation. The second party cannot claim ignorance i — the circumstances raise red
lags — such as a suspiciously low “sale” price — or the data or the presence o — obvious con — identiality markings. By extending liability, the law deters conspiracies and a — ter- the- — act pro — iteers.
1.4.3. Improper Use
Even when acquisition was initially authorized, misappropriation can arise through
“improper use.” Here, the person in possession o --- the trade secret goes beyond the
scope o --- any permitted purpose. Perhaps they acquired the in --- ormation under a con-
identiality agreement or in the context o — limited research. I — they then deploy the secret in ways the owner never agreed to, the law regards it as misappropriation. For instance, a technician might be hired to re — ine a manu — acturing method under strict nondisclosure terms. I — that technician later — orms a rival startup and employs the exact method — or personal gain, it counts as improper use. Courts typically scru- tinize the original context o — the relationship — particularly written agreements that de — ine how — ar the authorized use extends. A nondisclosure agreement (NDA) or license might say, “You may use this secret only to produce X — or us, no other uses are permitted.” Any usage outside that clause can become grounds — or litigation.
Improper Use o --- Properly Acquired In --- ormation
3M Co. v. Pribyl
259 F.3d 587 (7th Cir. 2001)
In this case, several --- ormer employees le --- t 3M to --- orm a rival venture, Accu-
Tech Plastics. While at 3M, they had legitimate access to its technical manu-
als and operating procedures, which detailed resin --- ormulations and precise
methods --- or producing specialized plastics. However, once they started Accu-
Tech, they directly incorporated these con --- idential processes into their new
enterprise. The Seventh Circuit --- ound that although the employees obtained
3M’s procedures law --- ully in their prior roles, their subsequent application o ---
the same proprietary steps to build a competing business was an unauthorized
use o --- trade secrets.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 23 10/16/25 9:25 PM 24 1 • Understanding Trade Secret Law
Because the employees knew 3M’s processes were secret and had signed
con --- identiality obligations, the court emphasized that their actions clearly
went beyond permissible use. That knowledge belonged to 3M --- or its own pro-
duction advantage and was not to be repurposed at a new company without
permission. In ruling --- or 3M, the court enjoined Accu-Tech’s continued exploi-
tation o --- the procedures and awarded damages re --- lecting the head start gained
by circumventing the normal learning curve. 3M Co. v. Pribyl illustrates that
even when acquisition is initially legitimate, reusing secret knowledge in an
unapproved venture can constitute misappropriation.
Measuring damages or injunction scope in improper-use cases can be complicated,
as the de --- endant likely had partial or temporary rights. Courts may restrict them --- rom
urther use — or a set “head start” period or until the advantage gained — rom the breach dissipates. They might also assess monetary relie — — lost pro — its, unjust enrichment, or a reasonable royalty — — or the unauthorized bene — it the de — endant derived. The key remains that the de — endant’s usage exceeded whatever was originally authorized, and they knew or should have known that it violated the owner’s expectations.
1.4.4. Improper Disclosure
A similarly damaging variant o --- misappropriation arises when a party who knows
the secret has no license to reveal it to others yet does so. Even a single disclosure
to a competitor can unravel years o --- investment i --- that competitor can immediately
exploit the knowledge. When disclosure reaches the public domain, the secret’s
entire advantage typically vanishes. By imposing liability --- or unauthorized disclo-
sure, the law encourages anyone entrusted with con --- idential knowledge to preserve
it care --- ully.
Wrong --- ul disclosure o --- ten appears in employee departure scenarios. An employee
may email key documents to a personal account or keep a USB drive o --- strategic --- iles.
I --- they share these --- iles with their new employer or upload them online, they breach
their duty not to reveal them. The severity o --- misappropriation can be even higher
when distribution is so broad that re-sealing the knowledge is impossible. Courts
react strongly, o --- ten ordering injunctions, awarding damages, and punishing mali-
cious intent with enhanced remedies.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 24 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 25
Wrong --- ul Inducement to Disclose
Con --- idential In --- ormation
Board o --- Trade o --- City o --- Chicago v. Christie Grain & Stock Co.
198 U.S. 236 (1905)
In this early Supreme Court decision, the Chicago Board o --- Trade provided
grain price quotations exclusively to a limited group o --- paying subscribers
under strict con --- identiality terms. A competitor induced insiders to disclose
this in --- ormation, thereby making the data publicly accessible. The Court
ocused on the act o — disclosure itsel — as the critical wrongdoing rather than on how the in — ormation was acquired or used subsequently. This case set a pre cedent by holding that deliberately breaching a con — identiality arrangement through unauthorized disclosure is su —
icient to trigger liability under trade secret law.
Disclosure can also be reckless rather than intentional. An organization might
post sensitive source code online by mistake or might neglect to redact trade secret
details --- rom a regulatory --- iling. While an errant slip might not always re --- lect mali-
cious conduct, courts o --- ten treat it as destructive to secrecy i --- the code or data truly
becomes public. The question is whether the de --- endant had a clear duty (contrac-
tual or ethical) to avoid exposing the in --- ormation but disregarded that obligation. I ---
so, liability likely --- ollows, although the remedy may vary depending on intent and
consequences.
Improper Disclosure o --- Properly
Acquired In --- ormation
MicroStrategy, Inc. v. Business Objects, S.A.
331 F. Supp. 2d 396 (E.D. Va. 2004)
In this case, MicroStrategy asserted that its --- ormer employees, who were
bound by con --- identiality agreements, improperly disclosed sensitive internal
documents to Business Objects. The documents at issue included MicroStrat-
egy’s “Business Objects Competitive Recipe” and a volume discount schedule.
MicroStrategy had taken extensive measures to keep both secret. The court
ound that these materials were not publicly available and could only have been obtained through a breach o — the employees’ duty o — con — identiality. As a result, Business Objects was enjoined — rom possessing, disclosing, or using the mis- appropriated documents. This case illustrates that even when in — ormation is
6406_Oranburg_Protecting Trade Secrets_1pp.indb 25 10/16/25 9:25 PM 26 1 • Understanding Trade Secret Law
acquired properly or indirectly ( --- or example, via --- ormer employees), any unau-
thorized --- urther disclosure that undermines the owner’s e ---
orts to maintain secrecy constitutes misappropriation.
Unauthorized disclosure is particularly damaging when it renders a secret no lon-
ger secret. Once con --- idential in --- ormation is disseminated widely, the owner’s exclu-
sive advantage evaporates. Courts are there --- ore quick to enjoin --- urther disclosures
and, in many cases, award damages that re --- lect the loss o --- the secret’s economic value.
1.4.5. Proper Means: Reverse Engineering
and Independent Discovery
Trade secret law does not create a monopoly over knowledge. Competitors remain
--- ree to discover or replicate a secret i --- they do so by honest methods — commonly by
reverse engineering a purchased product or conducting original R&D. Owners who
choose secrecy over patenting accept the risk that, once a product is sold openly,
skilled rivals might analyze and deduce the hidden aspects.
1.4.5.1. Reverse Engineering
Reverse engineering re --- ers to examining and dismantling a legitimate copy o --- an
item to understand its workings. As long as it was obtained law --- ully on the market,
trade secret law deems this approach permissible. I --- the original owner wanted to
keep the details hidden, they might have used physical security (potting compound
in electronics, --- or instance) or contractual limits (shrink-wrap or labeling disclaimers
that bar reverse engineering). Where no such measure or contract precludes analysis,
the competitor may replicate the design.
The Right to Reverse Engineer
Bonito Boats, Inc. v. Thunder Cra --- t Boats, Inc.
489 U.S. 141 (1989)
In invalidating a Florida statute that prohibited copying boat hull designs,
the Supreme Court rea ---
irmed the policy that absent patent protection, a prod- uct released publicly is — air game — or reverse engineering. The Court reasoned that states cannot grant a de — acto perpetual monopoly by banning law — ul investigative methods. Trade secret owners must adopt their own sa — eguards i —
they wish to keep knowledge hidden.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 26 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 27
Any attempt to label normal analysis or testing as “improper acquisition” typically
ails unless the owner can show a breach o — contract or an extraordinary in — iltration tactic. Courts encourage reverse engineering as a driver o — innovation and competi- tion, balancing the secrecy-based regime. Once the competitor obtains the data — rom the product itsel — , no misappropriation claim can stand, provided no NDAs or license restrictions exist.
1.4.5.2. Independent Discovery
A similarly valid avenue is independently creating or discovering the same knowl-
edge. Nothing in trade secret law grants the --- irst developer an automatic monopoly
i --- a second developer invests time and skill to reach the same solution. The second
developer need not pay royalties or --- ace litigation i --- they never accessed the --- irst com
pany’s data. Plainti ---
s trying to prove misappropriation must show the de — endant’s knowledge was tainted by improper means or a breach o — duty, not merely that both parties ended up with alike results.
Independent Discovery as a Law --- ul Path
Winston Research Corp. v. Minnesota Mining & M --- g. Co.
350 F.2d 134 (9th Cir. 1965)
In this historical dispute, Winston Research created a product resembling a
design by 3M. 3M alleged the --- t o --- con --- idential in --- ormation. Winston, however,
showed documentation o --- its own engineering progress that paralleled 3M’s
developments without tapping into 3M’s proprietary data. The Ninth Circuit
ruled that honest independent discovery does not constitute misappropriation.
Because Winston’s approach did not rely on secret disclosures, 3M’s claim --- ailed.
By preserving reverse engineering and independent discovery as “proper means,”
trade secret law encourages a dynamic marketplace. Businesses cannot rely on secrecy
alone i --- their product is easy to replicate once sold. Instead, they must weigh the pros
and cons: either reveal the invention --- or patent coverage or invest in robust internal
measures that deter reverse engineering. In either case, the law ensures that --- air com-
petition is not sti --- led and that cunning espionage or breach o --- con --- idence is the real
target o --- en --- orcement.
Courts o --- ten examine evidence such as lab notebooks, timelines, or internal emails
to con --- irm that the second entity truly did the work themselves rather than piggy-
backing on the original secret.
Because misappropriation depends on the de --- endant’s knowledge that it is acting
improperly — a bona --- ide second inventor who stumbles on the same method has no
6406_Oranburg_Protecting Trade Secrets_1pp.indb 27 10/16/25 9:25 PM 28 1 • Understanding Trade Secret Law
liability — this --- eature o --- trade secret law also supports the choice some businesses
make to patent their inventions i --- they --- ear easy duplication. I --- the trade secret is likely
to be discovered independently or is embedded in a publicly sold product, relying
solely on secrecy might be a gamble.
1.4.6. Balancing Ethics and Competition
Trade secret misappropriation law attempts to strike a delicate balance. On one
side, owners should be able to share con --- idential knowledge internally (or with part-
ners) without surrendering their competitive advantage. On the other, competition
demands that no single --- irm can lock down knowledge that rivals develop or discern
through legitimate methods. The line thus runs between ethical and unethical actions:
the --- t, breaches o --- contract, and secret betrayals are punished, while open research and
honest observation are allowed.
By --- ocusing on improper acquisition, use, or disclosure, courts preserve the right-
ul balance between encouraging investment in undisclosed knowledge and prevent- ing undue hindrance to independent or reverse-engineered discoveries. This ethic is deeply rooted in older cases and persists in modern statutes. Under the UTSA and the DTSA, plainti —
s must show both that they possess a valid trade secret and that the de — endant’s means or motive was wrong — ul. Where these elements coincide, the law steps in. Next, we examine the remedies available when a trade secret holder proves misap- propriation — ranging — rom injunctions to damage awards and sometimes to punitive measures — or will — ul and malicious wrongdoing. These remedies rein — orce the system by helping to restore the owner’s position, punish unscrupulous tactics, and deter others — rom similarly breaching commercial morality.
1.5. Remedies --- or Trade Secret
Misappropriation
Trade secret law delivers protection through a set o --- remedies that both deter
wrongdoing and compensate owners --- or the harm caused by misappropriation.
When a court con --- irms that a party has wrong --- ully acquired, used, or disclosed a
protected secret, it can invoke a blend o --- injunctions, damages, --- ee awards, and other
equitable measures. This section explores how these remedies operate under the
UTSA and the DTSA. It also highlights ways in which judges tailor relie --- to --- it the
acts, — rom halting production lines that rely on stolen knowledge to imposing royal- ties on — urther usage.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 28 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 29
1.5.1. Remedial Goals
The overriding purpose o --- trade secret remedies is three --- old:
1. Stop --- urther wrongdoing by enjoining ongoing or imminent
misappropriation.
2. Restore the owner’s position by awarding damages that approximate
lost pro --- its or the de --- endant’s unjust gains.
3. Deter malicious acts by allowing punitive damages and attorneys’ --- ee
awards in severe cases.
Trade secret owners need swi --- t action i --- an opposing party threatens to disseminate
or continues pro --- iting --- rom the misappropriated data. At the same time, courts seek to
avoid crippling legitimate competition. They there --- ore calibrate remedies to neutral-
ize un --- air advantages while respecting good- --- aith market activities.
1.5.2. Injunctive Relie ---
An injunction is o --- ten the most urgent --- orm o --- relie --- because trade secrets lose
value quickly once exposed. Preliminary injunctions stop de --- endants --- rom exploiting
or disclosing a secret while litigation un --- olds. A court may later enter a permanent
injunction i --- it --- inds liability proven at trial.
Under both the UTSA and the DTSA, plainti ---
s can request to enjoin “actual or threatened misappropriation.” This language enables courts to intervene even without proo — that the de — endant has already disclosed or used the secret, provided there is a serious risk they soon will.
1.5.2.1. Preliminary Injunctions
A preliminary injunction usually requires the plainti ---
to show (1) a likelihood o — success on the merits, (2) irreparable harm i — not granted, (3) that the balance o —
hardships --- avors the plainti ---
, and (4) alignment with the public interest. Trade secret claimants o — ten meet the irreparable harm standard by demonstrating that once the secret is out, no monetary sum can — ully restore exclusivity.
Preliminary Injunction to Prevent
“Inevitable Disclosure”
Bimbo Bakeries USA, Inc. v. Botticella
613 F.3d 102 (3d Cir. 2010)
A high-level baking executive had intimate knowledge o --- Bimbo’s secret
recipes. He accepted employment with a direct competitor, but the court rec-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 29 10/16/25 9:25 PM 30 1 • Understanding Trade Secret Law
ognized a risk that he could “inevitably” disclose key data in his new role. The
Third Circuit upheld a preliminary injunction blocking him --- rom starting the
new job. This outcome underscores how courts can step in even be --- ore disclo-
sure occurs, provided the --- acts suggest a genuine threat o --- misuse.
A preliminary injunction grants the plainti ---
valuable breathing room. It ensures that the de — endant cannot commercialize or — urther spread the secret, which might otherwise undermine the entire reason — or litigating. I — the de — endant has begun pro- duction, the injunction may — reeze operations, impose a special monitor, or require immediate return o — con — idential — iles.
1.5.2.2. Permanent and Tailored Injunctions
I --- the plainti ---
establishes liability at trial, a permanent injunction may issue to pro- hibit continued misappropriation. However, courts sometimes must balance — airness. A de — endant who merged the misappropriated knowledge into a complex product might not be able to “unlearn” it. Judges occasionally cra — t “head start” injunctions, preventing usage — or the period it would have taken the de — endant to develop the secret law — ully.
Permanent Injunction to Prevent
Further Misappropriation
American Can Co. v. Mansukhani
742 F.2d 314 (7th Cir. 1984)
In this landmark case, American Can Company brought suit against its
ormer executive, Mansukhani, — or misappropriating proprietary ink — ormu- las and using them to manu — acture competing products. The court — ound that Mansukhani had violated his duty o — con — identiality by exploiting the secret
ormulas to gain a competitive advantage. As a remedy, the court granted a permanent injunction that barred Mansukhani — rom using or disclosing the stolen — ormulas in any — urther business activities. The decision underscored the critical role o — injunctive relie — in trade secret cases, emphasizing that once con — idential in — ormation is misappropriated, preventing — urther use is essential to protect the owner’s market position and sa — eguard its investment in secrecy.
In exceptional circumstances, the UTSA permits courts to trans --- orm a strict ban
into a reasonable royalty arrangement — particularly where en --- orcing a complete pro-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 30 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 31
hibition might in --- lict disproportionate hardship. This approach recognizes that some
projects, once deeply dependent on the stolen secret, cannot be easily dismantled. The
de --- endant must pay ongoing royalties instead, e ---
ectively licensing what they wrong-
ully obtained but at a court-imposed rate rather than a negotiated one.
1.5.3. Damages: Lost Pro --- its, Unjust Enrichment,
and Royalties
In addition to — or instead o --- — an injunction, owners can seek damages --- or the
economic harm misappropriation caused. Courts applying the UTSA or the DTSA
generally allow three primary calculations: (1) actual loss, (2) unjust enrichment, or
(3) a reasonable royalty. Courts may adopt any measure that best captures the harm
or ill-gotten gains.
1.5.3.1 Actual Loss
Actual loss --- ocuses on how the plainti ---
’s own business su —
ered. I — the de — endant used the secret to undercut prices, the owner may present sales or pro — it records showing that but — or the misappropriation, it would have captured more revenue. Calculating such damages o — ten demands expert analysis and modeling o — what the owner’s position would have been without the wrong — ul conduct. Another angle is the cost o — extra R&D or marketing needed to recover — rom the competitor’s sudden leap — orward.
Award o --- Damages Re --- lecting
Actual Loss
Bianco v. Globus Med., Inc.
30 F. Supp. 3d 565 (E.D. Tex. 2014)
In this case, Dr. Bianco brought suit against Globus Medical, Inc., --- or mis-
appropriation o --- his con --- idential spinal implant design. The jury --- ound that
Globus wrong --- ully used Bianco’s proprietary design, which had been devel-
oped and maintained as a trade secret, to produce comparable spinal implants
without authorization or proper compensation. The court awarded over $4.2
million in damages, an amount re --- lecting the actual economic harm su ---
ered by Bianco due to lost pro — its and the competitive advantage that was eroded by the unauthorized use. This award underscored that misappropriation not only disrupts the market position o — the trade secret owner but also results in measurable — inancial losses that must be remedied.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 31 10/16/25 9:25 PM 32 1 • Understanding Trade Secret Law
However, actual loss can be challenging to prove i --- the plainti ---
’s revenue drop stems — rom multiple market — actors or i — the timeline — or the competitor’s product launch is uncertain. De — endants typically argue that their success or the plainti —
’s slump was due to external market conditions, not the stolen data.
1.5.3.2. Unjust Enrichment
Where the de --- endant’s actions yield measurable pro --- its, courts may award those
gains as damages. This avoids letting a misappropriator retain bene --- its --- rom cheating.
The logic is that i --- the de --- endant saved R&D time or otherwise reaped wind --- all rev-
enue, that advantage should revert to the right --- ul owner. Plainti ---
s might show that the de — endant slashed development costs or reached customers — aster, thereby securing pro — its it could not have earned but — or the secret.
Money Damages --- or Unjust Enrichment
3M v. Pribyl
259 F.3d 587 (7th Cir. 2001)
In this case, ex-employees used 3M’s specialized manuals and manu --- ac-
turing know-how to start a competitor business. The court a ---
irmed that the de — endant’s swi — t market entry and pro — it signaled unjust enrichment — rom the secret knowledge. 3M’s internal procedures, though partly known in the indus- try, gained protectable status — rom their unique combination, and damages re — lected the competitor’s wind — all.
This measure can overlap with actual loss, but sometimes one measure is easier to
demonstrate. I --- the de --- endant’s product soared in sales while the plainti ---
’s market share held steady, actual loss might appear minimal, yet the de — endant’s enrichment is substantial. Courts can pick whichever approach ensures equitable relie — .
1.5.3.3. Reasonable Royalty
Courts sometimes turn to a “reasonable royalty” measure — essentially, imagining
a hypothetical negotiation between the owner and the misappropriator --- or licensed
use o --- the secret. This approach is use --- ul when actual loss or unjust enrichment is
too speculative or cannot be --- ully proven. However, the royalty must be supported
by evidence, not mere speculation. The judge or jury must base the estimate on rele-
vant --- acts — such as comparable licenses, expert testimony, or market conditions — to
determine what --- ee the de --- endant would likely have paid i --- it had acted law --- ully.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 32 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 33
Reasonable Royalty Award --- or
Misappropriation
Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
226 Cal. App. 4th 26 (2014)
In this case, Altavion, a small technology company specializing in digi-
tal stamping methods, brought suit a --- ter Konica Minolta Systems Labora-
tory secretly --- iled patent applications covering Altavion’s con --- idential digital
stamping technology. Although Altavion had not patented its technology, it
had disclosed detailed in --- ormation under a nondisclosure agreement, thereby
establishing that its methods had substantial economic value derived --- rom
their secrecy. The court rejected Konica Minolta’s argument that con --- idential
in --- ormation could not yield a royalty-based award, and it instead calculated
damages using a reasonable royalty --- ramework. This approach involved a
hypothetical negotiation to determine what Konica Minolta would have paid
or a license to legally use Altavion’s technology. The award underscored that even unpatented, economically valuable con — idential in — ormation merits com- pensation when misappropriated, thereby rein — orcing the principle that a trade secret’s value is intrinsically linked to its restricted availability.
A royalty measure can apply where the de --- endant’s product only partially relies on
the secret, or where the product has not yet hit the market but the the --- t is established.
It also suits cases where equitable relie --- alone does not su ---
ice and the court wants to ensure the plainti —
is compensated — or any advantage the de — endant retains.
1.5.4. Enhanced Damages and Attorneys’ Fees
For egregious, will --- ul behavior, both the UTSA and the DTSA permit punitive or
exemplary damages, o --- ten capped at double the compensatory sum. I --- a court --- inds
that the de --- endant acted maliciously or engaged in knowing conspiracy, such height-
ened awards punish wrongdoing and discourage --- uture acts.
Punitive Damages --- or Deliberate Conspiracy
Cognis Corp. v. Chemcentral Corp.
430 F. Supp. 2d 806 (N.D. Ill. 2006)
In a scenario where employees conspired to pass a chemical --- ormula to a
competitor, the court concluded that their systematic cover-up and re --- usal
6406_Oranburg_Protecting Trade Secrets_1pp.indb 33 10/16/25 9:25 PM 34 1 • Understanding Trade Secret Law
to cease exploitation warranted exemplary damages. Such an award signaled
that trade secret the --- t accompanied by subter --- uge goes beyond compensatory
remedies.
Attorneys’ --- ees may also shi --- t in certain contexts. Will --- ul and malicious misap-
propriation is a common trigger, though some courts award --- ees i --- a de --- endant raises
meritless de --- enses or i --- the plainti ---
’s claim proves — rivolous. These cost-shi — ting tools re — lect the law’s equitable origins and ensure that truly bad- — aith tactics — on either side — do not escape unscathed.
1.5.5. Additional Equitable Remedies
Not every case o --- misappropriation --- its neatly into a standard remedy like damages
or a blanket injunction. Sometimes, courts must cra --- t creative or --- lexible equitable
relie --- to --- it the nuances o --- the wrongdoing and the harm. These “additional equitable
remedies” respond to the challenges o --- unwinding entangled uses o --- secret in --- or-
mation, mitigating reputational damage, or restoring a semblance o --- pre-disclosure
secrecy. The goal is to eliminate any lingering un --- air advantage gained through mis-
appropriation, even when monetary compensation or basic injunctive orders --- all
short.
One example arises when a de --- endant has built a new technology, process, or
business model that is inseparably based on misappropriated in --- ormation. In such
situations, courts may impose what is called a production injunction — not merely
barring --- urther use o --- a secret but also blocking the de --- endant --- rom manu --- acturing
or selling any resulting products derived --- rom it. These injunctions are designed
to prevent misappropriators --- rom enjoying the --- ruits o --- their misconduct, even i ---
they have since made technical modi --- ications. I --- the core advantage remains rooted
in stolen knowledge, the court may treat any downstream product as tainted and
o ---
-limits.
Injunction to Neutralize an Un --- air Head Start
General Electric Co. v. Sung
843 F. Supp. 776 (D. Mass. 1994)
GE sued its --- ormer employee, Dr. Chien-Min Sung, who took propri-
etary diamond-manu --- acturing documents and trans --- erred the technology
to Iljin Diamond Manu --- acturing. The court --- ound that Iljin’s entire indus-
trial process --- or saw-grade diamonds was “substantially derived” --- rom GE’s
6406_Oranburg_Protecting Trade Secrets_1pp.indb 34 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 35
con --- idential documents. Recognizing that a simple use injunction would not
su ---
ice — because Iljin could not realistically “unlearn” the trade secrets — the court imposed a seven-year production injunction. This barred Iljin — rom man- u — acturing the product itsel — during the estimated time it would have taken to independently develop the technology. The ruling rein — orced that when a secret is tightly woven into a product’s core, courts may go beyond use-based restrictions and — reeze commercial activity altogether to neutralize the misap- propriator’s advantage.
Other cases may call --- or even broader structural or organizational remedies. For
instance, courts have ordered internal audits, the appointment o --- monitors, destruc-
tion o --- contaminated code, or even the trans --- er o --- licensing rights back to the victim.
These --- orms o --- relie --- are typically tailored to ensure the de --- endant cannot continue
bene --- iting --- rom any knowledge improperly gained, even i --- it was only used in part.
Mandating Code Destruction to Remedy
Misappropriation
Syntel Sterling Best Shores Ltd. v. Trizetto Group, Inc.
68 F.4th 792 (2d Cir. 2023)
In this recent case, Syntel was --- ound to have deliberately misappropriated
Trizetto’s con --- idential so --- tware architecture and code during the course o --- a
ailed outsourcing relationship. The jury awarded damages, but the court went
urther. It ordered the destruction o — Syntel’s in — ringing code and enjoined Syn- tel — rom using or disclosing any o — Trizetto’s trade secrets, including in deriva- tive products or services. This remedy recognized that once trade secrets in — ect a rival’s development process, the only way to restore — airness may be to purge all resulting outputs. By combining permanent injunction with mandatory deletion o — source materials, the court signaled that equitable relie — can directly address the structural damage caused by trade secret the — t.
These cases exempli --- y a broader truth: courts have wide discretion in cra --- ting
remedies that ensure --- airness and restore competitive balance. When a de --- en-
dant’s entire operation or product line becomes tainted by stolen secrets, monetary
damages may be inadequate or di ---
icult to measure. Equitable tools — production bans, code destruction, licensing trans — ers, monitoring, and even dissolution o —
partnerships — o ---
er the — lexibility needed to unwind misuse and neutralize the mis- appropriator’s edge.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 35 10/16/25 9:25 PM 36 1 • Understanding Trade Secret Law
Additional equitable remedies also highlight how seriously courts take the duty o ---
secrecy. These rulings rein --- orce that misuse o --- con --- idential in --- ormation is not a mere
contract breach or commercial inconvenience. It is a breach o --- trust that can reshape
entire industries, and courts stand ready to issue sweeping and lasting orders to rebal-
ance the playing --- ield.
1.5.6. The Importance o --- Prompt Action
and Thorough Evidence
A trade secret owner may possess strong legal rights, but en --- orcement depends
heavily on timing and preparation. Courts do not automatically protect trade secrets.
They reward vigilance. Plainti ---
s who act quickly and substantiate their claims with detailed records are — ar more likely to secure strong remedies. By contrast, delay or disorganization can render even the most valuable trade secrets unprotectable in practice. When a company discovers possible misappropriation, time is o — the essence. A trade secret that has not yet been used or disclosed may still be contained. But i — a plainti —
hesitates, the knowledge may spread, be embedded into a rival product, or even reach the public domain. At that point, the core requirement o — secrecy can be irreversibly lost. Courts recognize this danger, which is why they o — ten issue prelimi- nary injunctions when the plainti —
shows immediate and irreparable harm. But they will only act swi — tly i — the plainti —
does.
Prompt Action Leads to Injunction Granted
IBM v. Papermaster
No. 08-CV-9078 (S.D.N.Y. 2008)
IBM moved quickly to enjoin its --- ormer executive, Mark Papermaster, --- rom
joining Apple, arguing that the risk o --- trade secret disclosure was imminent.
Although Papermaster had not yet revealed any con --- idential in --- ormation, IBM
convinced the court that his deep knowledge o --- its microprocessor technol-
ogy — and the similarity o --- his role at Apple — posed a serious threat. The court
granted a preliminary injunction, noting that IBM had acted promptly and
supported its claim with clear evidence o --- both the con --- idential nature o --- the
in --- ormation and the competitive risk. This case exempli --- ies how timeliness
strengthens a plainti ---
’s credibility and allows courts to intervene be — ore the damage is done.
Equally important is the ability to clearly de --- ine the trade secret and demonstrate
the measures taken to protect it. Courts do not accept vague re --- erences to “pro-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 36 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 37
prietary knowledge” or “con --- idential methods.” They require speci --- icity — what the
secret is, how it was secured, and how its disclosure or use caused harm. Plainti ---
s must show that the secret was treated as such: labeled con — idential, shared only under nondisclosure agreements, and protected through physical, digital, or procedural barriers.
Failure to Identi --- y the Secret Leads
to Dismissal
Comprehensive Technologies Int’l, Inc. v. So --- tware Artisans, Inc.
3 F.3d 730 (4th Cir. 1993)
In this case, the plainti ---
accused — ormer employees o — misappropriat- ing trade secrets to develop a rival so — tware product. But the Fourth Circuit a —
irmed dismissal o — the claim, — inding that the plainti —
had — ailed to identi — y the speci — ic trade secrets with su —
icient detail. Moreover, the plainti —
did not o —
er credible evidence o — e —
orts to maintain secrecy, such as access controls or written con — identiality policies. The court emphasized that general allegations o — proprietary knowledge are not enough — plainti —
s must show exactly what was stolen and how it was protected. The ruling rein — orces that without clear documentation, even genuine secrets may be unprotectable in court.
Injunctions and damages are not awarded based on moral indignation alone. They
depend on the plainti ---
’s own diligence. Courts ask: Did the company take secrecy seriously be — ore the misappropriation occurred? Did it monitor access, en — orce poli- cies, and — ollow up on violations? These background — acts shape the court’s perception o — whether the trade secret was real and worth protecting.
Culture o --- Secrecy Supports En --- orcement
o --- Trade Secret Rights
Data General Corp. v. Digital Computer Controls, Inc.
357 A.2d 105 (Del. Ch. 1975)
Data General alleged that a competitor had acquired con --- idential engineer-
ing drawings through --- ormer employees. The court credited Data General’s
consistent en --- orcement o --- con --- identiality practices: it marked documents
as proprietary, used employee agreements with nondisclosure clauses, and
limited internal access on a need-to-know basis. Because the company demon-
strated a longstanding commitment to secrecy, the court --- ound that the draw-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 37 10/16/25 9:25 PM 38 1 • Understanding Trade Secret Law
ings quali --- ied as trade secrets. This case shows that courts look not only at the
misappropriation but also at the plainti ---
’s prior behavior in sa — eguarding its in — ormation.
Taken together, these decisions illustrate a simple but power --- ul lesson: a trade
secret is only as strong as the company’s willingness to treat it as one. Courts will
intervene to protect secrecy, but only when plainti ---
s can prove (1) that they acted promptly upon discovering a threat and (2) that they consistently treated the in — orma- tion as con — idential. The best way to prepare — or litigation is not a — ter a breach but well be — ore it, by building a record o — reasonable, diligent, and consistent secrecy practices.
1.5.7. Power --- ul and Nuanced Relie ---
Remedies represent the mechanism by which trade secret law de --- ends con --- identi-
ality. They balance the need --- or prompt, o --- ten drastic measures — like halting produc-
tion lines or awarding signi --- icant damages — against the principle that competition
should remain --- ree --- or independent or reverse-engineering innovators. Hence, a
plainti ---
who proves wrong — ul acquisition, use, or disclosure can expect an array o —
tools: immediate injunctions, monetary relie --- pegged to losses or ill-gotten gains,
attorneys’ --- ees i --- malice is evident, and possibly an ongoing royalty arrangement i ---
banning usage entirely seems inequitable.
These outcomes show that trade secret protection can be power --- ul --- or a business
that invests in properly designating and securing its knowledge. Yet the law does not
automatically reward lax secrecy or block legitimate discovery methods. By under-
standing these remedial principles, owners can gauge the practical bene --- its and limits
o --- trade secrets as an intellectual property strategy, while potential de --- endants can
see how high the stakes are i --- they encroach on proprietary data through unethical or
unauthorized methods.
1.6. International Comparisons
The US approach to trade secrets, exempli --- ied by the UTSA and the --- ederal DTSA,
has shaped modern discourse on protecting undisclosed commercial knowledge.
However, American courts and laws do not operate in a vacuum. As companies
increasingly --- unction across borders, they must consider how other jurisdictions
de --- ine and en --- orce trade secrets. While many legal systems share core ideas — requir-
ing secrecy, economic value, and e ---
orts to protect it — they sometimes di —
er signi — i- cantly in scope, procedural mechanisms, or available remedies. This section examines the UTSA and the DTSA alongside international — rameworks: the Agreement on
6406_Oranburg_Protecting Trade Secrets_1pp.indb 38 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 39
Trade-Related Aspects o --- Intellectual Property Rights (TRIPS), the European Union’s
Trade Secrets Directive, and prominent regimes in China, Canada, Mexico, and Israel.
1.6.1. TRIPS: A Global Baseline --- or
Trade Secret Protections
The World Trade Organization’s Agreement on Trade-Related Aspects o --- Intel-
lectual Property Rights (TRIPS) lays the --- oundation --- or how member countries treat
undisclosed in --- ormation. Article 39 o --- TRIPS insists that member states must protect
commercially valuable secrets against un --- air competition, echoing the general prem-
ise o --- American trade secret law. TRIPS does not prescribe a detailed procedural code
but sets out certain minimum requirements. It calls --- or preventing in --- ormation --- rom
being disclosed, acquired, or used by third parties “in a manner contrary to honest
commercial practices,” especially when that data is valuable and subject to reasonable
steps to remain con --- idential.
This high-level alignment with the UTSA and the DTSA underscores the broad
global consensus on punishing industrial espionage, deception, or breaches o --- trust.
Still, each WTO member retains --- lexibility in how it translates TRIPS obligations into
domestic statutes. En --- orcement provisions, damage calculations, and injunctive relie ---
vary widely. Some countries accord trade secret disputes specialized treatment in spe-
cialized courts, while others handle them under more general civil or commercial
codes. As long as they uphold the basic TRIPS principles o --- protecting undisclosed
knowledge, states satis --- y their treaty obligations.
The result is a baseline that resembles American doctrine, even though the details
can diverge. A --- irm that experiences misappropriation abroad cannot directly invoke
TRIPS against a --- oreign actor. Instead, en --- orcement o --- TRIPS obligations occurs
through the WTO’s Dispute Settlement Body and must be initiated by a member
state, not a private party. As a result, companies o --- ten depend on their home govern-
ments to press trade secret concerns through diplomatic or trade channels rather than
direct legal action. In practice, this means that the e ---
ectiveness o — TRIPS o — ten turns on local procedural norms, national implementation, and the political will to en — orce. Nonetheless, TRIPS serves as a crucial benchmark: it establishes minimum stan- dards and re — lects international consensus that unethical methods o — extracting con-
idential know-how should be penalized. In many cases, stronger protections arise through TRIPS-plus provisions negotiated in bilateral or regional trade agreements, which go beyond the baseline obligations o — TRIPS. The United States, in partic ular, has used trade leverage — including Section 301 investigations and bilateral agreements — to encourage stricter en — orcement o — trade secret norms. At the same time, the Doha Declaration and related debates highlight ongoing tensions between intellectual property en — orcement and access to knowledge, particularly in — ields like health and technology.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 39 10/16/25 9:25 PM 40 1 • Understanding Trade Secret Law
1.6.2. The European Union Trade Secrets
Directive
Historically, EU member states had varied approaches to trade secret en --- orcement.
Some, such as Germany, possessed robust protections, while others relied on less-
de --- ined un --- air competition principles. In 2016, the EU approved the Trade Secrets
Directive (Directive 2016/943) to harmonize these di ---
erences and ensure consistent standards. The Directive de — ines a trade secret similarly to the UTSA and the DTSA,
ocusing on secrecy, commercial value, and reasonable measures — or protection. It also lists speci — ic acts o — unlaw — ul acquisition, use, or disclosure, mirroring the “mis- appropriation” language — ound in American statutes. The EU Directive instructs member states to ensure that courts can grant injunc- tions, damage awards, and orders to preserve con — identiality during litigation. By emphasizing that owners must prove actual or potential economic value — rom secrecy, the Directive aligns closely with American doctrines. Yet procedural aspects still vary
rom one member state to another. The Directive sets minimum requirements, but the actual en — orcement environment can re — lect local judicial practices. In certain EU countries, the courts might provide swi — ter preliminary injunctions, while in others, the threshold — or proving irreparable harm may be higher or the measure o — damages more conservative. Another distinctive — actor is that EU law generally upholds employee mobility and requires balancing the interests o — workers and employers. Courts aim to protect trade secrets while allowing workers to change jobs — reely. They also work to prevent employees — rom acting disloyally or misusing con — idential in — ormation. This balance is important because it sa — eguards business interests while respecting employee rights to career mobility. Like the DTSA, the EU — ramework invalidates nondisclosure obligations i — the knowledge has become generally known or can be deduced through — air means. How- ever, divergences in civil procedure, evidentiary rules, and local cultural attitudes about competition can subtly shape outcomes. For international businesses operat- ing in multiple EU jurisdictions, it remains vital to monitor local court trends and national statutes that implement the Directive in nuanced ways.
1.6.3. China: Evolving En --- orcement Under
Anti-Un --- air Competition Law
China’s stance toward trade secret law has evolved dramatically. It was once per-
ceived as a high-risk environment --- or --- oreign companies, given the country’s lax
en --- orcement and the di ---
iculties in gathering evidence o — misappropriation. But amendments to the Anti-Un — air Competition Law and complementary regulations over the past decade have strengthened legal recourse — or trade secret owners. Chi-
6406_Oranburg_Protecting Trade Secrets_1pp.indb 40 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 41
nese courts are now more willing to grant civil or even criminal remedies, especially
or large-scale the — t or conspiratorial behavior. These re — orms align Chinese doctrine more closely with UTSA and DTSA princi ples. Chinese law requires that the in — ormation be unknown to the public, con — er commercial value because o — that secrecy, and be guarded by appropriate measures. Employees, contractors, and business partners bear a duty to uphold con — identiality obligations. I — they commit — raud, the — t, or inducement to obtain the secret, courts can issue injunctions and award damages. En — orcement challenges persist in areas such as evidence gathering. Plainti —
s may struggle to prove misappropriation without robust discovery procedures. Still, recent cases demonstrate that high-pro — ile disputes — particularly those involving sensi- tive technology or major — oreign investment — can result in signi — icant judgments or criminal charges. Foreign — irms o — ten buttress their trade secret posture in China by combining strict internal controls with local partnerships that mitigate risk. They also sometimes keep key aspects o — secret processes outside the country. Such strategies do not guarantee immunity — rom the — t, but they re — lect an awareness that Chinese law, while improved, may not always respond in the same manner as American courts. Yet as China’s commercial ambitions continue to grow, trade secret en — orcement remains a crucial and intensi — ying — ield o — legal re — orm.
1.6.4. Canada: Blend o --- Statutory and
Common Law Principles
Canada’s provincial legal --- rameworks generally parallel the American approach.
Although there is no single nationwide statute mirroring the UTSA, Canadian courts
rely on common law rules against breaches o --- con --- idence, plus various provincial
legislation targeting un --- air competition. A plainti ---
must show that the in — ormation was secret, was valuable because o — secrecy, and was shared in an environment imply- ing con — identiality. Wrong — ul acquisition or disclosure will then give rise to potential injunctions and monetary remedies. Canadian courts o — ten cite English case law in addition to looking to American precedent. They share the general principles that legitimate reverse engineering is per- missible and that employee mobility should not be unreasonably constrained. Some provinces have rules reminiscent o — the UTSA in style, i — not in codi — ied detail. Damages can be calculated through lost pro — its or unjust enrichment, but large punitive awards are less common than in the United States. Canada also recognizes that some nondis- closure obligations can overlap with noncompetition or non-solicitation clauses, and those must not exceed the reasonable scope needed to protect genuine secrets. Because Canada is a party to the USMCA ( — ormerly NAFTA), cross-border — irms dealing with trade secrets may — ind streamlined en — orcement under certain circum- stances. They remain mind — ul, however, that provincial di —
erences exist, especially in
6406_Oranburg_Protecting Trade Secrets_1pp.indb 41 10/16/25 9:25 PM 42 1 • Understanding Trade Secret Law
Quebec’s civil law system, which takes guidance --- rom French legal traditions. Gener-
ally, i --- a company care --- ully demonstrates secrecy and invests in appropriate protective
measures, Canadian courts can be counted on to uphold the essence o --- the UTSA/
DTSA approach.
1.6.5. Mexico: Recent Re --- orms and Distinct
Procedural Hurdles
Mexico’s Federal Law --- or the Protection o --- Industrial Property, which replaced
earlier legislation, governs trade secrets alongside patents, trademarks, and other
IP rights. The law de --- ines a trade secret as in --- ormation kept con --- idential by reason-
able means, possessing real or potential economic value, and not generally known.
In that sense, it overlaps signi --- icantly with UTSA/DTSA standards. Unauthorized
acquisition through deceit, breach o --- contract, or other disloyal acts is considered an
in --- ringement, and the law provides --- or injunctions and damages.
Despite this similarity on paper, en --- orcement in Mexico can involve unique pro-
cedural challenges. Civil litigation may progress slowly, and collecting evidence o ---
misappropriation is not always straight --- orward. Some cases also can shi --- t into crimi-
nal domains i --- the the --- t is grave, but that route entails higher burdens o --- proo --- . Trade
secrets intersect with Mexico’s broader competition policies, meaning that certain
NDAs must not be dra --- ted so broadly that they become anticompetitive or in --- ringe
labor rights.
Many international companies that enter Mexico adopt parallel measures: they
create robust internal compliance (requiring NDAs and limiting disclosure), keep
certain key processes abroad, and closely monitor potential local partners or subcon-
tractors. Although Mexico’s statutory language mirrors that o --- more mature systems,
the reality can vary --- rom region to region. Nevertheless, Mexico’s e ---
orts to modernize its IP and trade secret laws under the USMCA — ramework continue to reduce discrep- ancies with US practice, o —
ering more reliable protection — or — oreign and domestic businesses alike.
1.6.6. Israel: Balancing Innovation with
Con --- identiality Obligations
Israel’s trade secret regime draws largely --- rom the Commercial Torts Law o --- 1999,
buttressed by case law that resembles common law un --- air competition doctrines. The
statutory --- ramework bars the use or disclosure o --- a trade secret without the owner’s
consent i --- it was obtained in bad --- aith, through breach o --- con --- idence, or by other
unethical means. Israeli courts also embrace the notion that genuine secrecy must
exist and must be guarded actively by the owner. I --- a secret becomes publicly available,
or i --- a competitor discovers it independently, protection dissolves.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 42 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 43
In addition, Israeli courts can impose injunctions and grant damages. They
emphasize the signi --- icance o --- employee mobility and the public interest in --- ostering
entrepreneurship, so they tend to con --- irm that only “truly secret” processes deserve
sweeping NDAs or post-employment restrictive covenants. This stance aligns with
that o --- many EU countries, where an employer’s interest in secrecy must be balanced
against a pro --- essional’s --- reedom to use their general skills.
En --- orcement in Israel can be quite proactive --- or technology-based businesses,
given the country’s status as a leading tech innovator. Organizations that demon-
strate thorough internal controls and make immediate responses to suspected leaks
typically --- ind the courts to be supportive. On the other hand, i --- a --- irm attempts
to rely on trade secret rhetoric without consistent security measures or it tries to
sti --- le normal employee transitions, the judicial response will be measured. Overall,
Israel’s system incorporates core UTSA/DTSA elements — secrecy, value, and wrong-
doing — while sustaining a policy backdrop that encourages open innovation under
controlled conditions.
1.6.7. Convergence and Divergence in
Global Trade Secret Regimes
International legal regimes have largely converged on the substantive de --- initions
o --- a “trade secret” and its “misappropriation.” But rights and responsibilities that --- low
rom that de — inition diverge signi — icantly The UTSA (promulgated in 1979 and amended in 1985), the DTSA (enacted May 11, 2016), the World Trade Organization’s Agreement on Trade-Related Aspects on Intellectual Property (entered on Jan. 1, 1995), the EU Trade Secrets Directive (adopted on June 8, 2016), China’s anti-un — air competition law re — orms (2018/19), Israel’s Commercial Torts Law (1999), the Canada–United States–Mexico Agreement Implementation Act (entered on July 1, 2020), and Mexico’s Federal Law — or the Pro- tection o — Industrial Property (entered on Nov. 5, 2020) have all nudged global prac- tices toward broadly similar criteria: A trade secret is in — ormation that remains con — idential, holds commercial value speci — ically because o — that secrecy, and is actively protected by its owner. Acquiring or using the knowledge through deception or breach o — con — idence triggers liability. Nevertheless, important di —
erences persist in procedural rules, discovery pow- ers, and cultural attitudes toward competition. While American courts can award expansive damages or punitive relie — , some other systems limit recoveries or treat litigation as less adversarial. In certain jurisdictions, it may be harder to secure a swi — t injunction or to gather the evidence needed to prove misappropriation. Where US law might promptly issue a preliminary injunction to maintain the status quo,
oreign courts may require a more stringent standard o — proo — or a detailed showing o — irreparable harm.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 43 10/16/25 9:25 PM 44 1 • Understanding Trade Secret Law
Another area o --- divergence arises in how vigorously courts uphold employee mobil-
ity. In the United States, many states dis --- avor overly broad noncompetition clauses but
do en --- orce reasonable NDAs. The EU, Canada, Israel, and other jurisdictions similarly
respect employees’ --- reedom to move between jobs, yet they o --- ten scrutinize con --- identi-
ality agreements to ensure they do not hamper legitimate transitions. China’s approach
remains --- luid, balancing a growing recognition o --- trade secret rights against the reality
o --- robust local competition. The bottom line is that while the UTSA and the DTSA are
not global law, their emphasis on secrecy, value, and wrongdoing --- orms an interna-
tional template that local lawmakers have borrowed and adapted.
Ultimately, companies with multinational --- ootprints must harmonize their secrecy
strategies. They must implement consistent internal controls, --- rom NDAs to seg-
mented access to sensitive data, to ensure compliance with both American --- rame-
works and --- oreign statutes. By treating secrecy as a global discipline — limiting who
sees the in --- ormation, training employees in multiple jurisdictions, and quickly en --- orc-
ing rights when leaks emerge — owners maximize their odds o --- securing remedies in
varied legal arenas. Understanding the parallels and distinctions among trade secret
regimes around the world enables businesses to navigate cross-border challenges and
remain vigilant against misappropriation, whether in a US district court action under
the DTSA or a specialized proceeding in a --- ar- --- lung jurisdiction.
1.7 Frictions and Trade-O ---
s Trade secret law is not only about locking up knowledge; it is about steering inno- vation, labor, and competition. Courts judge “reasonable e —
orts,” but what counts as reasonable re — lects deeper policy choices about what to protect, how strongly, and against whom. As you move toward building your own Trade Secret Protection Plan (TSPP), keep an eye on — our recurring tensions that shape both legal outcomes and business practices.
1.7.1. Secrecy vs. Mobility
Employers o --- ten seek to stop departing engineers --- rom carrying know-how to
rivals. Some use NDAs, noncompetes, or “inevitable disclosure” claims to limit risk.
But states like Cali --- ornia treat post-employment mobility as a public good and pro-
hibit most noncompetes on policy grounds. Courts in mobility- --- riendly jurisdictions
will scrutinize overbroad restrictions and may deny injunctive relie --- that looks like a
restraint on ordinary career moves.
1.7.2. Con --- identiality vs. Competition
NDAs are essential — but when dra --- ted too broadly, they can suppress ordinary
commercial competition. For example, a vendor asked to sign an NDA may worry
6406_Oranburg_Protecting Trade Secrets_1pp.indb 44 10/16/25 9:25 PM 1 • Understanding Trade Secret Law 45
that it prevents --- uture work with other customers. Recent empirical studies suggest
that many NDAs now --- unction as de --- acto noncompetes, thus triggering scrutiny
under antitrust law and FTC policy. En --- orcement hinges not only on content but also
on context and proportionality.
1.7.3. Security vs. Transparency
Some trade secret claims intersect with employee obligations to report miscon-
duct, raise product-sa --- ety concerns, or alert regulators. While secrecy is critical to
commercial integrity, it must sometimes yield to whistle-blower protections and
public-interest disclosures. Courts and legislatures increasingly carve out exceptions
or “good — aith” disclosure, especially where health, sa — ety, or illegality is at stake.
1.7.4. Protection vs. Innovation
Firms must o --- ten choose between the secrecy o --- trade secret law and the disclo-
sure required --- or patent protection. This decision re --- lects a broader policy trade-o ---
between static control (holding onto exclusive rights) and dynamic spillovers (allow-
ing others to build and improve). Patent law o ---
ers time-limited monopolies with — ull disclosure; trade secrets o —
er longer potential duration, but only i — secrecy is main- tained and law — ul reverse engineering is unlikely.
1.7.5. Trade Secret Protections in the Balance
A sound TSPP guards what matters — but also aligns with the organization’s values,
competitive goals, and obligations to employees and society. As you begin Chapter 2,
you will start the process o --- identi --- ying, classi --- ying, and protecting your con --- idential
assets. That process is not just legal. It is strategic.
1.8. From Legal De --- initions
to Practical Protection
Trade secrets occupy a unique position within intellectual property law. Unlike
patents or trademarks, they are not created by --- iling paperwork or satis --- ying a --- ormal
statutory test. They exist only so long as they are actively and e ---
ectively kept secret. This — eature makes trade secret law both power — ul and — ragile. It protects some o — the most valuable assets in business — — ormulas, processes, strategies, and data — but only i — the owner treats them like secrets worth guarding. As this chapter has shown, a trade secret must meet three core criteria: it must be in — ormation, it must derive independent economic value — rom not being generally
6406_Oranburg_Protecting Trade Secrets_1pp.indb 45 10/16/25 9:25 PM 46 1 • Understanding Trade Secret Law
known or readily ascertainable, and it must be subject to reasonable e ---
orts to main- tain secrecy. Those requirements de — ine what quali — ies as a trade secret, but they also set the — oundation — or everything that — ollows. A business that does not know what its secrets are, cannot articulate why they matter, or has not built a culture o — con — iden- tiality will struggle to en — orce its rights. We have also seen that trade secret law is not passive. Remedies — whether dam- ages, injunctions, or equitable relie — — are not automatic. They require evidence, speed, and credibility. Courts respond to clear documentation, consistent en — orcement, and timely legal action. Without those things, even egregious misappropriation may go unpunished. In this way, trade secret protection is not merely a matter o — legal theory but rather a matter o — organizational discipline. This book is built on that idea. The chapters that — ollow do not assume that trade secrets can be protected with a single policy or contract. Instead, they explore what real protection requires: identi — ying your trade secrets with precision, assessing their value and risk, establishing layers o — internal and external sa — eguards, and responding e —
ectively to breaches when they occur. The law provides tools — but it is up to busi- nesses, lawyers, and courts to use them wisely. In short, trade secret protection is not something that happens in courtrooms. It happens in con — erence rooms, product labs, and shared servers. It is embedded in who has access to what, how in — ormation — lows within an organization, and how leaders set expectations — or con — identiality. What the law recognizes as a trade secret depends entirely on what the business chooses to protect and how well it does so. The rest o — this book will show how to do exactly that.
Re --- erences
Mark A. Lemley, The Surprising Virtues o --- Treating Trade Secrets as IP Rights, 61
Stan. L. Rev. 311 (2010).
Orly Lobel, Talent Wants to Be Free (Yale University Press 2013).
Amy Kapczynski, The Public History o --- Secrets, 55 U.C. Davis L. Rev. 1367 (2022).
William Landes & Richard Posner, The Economic Structure o --- Intellectual
Property Law (Belknap Press 2003).
I.P.L. Png, Secrecy and Patents: Theory and Evidence --- rom the UTSA, 2(3) Strategy
Science 176–93 (2017).
Camilla Hrdy & Christopher Seaman, Beyond Trade Secrecy: Con --- identiality Agree-
ments That Act Like Noncompetes, 133 Yale L.J. 669 (2024).
David S. Levine, Secrecy and Unaccountability: Trade Secrets in Our Public In --- ra-
structure, 59 Fla. L. Rev. 135 (2007).
Ronald Gilson, The Legal In --- rastructure o --- High Technology Industrial Districts, 74
N.Y.U. L. Rev. 575 (1999).
6406_Oranburg_Protecting Trade Secrets_1pp.indb 46 10/16/25 9:25 PM Chapter 2 Inventorying and Classi — ying Trade Secrets
You cannot hit a target you cannot perceive — and you cannot protect a trade secret
o --- which you are unaware.
Trade secret protection begins with one unshakable truth: you must know what
you are protecting. There is no such thing as a secret that protects itsel --- . The law only
helps those who help themselves — and the --- irst step is identi --- ying which pieces o ---
in --- ormation quali --- y as trade secrets in the --- irst place.
This chapter marks the beginning o --- that process. Be --- ore a company can reduce
risk, impose restrictions, or take legal action, it must --- irst recognize the assets at stake.
That means conducting a thorough inventory o --- its con --- idential knowledge — identi-
ying what secrets exist, where they reside, how they — unction, and why they matter. Inventorying is not about documentation — or its own sake. It is about clarity. A well-executed trade secret inventory allows a business to prioritize what matters most, classi — y di — — erent kinds o — secrets, and build a protection strategy tailored to its unique operations. Without it, even the best legal theories or policies will — ail. Every other chapter in this book depends on this one. Although you now under- stand what trade secrets are and how they — it into the — ramework o — intellectual prop- erty (Chapter 1), you cannot evaluate risks (Chapter 3), mitigate threats (Chapters 4 and 5), en — orce your rights (Chapter 6), or implement an organization-wide plan (Chapter 7) unless you have — irst inventoried and classi — ied your trade secrets (this Chapter 2). This step is not optional. It is the — oundation — or everything that — ollows.
2.1. Identi --- ication Is the Foundation
or Protection Trade secrets are protected only when they are identi — ied, valued, and actively guarded. Unlike patents or copyrights, trade secrets are not registered or granted by the government. They have no — ixed term and no o —
icial recognition. They exist only because someone treats them as secrets — and i — someone stops treating them that way, they disappear.
47
6406_Oranburg_Protecting Trade Secrets_1pp.indb 47 10/16/25 9:25 PM 48 2 • Inventorying and Classi — ying Trade Secrets
The --- irst step in protecting a trade secret is knowing that it exists. That’s the purpose
o --- a trade secret inventory. It gives a business a structured way to identi --- y and classi --- y
the con --- idential in --- ormation that drives its competitive edge. Without an inventory,
protection is impossible. You cannot en --- orce a right to something you never docu-
mented. You cannot prioritize sa --- eguards --- or assets you have never named.
This chapter walks through how to create that inventory. It explains how to rec-
ognize di --- --- erent kinds o --- trade secrets, how to apply the legal test --- or protection, and
how to assign priority levels based on economic importance. Along the way, it o ---
ers practical tools — or making the inventory a living part o — your business: not a static list, but an ongoing process. Trade secret protection is a system, not a — iling cabinet. That system starts here.
2.2. Identi --- ying Trade Secrets
or the Inventory You cannot protect a trade secret until you recognize that you have one. That simple insight underlies the most important task in building a Trade Secret Protection Plan: identi — ying what quali — ies as a trade secret in the — irst place. Most businesses are sur- prised by how much in — ormation quali — ies — and by how much does not. This section explains how to recognize a trade secret when you see one. It dis- tinguishes between three major categories o — secrets — technical, business, and hybrid — and shows how each can quali — y — or legal protection. These categories do not create legal rights on their own. But they help teams inventory their secrets more clearly, making it easier to apply the legal test — rom Chapter 1 and assess risk in Chapter 3. E —
ective identi — ication is not about reciting doctrine. It is about learning to look at your own operations — products, processes, strategies, and data — and recognizing which parts give you an edge. Many o — those edges exist only because others do not know how you do what you do. Once you see your business through that lens, you can begin identi — ying what needs protection.
2.2.1. Technical Trade Secrets
Technical trade secrets are o --- ten the easiest to recognize. They include product
ormulas, manu — acturing processes, engineering designs, source code, algorithms, and scienti — ic methods. I — the in — ormation is used to build, create, test, or operate a product or service and is not generally known, it may be a technical trade secret.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 48 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 49
These secrets usually reside with engineers, developers, or scientists — but not
always. A sales team’s proprietary scoring model or an IT department’s internal cyber-
security architecture might also quali --- y. What matters is that the knowledge is techni-
cal in nature and used to accomplish a speci --- ic --- unctional task.
To quali --- y as a trade secret, a technical process must be su ---
iciently detailed to be replicated. Courts do not protect vague ideas like “make the so — tware run — aster” or “improve product quality.” The process must be de — ined with enough speci — icity that, i — stolen, it could be used by a competitor to replicate the bene — it.
So --- tware Algorithms Can Be Trade Secrets
ClearOne Communications, Inc. v. Bowers
643 F.3d 735 (10th Cir. 2011)
ClearOne developed proprietary echo cancellation so --- tware --- or use in its
audio con --- erencing systems. When a competitor acquired the so --- tware through
a third party and integrated it into its own products, ClearOne sued --- or misap-
propriation. The court upheld an injunction, --- inding that ClearOne’s under
lying algorithms were protectable technical trade secrets. This case rein --- orces
that advanced so --- tware logic, even i --- not patented, can receive trade secret pro-
tection i --- kept con --- idential and technically detailed.
2.2.2. Business Trade Secrets
Business trade secrets are equally important, though sometimes less obvious. They
include customer lists, pricing strategies, supplier terms, marketing tactics, sales
orecasts, and operational methods. Unlike technical secrets, business secrets are not about how to build a product — they are about how to sell it, manage it, or gain a market advantage. Business secrets o — ten live in spreadsheets, databases, and employee knowledge. They are especially vulnerable when employees leave to join a competitor or start a new business. A well-maintained CRM system, i — protected by con — identiality agree- ments and limited access, can be one o — the most valuable trade secrets a company owns. The key question is whether the in — ormation is more than general business experi- ence. Courts distinguish between an employee’s general knowledge (which is portable) and the employer’s con — idential methods (which are protectable). I — the in — ormation gives the business a competitive edge and is not available to others without e —
ort, it may quali — y as a trade secret.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 49 10/16/25 9:25 PM 50 2 • Inventorying and Classi — ying Trade Secrets
Customer Lists and Pricing In --- ormation
Can Be Trade Secrets
Che --- s Diet Acquisition Corp. v. Lean Che --- s, LLC
2016 U.S. Dist. LEXIS 133299 (S.D.N.Y. 2016)
Former executives o --- Che --- s Diet launched a competing company, using cus-
tomer lists, proprietary recipes, and pricing data taken --- rom their previous
employer. The court allowed trade secret claims to proceed, --- inding that such
business-side data — when actively protected — could quali --- y --- or legal protec-
tion. This case shows that customer and pricing in --- ormation is not just admin-
istrative detail; it can be a core asset i --- treated as a secret.
2.2.3. Hybrid Trade Secrets
Some trade secrets blur the line between technical and business. These hybrid
secrets combine engineering or scienti --- ic content with strategic, --- inancial, or opera-
tional components. For example, a so --- tware tool that calculates optimal pricing based
on real-time data inputs involves both technical algorithms and business decision-
making. Neither part alone may be groundbreaking, but together they can produce a
high-value system.
Hybrid trade secrets are increasingly common in data-driven businesses. A predic-
tive analytics plat --- orm might use con --- idential client data and a proprietary algorithm.
A marketing campaign might rely on a custom-built segmentation model and an
internal dataset. These are not purely technical or purely strategic — they are both.
What makes hybrid trade secrets power --- ul is the way they integrate multiple types
o --- knowledge into a cohesive advantage. Courts have recognized this --- usion as pro-
tectable when the individual components are con --- idential and the combined system
delivers unique value.
Hybrid Business-Technical In --- ormation Can
Be Trade Secrets
ClearOne Advantage, LLC v. Kersen
2024 U.S. Dist. LEXIS 205636 (D. Md. 2024)
ClearOne sued a --- ormer employee who allegedly stole client-targeting
algorithms used to optimize digital marketing campaigns. The algorithms
combined technical logic with behavioral and --- inancial data, making them
6406_Oranburg_Protecting Trade Secrets_1pp.indb 50 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 51
valuable --- or both engineering and strategic purposes. The court --- ound that
the combination o --- technical components and marketing use could constitute
a trade secret. This case illustrates how hybrid in --- ormation can be protectable
when it integrates con --- idential data and technical methods into a single, high-
impact system.
2.3. Applying the Three
Essential Elements
Be --- ore a business can protect its in --- ormation as a trade secret, it must --- irst deter-
mine whether that in --- ormation meets the legal de --- inition. Trade secret protection
is not automatic; it applies only when the in --- ormation satis --- ies all parts o --- a three-
element test:
1. The in --- ormation must quali --- y as a protectable --- orm o --- knowledge
(re --- erred to here simply as “in --- ormation”);
2. It must have independent economic value because it is kept secret; and
3. The owner must take reasonable e ---
orts to maintain that secrecy. Each element plays a distinct and necessary role. I — even one is missing, the in — or- mation cannot be treated as a trade secret under state or — ederal law. Courts look to all three when deciding whether something is legally protected. The — irst and third elements — what counts as “in — ormation,” and what counts as “reasonable e —
orts” — are relatively straight — orward in structure, though they raise important questions in practice. The second element, however, is more complex. The second element requires that the in — ormation’s economic value comes — rom the — act that it is not widely known or easily discovered. Courts have consistently held that this element is not a single — act to prove but rather a combination o — interrelated conditions that work together to establish value through secrecy. Speci — ically, to meet this element, the in — ormation must (a) have independent economic value (that is, its value comes speci — ically — rom being secret), (b) not be generally known in the relevant industry, and (c) not be readily ascertainable through proper means. These three qualities are not separate legal elements. Rather, they — orm a single, compound element: independent economic value — rom secrecy. In some cases, courts analyze them together as one inquiry; in others, especially where — acts are contested, they break them apart. For clarity, this guide takes the latter approach. Understanding how this second element works is key to identi — ying what in — ormation quali — ies — or trade secret protection and what does not.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 51 10/16/25 9:25 PM 52 2 • Inventorying and Classi — ying Trade Secrets
2.3.1. In --- ormation
The --- irst element o --- the trade secret test requires that the subject matter quali --- y as
“in --- ormation.” At a glance, this might seem obvious, but trade secret law draws a care-
ul line between in — ormation that is protectable and in — ormation that is not. The UTSA de — ines a trade secret as “in — ormation, including a — ormula, pattern, compilation, program, device, method, technique, or process.” This list is not exhaus- tive, but it illustrates the breadth o — what can be protected — so long as the other two elements o — the trade secret test are met. In practice, courts have recognized a wide range o — content as “in — ormation,” including: • Formulas (e.g., chemical recipes, — lavor blends) • Patterns (e.g., textile templates, engineering layouts) • Compilations (e.g., curated customer lists, pricing databases) • Programs (e.g., so — tware source code or apps) • Methods and Techniques (e.g., specialized manu — acturing steps or analytical procedures) • Processes (e.g., production sequences or business work — lows) • Design Speci — ications (e.g., CAD — iles, engineering blueprints) • Prototypes (e.g., mockups embodying novel design — eatures) • Strategic Plans (e.g., product roadmaps or market-entry strategies) • Algorithms and Codes (e.g., data-sorting logic or encryption keys) • Procedures (e.g., internal quality control protocols)
What unites all o --- these in --- ormation types is that they represent concrete, de --- ined
sets o --- knowledge or instructions that are capable o --- being protected — provided they
are also secret and valuable.
However, not everything a company keeps private is protectable. The law excludes:
• Physical objects themselves (though the design or method behind them may
be protectable)
• General employee skill and experience
• Sensory impressions (e.g., the taste o --- a product, unless tied to a secret --- ormula)
• Abstract ideas or undeveloped concepts
In other words, trade secret law protects knowledge, not things. A machine is not
a trade secret, but the con --- idential process --- or building or operating it might be. Simi-
larly, a person’s accumulated skill is not a company trade secret — even i --- they acquired
that skill on the job — unless they are also taking de --- ined, protectable knowledge along
with them.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 52 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 53
Technical Concepts Can Be Trade Secrets
Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
226 Cal. App. 4th 26 (2014)
Altavion developed a method --- or embedding secure digital stamps into PDF
iles and shared this idea with Konica Minolta under a con — identiality agree- ment. When Konica Minolta applied — or patents on similar technology without involving Altavion, litigation — ollowed. The court held that Altavion’s ideas were su —
iciently speci — ic and technically detailed to quali — y as trade secrets. Although they had not yet been turned into a product, they were well-developed enough to be protectable. This case illustrates that even early-stage concepts can be trade secrets i — they are clearly described and technically meaning — ul.
Finally, courts --- ocus on the substance, not the --- orm. It does not matter whether the
in --- ormation is written on paper, stored in a --- ile, or embedded in a prototype. What
matters is whether the underlying knowledge is su ---
iciently concrete, secret, and eco nomically valuable to warrant protection. Trade secret law protects the intangible insight, not the medium it happens to live in.
2.3.2. Independent Economic Value
rom Secrecy The second element o — the trade secret test requires that the in — ormation provide a competitive advantage because it is kept secret. Trade secret law does not protect secrecy — or its own sake — it protects secrecy that has commercial signi — icance. In other words, the in — ormation must be valuable in a way that depends on its not being gener- ally known or easily discoverable. That value must be tied directly to its con — identiality. For example, a secret — ormula that allows a company to produce goods more cheaply, a pricing model that gives it leverage in negotiations, or a customer list that allows more targeted sales — all o — these might have economic value that comes — rom being closely held. I — the same in — ormation were to become widely known, the advan- tage would disappear. This second element is more complex than it — irst appears. Courts have consis- tently interpreted it as a compound requirement, one that involves several interlock- ing ideas: A. The in — ormation must have independent economic value — its utility must come speci — ically — rom being secret, not merely — rom being use — ul. B. It must be not generally known in the relevant industry — i — it is common knowledge, it con — ers no competitive advantage.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 53 10/16/25 9:25 PM 54 2 • Inventorying and Classi — ying Trade Secrets
C. It must be not readily ascertainable by proper means — i --- competitors
could easily --- igure it out on their own, secrecy is not what makes it
valuable.
These three ideas together de --- ine the legal meaning o --- “independent economic
value --- rom secrecy.” Some courts analyze them together; others treat them as dis-
tinct --- actual questions. Either way, all three must be true --- or this element to be satis-
ied. I — the in — ormation is valuable but generally known, or secret but easy to reverse engineer, it will not quali — y — or protection. Understanding how these — actors work together is essential — or identi — ying and prioritizing protectable trade secrets in a business setting.
2.3.2.1. Independent Economic Value
The second element o --- the trade secret test begins with the idea that the in --- orma-
tion must be valuable. In this context, “value” re --- ers to use --- ulness — in --- ormation that
contributes meaning --- ully to the operations or success o --- a business. But not all types
o --- value quali --- y. Trade secret law is concerned only with value that is economic. The
in --- ormation must improve the business’s position in the marketplace, whether by
increasing revenue, reducing costs, improving e ---
iciency, enhancing quality, accelerat- ing development, or otherwise creating a competitive advantage. Courts have made clear that other kinds o — value — while possibly important in other contexts — do not satis — y this requirement. For example, sentimental value, per- sonal pride, or religious signi — icance do not count. Nor does reputational value, in the sense o — simply wanting to prevent embarrassment or criticism. These may support claims in de — amation, contract, or other areas o — law — but they are not part o — the trade secret — ramework. This value must be economic in nature. That is, the in — ormation must make a di — -
erence to the business’s pro — itability, e —
iciency, or market standing. Courts accept that this value can take many — orms. It might increase revenues, reduce costs, improve decision-making, enhance product quality, or position the company to act more e —
ectively than competitors. Crucially, the in — ormation need not be currently mon- etized — it may quali — y even i — it has only potential economic value, so long as there is a reasonable basis to believe it could be leveraged — or competitive gain in the — uture.
Secrecy Can Evidence Economic Value
Religious Technology Center v. Lerma
908 F. Supp. 1353 (E.D. Va. 1995)
In this case, the Church o --- Scientology claimed trade secret protection over
con --- idential religious training materials. Although the materials held spiritual
or ideological meaning, the court --- ocused on their economic value. The Church
6406_Oranburg_Protecting Trade Secrets_1pp.indb 54 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 55
charged members substantial --- ees to access them and imposed strict con --- iden-
tiality rules. The court --- ound that the organization’s commercial model — mon-
etizing access to secret materials — demonstrated independent economic value
that stemmed directly --- rom secrecy.
Importantly, the economic value must also be independent, meaning it comes spe-
ci --- ically --- rom the in --- ormation’s being secret. It is not enough that the in --- ormation is
use --- ul to the company; the value must derive --- rom the --- act that others do not know it.
I --- the same bene --- it would remain even a --- ter public disclosure, the in --- ormation does
not meet this standard. This exclusivity is the --- oundation o --- trade secret protection:
it rewards businesses that develop valuable knowledge and success --- ully keep it out o ---
competitors’ hands.
Some courts describe this as a test o --- competitive harm: Would a rival gain a
meaning --- ul advantage by acquiring the in --- ormation? I --- so, that’s a strong indication
that the in --- ormation has independent economic value. I --- not — i --- the in --- ormation
provides no edge or is already in general use — then trade secret law o ---
ers no pro- tection. To illustrate this point, it helps to consider examples o — what does and does not count. In — ormation that may have independent economic value includes: • Con — idential manu — acturing techniques that lower production costs • Internal pricing data and customer pro — iles that improve sales targeting • Strategic business plans, market entry timing, or investment — orecasts • Proprietary so — tware source code or machine-learning algorithms • Unreleased product speci — ications or research data
In --- ormation that does not have independent economic value includes:
• Routine internal data, like employee schedules or vacation calendars
• Holiday party plans or internal communications with no competitive impact
• Common industry practices or generic strategies everyone uses
• Public --- ilings or promotional materials
• Outdated projections or speci --- ications no longer in use
Finally, it is worth distinguishing this requirement --- rom secrecy itsel --- . Economic
value and secrecy are related, but not identical. Some in --- ormation may be secret but
trivial — and there --- ore not protectable. Other in --- ormation may be use --- ul, but widely
known — and thus not protectable either. The point o --- this element is to --- ocus on value
that is created or preserved by the --- act o --- secrecy.
This test ensures that trade secret law protects knowledge that is both meaning-
ul in the marketplace and unavailable to the public. The next section examines the
6406_Oranburg_Protecting Trade Secrets_1pp.indb 55 10/16/25 9:25 PM 56 2 • Inventorying and Classi — ying Trade Secrets
irst o — the two secrecy-related components: whether the in — ormation is not generally known to others in the relevant — ield.
2.3.2.2. Not Generally Known
The second component o --- the “independent economic value” element is that the
in --- ormation must be not generally known. This re --- lects the --- undamental insight
behind trade secret law: i --- a business advantage comes --- rom keeping in --- ormation
secret, that advantage disappears once the in --- ormation becomes widely available.
Trade secret protection ends where public knowledge begins.
But the law does not demand total or absolute secrecy. Courts recognize a standard
o --- relative secrecy. In --- ormation can still be protected even i --- it is known to a small
number o --- people so long as those people are bound by con --- identiality obligations
or internal security controls. What matters is whether the in --- ormation is generally
accessible to those who could pro --- it --- rom it — competitors, industry peers, or other
actors in the marketplace.
This is not a bright-line rule. Courts assess whether the in --- ormation is known
by enough people, in enough places, and through enough channels to eliminate its
competitive value as a secret. I --- so, it no longer quali --- ies --- or protection. Even a com
pany’s internal knowledge can lose trade secret status i --- it has been too widely shared
internally without proper sa --- eguards.
There are many ways that in --- ormation can become generally known, some deliber-
ate, some accidental:
• Filing --- or a patent will make the disclosed content public, even i --- the patent is
later denied or withdrawn.
• Publishing in --- ormation in academic journals, industry whitepapers, or mar-
keting materials makes it accessible to competitors.
• Disclosing content in court --- ilings or regulatory submissions can strip it o --- pro-
tection unless speci --- ic con --- identiality procedures (such as protective orders)
are in place.
• Broad dissemination within a company, without access controls or con --- iden-
tiality markings, can undermine claims that the in --- ormation was secret.
Conversely, courts have held that in --- ormation is not generally known when:
• It is shared only with employees or partners under nondisclosure agreements.
• It is discussed in closed business negotiations where con --- identiality is implied
or --- ormalized.
• It is known to a small number o --- companies in the industry but is not publicly
available.
• It is based on original internal research, planning, or design, and not dupli-
cated elsewhere.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 56 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 57
Controlled Distribution Preserves
Con --- identiality
Board o --- Trade o --- City o --- Chicago v. Christie Grain & Stock Co.
198 U.S. 236 (1905)
The Board o --- Trade created valuable grain pricing data, which it distributed
only to paying subscribers under strict conditions. A competitor acquired and
republished the data. The Supreme Court held that the Board’s data remained
con --- idential because it was not available to the general public. Its value came
rom its controlled and limited distribution: a key example o — how relative secrecy can still support legal protection.
What this element ultimately asks is whether the in --- ormation gives the business a
competitive advantage because others in the industry do not have access to it. I --- so,
then it is not generally known — and it satis --- ies this part o --- the test.
But i --- the in --- ormation has already “leaked out” into the public domain — whether
through external disclosures, shared practices, or --- ailure to restrict internal access — it
is no longer a secret in the eyes o --- the law. That is true even i --- the company continues
to treat it as con --- idential. Once secrecy is lost, legal protection ends.
This concept is closely related to yet distinct --- rom the next element: whether the
in --- ormation is readily ascertainable. “Not generally known” asks whether the in --- or-
mation is currently available to others. “Not readily ascertainable” asks whether others
could easily --- igure it out, even i --- they haven’t yet. Both tests must be satis --- ied. The next
section turns to that question.
2.3.2.3. Not Readily Ascertainable by
Proper Means
The --- inal component o --- the “independent economic value” element --- ocuses not on
what others do know but rather on what they could know. Speci --- ically, it asks whether
the in --- ormation could be discovered by others using law --- ul and legitimate e ---
orts. To quali — y as a trade secret, the in — ormation must be not readily ascertainable by proper means. This requirement plays a critical role in separating protectable secrets — rom open knowledge. Even i — in — ormation is currently unknown to competitors, it may not be eligible — or protection i — it can be easily uncovered through commonly accepted meth- ods. The law does not shield businesses — rom the risk that others might independently
igure things out. Instead, it rewards secrecy only when secrecy is necessary to pre- serve a competitive advantage — when the in — ormation would be di —
icult — or others to obtain without improper conduct.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 57 10/16/25 9:25 PM 58 2 • Inventorying and Classi — ying Trade Secrets
The term “readily ascertainable” re --- ers to whether the in --- ormation could be learned
with reasonable e ---
ort. The threshold is not impossibility. The question is whether the in — ormation is su —
iciently accessible that a skilled person, acting law — ully and without deception, could reproduce or reconstruct it using public tools, market knowledge, or direct analysis. For example, a company that releases a physical product into the market cannot claim as a trade secret any aspect o — that product that could be easily reverse engi- neered. Courts have consistently held that reverse engineering — care — ully examining a product to understand how it works — is a proper means o — discovery. I — the secret can be determined by disassembling the product, conducting standard chemical test- ing, or observing its behavior in the — ield, then that secret is legally exposed, even i —
no one has taken the time to uncover it yet.
Similarly, courts recognize that companies may arrive at the same in --- ormation
through independent development. I --- two --- irms, working separately and without col-
lusion, reach the same technical or strategic insight, each has the right to use that
in --- ormation. Trade secret protection does not grant exclusivity over knowledge that
others can law --- ully invent on their own.
Likewise, courts reject claims that rest on in --- ormation --- ound in public sources,
even i --- a company was the --- irst to compile or organize that data. I --- the core details are
published in regulatory --- ilings, government databases, academic journals, or other
public repositories, the --- act that a competitor could gather and synthesize them with-
out wrongdoing makes the resulting in --- ormation unprotectable.
The de --- ining theme here is accessibility through honest e ---
ort. I — the path to dis- covery is short, clear, and law — ul, the law does not bar others — rom taking it. That is why courts assess not only the originality or use — ulness o — the in — ormation but also how di —
icult it would be — or others to learn it using conventional tools or standard pro — essional diligence. However, there are many situations where in — ormation is not readily ascertain- able. A process that is used behind closed doors, embedded in a secure system, or tied to subtle re — inements not visible — rom the — inal product may remain secret even i — the end result is public. In Hertz v. Luzenac Group, the court recognized that although each individual step in the talc manu — acturing process was known in the industry, Luzenac Group’s speci — ic combination and sequence o — those steps had not been discovered. The court emphasized that it was not obvious how to assemble the process in the same way — and that di —
iculty is what made the process not readily ascertainable. What matters is the e —
ort and expertise required. I — reverse engineering would take weeks o — trial and error, require special equipment, or depend on unlikely insight, courts may — ind that the in — ormation is not readily obtainable. But i — the discov- ery could be made quickly and easily by someone with standard tools and industry knowledge, protection will not apply.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 58 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 59
At the same time, trade secret law draws a bright line between proper and improper
means o --- discovery. Only discovery by proper means — meaning honest, law --- ul, and
ethical conduct — counts against protection. I --- a competitor learns the in --- ormation
through the --- t, deception, bribery, hacking, or breach o --- contract, that acquisition is
legally improper, and the trade secret remains intact.
Statutes like the UTSA and the DTSA de --- ine improper means to include the --- t;
bribery; misrepresentation; breach o --- a con --- identiality duty; or espionage, whether
physical or electronic. Courts have expanded on these examples to include cyber
intrusions, phishing schemes, employee disloyalty, and violations o --- nondisclosure
agreements. In these cases, the use o --- the in --- ormation is misappropriation, and trade
secret law provides remedies even i --- the in --- ormation could theoretically be reverse
engineered. The issue is not whether discovery was possible but instead whether it
was done the right way.
This distinction serves a --- undamental policy goal: encouraging --- air competition
without endorsing misconduct. I --- a competitor works independently to replicate a
product or process using proper techniques, the law protects their right to do so. But
i --- they cross ethical or legal boundaries to gain access to con --- idential in --- ormation, that
conduct violates trade secret protections — even i --- the in --- ormation might have been
discoverable by other means.
Reverse Engineering Is (Generally) Not
Misappropriation
Chicago Lock Co. v. Fanberg
676 F.2d 400 (9th Cir. 1982)
Chicago Lock sold high-security locks that shared a common key code sys-
tem. Locksmiths who purchased the locks began reverse engineering the codes
and publishing them in re --- erence guides. The company sued to stop this, argu-
ing that the keying system was a trade secret. The court disagreed. It --- ound that
the locks were publicly available and the internal coding could be discovered
through law --- ul examination. Because the in --- ormation was readily ascertain-
able by anyone who purchased the product and studied it, it did not quali --- y as
a trade secret. This case demonstrates that trade secret protection ends where
law --- ul discovery begins.
In sum, the third and --- inal part o --- the “independent economic value” element asks
whether the in --- ormation is di ---
icult to obtain through law — ul methods. The law — avors protecting in — ormation that cannot be easily reconstructed or — ound using proper diligence. When secrecy makes discovery genuinely di —
icult, the owner retains pro- tection. When discovery would be obvious, routine, or trivial, the law steps aside.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 59 10/16/25 9:25 PM 60 2 • Inventorying and Classi — ying Trade Secrets
With this --- inal component established, we have now --- ully unpacked the second ele
ment o --- the trade secret test. We turn next to the third and --- inal requirement: whether
the in --- ormation has been subject to reasonable e ---
orts to maintain its secrecy.
2.3.3. Subject to Reasonable E ---
orts to Maintain Secrecy Trade secret law protects secrets — but only when the owner acts like they are secret. The — inal and perhaps most important element in the legal test is whether the in — ormation has been subject to reasonable e —
orts to maintain its secrecy. This is not a question o — per — ect security. It is a question o — seriousness, discipline, and consistency. The law does not require that only one person know the secret. Nor does it require vaults, encryption, or locked rooms in every case. What it requires is evidence that the business took a —
irmative steps to limit disclosure and prevent unauthorized use. That includes policies, contracts, markings, access restrictions, training, and internal practices that signal to employees and partners that the in — ormation is not — or public consumption. Courts ask whether the company behaved in a way that re — lects an expectation o —
con --- identiality. I --- a business shares in --- ormation casually, --- ails to use nondisclosure
agreements, leaves documents unprotected, or allows access without controls, it may
lose trade secret protection even i --- the in --- ormation itsel --- remains unknown to the
public. The law will not save a company --- rom its own carelessness.
At the same time, the e ---
orts must be proportionate. What counts as reasonable depends on the nature o — the business, the sensitivity o — the in — ormation, and the resources available. A small company with limited in — rastructure is not held to the same standard as a multinational corporation. But both are expected to do what is reasonably within their power to preserve secrecy. One o — the most common — ailures occurs when businesses require signed NDAs but do nothing else. A nondisclosure agreement is a good start, but it is not enough on its own. I — the NDA is never explained, en — orced, or integrated into company culture, courts may see it as window dressing rather than real protection. The same is true
or con — identiality labels that are never backed up by meaning — ul access controls or consistent reminders. On the other hand, when companies combine contractual protections with access limitations, employee training, document labeling, and internal discipline, courts are
ar more likely to uphold the existence o — a trade secret. What matters is the overall pattern. The company must treat the in — ormation like a secret at every stage o — its use and handling.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 60 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 61
NDAs Alone Are Not Enough --- or
“Reasonable E ---
orts”
nClosures Inc. v. Block & Co.
770 F.3d 598 (7th Cir. 2014)
nClosures developed a metal iPad case and entered into a manu --- actur-
ing relationship with Block & Co. under a con --- identiality agreement. Block
later brought a similar product to market, and nClosures sued --- or trade secret
misappropriation. The court --- ound that although there was an NDA in place,
nClosures had --- ailed to take other reasonable measures to maintain secrecy. It
had shared design --- iles without restriction, displayed the product publicly, and
taken no additional steps to guard the in --- ormation. The court ruled that the
alleged secret had not been adequately protected and there --- ore did not quali --- y
or trade secret status. This case illustrates that — ormal agreements alone are not enough; businesses must actively maintain secrecy in practice.
The legal standard is reasonableness, not per --- ection. But reasonableness means
more than good intentions. It means acting in a way that a court can recognize as
consistent with secrecy. When companies show that they care about protecting in --- or-
mation, courts are willing to help. When companies are careless, courts will not inter-
vene. Trade secret law protects the diligent, not the indi ---
erent.
2.4. Prioritizing Trade Secrets by
Economic and Strategic Importance
Once a company identi --- ies what quali --- ies as a trade secret, the next challenge is
deciding which secrets matter most. Not all secrets are equally valuable. Some drive
revenue, shape strategy, or protect the business --- rom collapse. Others are use --- ul but
replaceable. Treating every trade secret as equally important leads to wasted e ---
ort. Trade secret protection is resource-intensive. A company must know where to con- centrate its energy. Prioritization is a matter o — both economics and judgment. The legal test tells us whether something quali — ies as a trade secret. But the inventory is also a business tool, and businesses need to know which secrets are most worth de — ending. A small startup might have only a hand — ul o — high-priority secrets. A large — irm might have dozens spread across departments. Regardless o — size, every organization must make distinctions.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 61 10/16/25 9:25 PM 62 2 • Inventorying and Classi — ying Trade Secrets
Some secrets protect what no competitor can match. Others allow the company to
move --- aster, cheaper, or more e ---
ectively than rivals. Still others are important but not critical; they contribute to the business but their loss would not cripple it. A — ew may be legacy items that once mattered but no longer de — ine the company’s position in the market. The goal o — prioritization is not to minimize protection — or the lower tiers but rather to recognize that not everything can be treated as mission-critical. The inventory must re — lect these di —
erences. Each trade secret should be catego- rized by priority level based on what would happen i — the secret were exposed. That exposure might come through misappropriation, reverse engineering, law — ul disclo- sure, or carelessness. The point is to evaluate how much harm would result and how di —
icult it would be to replace the advantage. There are no rigid — ormulas. But companies can generally classi — y their secrets into three broad tiers. Some trade secrets are high priority — these are the crown jewels, the secrets that shape everything else. Others are medium priority — they matter, but they can be rebuilt or worked around. The rest are low priority — they still quali — y as trade secrets, but their strategic value is modest or declining. The next three sections explain each o — these categories in more detail. The distinc- tions are not just — or theory. They shape how the company allocates protection, assigns responsibility, and prepares — or potential litigation. A good inventory does more than identi — y secrets. It tells the business which secrets it cannot a —
ord to lose.
2.4.1. High-Priority Trade Secrets
High-priority trade secrets are the ones a business cannot a ---
ord to lose. These are the assets that provide a decisive competitive advantage — knowledge that would cause serious harm i — it were disclosed or misappropriated. They o — ten support core products, proprietary technologies, key customers, or strategic relationships. Without them, the business would su —
er immediate commercial damage or long-term strate- gic erosion. In many cases, these secrets are directly tied to revenue. A proprietary manu — ac- turing process that allows a company to produce at hal — the cost o — its competitors belongs in this category. So does an algorithm that powers a — lagship product, a design no one else can replicate, or a dataset that underpins high-value decision-making. When a trade secret loss would mean loss o — customers, collapse o — margins, or the end o — a product line, the priority is obvious. But not all high-priority secrets are visible on a balance sheet. Some are early-stage technologies that have not yet reached the market. Others are strategic roadmaps or internal playbooks that guide — uture growth. I — a competitor gained access to those documents, they might not destroy the company, but they could erode its ability to lead. Priority is about more than present value. It is also about vulnerability, timing, and the company’s broader trajectory.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 62 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 63
These are the secrets that demand the most protection. They should be subject to
the strongest contractual sa --- eguards, the tightest access restrictions, and the most
rigorous monitoring. In some cases, they should be kept entirely out o --- vendor rela-
tionships or third-party plat --- orms, even i --- doing so creates operational --- riction. The
cost o --- inconvenience is small compared to the cost o --- exposure.
Courts are more likely to en --- orce trade secret claims when the in --- ormation clearly
mattered to the business. A company that can point to a care --- ully guarded secret that
underpins a --- lagship product will have a --- ar easier time proving misappropriation
than one that over-claims routine procedures. Prioritization signals to courts that the
company understands its own assets and has acted accordingly.
High Economic Value Bolsters
Trade Secret Status
Boeing Co. v. Sierracin Corp.
738 P.2d 665 (Wash. 1987)
Boeing developed proprietary methods --- or manu --- acturing aircra --- t wind-
shields and treated these techniques as trade secrets. When a supplier began
using similar processes, Boeing sued. The court upheld the claim, emphasizing
the commercial importance o --- the techniques and Boeing’s e ---
orts to protect them. The decision rein — orced that where a secret is both highly valuable and care — ully guarded, the law will provide strong protection. Boeing’s success in the case re — lected not only the uniqueness o — the in — ormation but also the clar- ity with which the company had treated it as a critical asset.
A business does not need to have many high-priority secrets, but it must know
which ones --- all into that category — and treat them accordingly. These are the assets
that de --- ine the company’s edge. Without them, the business is just another competitor.
2.4.2. Medium-Priority Trade Secrets
Medium- priority trade secrets matter. They contribute to the business’s
per --- ormance, e ---
iciency, or strategy. But they are not essential to survival. I — lost, they would cause — riction, not — ailure. The company might need to retool a process, adjust pricing, or rebuild relationships. But it could do so without catastrophic disruption. These secrets o — ten re — lect operational experience. A pricing — ormula that helps optimize margins across multiple markets might — all in this category. So might a vendor negotiation strategy, a bundled service approach, or an internal work — low that shortens production time. These are not secrets that competitors could never
6406_Oranburg_Protecting Trade Secrets_1pp.indb 63 10/16/25 9:25 PM 64 2 • Inventorying and Classi — ying Trade Secrets
develop. They are secrets that the company developed --- irst and that still o ---
er a mean- ing — ul edge. In some cases, a trade secret’s priority is a — unction o — time. A strategy document might be high priority be — ore a product launch but drop to medium priority a — ter the product is released. A supplier arrangement might be sensitive while a deal is in negotiation but less important once terms are locked in. Prioritization is dynamic. It re — lects the secret’s current role in the business, not just its theoretical value. Medium-priority secrets deserve protection, but not at all costs. A company might share these secrets with trusted partners under contract. It might allow broader inter- nal access with appropriate training and reminders. What matters is proportional- ity. The security measures should re — lect the value o — the secret and the risk o — loss. Over-protecting these assets can waste resources or slow down operations. Under- protecting them can invite preventable loss. Companies sometimes try to in — late the importance o — these secrets during litiga- tion. Courts are not persuaded by exaggeration. I — the in — ormation was not treated as high-value at the time o — the alleged misappropriation, courts are unlikely to elevate it a — ter the — act. A business that classi — ies its secrets realistically is in a better position to de — end its actions and protect its rights.
Moderate E ---
orts Su —
ice — or Moderate-V alue Secrets
Fred’s Stores o --- Tennessee, Inc. v. M & P Partners, LLC
2015 U.S. Dist. LEXIS 178745 (N.D. Miss. Dec. 30, 2015)
Fred’s alleged that a --- ormer business partner misappropriated in --- orma-
tion about site selection --- or new store locations. The court --- ound that while
the in --- ormation was not publicly available, it was developed using standard
techniques and available data. The business methods had some strategic value,
but they were not unique or trans --- ormative. The court treated the in --- ormation
as potentially protectable, but it emphasized that the level o --- protection must
re --- lect the in --- ormation’s actual role in the business. This case illustrates how
courts recognize medium-priority secrets when they are realistically --- ramed
and reasonably guarded.
Medium-priority secrets --- ill the middle o --- the inventory. They are the tools and
tactics that help a business compete day to day. Losing them would hurt. But it would
not end the game. They require care --- ul protection — not the highest wall, but a strong
ence.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 64 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 65
2.4.3. Low-Priority Trade Secrets
Some trade secrets quali --- y --- or protection under the law but carry little weight in the
li --- e o --- the business. These low-priority secrets may re --- lect routine operations, internal
pre --- erences, or legacy practices that no longer shape competitive per --- ormance. They
still meet the legal de --- inition, and they still deserve reasonable sa --- eguards. But they do
not demand the same level o --- attention, investment, or urgency as more critical assets.
Low-priority secrets might include administrative procedures, marginal product
tweaks, or legacy data that has not been purged. A company’s old pricing models,
outdated technical documentation, or internal training slides may all be con --- idential
and nonpublic. But their exposure would not materially damage the business. These
items are worth keeping private, but they are not worth a lawsuit.
In practice, low-priority trade secrets o --- ten enter the inventory not because they
are vital but because they quali --- y. The goal o --- the inventory is to be comprehensive.
Once an item is identi --- ied as a trade secret, it should be documented. But once docu-
mented, it should also be evaluated. Companies should not pretend that every secret
is a crown jewel. Doing so undermines credibility and creates noise that distracts --- rom
what really matters.
Protection --- or low-priority secrets should be e ---
icient and proportional. Labeling, basic internal access controls, and standard nondisclosure policies are o — ten enough. I — the business later discards the in — ormation, removes it — rom operations, or shares it more broadly, it can be removed — rom the inventory. The point is not to protect every thing — orever. The point is to manage secrets wisely. Occasionally, a low-priority secret becomes more important over time. A small internal tool might become the — oundation — or a customer- — acing product. A minor data set might grow into a strategic asset. Regular inventory updates help businesses spot these changes be — ore it is too late. What starts as low-priority can become critical. But most secrets stay in their lane.
Low-V alue In --- ormation May Not Quality
as Trade Secrets
Paragon Techs., Inc. v. United States
567 F.3d 1329 (Fed. Cir. 2009)
Paragon claimed that certain in --- ormation in its contract bidding process
was con --- idential and misused. The court accepted that some o --- the in --- ormation
may have been nonpublic but --- ound that it was routine and o --- limited strategic
value. The company’s --- ailure to demonstrate commercial harm or competi-
tive consequence led the court to treat the secrets as low-priority, with little
6406_Oranburg_Protecting Trade Secrets_1pp.indb 65 10/16/25 9:25 PM 66 2 • Inventorying and Classi — ying Trade Secrets
justi --- ication --- or heightened protection. The case illustrates that trade secret law
does not exist to protect everything a business pre --- ers to keep private. The
in --- ormation must matter.
A trade secret inventory is not just a list. It is a map o --- what the business values.
Low-priority secrets have a place on that map, but they should not draw dispropor-
tionate attention. A good inventory gives each secret the protection it deserves — and
no more than that.
2.5. Creating the Trade Secret
Inventory
Once a company knows what quali --- ies as a trade secret and how valuable each one
is, it must take the next step: putting those secrets into a usable --- orm. The inventory is
that --- orm. It is not just a document — it is the backbone o --- the entire protection plan.
A well-built inventory clari --- ies what needs to be protected, how it is being used, and
why it matters. Without one, even the best legal strategies have no --- oundation.
The inventory should be structured as a living document. It is typically organized
as a spreadsheet or secure database, with each row representing a single trade secret
and each column capturing key in --- ormation about it. That includes a short, descrip-
tive name; a clear explanation o --- what the secret is; its classi --- ication as technical,
business, or hybrid; its physical or digital location; its priority level; and any special
considerations --- or how it is used or protected. Some companies include additional
ields — such as access controls, department ownership, or dates o — last review — but the core elements are the same across industries. Creating the inventory requires both legal and operational judgment. The legal team ensures that each item meets the legal de — inition o — a trade secret. The business team identi — ies what knowledge is actually in use and what value it provides. Neither side can do the work alone. A legal team working in isolation may miss strategically important assets. A business team working without legal guidance may include items that do not quali — y or overlook risks in how secrets are shared. The process only works when both perspectives are involved. The inventory is not a dumping ground — or all con — idential in — ormation. It should not include internal chatter, minor process tweaks, or marketing slogans unless they genuinely meet the legal test. At the same time, the threshold — or inclusion should not be too high. Many valuable trade secrets are easy to overlook because they are embedded in daily routines. A company’s ability to identi — y those quiet advantages o — ten determines how well it protects itsel — in the long run.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 66 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 67
Precision matters. Each trade secret must be described in terms that are speci --- ic
enough to be understood by someone outside the company yet clear enough to be
use --- ul internally. A vague entry like “customer strategy” or “pricing tool” provides
little guidance and little protection. A strong inventory entry tells you what the secret
is, where it resides, how it works, and why it matters. It can be read and understood
by a judge, a new executive, or a compliance o ---
icer without guesswork. A strong inventory is also de — ensible. I — a dispute arises, the company can point to its inventory to show that the in — ormation was identi — ied, reviewed, and classi — ied long be — ore the con — lict. This is power — ul evidence that the secret was real — and that the company took reasonable e —
orts to protect it. Courts are more likely to credit trade secret claims that are supported by internal documentation prepared in the ordinary course o — business, not just materials created — or litigation. Because the inventory becomes a legal and operational tool, it must be updated regularly. But it must — irst be created with care. Many companies start with a working version — ocused on the highest-priority secrets and expand over time. What matters is not that the inventory is per — ect on day one, but that it is structured and taken seriously
rom the beginning. A sloppy or overinclusive inventory can do more harm than good. The — ollowing example illustrates how a well-organized inventory spreadsheet might be structured. Each entry includes a speci — ic name, a — unctional description, a classi — ication type, a priority level, and other relevant metadata. This is not a checklist o — labels. It is a blueprint — or protection.
Table 1. Sample Trade Secret Inventory Spreadsheet—
Basic Structure --- or Classi --- ication and Prioritization.
Trade Secret Name Description Type Location Priority
Flavoring So --- tware module that Internal
Technical High
Algorithm optimizes recipe ratios Git repo
Curated list with sales
Enterprise CRM
notes and renewal Business High
Client List system
history
Targeting Digital marketing bid AdTech
Hybrid Medium
Formula allocation logic team --- iles
Custom backend tool
Internal Admin Cloud
with employee usage Technical Low
Portal instance
data
Vendor Rate Negotiated terms Legal
Business Medium
Table across regions Drive
6406_Oranburg_Protecting Trade Secrets_1pp.indb 67 10/16/25 9:25 PM 68 2 • Inventorying and Classi — ying Trade Secrets
A spreadsheet like this can evolve over time. It becomes more use --- ul as the com
pany re --- ines how it describes its secrets and how it understands their role in the busi-
ness. Ultimately, the inventory is not just a document — it is a way o --- thinking. It shi --- ts
the organization --- rom vague awareness to concrete control. That shi --- t is what turns
con --- identiality into protection.
2.6. Common Pit --- alls and Best
Practices in Inventorying
Creating a trade secret inventory is a high-leverage task. When done well, it
becomes a cornerstone o --- legal protection and operational clarity. When done poorly,
it becomes a liability — con --- using, overbroad, or dangerously incomplete. Many com-
panies --- all into --- amiliar traps during the inventorying process. These pit --- alls are avoid-
able, but only i --- they are recognized early.
The most common mistake is overinclusion. Businesses sometimes attempt to
label every internal document, communication, or idea as a trade secret. They believe
that casting a wide net will maximize protection. In reality, it undermines credibility.
Courts are skeptical o --- sweeping claims. An inventory that includes routine emails,
vague strategies, or public- --- acing content suggests that the company does not under-
stand what a trade secret is. Worse, it dilutes --- ocus. When everything is marked high-
priority, nothing really is.
The opposite mistake is underinclusion. Some companies build inventories that
are too narrow by listing only --- ormal technologies or customer lists while ignoring
embedded knowledge that lives inside teams. A unique onboarding process, a high-
per --- orming internal dashboard, or a supplier negotiation sequence may not --- eel like
“IP” but can be a valuable trade secret. Businesses that --- ocus only on patents, prod-
ucts, or technical --- iles o --- ten miss their own competitive advantages. A good inventory
demands curiosity, not just compliance.
Another --- requent error is lack o --- speci --- icity. Entries like “sales playbook,” “product
roadmap,” or “pricing method” are too vague to support legal en --- orcement. Courts
will not protect abstractions. I --- a trade secret cannot be described with precision, it
cannot be de --- ended. The inventory must describe what the secret is, how it works,
and what makes it distinct. Speci --- icity also helps internally. When teams know exactly
what the secret is, they are more likely to treat it properly.
Some inventories --- ail because they are treated as static. A one-time list created dur-
ing a compliance sprint is not a protection plan. Trade secrets change as businesses
evolve. New products launch, old methods are retired, strategies shi --- t. A use --- ul inven-
tory must be reviewed and revised regularly. Companies that revisit their inventory
6406_Oranburg_Protecting Trade Secrets_1pp.indb 68 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 69
once a year or during major operational changes are --- ar better positioned to respond
to risk or litigation than those that treat it as a --- inished product.
Ownership is another challenge. In many organizations, no one is clearly respon-
sible --- or the inventory. Legal teams may dra --- t the --- ramework but have no visibility into
day-to-day practices. Business teams may understand the secrets but see inventorying
as someone else’s job. The result is an incomplete or outdated list. Success --- ul compa-
nies designate a responsible party or team, ensure collaboration across departments,
and integrate inventory maintenance into regular work --- lows.
Finally, many businesses --- ail to link the inventory to en --- orcement. When a trade
secret is misappropriated, the company must be able to prove that the in --- ormation
was identi --- ied, protected, and valued be --- ore the breach. A trade secret that appears
only in a litigation brie --- will not persuade a court. But a secret that was clearly listed,
care --- ully described, and periodically reviewed tells a di --- --- erent story. It shows that the
company knew what it was protecting — and treated it accordingly.
Over-Claiming Yet Under-D ocumenting
“Secret” Proc esses
Hertz v. Luzenac Group
576 F.3d 1103 (10th Cir. 2009)
Luzenac claimed that its talc puri --- ication process was a trade secret, but it
ailed to clearly document what the process involved or how it was protected. The company asserted broad rights over multiple elements o — its operations, without distinguishing which components were critical or how they had been maintained as con — idential. The court expressed skepticism about these sweep- ing claims and ultimately narrowed the scope o — protection. The case illustrates that overclaiming weakens credibility, and that a trade secret inventory must be both speci — ic and supported by evidence o — active protection.
A trade secret inventory is only as strong as the process behind it. Simply stamp-
ing “CONFIDENTIAL” on every document will not hold up in court. Precision,
balance, regular updates, and clear ownership are not just best practices but rather
are the di ---
erence between protection that works and protection that — ails when it is needed most.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 69 10/16/25 9:25 PM 70 2 • Inventorying and Classi — ying Trade Secrets
2.7. Integrating the Inventory Into
Business Operations
A trade secret inventory is not use --- ul i --- it sits on a shel --- . It must become part o --- how
the business actually --- unctions. The strongest protection plans are not legal arti --- acts
but rather are operational realities. That means the inventory must be integrated into
everyday decisions, not just maintained as a static document --- or --- uture litigation.
Integration begins with access. The people responsible --- or protecting trade secrets
must know what those secrets are. That includes legal counsel, security o ---
icers, team leads, and business executives who work in areas where the secrets are used. I — these individuals cannot easily — ind, understand, or re — erence the inventory, it cannot guide behavior. The inventory must be secure, but it must also be usable. Integration also requires alignment. Internal policies should re — lect the distinctions made in the inventory. I — a trade secret is marked high priority, it should be subject to stronger protections than a low-priority item. Contracts, training programs, and access protocols should all respond to the classi — ication and prioritization decisions embedded in the inventory. When a secret is labeled as important but treated casually, the inconsistency undermines legal credibility and creates operational risk. The inventory should in — luence who gets access to what. This is not just about cybersecurity. It is about personnel decisions. Teams working with sensitive in — or- mation should be trained in how to handle it. Employees should be brie — ed on what quali — ies as a trade secret and why it matters. Contractors and vendors should be given access only to what they need — and only a — ter appropriate agreements are in place. The inventory can help structure these controls by identi — ying where the risks lie and which assets require care — ul handling. Business planning is another place where the inventory must play a role. I — a team is preparing to launch a new product or enter a new market, the inventory should be consulted. Are any o — the relevant assets already in the inventory? Do new trade secrets need to be added? Are existing secrets being used in new ways that create di —
erent exposure risks? Treating the inventory as a living re — erence helps ensure that trade secret protection is part o — strategy, not just an a — terthought. Litigation readiness also depends on integration. I — a company alleges trade secret misappropriation, it must show not only that the secret was documented but also that it was treated as con — idential in practice. Courts look — or consistency between the inventory and the company’s operational behavior. I — the inventory is maintained separately — rom the way the business runs, it is unlikely to carry much weight when it matters most. The goal is not to turn every employee into a trade secret lawyer. The goal is to cre- ate an organization that knows what its secrets are and acts accordingly. That culture starts with visibility. It grows through habits and structure. And it succeeds when the inventory moves out o — the legal department and into the heart o — the business.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 70 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 71
2.8. Maintaining and Updating
the Inventory
A trade secret inventory is not a one-time project. It must be updated, maintained,
and revisited as the business evolves. In --- ormation that quali --- ies as a trade secret today
may lose its value tomorrow. A new initiative may generate protectable knowledge
that is never captured unless someone adds it to the record. Without updates, even
the best inventory becomes stale, and a stale inventory is almost as dangerous as no
inventory at all.
Trade secrets change because businesses change. New products are launched. Old
services are retired. Employees come and go. Vendors are replaced. A process that
was once con --- idential may become public. A customer list may grow outdated. A
con --- idential tool may be made obsolete by new technology. I --- the inventory does not
re --- lect these changes, it creates a --- alse sense o --- security.
Regular updates should be scheduled and structured. Many companies align inven-
tory reviews with annual audits, major product cycles, or key moments in personnel
transitions. The right interval depends on the pace and nature o --- the business. A --- ast-
moving tech company may need quarterly updates. A more stable operation may --- ind
that once or twice a year is enough. What matters is that updates happen as a matter
o --- process, not as a reaction to litigation or crisis.
Maintenance is not just about adding new secrets. It is also about removing or
reclassi --- ying old ones. I --- a trade secret is no longer used, or i --- the company has stopped
taking steps to protect it, it may no longer quali --- y. Leaving it in the inventory anyway
weakens the credibility o --- the whole system. It suggests that the company does not
really know which o --- its assets are con --- idential. Pruning the inventory is just as impor
tant as expanding it.
Updating also means revisiting classi --- ications and priority levels. A secret that was
once low-priority may become critical i --- a new product depends on it. A high-priority
secret may be downgraded i --- the business shi --- ts direction. These changes o --- ten go
unnoticed unless the company builds time --- or re --- lection into its process. Without
that discipline, the inventory becomes --- rozen in the past, even as the business moves
orward. Ownership is key. Someone must be responsible — or keeping the inventory cur- rent. That person or team must have access to the legal, operational, and technical knowledge needed to evaluate what has changed. They must also have the authority to prompt revisions and the judgment to know when they are necessary. In some organizations, this role — alls to in-house counsel. In others, it is handled by compli- ance, risk management, or in — ormation security. The right structure varies. The need
or clear responsibility does not. A well-maintained inventory tells a story o — awareness. It shows that the com pany knows what matters, monitors how its assets are used, and adjusts its protection
6406_Oranburg_Protecting Trade Secrets_1pp.indb 71 10/16/25 9:25 PM 72 2 • Inventorying and Classi — ying Trade Secrets
accordingly. Courts are more likely to respect that kind o --- system. So are employees,
partners, and investors. A trade secret inventory is not just a document. It is a record
o --- care. Keeping it current is how that care becomes credible.
2.9. Creating an Organizational
Culture Around the Inventory
The trade secret inventory is more than a record. It is a re --- lection o --- how seriously
a company treats its own knowledge. The best protection plans do not depend solely
on legal documents or technical sa --- eguards. They depend on people — on the habits,
expectations, and norms that guide how in --- ormation is handled every day. For the
inventory to work, it must be embedded in the company’s culture.
A culture o --- con --- identiality does not arise on its own. It must be modeled, commu-
nicated, and rein --- orced. Employees must understand what quali --- ies as a trade secret,
why those secrets matter, and how their own actions contribute to or undermine
protection. That understanding begins with visibility. The inventory makes secrecy
visible. It shows that the company takes its knowledge seriously and expects others
to do the same.
Creating a culture around the inventory means that con --- identiality is not just a
legal requirement but rather is part o --- how people do their jobs. Employees are trained
to recognize sensitive in --- ormation. New hires are brie --- ed on the types o --- trade secrets
they may encounter. Departing employees are reminded o --- their continuing obliga-
tions. When people see that the company knows what its secrets are and that it moni-
tors how they are treated, behavior changes.
A Culture o --- Secrecy Supports a Finding
o --- Trade Secrets
Data General Corp. v. Digital Computer Controls, Inc.
357 A.2d 105 (Del. Ch. 1975)
Data General sued a competitor and --- ormer employee --- or misappropriat-
ing internal schematics used in computer hardware design. The court --- ound
that Data General had built a strong culture o --- con --- identiality by using access
controls, training, and internal policies to ensure its employees understood
their obligations. Because the company took secrecy seriously in both policy
and practice, the court --- ound its trade secret protections en --- orceable. This case
illustrates how a company’s internal discipline and cultural rein --- orcement can
tip the balance in --- avor o --- legal protection.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 72 10/16/25 9:25 PM 2 • Inventorying and Classi — ying Trade Secrets 73
This culture also depends on access and collaboration. The inventory must be
known to those who work with the secrets. Engineers, salespeople, product teams,
legal, and IT must all play a role in identi --- ying, classi --- ying, and protecting in --- or-
mation. When di --- --- erent parts o --- the organization treat secrets di ---
erently, the gaps become risks. But when everyone works — rom the same map, the business acts with coherence and purpose. Accountability is another key. Culture is not created by slogans or policies alone. It is created by what people see happening around them. I — violations go unaddressed, the inventory becomes irrelevant. I — secrecy is en — orced only during litigation, the protection e —
ort will be too late. A culture o — con — identiality takes root when people understand that the inventory matters — and that — ailing to — ollow it has consequences.
Lax Maintenance Dooms Trade
Secret Claim
Fail-Sa --- e, LLC v. A.O. Smith Corp.
674 F.3d 889 (7th Cir. 2012)
Fail-Sa --- e developed a pool sa --- ety technology and shared it with a pro-
spective partner without using any con --- identiality agreements, markings, or
internal secrecy practices. The court --- ound that Fail-Sa --- e had --- ailed to treat
the in --- ormation as a secret in any meaning --- ul way. It lacked training, internal
documentation, and consistent en --- orcement. As a result, the court held that the
in --- ormation did not quali --- y as a trade secret. The case demonstrates that with-
out a --- unctioning culture o --- con --- identiality, even valuable business knowledge
may be unprotected.
Some o --- the strongest trade secret programs are those where the inventory is not
treated as a compliance tool but rather as a strategic asset. The people who create and
manage the secrets understand their importance. The executives who lead the com
pany use the inventory to set priorities. The culture that grows --- rom that alignment
is not just protective — it is productive. It encourages --- ocus, reduces duplication, and
builds shared understanding across teams.
Trade secrets do not live on paper. They live in people’s heads, in the systems they
build, and in the relationships they manage. A trade secret protection plan only works
when the inventory becomes part o --- how those people think and act. That is what it
means to build a culture around it. Once that culture takes hold, the inventory is no
longer a document. It is a mindset.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 73 10/16/25 9:25 PM 74 2 • Inventorying and Classi — ying Trade Secrets
2.10. From Classi --- ication
to Action
Every e ---
ort to protect trade secrets begins with a single step: identi — ying what you are protecting. That step is not theoretical. It is concrete. It requires clear descrip- tions, principled classi — ications, and hard decisions about what matters most. A strong inventory captures those judgments. It — orces a business to recognize the shape and value o — its own knowledge — sometimes — or the — irst time. The legal test provides the boundary. Not everything a company wants to protect will quali — y. But within those boundaries, the inventory gives structure to what was previously scattered and unspoken. It distinguishes between di — — erent kinds o — secrets and di — — erent levels o — strategic weight. It replaces vague intuitions with organized insight. But the inventory is only the beginning. It is a snapshot o — knowledge, not a shield. For that knowledge to remain protected, it must be actively managed. The inventory must become part o — the business — not just a record o — what the business knows, but a guide — or how it operates. That work continues in the next chapter. Once a company has identi — ied its trade secrets and prioritized them, it must con — ront the next challenge: how those secrets might be lost. Legal protection depends not only on what you have but also on how vulnerable it is to exposure. Classi — ication without risk assessment is incomplete. The question now is not what the secrets are but rather how likely they are to escape.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 74 10/16/25 9:25 PM Chapter 3 Assessing Risks and Mitigating Vulnerabilities
Trade secrets are only valuable as long as they remain secret. That simple premise
underlies every chapter in this book, but nowhere is it more critical than here. Even the
strongest legal claim cannot protect in --- ormation that has already leaked. Once secrecy
is lost — whether through the --- t, error, or indi ---
erence— the trade secret disappears. This chapter addresses that challenge directly. It explains how companies can anticipate, analyze, and manage the many ways in which their secrets might be exposed. E —
ective protection begins with understanding what can go wrong. Trade secret law is reactive by nature: it allows owners to sue a — ter a misappropriation occurs. But smart organizations do not wait — or a breach — they identi — y where they are most vulnerable and act to reduce those risks. This chapter builds that capacity. It begins by de — ining the di —
erence between risk and uncertainty, two related but distinct chal- lenges in managing secrecy. It then explores common sources o — exposure — — rom insider threats to external partners to technology-driven leaks — and outlines struc- tured methods — or assessing which secrets are most at risk. Finally, it shows why risk assessment is not just a technical exercise but a strategic discipline, one that blends analytics with judgment, and law with leadership. For organizations seeking to protect their competitive edge, this chapter provides the tools and — rameworks to identi — y threats be — ore those threats turn into losses they cannot reverse.
3.1. The Centrality o --- Risk
Assessment
Trade secret law o ---
ers power — ul remedies, but only a — ter the damage has been done. A success — ul lawsuit might lead to an injunction, damages, or even criminal penalties — but none o — those outcomes can restore the value o — a secret that has already spread. This makes trade secrets uniquely vulnerable. Unlike other — orms o —
intellectual property, their legal existence depends on the practical reality o --- ongoing
secrecy. Once that secrecy is compromised, the right disappears with it.
75
6406_Oranburg_Protecting Trade Secrets_1pp.indb 75 10/16/25 9:25 PM 76 3 • Assessing Risks and Mitigating Vulnerabilities
That is why risk assessment is not just a legal tool. It is a strategic imperative. To
protect what is secret, a business must --- irst understand where its secrets are exposed.
Risk is not something that can be wished away. It comes --- rom employees, contrac-
tors, vendors, outdated systems, poor training, loose policies, or simple human error.
Most trade secret --- ailures are not dramatic acts o --- the --- t. They are slow leaks, casual
oversights, or breakdowns in process. And they are almost always --- oreseeable — i ---
someone had taken the time to ask the right questions.
This chapter begins with a --- oundational distinction: risk is di --- --- erent --- rom uncer-
tainty. Risk involves quanti --- iable threats — things that can be measured, modeled,
and prioritized. Uncertainty involves the unknown and the unknowable — scenar-
ios where no amount o --- data can predict what will happen. Trade secret protection
requires attention to both. A company might know that its sales algorithm is exposed
to a certain type o --- cybersecurity breach (a risk). But it cannot know whether a court
will --- ind that algorithm legally protectable i --- en --- orcement becomes necessary (an
uncertainty). Both must be managed, but they require di --- --- erent strategies.
In the sections that --- ollow, we will show how businesses can approach risk analytically
and uncertainty qualitatively. We will explore how secrets are lost, what kinds o --- vul-
nerabilities matter most, and why some threats cannot be measured at all. Most o ---
all, we will emphasize that risk assessment is not a checklist — it is a way o --- thinking.
It requires judgment, --- oresight, and an honest appraisal o --- how the business actually
operates. Trade secret protection begins long be --- ore a lawsuit is --- iled. It begins with a
question: What could go wrong, and what would it cost i --- it did?
3.2. Understanding Risk and
Uncertainty
Trade secret law assumes that in --- ormation remains secret unless a --- irm allows it
to slip. Yet the line between “accidental exposure” and “un --- oreseeable threat” is o --- ten
blurred. A trade secret can disappear in a moment, through a carelessly --- orwarded
email, a miscon --- igured server, a vendor’s lapse in judgment, or a --- ormer employee’s
quiet conversation at a con --- erence. Sometimes the risk was obvious. Other times, no
one could have seen it coming.
To protect trade secrets in this environment, businesses must think di ---
erently. They cannot rely solely on compliance checklists, — irewalls, or legal — orms. Those tools matter, but they only work i — the company understands where its in — ormation is most vulnerable and how that vulnerability might mani — est. That process is not intuitive. It requires a deliberate — ramework — or analyzing exposure, anticipating threats, and making judgment calls in conditions o — both con — idence and doubt. It also requires an honest reckoning with the limits o —
oresight. This section introduces the analytical — oundation o — trade secret risk strategy. It begins by distinguishing between two closely related but — undamentally di — — erent
6406_Oranburg_Protecting Trade Secrets_1pp.indb 76 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 77
ideas: risk and uncertainty. Risk re --- ers to situations where outcomes and probabilities
can be estimated with some degree o --- con --- idence. Uncertainty, by contrast, re --- ers to
situations where such probabilities cannot be known at all. Both appear routinely in
trade secret management. A company might calculate the chance that an employee
will click on a phishing link. But it cannot quanti --- y how a judge will interpret a vague
nondisclosure agreement or whether a new competitor will act opportunistically i --- it
stumbles across unprotected IP.
The problem is not that uncertainty exists. The problem is that it is o --- ten ignored.
Legal teams may overestimate their ability to predict judicial outcomes. Engineers may
place too much trust in encryption. Executives may assume that trade secrets are sa --- e
because no breach has occurred — yet. These assumptions lull organizations into reac-
tive postures, where trade secrets are protected only a --- ter a threat has materialized. By
then, it is o --- ten too late.
To guard against this, trade secret holders must build systems that account --- or both
what they know and what they cannot know. They must integrate quantitative models
or estimating risks with qualitative judgment — or navigating uncertainty. These are not competing modes o — reasoning. They are complements. A business that only measures what it can count will miss what it cannot see. A business that relies only on intuition will struggle to prioritize and allocate resources. The goal is not certainty — it is clarity. Clarity about where secrets live, how they might be exposed, and what kinds o — events could disrupt their protection. In the pages that — ollow, we will break down risk and uncertainty with precision. We will explain why each matters, how they di —
er, and what kinds o — reasoning each requires. We will then map the speci — ic domains where uncertainty tends to arise— legal, tech- nological, strategic, and behavioral — and show how those domains shape the modern landscape o — trade secret vulnerability. Together, these — rameworks provide the — ounda- tion — or understanding how trade secrets are lost, how threats should be prioritized, and how decision-makers can act wisely even when the — uture is unclear.
3.2.1. De --- ining Risk
Risk is o --- ten treated as a vague or generalized threat, but in structured trade secret
management, it has a speci --- ic meaning. Risk exists when outcomes are uncertain but
measurable. It is the product o --- two elements: the likelihood that an event will occur and
the magnitude o --- harm that would --- ollow. The standard --- ormulation expresses this as:
Risk = Probability o --- Event × Magnitude o --- Harm
This simple equation provides a power --- ul starting point. It allows organizations to
evaluate threats not by intuition but by structured reasoning. A vulnerability that is
extremely likely but would cause only minor disruption may warrant only modest pro-
tection. A low-probability event that could destroy the company’s competitive position
might demand aggressive sa --- eguards. The --- ramework provides a language --- or making
such trade-o ---
s explicit.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 77 10/16/25 9:25 PM 78 3 • Assessing Risks and Mitigating Vulnerabilities
Consider a so --- tware --- irm whose --- lagship product relies on a proprietary algorithm.
The probability o --- a data breach may be in --- ormed by prior cybersecurity incidents,
industry benchmarks, or technical assessments. The magnitude o --- harm could include
not only --- inancial loss but also reputational damage and diminished investor con --- i-
dence. By assigning values — quantitative or categorical — to these dimensions, the
irm can begin to prioritize risks across its port — olio o — secrets. Structured risk assessment serves multiple purposes. It helps justi — y resource allo- cation. It provides a rationale — or why some secrets receive more protection than others. And it o —
ers a way to communicate with senior leadership about the trade- o —
s between cost, convenience, and exposure. Without such a — ramework, protective measures may be inconsistent, reactive, or politically driven rather than strategic. But even the best risk models rely on assumptions. The accuracy o — a probability estimate depends on the availability and reliability o — data. Magnitude is o — ten easier to approximate in retrospect than in advance. Still, even imper — ect models are valu- able. They shi — t the conversation — rom vague concerns to concrete judgments. They reveal what a company believes about its own exposure and whether that belie — is grounded in evidence or hope. In practice, many trade secret threats — all into well-understood categories. Insider the — t, phishing attacks, lost devices, shared credentials — each has a known pattern and a body o — industry data. This makes them amenable to quanti — ication. And because they are quanti — iable, they can be ranked, tracked, and monitored over time. What risk assessment cannot do is eliminate judgment. Numbers must be inter- preted. Categories must be de — ined. Models must be updated as the business envi- ronment changes. Still, when built correctly, a structured approach to risk can help organizations act be — ore a breach occurs — not just respond a — terward.
3.2.2. De --- ining Uncertainty
Uncertainty is not a --- uzzier --- orm o --- risk. It is a di --- --- erent category altogether. Where
risk involves probabilities that can be estimated, uncertainty arises when such prob-
abilities are unknown or unknowable. It marks the limits o --- prediction, the boundary
where quantitative models lose their grip. For trade secret holders, that boundary is
closer than many assume.
Uncertainty pervades the legal environment in which trade secrets exist. A com
pany may have strong internal controls but cannot know how a judge will interpret
“reasonable e ---
orts” under the De — end Trade Secrets Act. It may disclose con — idential in — ormation under an NDA but cannot predict whether a jury will — ind the agree- ment en — orceable or the disclosure su —
iciently limited. The law o — trade secrets is — act- intensive, jurisdictionally — ragmented, and o — ten shaped by evolving norms. There is no algorithm that can assign a reliable probability to a — uture court ruling.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 78 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 79
The same is true in the competitive landscape. A startup might rely on secrecy to
protect a novel product design, believing that its competitors will play by the rules.
But what i --- a well- --- unded rival disregards the risk o --- litigation? What i --- a --- oreign part-
ner copies the product, knowing that en --- orcement abroad will be slow or ine ---
ective? These are not simply low-probability events. They are uncertain events — unbounded by usable data, driven by strategic behavior, and subject to externalities that cannot be modeled. Technological uncertainty adds another layer. New tools and plat — orms emerge constantly. Today’s secure system may be tomorrow’s liability. A company might encrypt its customer analytics with what it believes is a state-o — -the-art proto- col, only to learn that an advance in machine learning makes it possible in — er much o — the data — rom metadata alone, or that a new device can scan — or electromagnetic signatures — rom monitors, thus allowing outside actors to reconstruct sensitive visual content. These are not science — iction scenarios. Rather, they demonstrate the real ity that protection strategies must evolve — aster than traditional legal doctrines can respond. There is also human uncertainty: the internal variables that resist control. Will a departing employee honor their obligations? Will a junior developer share propri- etary knowledge at a meetup? Will a manager, under pressure to hit deadlines, autho- rize a risky disclosure to a vendor? These questions cannot be answered with statistics. They demand judgment, culture, and — oresight. None o — this means that trade secret protection is — utile. But it does mean that pro- tection cannot rest solely on risk models. In conditions o — uncertainty, decision-makers must rely on qualitative reasoning. They must use analogy, pattern recognition, and scenario thinking. They must weigh worst-case outcomes, not just average-case projec- tions. And they must learn to act even when no clear metric tells them what to expect. Understanding uncertainty is not a retreat — rom rationality. It is an extension o — it. It acknowledges that many important decisions are made with partial in — ormation, in evolving environments, by actors who are not — ully predictable. In such settings, strategy does not mean calculating the odds. It means preparing — or what cannot be calculated at all.
3.2.3. Domains o --- Uncertainty in
Trade Secret Strategy
Uncertainty is not random noise. It --- ollows patterns. Although individual outcomes
cannot be predicted, the sources o --- unpredictability o --- ten --- all into recurring catego-
ries. For trade secret holders, --- our domains o --- uncertainty tend to dominate strategic
decision-making: entrepreneurial, legal, technological, and human-behavioral. Each
requires a di --- --- erent --- orm o --- judgment and a di --- --- erent kind o --- response.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 79 10/16/25 9:25 PM 80 3 • Assessing Risks and Mitigating Vulnerabilities
3.2.3.1. Entrepreneurial Uncertainty
Business conditions change, o --- ten without warning. A company might launch a
product under the assumption that its pricing algorithm or supply chain method will
remain valuable --- or years — only to watch a competitor introduce a more e ---
icient model that renders the original advantage obsolete. Markets shi — t. Customer pre — er- ences evolve. New entrants disrupt cost structures or distribution channels. These dynamics reshape the value o — a trade secret long be — ore a breach occurs. In — ast- moving sectors like so — tware, logistics, and consumer technology, even a well-guarded secret can become irrelevant i — the strategic assumptions behind it no longer hold. Entrepreneurial uncertainty is especially salient — or startups and growth-stage
irms. These organizations o — ten rely on secrecy because they lack the resources — or patent — ilings or trademark campaigns. But they also — ace a volatile environment in which the most dangerous threat is not necessarily misappropriation but rather that their business model will be overtaken be — ore their secret can generate value. In such cases, the most important strategic question is not how to guard the secret but whether the secret is likely to matter six months — rom now.
3.2.3.2. Legal Uncertainty
Even when companies make serious e ---
orts to protect their secrets, the law may not respond as expected. Courts evaluate trade secret claims through — act-speci — ic analysis that varies by jurisdiction and evolves over time. What one judge considers a “reasonable e —
ort” to maintain secrecy, another may dismiss as inadequate. Legal standards are o — ten — ramed in general terms such as “not readily ascertainable” or “deriving value — rom not being known” but applied inconsistently in practice. This unpredictability extends to en — orcement. An NDA may appear airtight until a jury — inds it vague or overbroad. A protective order may be granted in one court but denied in another, based on a di — — erent reading o — procedural rules. Some doctrines, such as inevitable disclosure or threatened misappropriation, remain controversial and unevenly applied. Even i — a company ultimately prevails, delays, appeals, and evidentiary burdens can drain resources and erode the practical value o — success. Legal uncertainty is not just about doctrine. It is about institutions. Judges have di — — erent levels o — technical sophistication. Courts move at di — — erent speeds. Discovery may reveal more than it protects. Strategic decisions about whether to sue, settle, or stay quiet must account — or these variables, even i — they cannot be quanti — ied.
3.2.3.3. Technological Uncertainty
No technology remains stable --- or long. Advances in computation, data analysis,
connectivity, and surveillance continuously reshape the landscape o --- trade secret
protection. Techniques that were once considered secure — such as simple password
6406_Oranburg_Protecting Trade Secrets_1pp.indb 80 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 81
protection, VPN access, or non-indexed web storage — are now widely recognized as
inadequate. Encryption standards evolve. Collaboration tools change how in --- orma-
tion is shared. Arti --- icial intelligence opens new avenues --- or reverse engineering and
pattern detection.
These developments create uncertainty not only about threats but also about sa --- e-
guards. Will a new plat --- orm introduce vulnerabilities the company has not antici-
pated? Will a patch resolve a weakness or introduce another? Will a storage provider’s
terms o --- service inadvertently authorize broader access than intended? These are not
idle questions. They are daily concerns --- or companies whose secrets reside in code-
bases, databases, design --- iles, and distributed work --- lows.
Trade secrets depend on control. Technology, by its nature, disperses control.
That tension cannot be eliminated, but it must be acknowledged. A robust strategy
accounts not just --- or what is known today, but --- or what could change tomorrow.
3.2.3.4 Human-Behavioral Uncertainty
Perhaps the most pervasive and least predictable domain o --- uncertainty is human
behavior. People make mistakes. They act in bad --- aith. They respond to incentives,
pressures, loyalties, and --- rustrations that are o --- ten invisible to the organizations they
serve. An engineer may believe they are acting ethically by reusing design ideas at a
new job. A manager may bypass protocols under deadline pressure. A vendor may
assume that shared --- iles are not con --- idential unless explicitly labeled as such.
Policies can mitigate these risks, but they cannot eliminate them. Contracts can
establish obligations but cannot guarantee per --- ormance. Even good training may not
overcome distraction, carelessness, or personal ambition. Human behavior does not
ollow the logic o — a spreadsheet. It — ollows emotion, habit, and context. Trade secret strategy must make room — or that reality. This domain also includes internal dynamics. Does the organization take secrecy seriously? Do managers model good behavior? Are violations treated with appropri- ate consequence? A company’s internal culture is one o — the most power — ul predictors o — whether its secrecy measures will succeed. But culture is not a variable that can be programmed. It must be cultivated, sustained, and — when necessary — corrected.
3.3. Vectors o --- Loss o --- Secrecy
A trade secret is only protected --- or as long as it remains secret. That protection can
be lost in many ways — some law --- ul, some unlaw --- ul, and many that --- all into a gray
area. Understanding how secrecy is compromised is not just an academic question. It
is the practical starting point --- or every protection plan. Without a clear view o --- how
secrets might be lost, it is impossible to assess risk, prioritize resources, or design
meaning --- ul sa --- eguards.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 81 10/16/25 9:25 PM 82 3 • Assessing Risks and Mitigating Vulnerabilities
This section --- ocuses on the concept o --- loss vectors: the distinct pathways through
which a trade secret can lose its protected status. These vectors matter whether the
loss comes --- rom misappropriation, mistake, or necessity. They include internal expo-
sures, like employee misconduct; external exposures, like vendor leaks; technological
vulnerabilities, like unsecured storage; and even law --- ul conduct, like reverse engi-
neering or independent discovery. Each vector poses a di --- --- erent kind o --- threat and
calls --- or a di --- --- erent kind o --- analysis.
Mapping these vectors is a central component o --- the Trade Secret Protection Plan.
It is also essential to understanding real-world litigation. Many o --- the most important
trade secret cases hinge on how the in --- ormation was lost. Was the employee bound by
a con --- identiality agreement? Did the vendor have access to labeled secrets? Was the
technology reverse engineered --- rom public materials? These questions are not always
easy to answer. But they begin with a clear sense o --- what the vectors are.
The --- ollowing subsections provide a detailed --- ramework --- or identi --- ying and ana-
lyzing loss vectors. They serve both as a conceptual guide and as a checklist --- or prac-
tical application. Each vector is examined not only in terms o --- what it is but also
in terms o --- why it matters and how it tends to arise in business operations. Under-
standing these pathways is the --- irst step in designing de --- enses strong enough to keep
secrets secret.
3.3.1. Insider Threats and Employee Mobility
Insiders are o --- ten the most dangerous threat to trade secrets — not always because
they are malicious but because they already have access. Employees, executives,
interns, and contractors are trusted with sensitive in --- ormation to do their jobs. That
trust creates opportunity. When insiders misuse or mishandle con --- idential material,
the damage can be swi --- t and irreversible.
Some insider threats are deliberate. A departing employee may take --- iles to a com-
petitor, download source code --- or personal use, or share customer data to impress a
new employer. Others are the result o --- carelessness: --- orwarding con --- idential emails to
a personal account, uploading documents to an unsecured cloud service, or discuss-
ing sensitive projects with --- riends. In some cases, the risk is not action but inaction:
ailing to delete — iles, return physical materials, or abide by continuing obligations a — ter employment ends. Employee mobility compounds this risk. In industries where job switching is — re- quent and teams are built — rom overlapping networks o — pro — essionals, trade secrets o — ten travel with people. Even when an employee does not intend to steal anything, their knowledge and habits may re — lect con — idential methods learned at a prior job. This can lead to inadvertent use or disclosure o — protected material that ends up trig- gering legal disputes long a — ter the employee has moved on. One o — the most prominent insider risk cases arose when a senior executive at Bimbo Bakeries prepared to join a competitor while still employed and still accessing
6406_Oranburg_Protecting Trade Secrets_1pp.indb 82 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 83
con --- idential in --- ormation. The court allowed an injunction, even be --- ore any misappro-
priation occurred, based on the risk that the employee’s --- uture work would inevitably
draw on protected knowledge.
Courts Can Enjoin Threatened
Misappropriation
Bimbo Bakeries USA, Inc. v. Botticella
613 F.3d 102 (3d Cir. 2010)
Botticella, a senior executive at Bimbo Bakeries, accepted a job with a direct
competitor but continued accessing con --- idential --- iles during his --- inal weeks.
Bimbo sought an injunction be --- ore he le --- t, arguing that Botticella would inevi-
tably use Bimbo’s trade secrets in his new role, and the court agreed. Empha-
sizing the risk o --- irreversible harm i --- Botticella were allowed to begin work, it
granted a preliminary injunction. The decision turned on his continued access
to sensitive in --- ormation, his misleading statements during the transition, and
the similarity o --- the new role to his prior position.
In other cases, insider threats become criminal. For example, a --- ormer Motorola
employee was caught boarding a --- light to China with thousands o --- proprietary docu-
ments. The company’s internal systems had --- lagged abnormal download activity, which
triggered an investigation that led to prosecution under the Economic Espionage Act.
System Logs Can Serve as Evidence o ---
Misappropriation
United States v. Jin
733 F.3d 718 (7th Cir. 2013)
Hanjuan Jin, an engineer at Motorola, was stopped at the airport with over
a thousand sensitive documents in her luggage. Motorola’s system logs had
detected a surge in downloads be --- ore her unannounced departure. Prosecutors
charged her under the Economic Espionage Act. The court upheld her convic-
tion, noting that Motorola had both tracked the activity and taken prompt
action. The case highlighted the importance o --- real-time monitoring and docu-
mented access control in identi --- ying insider misappropriation.
Trade secret law does not prohibit people --- rom changing jobs. Nor does it --- or-
bid them --- rom using their general skills and experience. But it does require that
6406_Oranburg_Protecting Trade Secrets_1pp.indb 83 10/16/25 9:25 PM 84 3 • Assessing Risks and Mitigating Vulnerabilities
con --- idential in --- ormation gained under conditions o --- trust remain protected. Courts
are o --- ten care --- ul to preserve this balance. In some cases, they have rejected claims
based on speculative concerns, recognizing that employees are entitled to pursue new
opportunities — even with competitors.
“Inevitable Disclosure” Requires More
Than Job Similarity
LeJeune v. Coin Acceptors, Inc.
849 A.2d 451 (Md. Ct. Spec. App. 2004)
Coin Acceptors sued a --- ormer engineer who le --- t to join a competitor, alleg-
ing that his new role would lead to inevitable disclosure o --- trade secrets. The
court denied the injunction, --- inding no evidence that the employee had taken
con --- idential materials or was likely to misuse them. It emphasized that mere
job similarity and prior access were insu ---
icient without proo — o — a real threat. The decision rein — orced the principle that employee mobility is not, by itsel — , misappropriation.
Companies must there --- ore think critically about how in --- ormation is shared inter-
nally. Who needs access to what? Are materials clearly labeled as con --- idential? Are
employees trained on what counts as a trade secret and how it must be handled? Are
exit interviews used to rein --- orce continuing obligations? The answers to these ques-
tions determine whether a court will view the company as having taken reasonable
steps to maintain secrecy or as having allowed its secrets to walk out the door.
Legal disputes over insider threats o --- ten turn on documentation and diligence.
Courts want to see policies, training, access controls, and en --- orcement. Without
them, even the strongest claim o --- the --- t may --- all --- lat. With them, companies can not
only protect their secrets, but also deter misappropriation be --- ore it starts.
3.3.2. Vendor and Partner Exposure
Trade secrets do not stay locked in a single department or secure --- acility. They
move — through contracts, collaborations, shared services, and outsourced opera-
tions. When companies work with vendors, suppliers, consultants, or joint venture
partners, they o --- ten share con --- idential in --- ormation to make the relationship --- unction.
That exchange creates opportunity but also exposure.
The risk here is not always deliberate the --- t. More o --- ten, it is a breakdown in align-
ment. A vendor may not realize that a shared schematic is proprietary. A supplier
may store con --- idential data on insecure servers. A consultant may include propri-
etary process steps in a presentation to another client, believing that they are only
6406_Oranburg_Protecting Trade Secrets_1pp.indb 84 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 85
describing industry norms. These errors can be just as damaging as outright misap-
propriation — and harder to detect.
This problem is compounded when there is no direct relationship between the
originator o --- the trade secret and the party who ultimately receives it. In --- ormation
may pass through layers o --- contractors or intermediaries, none o --- whom --- ully under-
stand the obligations attached. Even when a nondisclosure agreement is in place,
courts will look closely at whether it clearly de --- ined what in --- ormation was protected,
whether the receiving party understood those boundaries, and whether reasonable
e ---
orts were made to prevent disclosure. A case — rom the — inancial services industry highlights this dynamic. The plainti —
claimed it shared a proprietary investment concept that ultimately reached the de --- en-
dant through a chain o --- intermediaries. But because the in --- ormation passed through
in --- ormal channels and lacked clearly de --- ined con --- identiality obligations, the court
declined to --- ind misappropriation.
Discloser Must Establish a Duty o --- Con --- idence
Novus Group, LLC v. Prudential Financial, Inc.
No. 12-CV-5279 (S.D.N.Y. Apr. 22, 2014)
Novus Group alleged that it shared a proprietary --- inancial product idea with
Prudential through a series o --- intermediaries. The court --- ound that the plain-
ti ---
had not established a direct or su —
iciently clear con — idential relationship between itsel — and the de — endant. Because there was no evidence that Pruden- tial knew the idea was shared under restrictions and no NDA covered the — inal exchange, the court declined to treat the in — ormation as misappropriated. The decision illustrates the di —
iculty o — asserting trade secret rights when in — orma- tion is passed in — ormally or indirectly across multiple parties.
The takeaway is not that partnerships are inherently risky but rather that they must
be structured with clarity. Companies should de --- ine what in --- ormation is con --- iden-
tial, document who receives it, and monitor how it is used. Con --- identiality agree-
ments should be tailored, not boilerplate. Just as importantly, those agreements
should be backed by practical controls — limited access, version tracking, retention
policies — that rein --- orce the legal --- ramework with operational discipline.
Trade secret law does not penalize companies --- or collaborating. But it does expect
them to take care. When courts assess whether in --- ormation was treated as a trade
secret, they ask not only whether it was labeled con --- idential but also whether the
owner behaved as though secrecy mattered — even when someone else was holding
the data.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 85 10/16/25 9:25 PM 86 3 • Assessing Risks and Mitigating Vulnerabilities
3.3.3. Cybersecurity and Technical Weak Points
Not all trade secret threats come --- rom people. Some come --- rom systems — or --- rom
the --- ailure to secure them. As more proprietary in --- ormation moves into digital envi-
ronments, trade secret exposure increasingly occurs through technical vulnerabili-
ties: insecure servers, unencrypted --- iles, shared credentials, --- orgotten access points, or
miscon --- igured cloud plat --- orms. These exposures o --- ten arise without malicious intent.
But when they are exploited — by competitors, hackers, or even automated tools — the
result is the same: the secret is lost.
Unlike traditional the --- t, technical ex --- iltration may leave no trace. A contractor
might access a shared drive --- rom an unsecured laptop. A --- ormer employee’s login may
remain active a --- ter departure. A third-party service may retain copies o --- uploaded
materials even a --- ter a project ends. These are not exotic attack vectors. They are ordi-
nary oversights. And they can destroy the legal --- oundation o --- a trade secret by making
the in --- ormation “readily ascertainable” to others with only minimal e ---
ort. One o — the most striking examples comes — rom a case in the Fi — th Circuit. A tech- nology — irm alleged that its competitor had misappropriated con — idential so — tware by reverse engineering a data trans — er process. The de — endant had obtained the so — tware through law — ul means, but the plainti —
claimed that internal technical sa — eguards should have prevented such analysis. The case illustrates how courts examine both the legal and technical context in assessing whether a trade secret was su —
iciently protected.
“Reasonable E ---
orts” O — ten Requires Technical Barriers
GlobeRanger Corp. v. So --- tware AG USA, Inc.
836 F.3d 477 (5th Cir. 2016)
GlobeRanger developed so --- tware --- or tracking inventory using RFID tags.
It alleged that So --- tware AG misappropriated con --- idential aspects o --- the sys-
tem a --- ter obtaining a copy through a reseller. The court --- ound that although
So --- tware AG had law --- ully acquired the so --- tware, questions remained about
whether reverse engineering violated an implied duty o --- con --- identiality. The
case turned in part on the technical architecture o --- the system — whether it
included adequate protections against disassembly and analysis. The court
allowed the misappropriation claim to proceed, emphasizing that trade secret
protection depends not only on access restrictions but also on technical barri-
ers to unauthorized use.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 86 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 87
This kind o --- threat cannot be managed solely through contracts. It requires robust
in --- ormation security practices: tiered access controls, encryption in transit and at rest,
device management, network monitoring, o ---
boarding protocols, and — requent audits o — system permissions. It also requires awareness. Many businesses underestimate how much sensitive in — ormation circulates on internal drives, Slack channels, cloud
olders, and mobile devices. The law recognizes that no system is per — ect. But it does expect trade secret owners to behave as i — secrecy matters. Courts have consistently looked to technical discipline as a signal o — intent: Did the company lock down its most sensitive — iles? Did it restrict access by role? Did it take action when irregular activity was detected? I — the answer is no, even well-dra — ted NDAs may not be enough to preserve the claim. In a digital world, technical sa — eguards are not optional — they are — oundational. They do not replace legal protections. They make those protections credible.
3.3.4. Reverse Engineering and Law --- ul
Discovery
Not all loss o --- secrecy results --- rom misconduct. Trade secret law does not protect
in --- ormation --- rom being discovered through law --- ul means. I --- a competitor indepen
dently develops the same process, analyzes a publicly available product, or reverse
engineers a commercial device without breaching any duty o --- con --- identiality, the
secret is lost — and no legal remedy applies.
This principle distinguishes trade secret law --- rom other --- orms o --- intellectual prop-
erty. Unlike patents, which grant exclusive rights regardless o --- independent inven-
tion, trade secrets are vulnerable to legitimate discovery. That vulnerability is not a
loophole. It is a --- eature o --- the system. Trade secret protection rewards con --- identiality
and internal discipline — not exclusivity. I --- another party can --- igure out the same idea
without cheating, the law allows them to do so.
Reverse engineering is the most important and most common law --- ul vector o ---
loss. Courts have long held that a product placed in the marketplace can be analyzed,
deconstructed, and understood, so long as the analyst does not violate any legal obli-
gation in the process. This includes chemical analysis, so --- tware disassembly, physical
inspection, and even behavioral testing.
A well-known case --- rom the Ninth Circuit illustrates this clearly. A company that
sold mechanical locks claimed trade secret protection over its key codes. But lock-
smiths had law --- ully acquired the locks and decoded the system by observing the key
and lock combinations. The court held that the in --- ormation was no longer protectable
because it had become readily ascertainable by proper means.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 87 10/16/25 9:25 PM 88 3 • Assessing Risks and Mitigating Vulnerabilities
Law --- ul Reverse Engineering Renders In --- ormation
“Readily Ascertainable”
Chicago Lock Co. v. Fanberg
676 F.2d 400 (9th Cir. 1982)
Chicago Lock Co. manu --- actured mechanical locks that used proprietary
key codes. Independent locksmiths compiled re --- erence charts o --- the codes by
analyzing locks obtained in the market. The company sued to stop publication
o --- the charts, claiming trade secret misappropriation. The court rejected the
claim, holding that the in --- ormation had been acquired through law --- ul reverse
engineering. Once the locks were sold, nothing prevented customers or third
parties --- rom examining them to deduce their internal design.
Reverse engineering is not the only law --- ul path to disclosure. Some trade
secrets are uncovered through independent development. Others must be disclosed
in regulatory --- ilings, in contractual negotiations, or --- or public sa --- ety compliance.
While legal sa --- eguards can help limit how much is revealed, they cannot always pre-
vent loss o --- secrecy. I --- disclosure is required, the in --- ormation may lose its protected
status unless care --- ully managed through redactions, protective orders, or parallel IP
strategies.
The legal standard is clear: i --- a trade secret becomes readily ascertainable by proper
means, it ceases to be a trade secret. This places the burden on the owner to antici-
pate how the in --- ormation might be discovered and to take steps to delay or prevent
that discovery where possible. Techniques may include product ob --- uscation, modular
design, noncompete provisions (where en --- orceable), and care --- ul release sequencing.
But in many cases, the only reliable solution is to avoid releasing the secret at all.
Trade secret protection is strongest when the in --- ormation stays out o --- the public
eye. Once a product is shipped, reverse engineering is always a possibility. The law will
not save a company --- rom exposure it could have prevented.
3.3.5. Necessary Disclosure and Operational
Sharing
Some trade secrets cannot --- unction unless they are shared. A proprietary manu-
acturing method may need to be disclosed to a third-party processor. A customer database may be used by a marketing — irm to run targeted campaigns. A core algo- rithm may be embedded in a product sold to end users. In each case, the in — ormation must be exposed in order to generate value. That exposure creates risk, even when it is operationally necessary and legally authorized.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 88 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 89
The law does not prohibit companies --- rom sharing trade secrets with employees,
vendors, or collaborators. But it does require them to do so in a way that maintains
secrecy. Courts routinely ask whether the company took reasonable steps to preserve
con --- identiality when in --- ormation was distributed. This includes legal sa --- eguards, like
nondisclosure agreements and licensing terms. It also includes technical and proce-
dural controls, like access restrictions, data labeling, encryption, and audit trails.
The more widely a secret is shared, the harder it is to protect. Each disclosure cre-
ates a new vector --- or loss — not just through malice or error but through misinterpre-
tation as well. A document marked “con --- idential” may be --- orwarded to a new team
member who has not signed an NDA. A subcontractor may assume that shared --- iles
are general know-how. A team in one department may use a process they believe to
be routine, not realizing it was originally protected in --- ormation.
Courts are not sympathetic to companies that rely solely on --- ormalities. They look
or evidence that the business took its secrecy obligations seriously. This includes clar- ity in documentation, care in training, consistency in en — orcement, and restraint in distribution. A secret that is shared indiscriminately — without guardrails, tracking, or internal awareness — may lose its legal protection even i — it was once con — idential. A recent case — rom the District o — Massachusetts illustrates how even well- intentioned operational disclosures can undermine trade secret status when sa — e- guards are inadequate.
Operational Sharing Without Sa --- eguards
Undermines Trade Secrets
AnywhereCommerce, Inc. v. Ingenico Inc.
578 F. Supp. 3d 219 (D. Mass. 2022)
AnywhereCommerce alleged that a --- ormer partner misused trade secrets
shared during integration work on payment processing systems. The plainti ---
had shared in --- ormation through routine collaboration but --- ailed to establish
that the materials were disclosed under speci --- ic con --- identiality restrictions. The
court --- ound that although the in --- ormation may have had commercial value,
the lack o --- clear protective measures during operational use undermined its
trade secret status. The decision emphasized that mere intent to protect is not
enough — reasonable e ---
orts must be evident in practice.
Not every trade secret can be locked away. Some must be deployed. Some must be
licensed. Some must be explained to customers or integrated with third-party plat-
orms. The challenge is to do so without — or — eiting protection. That requires care — ul planning, disciplined execution, and a clear understanding that necessary disclosure does not mean unprotected disclosure.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 89 10/16/25 9:25 PM 90 3 • Assessing Risks and Mitigating Vulnerabilities
Trade secret law rewards those who treat con --- identiality as a continuous obliga-
tion, not a one-time --- ormality. When sharing is necessary, secrecy must travel with
the in --- ormation.
3.4. Strategic Decision-Making Under
Conditions o --- Uncertainty
Trade secret protection is not just a legal --- unction — it is a strategic one. While
lawyers may dra --- t NDAs and engineers may implement access controls, the question
o --- how much to protect, how widely to share, and what risks to accept --- alls to decision-
makers operating under uncertainty. These choices are rarely made with per --- ect in --- or-
mation. Most o --- the time, they involve tradeo ---
s, assumptions, and an uncom — ortable blend o — intuition and logic. Traditional risk analysis works well when probabilities are known. But trade secret decisions o — ten involve uncertainties that cannot be quanti — ied. Courts may apply unpredictable standards. Competitors may behave opportunistically. Employees may de — ect unexpectedly. Emerging technologies may render current protections obsolete. In these environments, companies must rely on strategic reasoning — structured tools that support sound judgment even when outcomes are unclear. This section explores several methods that organizations use to make decisions under uncertainty. These are not legal doctrines. They are business concepts with direct relevance to trade secret management. Each helps explain how companies can move — orward even when the path ahead is di —
icult to map.
3.4.1. Regret Minimization
One o --- the simplest and most power --- ul tools --- or strategic reasoning under uncer-
tainty is regret minimization. Rather than asking, “What is most likely to happen?”
this approach asks, “I --- I turn out to be wrong, what will I regret most?”
Applied to trade secrets, this o --- ten leads companies to overprotect high-value
in --- ormation, even when the probability o --- exposure seems low. I --- the downside o ---
disclosure would be catastrophic — loss o --- a product lead, damage to customer trust,
competitive erosion — the company may choose aggressive controls not because the
risk is high but because the regret would be severe i --- the risk materialized.
This approach explains why some businesses require dual-authentication to access
sensitive --- iles, or why they limit visibility even within trusted teams. It is not neces-
sarily because they expect a breach; rather, it is because they could not tolerate the
outcome i --- a breach occurred.
Regret minimization is especially use --- ul when comparing two imper --- ect options.
Should a company share a trade secret with a prospective partner be --- ore a deal is
6406_Oranburg_Protecting Trade Secrets_1pp.indb 90 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 91
inalized? I — the deal — alls through, will the company regret the exposure more than it would regret a delay in negotiations? These are strategic choices. The goal is not to eliminate uncertainty — but to live with it wisely.
3.4.2. Option Value and Flexibility
Secrecy preserves --- lexibility. In --- ormation that remains con --- idential gives a com
pany the option to patent it later, to license it selectively, or to pivot in response to
market developments. Once a trade secret is disclosed, even inadvertently, that --- lex-
ibility may be lost.
This is why many organizations treat secrecy itsel --- as a strategic asset. They delay
public --- ilings. They limit disclosures in contract negotiations. They split projects into
modules to avoid revealing the --- ull picture to any one outsider. These techniques are
not just about compliance — they are about preserving option value.
Flexibility matters most when --- uture outcomes are uncertain. A company may not
yet know whether it will pursue regulatory approval, seek outside investment, or part-
ner with a larger --- irm. By limiting exposure now, it retains the --- reedom to choose later.
This approach borrows --- rom real-options thinking in --- inance: the idea that waiting
has value when the cost o --- action is irreversible.
Trade secrets are inherently option-like. They do not guarantee exclusivity, but they
do allow a --- irm to keep its strategic hand hidden until the time is right. Protecting that
option — through technical, contractual, and procedural means — is a core element o ---
trade secret strategy.
3.4.3. Scenario Thinking and
Adaptive Planning
When probabilities are unclear, one alternative to --- orecasting is scenario thinking.
This approach asks decision-makers to imagine a range o --- plausible --- utures and to
plan --- or how each would a ---
ect the trade secret at issue. What i — a key engineer leaves and joins a competitor? What i — a — oreign jurisdic- tion re — uses to en — orce the company’s NDA? What i — a regulatory — iling becomes pub- lic despite redactions? Rather than pretending these outcomes are unlikely, scenario thinking prepares — or them. It asks: What would we do i — this happened tomorrow? The value o — this method is not in prediction but rather in preparedness. Scenario thinking allows a company to identi — y weak points in its current controls, build con- tingency plans, and assign responsibility be — ore a crisis occurs. It also supports inter- nal alignment: by discussing potential — utures in advance, teams are less likely to panic or blame each other when di —
icult situations arise. Adaptive planning builds on this by creating mechanisms — or response. For exam- ple, i — a competitor releases a product that appears to re — lect internal know-how, who
6406_Oranburg_Protecting Trade Secrets_1pp.indb 91 10/16/25 9:25 PM 92 3 • Assessing Risks and Mitigating Vulnerabilities
investigates? Who determines whether to litigate? Who controls messaging to cus-
tomers or investors? These are not legal questions alone — they are also strategic ones.
And they are best answered be --- ore the pressure hits.
3.4.4. Legal Uncertainty and Judicial Risk
Legal uncertainty adds a unique layer o --- complexity to trade secret decision-
making. A company may take extensive steps to protect its secrets, only to --- ind that a
court views those steps as insu ---
icient. Or it may pursue en — orcement, only to see the case dismissed on procedural grounds or limited by narrow judicial interpretation. This is not a reason to give up on trade secret protection. But it is a reason to — actor judicial risk into strategic choices. Companies should consider not only what the law says but also how courts have interpreted similar — acts in the past — and how long, costly, and public en — orcement might become. Legal uncertainty also a —
ects settlement strategy. A business may have a strong claim but choose to resolve a dispute quietly rather than risk unwanted disclosure during litigation. Or it may decline to — ile suit i — the evidentiary burden is too high or the — orum is un — avorable. These decisions are not signs o — weakness. They are part o — a mature risk strategy, one that recognizes the di —
erence between being right and being e —
ective.
3.4.5. Organizational Behavior and Bias
Finally, decision-making under uncertainty is shaped not only by in --- ormation but
by human behavior as well. Organizations tend to overestimate their security, under-
estimate adversaries, and discount rare but catastrophic events. These cognitive and
cultural biases can derail even the most care --- ully designed protection plans.
Overcon --- idence is especially dangerous. Teams may believe that their employees
would “never do that” or that their contracts are “airtight.” They may dismiss early
warning signs or --- ail to review access logs because no incident has occurred. This
mindset can blind an organization to real vulnerabilities.
Group dynamics also matter. Risk committees may avoid di ---
icult conversations or de — er to dominant voices. Legal and technical teams may operate in silos, — ailing to coordinate their e —
orts. These behavioral patterns are rarely visible on an org chart, but they shape every aspect o — trade secret strategy. The best organizations build processes to counteract these tendencies. They create structured risk reviews. They document assumptions. They invite dissent. And they treat risk management not as a box-checking exercise but as an evolving practice that requires judgment, humility, and continuous attention. Trade secrets are lost not only through the — t but also through inattention. Strategic decision-making under uncertainty is how companies guard against both.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 92 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 93
3.5. Mapping and Pro --- iling the
Threat Environment
Understanding risk requires more than knowing what threats exist. It requires a
structured picture o --- who might want access to a trade secret, how they might attempt
to get it, and where the organization’s de --- enses are most likely to --- ail. This means
mapping the threat environment in practical, not abstract, terms. Just as engineers
create diagrams o --- system architecture, trade secret managers must build models o ---
exposure — models that re --- lect the actual --- low o --- in --- ormation, the real-world behavior
o --- adversaries, and the structure o --- the organization itsel --- .
Trade secret law expects owners to take reasonable steps to maintain secrecy. But
reasonable steps depend on context. A one-person startup with a single proprietary
method --- aces a di --- --- erent environment than a multinational with dozens o --- overlapping
product lines and an extended supply chain. The threats are di --- --- erent. The resources
are di --- --- erent. The expectations are di --- --- erent. This section provides a --- ramework --- or
building a threat model that matches the organization’s speci --- ic posture.
3.5.1. Adversary Pro --- iling
Every trade secret threat has a potential actor behind it. Sometimes the actor is
external: a competitor, a vendor, a state-backed entity. Other times, it is internal: a
disgruntled employee, a careless contractor, a well-meaning executive under pressure.
Pro --- iling adversaries means identi --- ying not only who might bene --- it --- rom misappro-
priation but also who has the motive, means, and opportunity to act.
Some businesses --- ace specialized adversaries. A pharmaceutical company oper-
ating near patent expiration may expect reverse engineering --- rom generic manu-
acturers. A tech — irm in a competitive hiring market may expect sta —
poaching. A de — ense contractor may expect surveillance by — oreign agents. Pro — iling helps com- panies prioritize which secrets to guard most heavily, and which vectors to monitor most closely. The goal is not to assign blame in advance. It is to develop a realistic understand- ing o — the incentives and capabilities o — others. Would a competitor pay — or inside in — ormation? Would a regulator require disclosure that leaks into the public domain? Would a partner company retain access to con — idential — iles a — ter a joint project ends? These are questions that shape real risk — not hypotheticals, but the speci — ic ways trade secrets may come under pressure. Pro — iling also allows organizations to consider patterns. Have similar companies experienced leaks in speci — ic jurisdictions? Are competitors investing in technologies that make reverse engineering easier? Are certain vendors working with both the company and its rivals? The answers to these questions in — orm both legal strategies and operational decisions, such as who gets access to what and under what conditions.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 93 10/16/25 9:25 PM 94 3 • Assessing Risks and Mitigating Vulnerabilities
3.5.2. Attack Sur --- ace Analysis
An adversary needs an opening. That opening may be technical, physical, proce-
dural, or cultural. The set o --- all such openings is o --- ten re --- erred to as the attack sur --- ace.
For trade secret protection, the attack sur --- ace includes every place a secret is stored,
shared, or transmitted. It includes servers, devices, notebooks, emails, conversations,
whiteboards, cloud drives, onboarding materials, and exit interviews. I --- a trade secret
can be seen or in --- erred, it can be taken.
Mapping the attack sur --- ace begins with the inventory. What secrets exist, and where
do they live? Who has access? How is that access controlled, logged, or reviewed?
What policies govern disclosure? What tools monitor compliance? Many companies
are surprised by how widely their most valuable in --- ormation circulates and how --- ew
barriers exist to accessing it.
Attack sur --- ace analysis also requires understanding indirect exposure. A market-
ing team may use a proprietary pricing model without knowing how it works. A
design partner may receive speci --- ications that re --- lect years o --- con --- idential develop-
ment. A help desk technician may have access to internal documentation containing
trade secrets unrelated to their duties. Each o --- these exposures increases the sur --- ace
area and, there --- ore, the risk.
Cultural practices can widen the attack sur --- ace too. I --- employees routinely share
screenshots in messaging apps, download --- iles to personal devices, or use unsanctioned
collaboration tools, technical controls may o ---
er little protection. Trade secret security is only as strong as the system that en — orces it — and that system includes behavior. Attack sur — ace analysis does not guarantee prevention. But it enables visibility. It helps companies — ocus protection where it is needed most, limit unnecessary expo- sure, and document the kinds o — reasonable e —
orts courts expect to see when evaluat- ing trade secret claims.
3.6. Methods --- or Assessing Risks
Once the organization has identi --- ied its trade secrets, understood the nature o --- risk
and uncertainty, and mapped its threat environment, the next task is to assess which
secrets are most at risk and why. This is not a matter o --- intuition or guesswork. It is a
structured exercise that combines --- actual analysis, operational insight, and reasoned
judgment.
Risk assessment does not produce per --- ect answers. It produces visibility. By artic-
ulating each trade secret’s likelihood o --- exposure and how damaging that exposure
would be, companies can begin to prioritize protections. Some secrets may require
substantial investment in sa --- eguards. Others may pose only minimal risk. The point
is not to eliminate risk entirely but rather to align protection e ---
orts with actual exposure.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 94 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 95
This section outlines three common tools --- or trade secret risk assessment: vul-
nerability audits, risk matrices, and integration with existing enterprise --- rameworks.
Each approach has limitations. But when used together, they provide a practical --- oun-
dation --- or making de --- ensible, in --- ormed decisions about where and how to protect
con --- idential in --- ormation.
3.6.1. Vulnerability Audits
A vulnerability audit begins with a simple premise: the organization must know
how its trade secrets could be lost be --- ore it can decide how to protect them. The
audit process identi --- ies weak points in the systems, processes, and people who handle
sensitive in --- ormation. It evaluates both the existence o --- protections and their actual
implementation.
The process typically starts with access mapping. Who can see each trade secret?
Is access limited by role? Are logs kept and reviewed? Are permissions updated when
team members change projects or leave the company? Many --- irms --- ind that theo-
retical restrictions are not re --- lected in daily operations. A server may be password-
protected, but the password may be shared among dozens o --- users. A con --- idential --- ile
may be labeled but stored in a shared --- older accessible to contractors.
The audit then examines disclosure pathways. When is the in --- ormation shared
outside the company? Are NDAs signed? Are they speci --- ic to the in --- ormation at
issue? Is the in --- ormation labeled, segregated, or protected by technical measures? I ---
the trade secret appears in a pitch deck, is that deck marked as con --- idential, and is it
sent through secure channels?
Vulnerability audits also include cultural and procedural review. Are employees
trained in trade secret handling? Are security practices en --- orced consistently? Is there
a clear process --- or reporting concerns? Do managers rein --- orce or undermine con --- i-
dentiality norms? A trade secret is only as secure as the environment in which it is
handled.
The value o --- a vulnerability audit lies not in the number o ---
laws it uncovers but in the discipline it instills. It — orces the organization to articulate how it protects its most valuable in — ormation — and where that protection — alls short. It also creates documen- tation. I — litigation arises, the audit provides evidence that the company took secrecy seriously, even i — not every control was per — ect.
3.6.2. Risk Matrices
A risk matrix translates complex judgments into structured comparisons. It helps
organizations assess which trade secrets are at greatest risk, based on two dimensions:
the likelihood o --- exposure and the magnitude o --- harm. These assessments may be
qualitative or quantitative, but the goal is the same — to prioritize threats and allocate
resources accordingly.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 95 10/16/25 9:25 PM 96 3 • Assessing Risks and Mitigating Vulnerabilities
A basic matrix divides both axes into three categories: low, medium, and high. A
trade secret with high likelihood and high harm appears in the upper-right corner
o --- the matrix and demands urgent protection. A secret with low likelihood and low
harm may warrant only routine sa --- eguards. Secrets that --- all in between require closer
scrutiny. Some may be hard to access but extremely valuable. Others may be --- re-
quently shared but only moderately important.
The matrix does not supply exact answers. It supports deliberation. It helps teams
articulate why they see a particular risk as serious or manageable. It sur --- aces disagree-
ment. It --- orces speci --- icity. Why is this risk labeled high? What makes that one low?
What assumptions underlie those judgments?
Risk matrices also help identi --- y outliers. I --- a secret is extremely valuable but widely
accessible, the company may decide to restrict access. I --- a secret is routinely shared
but o --- low strategic value, the company may decide to relax controls. The point is not
to treat every secret the same but rather to match e ---
ort to exposure. Like any model, the matrix depends on input quality. Assessments must be grounded in actual work — lows, not abstract — ears. They must re — lect current behavior, not aspirational policy. But when done rigorously, the matrix provides a de — ensible, transparent basis — or risk classi — ication — one that holds up under internal review and external scrutiny alike.
3.6.3. Framework Integration
Many companies already maintain enterprise risk management systems. These sys-
tems may --- ollow international standards such as ISO 31000, sector-speci --- ic guidelines
such as the NIST Cybersecurity Framework, or internal protocols tailored to regula-
tory requirements. Trade secret protection can and should be integrated into these
existing structures.
ISO 31000 o ---
ers a general model — or risk management: establish the context, identi — y risks, analyze their likelihood and impact, implement treatments, and review outcomes. This model — its naturally with trade secret protection. The context is the company’s competitive position. The risks are vectors o — secrecy loss. The treatments are the sa — eguards described in later chapters. The review process includes audits, monitoring, and updates to the inventory. The NIST Cybersecurity Framework provides more detailed guidance in digital environments. It emphasizes — ive — unctions: identi — y, protect, detect, respond, and recover. These can be applied directly to trade secrets stored or transmitted electron- ically. Identi — ication maps what in — ormation quali — ies as a trade secret. Protection includes access controls and encryption. Detection involves anomaly tracking and log review. Response and recovery include breach protocols and containment strategies. Integrating trade secret risk into broader systems helps to ensure consistency. It also builds institutional support. When legal, technical, and operational teams work
rom the same — ramework, policies are more likely to be implemented, understood,
6406_Oranburg_Protecting Trade Secrets_1pp.indb 96 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 97
and en --- orced. Trade secrets do not sit in a legal silo. They exist in code reposito-
ries, --- actory --- loors, design studios, and vendor databases. Protecting them requires a
shared language — and shared responsibility.
Framework integration also supports external validation. When courts, regulators,
or investors ask whether a company takes trade secret protection seriously, pointing to
a systematic, standards-aligned process sends a stronger signal than ad hoc policies.
The goal is not compliance --- or its own sake. It is coordination, clarity, and credibility.
3.7. The Trade Secret Paradox
Trade secret law contains a conceptual puzzle at its core — a paradox that distin-
guishes it --- rom every other area o --- intellectual property. Patents are granted by the
government. Copyrights arise automatically when an author creates original work.
Trademarks protect signs and symbols used in commerce. But trade secrets are di ---
erent. They are not de — ined by registration or authorship. They are de — ined by secrecy. And yet, secrecy is not a stable category. Under the Uni — orm Trade Secrets Act and the De — end Trade Secrets Act, a trade secret is in — ormation that derives independent economic value — rom not being generally known and is subject to reasonable e —
orts to maintain its secrecy. This de — inition introduces a — eedback loop: the existence o — legal protection depends on the owner’s e —
orts to prevent misappropriation, but whether misappropriation occurred depends on whether the in — ormation was legally pro- tected in the — irst place. This creates the trade secret paradox: You cannot prove misappropriation unless the in — ormation was a trade secret. But you cannot prove something was a trade secret unless you can show that you tried to prevent misappropriation. The law protects secrets. But whether something is a secret is judged only a — ter a breach occurs. The right arises — rom conduct. The violation is de — ined by whether that conduct was enough. This circularity is not just theoretical. It de — ines how courts decide cases. When a business sues — or trade secret the — t, the — irst question is not whether the de — en- dant acted improperly. It is whether the in — ormation was actually a trade secret at the time o — the alleged the — t. That depends on — acts: Did the company label its docu- ments? Limit access? Use NDAs? Train employees? Monitor compliance? Courts will not assume secrecy. They require proo — that the company behaved as though secrecy mattered. This means that even wrong — ul acts — taking — iles, disclosing documents, using a rival’s proprietary process — may not be considered misappropriation i — the plainti —
ailed to treat the in — ormation as a secret. The legality o — the taker’s conduct is contin- gent on the owner’s behavior.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 97 10/16/25 9:25 PM 98 3 • Assessing Risks and Mitigating Vulnerabilities
This is the paradox in --- ull: Trade secret law does not de --- ine a --- ixed category o ---
protected in --- ormation. It de --- ines a dynamic relationship between a business and its
knowledge. The same piece o --- in --- ormation may or may not be a trade secret depend-
ing on how it was handled. Secrecy is not a status. It is a --- unction o --- e ---
ort. That e —
ort must precede the loss. You cannot retroactively create protection once the in — ormation is gone. Trade secret law protects only what was already being protected. It judges the past, not the intention. The paradox is that legal protection exists only i — the owner acted in a way that assumed legal protection would be needed — be — ore knowing that any violation would occur. Trade secrets, in this sense, are per — ormative. They exist because the owner treats them as i — they exist. And only by treating them that way will the law agree.
3.8. Resolving the Circularity
Paradox
The circularity at the heart o --- trade secret law is not a --- law. It is a --- eature that
re --- lects the nature o --- secrecy itsel --- . Unlike other --- orms o --- legal protection, which
begin with registration or authorship, trade secret protection begins with behavior.
The law responds not to the content o --- the in --- ormation but to the way it is treated.
This makes trade secrets deeply contextual, highly --- act-dependent, and inseparable
rom organizational conduct. The key to resolving the paradox is to recognize that protection and risk are mutu- ally de — ining. A company’s legal ability to stop misappropriation depends on the steps it took to prevent that misappropriation. Those steps do not merely support the legal claim — they are what create the conditions — or the claim to exist. Earlier in this chapter, we explored how threats arise — rom both law — ul conduct, such as reverse engineering or independent discovery, and unlaw — ul conduct, such as insider the — t or contractual breach. But whether a given act — alls into one category or the other depends on whether the in — ormation was legally protected as a trade secret. And that, in turn, depends on what the owner did to maintain secrecy. This is where strategy matters. As we saw in Sections 3.4 and 3.6, risk assessment is not just about identi — ying threats. It is about documenting control. It is about making choices — what to protect, how to protect it, and where to draw the line between nec- essary sharing and unacceptable exposure. These choices establish the — actual — ounda- tion — or legal en — orceability. The risk matrix is one tool. It helps prioritize which secrets require the strongest controls. The vulnerability audit is another. It exposes gaps between policy and prac- tice. But the real solution to the paradox is behavioral. Courts do not en — orce rights in the abstract. They en — orce evidence o — care. When a company can show that it treated
6406_Oranburg_Protecting Trade Secrets_1pp.indb 98 10/16/25 9:25 PM 3 • Assessing Risks and Mitigating Vulnerabilities 99
its in --- ormation as secret — not just in policy, but in daily operations — it gives the law
something to work with.
This also explains why so many trade secret claims --- ail. Plainti ---
s o — ten assume that the wrongdoing speaks — or itsel — . But the law does not begin with the wrongdo- ing. It begins with the question o — whether the in — ormation was protected in the — irst place. That protection must be visible, consistent, and credible. It must be embodied in NDAs, access logs, labeling practices, training protocols, and audits. It must appear not just in courtroom declarations but also in ordinary routines. In trade secret law, certainty comes not — rom rules but — rom preparation. The circu- larity is resolved when organizations treat protection as a continuous act — an opera- tional reality that gives meaning to the legal category. Trade secrets are not de — ined by their value or novelty. They are de — ined by how they are handled. The in — ormation becomes a trade secret because the company acted as i — it were one and because it can prove that it did.
3.9. From Awareness to Action
Trade secrets do not protect themselves. They exist only because an organization
acts — early, consistently, and deliberately — to keep them secret. This chapter has laid
out the conceptual and strategic --- ramework --- or understanding how trade secrets are
lost, how risks are assessed, and why protection begins long be --- ore litigation. It has
shown that secrecy is not a state o --- nature. It is a state o --- practice.
By now, the paradox at the heart o --- trade secret law should --- eel less puzzling. There
is no contradiction in requiring owners to prove they protected what they claim was
secret. It is not a trap. It is the bargain that de --- ines the entire system: the law will
en --- orce secrecy, but only i --- secrecy has already been maintained.
This means that risk assessment is not merely a technical exercise. It is the --- oun-
dation o --- legal credibility. Every decision — what to classi --- y as a trade secret, how to
limit access, when to share, and with whom — has downstream consequences. These
decisions determine whether the law will recognize a violation as misappropriation
or dismiss it as --- air competition.
Chapters 1 and 2 provided the groundwork: how trade secrets are de --- ined, and
how they are inventoried and categorized. This chapter has shown how risk enters
the picture, both as a practical concern and as a condition o --- en --- orceability. The
next step is to act on that awareness — to build systems that prevent loss, mitigate
vulnerabilities, and respond to internal and external threats in ways that courts will
recognize and respect.
Chapter 4 begins with internal risks. It examines the greatest and most common
source o --- loss: people within the organization. Employees, contractors, executives,
and others with authorized access can become the reason a secret no longer quali --- ies
6406_Oranburg_Protecting Trade Secrets_1pp.indb 99 10/16/25 9:25 PM 100 3 • Assessing Risks and Mitigating Vulnerabilities
as a secret. Whether through carelessness, misunderstanding, or deliberate breach,
insiders represent the most direct challenge to any protection plan.
But as we will see, those risks can be addressed. Protection is not an illusion. It is a
discipline. And it begins by turning awareness into action.
Re --- erences
Frank H. Knight, Risk, Uncertainty and Pro --- it (Houghton Mi ---
lin Co. 1921). Kenneth J. Arrow, Economic Wel — are and the Allocation o — Resources — or Invention, in The Rate and Direction o — Inventive Activity: Economic and Social Factors (Nat’l Bureau o — Econ. Research ed., Princeton Univ. Press 1962). Edmund W. Kitch, The Nature and Function o — the Patent System, 20 J.L. & Econ. 265 (1977).
6406_Oranburg_Protecting Trade Secrets_1pp.indb 100 10/16/25 9:25 PM Chapter 4 Mitigating Internal Vulnerabilities
No trade secret protection plan can succeed without controlling what happens
inside the organization. Employees, contractors, executives, and advisors all require
access to sensitive in --- ormation to do their jobs. That access creates vulnerability. And
while external threats may draw more attention, it is internal exposure that causes
most trade secret loss.
Internal vulnerabilities take many --- orms. A departing executive might join a com-
petitor and apply proprietary knowledge without ever copying a --- ile. A junior engi-
neer might --- orward documents to a personal account --- or convenience, not realizing
the legal consequences. A --- ormer salesperson might solicit old customers, believing
that the company’s CRM is just a list, not a protected asset. Even well-intentioned
insiders can become inadvertent threats i --- expectations are unclear or protections are
inconsistently en --- orced.
The law re --- lects this. Courts evaluating trade secret claims routinely ask whether
the company took reasonable measures to prevent exposure. That inquiry begins with
what happens inside the business: the clarity o --- its contracts, the structure o --- its access
controls, the discipline o --- its training and monitoring, and the credibility o --- its poli-
cies. In other words, trade secret status is not just about what the in --- ormation is. It is
about how the organization treats it — every day, at every level.
This chapter provides a detailed guide to mitigating internal vulnerabilities. It
covers:
• The use o --- contractual tools such as nondisclosure agreements, noncompetes,
and invention assignment clauses
• Operational sa --- eguards, including access limitation, document labeling, and
employee monitoring
• Behavioral and cultural systems: training, onboarding, and exit protocols
• Legal doctrines that determine when internal misuse becomes legally action-
able misappropriation
Throughout, we --- ocus on the per --- ormative nature o --- secrecy. Protections must
not only exist — they must be legible to a court as well. They must be consistently
101
6406_Oranburg_Protecting Trade Secrets_1pp.indb 101 10/16/25 9:25 PM 102 4 • Mitigating Internal Vulnerabilities
applied, well-documented, and tied to the reality o --- how the organization operates.
This is especially true in an era o --- hybrid work, cloud collaboration, mobile devices,
and expanding vendor networks. The internal environment is --- luid. So must be the
organization’s control over it.
We use the term vulnerability to capture both risk (which can o --- ten be measured)
and uncertainty (which cannot). Internal vulnerabilities may be driven by incentives,
behavior, oversight, or organizational design. Some are --- oreseeable. Others are not.
The point is not to eliminate all possibility o --- breach. It is to ensure that i --- one occurs,
the company can show that it did everything the law expects — and more.
The sections that --- ollow provide both doctrinal analysis and practical guidance.
Breakout boxes o ---
er clause samples and policy language, summarize key en — orcement cases, and unpack contested doctrines and compliance pit — alls. The result is not just a legal chapter but also a strategic one. It is meant to guide action — not just describe consequences.
4.1. Internal Risk as the
Primary Threat
The most serious threats to trade secrets almost always come --- rom within. It is
not the anonymous hacker or the distant competitor who most o --- ten compromises
con --- identiality. It is the employee who has legitimate access, the contractor who mis-
understands expectations, the executive who leaves --- or a rival, or the vendor whose
internal controls --- all short. These actors are not strangers to the in --- ormation. They are
part o --- the business. And because they operate with authority, trust, and routine expo-
sure, they represent the single most important category o --- trade secret vulnerability.
Courts have long recognized this. The majority o --- trade secret litigation involves
individuals or --- irms who once had legitimate access to the protected in --- ormation.
These cases o --- ten arise a --- ter a departure or during a transition in roles. Sometimes
the breach is overt, as when a departing executive downloads design --- iles and uses
them to launch a competing product. Other times, the harm is more subtle and harder
to detect, as when con --- idential know-how is gradually deployed at a new job in a
way that undermines the value o --- the original secret. In both cases, the legal analysis
begins with a single question: Did the company take reasonable steps to protect the
in --- ormation be --- ore the breach occurred?
Trade secret protection is backward-looking. A company cannot declare a --- ter the
act that certain in — ormation was valuable and con — idential. It must demonstrate, through contemporaneous conduct, that secrecy was consistently maintained. This conduct includes the use o — contractual restrictions, internal policies, access controls, and employee education. It includes monitoring, documentation, and en — orcement.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 102 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 103
Most importantly, it includes evidence that the company took secrecy seriously across
the organization — not just at the top or on paper, but in practice.
Internal risk is not a narrow category. It includes --- ull-time employees, part-time
workers, independent contractors, consultants, and executives. It includes interns,
advisors, board members, and temporary sta ---
. In some cases, it even includes individ- uals outside the — ormal organizational structure, such as joint development partners or embedded specialists who are given access to systems or materials — or operational reasons. What unites these groups is their proximity to the secret. They do not need to hack a system or circumvent a — irewall. They already have access. Because o — this proximity, internal protection requires more than generic poli- cies. It requires calibrated systems that align legal obligations with business realities. The protections must match the level o — access and the nature o — the risk. A senior developer with visibility into proprietary architecture needs a di — — erent set o — controls than a customer service representative handling routine account inquiries. The key is not to treat everyone the same but rather to design internal sa — eguards that are both credible and proportionate. This chapter begins with contractual mechanisms. These include nondisclo- sure agreements, invention assignment clauses, non-solicitation terms, and where en — orceable, noncompetition provisions. It then turns to operational sa — eguards, including access limitation, document management, and monitoring practices. It examines onboarding and training, both as legal evidence and as cultural rein — orce- ment. It addresses what happens when an employee leaves and how courts evalu- ate post-employment risk. And it concludes with en — orcement doctrine, drawing
rom case law to show how courts distinguish credible protection e —
orts — rom mere
ormality. Throughout, the — ocus remains on how companies can anticipate internal vulner- abilities be — ore they become legal liabilities. Trade secrets do not depend on any one contract or control. They depend on the system as a whole and on the company’s abil- ity to demonstrate that secrecy was built into its structure, not assumed a — ter the — act.
4.2. Con --- identiality Agreements
and Contractual Sa --- eguards
The --- irst and most essential method --- or mitigating internal vulnerability is through
contract. When companies grant individuals access to trade secrets, they must de --- ine
that access in legal terms. Con --- identiality agreements do not guarantee protection,
but they do create the --- ramework --- or en --- orcing it. They establish duties, clari --- y expec-
tations, and provide evidence that the company took deliberate steps to preserve
secrecy.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 103 10/16/25 9:25 PM 104 4 • Mitigating Internal Vulnerabilities
Courts evaluating trade secret claims routinely ask whether there was a contract
in place, what it said, and whether it re --- lected the actual --- low o --- in --- ormation within
the business. A well-dra --- ted agreement shows that the company did not rely on trust
or routine but rather took the a ---
irmative step o — spelling out what in — ormation was protected, how it was to be used, and what restrictions would remain a — ter the rela- tionship ended. When these elements are missing or vague, courts are more likely to
ind that the trade secret was not adequately protected. This section examines the core legal agreements used to control access to trade secrets: nondisclosure agreements, noncompetition and non-solicitation clauses, and invention assignment provisions. These are not one-size- — its-all contracts. They serve di — — erent purposes, raise di — — erent legal issues, and — ace di — — erent standards o —
en --- orceability depending on the jurisdiction and the relationship between the par-
ties. But all serve the same strategic goal: to give the company a legally recogniz-
able --- oundation --- or asserting that its in --- ormation was secret and that its secrecy was
maintained.
The law does not expect companies to use the strongest possible restriction in
every case. It expects them to use the right restriction --- or the circumstances. This
means tailoring the scope, duration, and geographic reach o --- restrictions to the role
o --- the person receiving the in --- ormation. It also means using language that is precise
enough to be en --- orceable but is not so rigid that it becomes impractical. Many trade
secret disputes turn not on whether a contract existed but on whether the terms o ---
that contract were clearly tied to the in --- ormation at issue and proportionate to the
risks involved.
In the subsections that --- ollow, we examine each type o --- agreement in detail. We
review case law illustrating what courts have --- ound en --- orceable and what they have
rejected. We present sample language, drawn --- rom real-world templates, showing
how variations in dra --- ting a ---
ect legal outcomes. And we analyze how these agree- ments — it into the broader strategy o — mitigating internal vulnerability — not as a sub- stitute — or operational controls but rather as the legal anchor that makes those controls en — orceable.
4.2.1. Core Doctrines in Trade Secret Contracts
Every internal protection strategy begins with the recognition that legal obligations
must be clear, en --- orceable, and appropriately matched to the role o --- the individual
receiving access. Trade secret law does not require a written contract in every case, but
it strongly --- avors the presence o --- one. Courts routinely cite the existence or absence
o --- con --- identiality agreements as a central --- actor in determining whether the owner o ---
the secret took reasonable steps to maintain secrecy. For employees, contractors, and
other insiders, these agreements de --- ine the legal boundaries o --- acceptable conduct.
The core contractual doctrines that govern these agreements begin with notice.
Trade secret protection requires that recipients o --- con --- idential in --- ormation understand
6406_Oranburg_Protecting Trade Secrets_1pp.indb 104 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 105
that it is con --- idential and that they are not --- ree to use or disclose it beyond the terms
o --- their engagement. A properly dra --- ted agreement provides this notice explicitly,
but it must do more than recite a general obligation o --- secrecy. It must describe what
in --- ormation is protected, under what conditions it may be accessed or shared, and
what duties survive the end o --- the relationship.
En --- orceability depends on more than the presence o --- a signature. Courts exam-
ine whether the contract re --- lects a reasonable balance between the interests o --- the
employer and the employee. In some states, like Cali --- ornia, certain clauses, particu-
larly noncompetition provisions, are presumptively unen --- orceable. In others, courts
apply a reasonableness test based on duration, geographic scope, and the nature o ---
the protected interest. What matters across jurisdictions is whether the agreement is
tailored to the role, the in --- ormation, and the actual business risks involved.
Con --- identiality agreements also exist within a broader structure o --- employment
law. An at-will employee may owe de --- ault duties o --- loyalty and nondisclosure, but
those duties are limited. Without a contract, there is o --- ten no surviving obligation
once the relationship ends. Similarly, without an invention assignment clause, a com
pany may --- ind that it does not actually own the trade secrets developed by its own
employees. In disputes over misappropriation, these gaps become liabilities. Courts
are reluctant to impose obligations that the company could have required but --- ailed to.
A common mistake in dra --- ting trade secret contracts is to use language that is
either too broad or too vague. Agreements that purport to cover all in --- ormation o ---
any kind or that impose sweeping restrictions without any re --- erence to role or dura-
tion are --- requently narrowed or struck down. Precision is essential. The agreement
must link the duty o --- secrecy to the actual in --- ormation at issue, describe how that
in --- ormation is conveyed or used, and identi --- y how long the obligation is intended
to last.
Ultimately, these contracts serve two purposes. They establish rights that can be
en --- orced in court, and they signal to employees and others that the company treats
its in --- ormation as a protected asset. They are not the only element in determining
whether something quali --- ies as a trade secret, but they are o --- ten the --- irst place a court
will look. In the next sections, we examine the di --- --- erent types o --- contractual sa --- e-
guards in detail, beginning with nondisclosure agreements and continuing through
more complex restrictions on use, competition, solicitation, and intellectual property.
4.2.2. Nondisclosure Agreements
A nondisclosure agreement is the --- oundational instrument o --- trade secret protec-
tion. It creates the --- irst and most explicit layer o --- legal obligation between a company
and anyone who receives access to con --- idential in --- ormation. Courts routinely look to
the language o --- the NDA to determine whether the company took reasonable steps to
maintain secrecy, whether the in --- ormation was adequately identi --- ied as con --- idential,
and whether the parties understood the terms o --- use and the consequences o --- breach.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 105 10/16/25 9:25 PM 106 4 • Mitigating Internal Vulnerabilities
Not all NDAs are en --- orceable. Many are dra --- ted with language so broad or vague
that courts decline to give them weight. Some de --- ine con --- idential in --- ormation in
terms so expansive that they include public knowledge, personal experience, or gen-
eral observations. Others --- ail to state what uses are permitted, how long the obliga-
tion lasts, or what disclosures are allowed in compliance with law. Some rely on --- orm
templates that do not align with the actual nature o --- the business relationship.
At its core, a well-dra --- ted NDA must identi --- y what counts as con --- idential, how the
in --- ormation will be used, to whom it may be disclosed, and --- or how long the obliga-
tion o --- secrecy will continue. It must match the terms to the --- acts. An agreement that
is intended to cover trade secrets must re --- lect that goal in both scope and structure.
This means de --- ining the “purpose” o --- the disclosure, limiting use to that purpose, and
prohibiting reverse engineering, independent application, or derivative use. It also
means speci --- ying whether oral disclosures are covered, how in --- ormation must be
labeled, and what happens when the relationship ends.
Many companies, especially those serving as disclosing parties, --- avor unilateral
NDAs that protect only their in --- ormation. Others use mutual NDAs where both sides
will share in --- ormation. The choice should re --- lect the --- low o --- risk. In either case, the
agreement must de --- ine its terms in a way that allows --- or en --- orcement. Courts will look
closely at whether the de --- inition o --- “con --- idential in --- ormation” includes only marked
materials or also covers in --- ormation that should be understood as con --- idential based
on context. They will ask whether the duration o --- obligation is reasonable, whether
return or destruction provisions are triggered automatically, and whether the receiv-
ing party can delegate access to a ---
iliates or third parties. The most de — ensible NDAs use layered de — initions and cascading protections. They de — ine “con — idential in — ormation” with both objective and contextual terms, include illustrative categories, and require the receiving party to exercise at least a reasonable degree o — care — i — not the same care used to protect its own in — ormation. They also speci — y that trade secrets must remain protected inde — initely, even i — other in — orma- tion becomes subject to a time limit. Many include standard language con — irming the disclosing party’s ownership rights and disavowing any grant o — license or use beyond the stated purpose. An NDA is not a legal substitute — or operational trade secret protection. But it is o — ten the clearest signal to a court that the company understood what was at stake. When paired with operational controls and consistent en — orcement, it becomes one o — the strongest — orms o — documentary evidence that secrecy was both real and reasonable. The clauses below illustrate how contract language changes depending on whether the company is in the stronger bargaining position. The — irst version is written — or a disclosing party seeking maximum protection. The second is written — or a receiv- ing party seeking — lexibility and clarity. Each version re — lects real language used in practice.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 106 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 107
Con --- idential In --- ormation Clause
Pro-Disclosing Party
“Con --- idential In --- ormation” means all nonpublic in --- ormation disclosed by
the Disclosing Party, directly or indirectly, in written, oral, electronic, visual,
or any other --- orm, that the Receiving Party knows or reasonably should know
is con --- idential based on the nature o --- the in --- ormation or the circumstances
surrounding its disclosure. Con --- idential In --- ormation includes, without limi-
tation, technical data, trade secrets, know-how, product designs, marketing
plans, business models, --- inancial data, internal policies, customer and supplier
in --- ormation, employee data, pricing strategies, and any analysis, compilations,
or summaries derived --- rom such in --- ormation.
The Receiving Party agrees to use the Con --- idential In --- ormation solely --- or the
purpose o --- evaluating or pursuing a business relationship with the Disclosing
Party, to restrict disclosure to those employees and agents who have a need to
know and are bound by obligations o --- con --- identiality no less protective than
those set --- orth herein, and to protect the Con --- idential In --- ormation with the
same degree o --- care used to protect its own con --- idential in --- ormation, but in no
event less than a reasonable degree o --- care. The Receiving Party shall not reverse
engineer, decompile, or otherwise attempt to derive the underlying materials
rom any Con — idential In — ormation and shall return or destroy all Con — idential In — ormation upon request or upon termination o — the relationship. This Agreement shall continue in e —
ect with respect to any Con — idential In — ormation — or a period o — two years — rom the date o — disclosure, except that the Receiving Party’s obligations with respect to any trade secret shall survive so long as the in — ormation remains a trade secret under applicable law.
In general, the clause’s dra --- ter should dra --- t it --- avorably to their own side. When
a party --- requently receives in --- ormation — such as an inventor-support hotline or a
venture-capital --- irm — that party may dra --- t the NDA in a narrower manner.
Con --- idential In --- ormation Clause
Pro-Receiving Party
“Con --- idential In --- ormation” means only such in --- ormation that is marked
in writing as con --- idential at the time o --- disclosure, or, i --- disclosed orally, is
designated as con --- idential in writing within ten (10) business days therea --- ter.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 107 10/16/25 9:25 PM 108 4 • Mitigating Internal Vulnerabilities
Con --- idential In --- ormation shall not include any in --- ormation that (a) was known
to the Receiving Party without restriction be --- ore disclosure, (b) becomes pub-
licly available through no --- ault o --- the Receiving Party, (c) is law --- ully obtained
rom a third party without a duty o — con — identiality, or (d) is independently developed by the Receiving Party without re — erence to the Disclosing Party’s in — ormation. The Receiving Party agrees to use the Con — idential In — ormation solely — or the purpose expressly identi — ied in this Agreement and not — or any other purpose. The Receiving Party shall protect the Con — idential In — ormation using reason- able care, but no greater than the care it uses to protect its own in — ormation o —
similar sensitivity. The Receiving Party shall not be liable --- or accidental disclo-
sure so long as it acted in good --- aith and promptly noti --- ies the Disclosing Party
o --- any unauthorized use.
Unless otherwise stated in writing, the con --- identiality obligations under this
Agreement shall expire one year a --- ter the date o --- disclosure.
These clauses di ---
er in both structure and e —
ect. The pro-disclosing party version uses broad, layered de — initions and extends obligations — or the duration o — trade secret protection. It avoids requiring written markings and prohibits reverse engineering. It seeks maximum control, including a return or destruction requirement and explicit limits on internal disclosure. The pro-receiving party version narrows the scope sig- ni — icantly. It limits con — identiality to marked or memorialized in — ormation, excludes independently known or developed content, sets a — ixed duration, and disclaims liabil- ity — or good- — aith mistakes. These distinctions are not just semantic. They determine what rights survive in a dispute, what obligations a court will en — orce, and how likely it is that the company will be able to assert a trade secret claim i — a breakdown occurs. When dra — ting NDAs, lawyers must understand not only what language is standard but also what language shi — ts risk. Whether representing the disclosing or receiving party, the objective is the same: to de — ine the relationship clearly, allocate responsibil- ity — airly, and anticipate how the agreement will — unction i — something goes wrong.
4.2.3. Non-Solicitation and Noncompetition
Agreements
Restrictions on solicitation and competition are among the most contentious and
heavily litigated clauses in employment agreements. For companies, they are essential
tools to prevent insiders --- rom departing and immediately undermining the company’s
competitive position. For employees, they can --- eel like career-limiting restraints that
persist long a --- ter the relationship ends. Trade secret law does not require these clauses,
but where they are en --- orceable, they can serve as a power --- ul supplement to traditional
6406_Oranburg_Protecting Trade Secrets_1pp.indb 108 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 109
con --- identiality agreements. They restrict the use o --- in --- ormation not by limiting access
but instead by limiting action.
Courts approach these clauses with caution. Unlike NDAs, which are usually
en --- orced as written unless unreasonably vague, non-solicitation and noncompetition
clauses are scrutinized --- or scope, duration, geographic reach, and the nature o --- the
employer’s legitimate business interest. They are typically en --- orced only to the extent
that they are necessary to protect customer relationships, employee stability, or the
misuse o --- con --- idential in --- ormation. I --- the restriction goes --- urther than necessary to
serve those goals, it may be struck down in whole or in part. In some jurisdictions,
such as Cali --- ornia, certain types o --- restrictions are unen --- orceable by statute regardless
o --- the employer’s interests.
A non-solicitation clause prohibits a --- ormer employee --- rom soliciting clients, cus-
tomers, or employees --- or a competing business. A noncompetition clause goes --- ur-
ther, barring the individual --- rom working --- or or establishing a competing business
altogether. Some agreements include narrow job-speci --- ic restrictions; others attempt
to bar entire categories o --- work across wide geographic regions. The broader the
clause, the more likely it is to be challenged.
The en --- orceability o --- these restrictions depends not only on the wording o --- the
clause but also on the justi --- ication o ---
ered — or it. Courts ask what interest the employer is trying to protect, why that interest cannot be protected through less restrictive means, and whether the employee’s new role actually implicates those interests. They also consider whether the restriction is necessary to protect trade secrets speci — ically or whether it is being used to limit ordinary market competition. The — ollowing clause re — lects a pro-employer approach. It includes a two-year dura- tion, prohibits both direct and indirect solicitation, and applies to both customers and employees. It is care — ully worded to — ocus on relationships developed during the term o — employment, which increases its likelihood o — en — orcement.
Customer and Employee Non-S olicitation Clause
Pro-Employer Language
The Employee agrees that --- or a period o --- two (2) years --- ollowing the ter-
mination o --- employment --- or any reason, the Employee shall not, directly or
indirectly, solicit, induce, or attempt to induce any employee, contractor, or
consultant o --- the Company to terminate their relationship with the Company.
The Employee --- urther agrees that, --- or the same period, the Employee shall not
solicit or attempt to solicit, --- or the purpose o --- o ---
ering competing products or services, any customer or prospective customer o — the Company with whom the Employee had material contact during the twelve (12) months preceding the termination o — employment.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 109 10/16/25 9:25 PM 110 4 • Mitigating Internal Vulnerabilities
This restriction shall apply regardless o --- whether the solicitation is initi-
ated by the Employee, the --- ormer colleague, or the customer, and regardless o ---
whether such conduct is undertaken on behal --- o --- the Employee individually or
through another business or entity.
This clause illustrates how a well-dra --- ted non-solicitation provision can be targeted
without being timid. It ties the restriction to speci --- ic relationships, includes a clear
time --- rame, and avoids language that could be seen as punitive or vague. Courts are
more likely to en --- orce clauses that are narrowly tailored in this way.
By contrast, the next clause re --- lects a pro-employee dra --- ting perspective. It limits
the scope o --- restriction, carves out general advertising and passive receipt o --- business,
and excludes --- ormer customers who initiate contact without solicitation. It also caps
the restriction at one year and applies only where trade secrets are implicated.
Customer and Employee Non-S olicitation Clause
Pro-Employee Language
The Employee agrees that --- or a period o --- one (1) year --- ollowing the termina-
tion o --- employment, the Employee will not actively solicit business --- rom any
client o --- the Company with whom the Employee had direct contact and con --- i-
dential commercial dealings during the last six (6) months o --- employment, but
only to the extent that such solicitation would involve the use or disclosure o ---
the Company’s trade secrets or other con --- idential in --- ormation.
Nothing in this clause shall prevent the Employee --- rom engaging in gen-
eral advertising not targeted at speci --- ic clients or --- rom accepting unsolicited
business initiated by a --- ormer customer without any active encouragement
or inducement. This restriction shall not apply to customers with whom the
Employee had a pre-existing relationship independent o --- their employment.
This language re --- lects a more limited view o --- post-employment obligations. It nar-
rows the scope o --- restriction to situations where actual misuse o --- con --- idential in --- or-
mation is likely, and it explicitly preserves the employee’s ability to compete on --- air
terms. Courts o --- ten --- avor this kind o ---
raming when evaluating whether a restric- tion is reasonably calculated to protect a legitimate business interest or whether it is designed simply to restrain competition. The strategic choice between these approaches depends on many — actors: the seniority o — the employee, the nature o — the in — ormation at issue, the competitive
6406_Oranburg_Protecting Trade Secrets_1pp.indb 110 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 111
dynamics o --- the industry, and the jurisdiction in which en --- orcement would occur.
Companies seeking to protect trade secrets through contract must consider not only
what protections are desirable but also what a court will uphold. Likewise, employees
and their counsel must evaluate what they are agreeing to give up and whether the
clause appropriately balances the employer’s interests with the employee’s --- reedom to
work.
Well-cra --- ted restrictions on solicitation and competition can reduce the risk that
trade secrets will walk out the door and be immediately deployed by a rival. But over-
reaching language can back --- ire by rendering the clause unen --- orceable and undermin-
ing the company’s credibility in court. The goal is not to prevent all post-employment
activity. It is to prevent misuse o --- protected in --- ormation by those who once had privi-
leged access to it.
4.2.4. Assignment o --- Inventions and IP Rights
Companies o --- ten assume that they automatically own the intellectual property
created by their employees. In many cases, that assumption is wrong. Under de --- ault
rules, the creator o --- an invention, work o --- authorship, or proprietary method retains
ownership unless a contract clearly assigns it to the employer. This is true even when
the invention is developed on company time or using company resources. As a result,
the absence o --- an e ---
ective invention assignment agreement can create substantial risk, particularly when trade secrets are developed internally. Invention assignment clauses serve two — unctions. First, they trans — er ownership o — innovations, developments, and other intellectual property — rom the individual to the company. Second, they rein — orce the company’s control over related trade secrets by establishing that in — ormation developed during the course o — employment is not merely con — idential — rather, it is owned by the business. This distinction matters. Ownership strengthens the argument that the company took reasonable steps to pro- tect the in — ormation and has standing to assert legal rights over it. En — orceability depends on scope. Clauses that purport to assign all ideas or inven- tions conceived by the employee, regardless o — whether they relate to the company’s business, are o — ten struck down as overbroad. Many states restrict an employer’s abil- ity to claim inventions developed entirely on an employee’s own time and without use o — company resources. Cali — ornia, — or example, requires employers to exclude such inventions — rom the scope o — assignment and to provide notice o — that exclusion. Other states allow broader assignment but still require a clear connection between the work and the employer’s line o — business. From the company’s perspective, the goal is to ensure that valuable innovation, including trade secrets, becomes part o — the — irm’s intellectual property port — olio. From the employee’s perspective, the concern is o — ten overreach — — or example, whether the clause captures work done outside the scope o — employment or imposes obligations that persist long a — ter the relationship ends. These tensions can be addressed through
6406_Oranburg_Protecting Trade Secrets_1pp.indb 111 10/16/25 9:25 PM 112 4 • Mitigating Internal Vulnerabilities
care --- ul dra --- ting that links the assignment to speci --- ic roles, projects, and business --- unc-
tions, and that limits its reach to what is reasonably necessary to protect the company’s
interests.
The clauses below re --- lect these competing approaches. The --- irst version is written
to maximize employer ownership. The second includes carveouts and clari --- ying limi-
tations designed to preserve the employee’s independent creative work.
Invention Assignment Clause
Pro-Employer Language
The Employee agrees that all inventions, discoveries, improvements, pro
cesses, designs, developments, ideas, trade secrets, and other works o --- author-
ship (collectively, “Inventions”) conceived, developed, or reduced to practice
by the Employee, alone or with others, during the term o --- employment, and
that relate in any manner to the Company’s business, operations, research, or
anticipated work, shall be the sole and exclusive property o --- the Company. The
Employee hereby assigns to the Company all right, title, and interest in and to
such Inventions, whether or not patentable or registrable, and agrees to execute
all documents necessary to con --- irm such ownership.
This obligation applies regardless o --- whether the Invention was developed
during working hours or using Company equipment, and shall survive the
termination o --- employment.
This clause --- avors the employer by using expansive but business-tethered lan-
guage. It captures all developments related to the company’s --- ield, regardless o --- when
or where they were made, and secures both patent and trade secret rights without
limitation. Courts are more likely to en --- orce such a clause when the employee’s role
is technical or innovation-oriented, and when the connection to the company’s work
is direct and provable.
Invention Assignment Clause
Pro-Employee Language
The Employee agrees to assign to the Company any invention, discovery,
or work o --- authorship that is conceived or developed by the Employee during
the course o --- employment and that either (a) results --- rom any work per --- ormed
or the Company, or (b) uses the Company’s time, equipment, supplies, or pro- prietary in — ormation. This assignment does not apply to any invention that (i)
6406_Oranburg_Protecting Trade Secrets_1pp.indb 112 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 113
was developed entirely on the Employee’s own time, (ii) does not relate to the
Company’s business or anticipated research, and (iii) was created without use
o --- Company resources. Nothing in this clause shall be construed to require
the Employee to assign rights in personal projects or unrelated creative work.
The Company agrees to provide advance written notice o --- the scope o --- any
assignment obligation imposed on work created outside the scope o --- regular
duties.
This version narrows the employer’s claim while preserving core protection. It mir-
rors statutory carveouts in jurisdictions like Cali --- ornia and creates a presumption that
unrelated or personal work remains with the employee. It also provides transparency
and avoids ambiguity about the scope o --- the assignment.
Invention assignment clauses are essential to the integrity o --- a trade secret protec-
tion plan. Without clear ownership, it becomes di ---
icult to argue that a given process or method belongs to the company, or that a departing employee had no right to use it. But overreach invites litigation and can weaken the company’s position. Preci- sion, balance, and relevance are what make these clauses work, not just strength o —
language.
4.3. Judicial En --- orcement o ---
Restrictive Covenants
The strength o --- a restrictive covenant lies not in how --- irmly it is written but rather
in whether a court is willing to en --- orce it. Nondisclosure agreements, noncompeti-
tion clauses, non-solicitation provisions, and invention assignment agreements each
create obligations that exist only to the extent that courts give them legal e ---
ect. What matters is not just what the contract says but also how it — unctions when tested. Trade secret protection depends on this en — orceability. I — a company cannot show that it used en — orceable covenants to limit misuse, it may be unable to prove that it took reasonable steps to maintain secrecy at all. Courts do not en — orce these clauses re — lexively. They scrutinize them. The premise o — en — orceability is that the clause is reasonable, proportionate, and tied to a legitimate business interest. Employers cannot use contract to suppress ordinary competition, restrict employee mobility beyond necessity, or claim ownership over in — ormation and relationships that are not directly related to trade secrets. But when the clause is well-dra — ted, well-matched to the role, and consistently en — orced, courts may treat it as central evidence that the company viewed its in — ormation as secret — and treated it accordingly.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 113 10/16/25 9:25 PM 114 4 • Mitigating Internal Vulnerabilities
The cases that --- ollow show how these doctrines are applied in practice. Each illus-
trates how a court evaluated the text o --- the agreement, the behavior o --- the parties,
and the connection between the clause and the in --- ormation at issue. These cases are
not simply about contract. They are about credibility: whether the company had a
real plan --- or protecting its secrets and whether the agreement supported that plan or
merely gestured at it.
4.3.1. En --- orcement o --- Nondisclosure
Agreements
Nondisclosure agreements are among the most --- requently litigated --- orms o --- restric-
tive covenant. While they are generally --- avored by courts, they are not automatically
en --- orceable. Their e ---
ectiveness depends on the speci — icity o — the language, the con- text in which the agreement was executed, and the behavior o — the parties during the relationship. Courts examine whether the NDA clearly de — ined what in — ormation was con — idential, whether that in — ormation was actually protected in practice, and whether the use or disclosure that — ollowed constituted a breach. In one early and in — luential case, the Seventh Circuit rejected a claim o — misap- propriation where the plainti —
relied on vague con — identiality language and — ailed to mark documents or limit access.
Disclosers Must Practice the Protections
Their NDAs Require
nClosures Inc. v. Block & Co.
770 F.3d 598 (7th Cir. 2014)
nClosures designed custom metal cases --- or tablets and shared product
drawings with a prospective manu --- acturing partner. The drawings were not
marked as con --- idential, and no NDA was signed. When the partner later
released a competing product, nClosures sued --- or trade secret misappropria-
tion. The court --- ound that nClosures had not taken reasonable steps to main-
tain secrecy. The absence o --- con --- identiality markings, coupled with the lack o ---
access restrictions or --- ormal contractual protections, de --- eated the claim. The
court emphasized that trade secret protection requires more than hope — it
requires structure.
By contrast, in a more recent decision --- rom Cali --- ornia, the court upheld a nondis-
closure agreement that included speci --- ic de --- initions and was accompanied by consis-
tent security practices, even though the de --- endant argued that the in --- ormation was
not truly secret.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 114 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 115
Following NDA Protocols Supports
Trade Secret Claims
BladeRoom Group Ltd. v. Emerson Electric Co.
331 F. Supp. 3d 977 (N.D. Cal. 2018)
BladeRoom developed modular data-center technology and disclosed key
design and process in --- ormation under a detailed NDA during acquisition dis-
cussions. A --- ter negotiations --- ailed, Emerson won a contract using a strikingly
similar design. BladeRoom sued --- or trade secret misappropriation. The court
allowed the claim to proceed, emphasizing the NDA’s speci --- icity, the care taken
to limit access, and the company’s internal practices --- or labeling and segregat-
ing con --- idential in --- ormation. The case shows how a well-executed NDA that is
tied to real-world behavior can support a broader en --- orcement strategy.
Courts are especially cautious about NDAs that rely solely on boilerplate language
or that purport to treat all in --- ormation as con --- idential. In a Delaware case involving a
so --- tware startup, the court declined to en --- orce an NDA where the scope was so broad
that it became --- unctionally meaningless.
Overbroad NDAs Undermine Trade
Secret Claims
Great Hill Equity Partners IV, LP v. SIG Growth Equity Fund I, LLLP, C.A.
No. 7906-VCG (Del. Ch. Nov. 26, 2018)
In a dispute --- ollowing the acquisition o --- a tech company, the buyer claimed
that the seller’s use o --- business in --- ormation violated the NDA. The agree-
ment de --- ined “con --- idential in --- ormation” to include virtually all company data,
regardless o --- whether it was public, private, or already known to the receiv-
ing party. The court --- ound the de --- inition unreasonably broad and declined
to en --- orce it as written. The decision underscores the importance o --- tailoring
NDAs to actual con --- identiality concerns and avoiding language that appears
to overreach.
These cases illustrate a clear pattern. Courts expect NDAs to be speci --- ic, grounded
in operational reality, and proportionate to the in --- ormation they aim to protect. They
reward precision and punish overreach. They also look beyond the text o --- the agree-
ment to see whether the company behaved like it had something worth protecting.
An NDA is not a magic wand. It is part o --- a system o --- e ---
ort. When it — its that system,
6406_Oranburg_Protecting Trade Secrets_1pp.indb 115 10/16/25 9:25 PM 116 4 • Mitigating Internal Vulnerabilities
it becomes a power --- ul tool. When it does not, it becomes evidence that the company
did not take its own secrets seriously.
4.3.2. En --- orcement o --- Non-Solicitation Clauses
Non-solicitation clauses are designed to protect a company’s relationships — both
with its customers and its employees. Courts evaluate them with more scrutiny than
NDAs but less skepticism than noncompetes. Their en --- orceability depends on how
narrowly they are drawn, whether they are tied to protectable interests such as trade
secrets or goodwill, and how they operate in practice. While courts are generally more
willing to en --- orce a clause that limits direct outreach than one that prohibits all --- orms
o --- competition, they still require that the restriction be reasonable and grounded in
the actual role o --- the person subject to it.
Customer non-solicitation clauses prevent --- ormer employees --- rom contacting or
attempting to do business with the company’s clients. These clauses are more likely to
be upheld when they are limited to clients with whom the employee had material con-
tact or to relationships developed during a de --- ined period prior to departure. Clauses
that attempt to prevent contact with all current or prospective customers, regardless
o --- connection, are o --- ten deemed overbroad.
In a case --- rom the Virginia state courts, an employer success --- ully en --- orced a cus-
tomer non-solicitation clause because it was narrowly tailored to cover only those
relationships the employee had actively managed.
Customer Non-S olicitation En --- orced When
Narrowly Tailored
Lasership, Inc. v. Watson
79 Va. Cir. 205 (2009)
Lasership, a delivery logistics company, sued a --- ormer employee who started
a competing service and contacted --- ormer clients. The employment agreement
included a non-solicitation clause prohibiting contact with customers whom
the employee had serviced within the past year. The court --- ound the clause
en --- orceable, emphasizing that it was limited in both scope and duration and
clearly connected to the protection o --- trade secrets and customer goodwill.
Because the employee had built direct relationships with the a ---
ected custom- ers, en — orcement was warranted.
In other cases, courts have rejected customer non-solicits that sweep too broadly or
are unsupported by evidence that the employee ever accessed sensitive client in --- orma-
tion. In a Pennsylvania case, the court declined to en --- orce a clause that applied to all
customers, including those the employee had never worked with.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 116 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 117
Overbroad Non-S olicits Are Unen --- orceable
WellSpan Health v. Bayliss
2005 PA Super 76 (2005)
WellSpan Health sought to en --- orce a non-solicitation clause against a --- ormer
executive who moved to a competing healthcare provider. The clause prohib-
ited contact with any current or prospective customer o --- WellSpan, regardless
o --- whether the executive had any relationship with them. The court re --- used
to en --- orce the restriction, holding that it was not reasonably tailored to pro-
tect trade secrets or goodwill. The decision emphasized that non-solicitation
clauses must be connected to the employee’s actual scope o --- responsibility and
not be used as a general barrier to competition.
Employee non-solicitation clauses are similarly limited. Courts are willing to
uphold provisions that prevent a --- ormer employee --- rom raiding a team or undermin-
ing internal stability, but they are wary o --- clauses that attempt to prevent all com-
munication or that --- unction as de --- acto noncompetes. The central inquiry is whether
the employee’s actions were targeted and whether the clause is proportionate to the
company’s interest in preventing disruption.
In a case involving a sta ---
ing — irm, the court upheld a non-solicit because the departing employee had attempted to move several key sta —
members to a new com- petitor within days o — leaving.
Employee Non-S olicits En --- orced When
Targeted and Proportionate
TEKsystems, Inc. v. Bolton
No. 2:19-CV-02355, 2019 WL 237388 (D. Kan. Jan. 16, 2019)
A recruiter --- or TEKsystems le --- t the company and began soliciting --- ormer
coworkers to join a direct competitor, despite a one-year employee non-
solicitation clause in her contract. The court --- ound that the clause was en --- orce-
able and narrowly tailored. The employee had direct relationships with those
she solicited, and the court held that the company had a legitimate interest in
preventing immediate team disruption. The case demonstrates how en --- orce-
ment is closely tied to the --- actual context and the nature o --- the departing
employee’s role.
Taken together, these cases re --- lect a common theme. Courts expect non-solicitation
clauses to be used precisely and sparingly. They must match the employee’s actual
6406_Oranburg_Protecting Trade Secrets_1pp.indb 117 10/16/25 9:25 PM 118 4 • Mitigating Internal Vulnerabilities
responsibilities, target speci --- ic risks such as trade secret misuse or goodwill disrup-
tion, and avoid --- unctioning as indirect noncompetes. When dra --- ted and applied
in this way, they can be highly e ---
ective. But when used broadly, without re — erence to actual exposure or competitive harm, they are likely to be narrowed or rejected. En — orcement is not a question o — whether solicitation occurred. It is a question o —
whether the restriction was --- air.
4.3.3. En --- orcement o --- Noncompetition
Clauses
Noncompetition clauses are the most controversial and least consistently en --- orced
type o --- restrictive covenant. While employers view them as necessary to prevent
insiders --- rom immediately undermining competitive advantage, courts view them
with skepticism. They are dis --- avored because they restrict an individual’s ability to
work, earn a living, and use general skills and experience. Courts will en --- orce them
only when the restriction is narrowly tailored, the interest protected is legitimate, and
the burden on the employee is not excessive.
The legal standard varies by jurisdiction. In some states, such as Cali --- ornia, non-
competes are generally void as a matter o --- statute, with only narrow exceptions --- or
the sale o --- a business or protection o --- trade secrets through other means. In others,
such as New York or Texas, courts apply a balancing test that considers duration,
geographic scope, industry speci --- icity, and necessity. The clause must be reasonable
in light o --- the employee’s role and the nature o --- the threat to the employer’s interest.
The employer must show that the restriction is not simply about preventing compe-
tition — it must be aimed at preventing un --- air competition arising --- rom misuse o ---
con --- idential in --- ormation, goodwill, or customer relationships.
Duration is a central --- actor. Courts are more likely to en --- orce a clause that lasts
six months or one year than one that extends --- or two years or longer. Scope matters
as well. A clause that prohibits work in a speci --- ic industry or geographic area may be
upheld i --- the employee held a senior role with extensive access to sensitive strategy.
But a clause that attempts to bar all competitive activity regardless o --- location or --- unc-
tion will likely be struck down or modi --- ied.
In one leading case, the Seventh Circuit enjoined a departing executive under a
theory o --- threatened misappropriation, even though he had not signed a noncompete
agreement. The court --- ound that the executive’s intimate knowledge o --- con --- idential
business strategy would likely in --- luence his work at a direct competitor, making mis-
use almost inevitable. This reasoning gave rise to the inevitable disclosure doctrine,
which allows courts to in --- er that trade secret misappropriation is likely to occur and
enjoin --- uture employment as a remedy. Although not --- ormally a noncompete, the
injunction --- unctioned as a de --- acto noncompete by limiting the employee’s ability to
work in the same industry based solely on the risk o --- disclosure.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 118 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 119
“Inevitable Disclosure” Can Justi --- y De Facto
Noncompete Relie ---
PepsiCo, Inc. v. Redmond
54 F.3d 1262 (7th Cir. 1995)
Redmond, a senior executive at PepsiCo, accepted a job with Quaker, a
direct competitor. PepsiCo sued to prevent him --- rom taking the role, arguing
that he would inevitably disclose or use PepsiCo’s con --- idential marketing and
pricing strategies. The court agreed, granting a preliminary injunction even
in the absence o --- actual disclosure. The decision was grounded in Redmond’s
intimate knowledge o --- PepsiCo’s competitive planning and the similarity o --- his
new responsibilities. The case became a --- oundational authority --- or the inevi-
table disclosure doctrine and remains one o --- the most widely cited examples o ---
proactive en --- orcement.
Not all courts accept the inevitable disclosure theory. Some require concrete evi-
dence o --- actual misuse. Others view the doctrine as a backdoor noncompete and
reject it on public policy grounds. Even in jurisdictions that allow the doctrine, it is
applied cautiously, typically only where the employee’s role at the new company would
make it impossible to avoid using the --- ormer employer’s secrets.
When a noncompete is too broad, courts may modi --- y it under the so-called blue
pencil doctrine. In some jurisdictions, courts will rewrite a clause to make it en --- orce-
able. In others, they will en --- orce only the part that is reasonable and strike the rest. But
some courts re --- use to salvage overbroad clauses at all, especially where the employer
appears to have overreached. In a Florida case, the court declined to en --- orce a sweep-
ing noncompete that barred the employee --- rom working anywhere in the state even
though the employer operated in only a --- ew counties.
Overbroad Noncompetes Are Unen --- orceable
Gupton v. Village Inn Pancake House
89 So. 2d 847 (Fla. 1956)
Gupton le --- t Village Inn to open his own restaurant. The company sought
to en --- orce a noncompete that prohibited him --- rom working in the restaurant
business anywhere in Florida --- or two years. The court --- ound the restriction
excessive, noting that Village Inn had only limited operations in the state and
that the clause appeared designed to eliminate law --- ul competition. The court
6406_Oranburg_Protecting Trade Secrets_1pp.indb 119 10/16/25 9:25 PM 120 4 • Mitigating Internal Vulnerabilities
re --- used to modi --- y or en --- orce the clause, emphasizing the importance o --- dra --- t-
ing covenants that re --- lect real business needs.
The lesson --- rom these cases is that noncompetes are en --- orceable only when they
are used care --- ully. Courts will not allow employers to block --- ormer employees --- rom
earning a living or working in their chosen --- ield unless the clause is clearly connected
to the protection o --- in --- ormation or relationships that the law recognizes as worthy
o --- special protection. Employers must be prepared to explain why the restriction is
necessary, how it is limited, and why no less restrictive option would su ---
ice. Well-dra — ted noncompetes can protect the investment a company has made in training, strategy, and client development. But they must be treated as exceptions, not de — aults. When they are overused or poorly justi — ied, they risk not only invalida- tion but also reputational harm. They must be built on real risk — and structured to survive real scrutiny. In 2024, the Federal Trade Commission issued a — inal rule banning most noncom- pete clauses nationwide, citing their negative e —
ects on labor mobility, wages, and innovation. The rule applies prospectively and retroactively in many cases, though it includes limited exceptions — or senior executives and in connection with the sale o — a business. However, the rule has already been challenged in multiple lawsuits asserting that the FTC lacks statutory authority to regulate in this space. The outcome o — this liti- gation remains uncertain, but the rule re — lects a broader regulatory and political shi — t toward restricting or eliminating noncompete agreements as a matter o — public policy.
4.3.4. En --- orcement o --- Invention Assignment
and IP Clauses
Ownership o --- intellectual property created during the course o --- employment is not
automatic. Unless the employer has secured a written assignment, the de --- ault rule
is that the creator — usually the employee — retains ownership, even when the work
was developed in the scope o --- employment or using company resources. Invention
assignment clauses are meant to prevent this ambiguity. They assign to the employer
any inventions or works o --- authorship that arise --- rom the employee’s work and relate
to the company’s business. When properly dra --- ted and consistently en --- orced, these
clauses provide a legal --- oundation --- or claiming ownership o --- trade secrets, con --- iden-
tial methods, and other --- orms o --- proprietary innovation.
Courts generally en --- orce invention assignment clauses when the terms are clear,
the scope is reasonable, and the connection to the company’s business is speci --- ic.
However, they are cautious about clauses that attempt to sweep in inventions created
on the employee’s own time, especially when those inventions are unrelated to the
6406_Oranburg_Protecting Trade Secrets_1pp.indb 120 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 121
employer’s --- ield o --- work. Many states impose statutory limitations. Cali --- ornia, --- or
example, prohibits assignment o --- inventions developed entirely on personal time and
without use o --- employer resources unless the invention relates directly to the com
pany’s business or expected research and development. Other states --- ollow similar
rules, requiring that the clause re --- lect the actual relationship between the invention
and the employer’s interests.
In a key Cali --- ornia case, the court re --- used to en --- orce an invention assignment
clause that sought to claim ownership over an employee’s side project developed out-
side o --- company time and without company materials.
Invention Assignment Agreements Must
Comply with State Law
Applied Materials, Inc. v. Advanced Micro-Fabrication Equipment, Inc.
No. 5:07-cv-05248, 2009 WL 10694784 (N.D. Cal. Feb. 17, 2009)
Applied Materials sued a --- ormer employee and his new company, claim-
ing that trade secrets and inventions created a --- ter his departure should be
assigned under his prior employment agreement. The agreement included a
broad invention assignment clause, but the court --- ound that Cali --- ornia Labor
Code section 2870 prohibited assignment o --- inventions developed entirely on
the employee’s own time, using no company resources, and unrelated to the
employer’s business. Because the invention did not --- all within the statutory
exceptions, the clause was unen --- orceable as applied.
Cases like this underscore the importance o --- tailoring invention assignment lan-
guage to comply with state law. Overly aggressive language may not only --- ail to protect
the company — it may also trigger legal challenges or render the entire clause void. The
most e ---
ective clauses are those that assign rights clearly, provide notice o — statutory carveouts, and create procedures — or employees to disclose independent projects — or review. Courts are more likely to uphold a clause that respects employee rights while sa — eguarding the company’s legitimate interests. Companies should also ensure that their assignment clauses are rein — orced by con- sistent onboarding, training, and exit procedures. Signing the clause is only the begin- ning. Employees should be reminded o — their continuing obligations, and procedures should be in place to con — irm return o — work product and con — idential material at the end o — the relationship. Without this — ollow-through, even a well-dra — ted clause may lose its value in en — orcement. Assignment clauses play a crucial role in trade secret litigation. When a departing employee claims to have developed a method independently, the company must be
6406_Oranburg_Protecting Trade Secrets_1pp.indb 121 10/16/25 9:25 PM 122 4 • Mitigating Internal Vulnerabilities
able to point to a signed agreement that covers the work and establishes ownership.
Without it, the legal basis --- or claiming misappropriation may be signi --- icantly weak-
ened. But to be e ---
ective, the clause must not only exist — it also must be en — orceable. And to be en — orceable, it must be both legally compliant and practically connected to the way the company and the employee actually operated.
4.3.5. Public Policy Limits on Restrictive
Covenants
Even the most care --- ully dra --- ted restrictive covenant may be unen --- orceable i --- it con-
licts with public policy. Courts do not evaluate these clauses in a vacuum. They exam- ine the broader context in which they are used — who is subject to the restriction, what the restriction prevents, and whether en — orcement would undermine principles such as employee mobility, economic — airness, or statutory protections — or innovation. In some states, public policy limits are codi — ied. In others, they emerge — rom common law decisions that balance the interests o — employers against the rights o — individuals and the public. Cali — ornia is the most well-known example o — a jurisdiction that prohibits most noncompete agreements. Under section 16600 o — the Cali — ornia Business and Pro — es- sions Code, any contract that restrains a person — rom engaging in a law — ul pro — ession, trade, or business is generally void. The — ew exceptions include the sale o — a business and protection o — trade secrets through narrowly drawn covenants that do not operate as blanket bans. Massachusetts, Illinois, Colorado, and Washington have also enacted statutes limiting the use o — noncompetes — or low-wage workers, requiring advance notice, or imposing other procedural sa — eguards. These laws are intended to prevent overuse o — restrictions that could suppress labor mobility or chill innovation. Even in states without speci — ic legislation, courts may re — use to en — orce a covenant that appears punitive, anticompetitive, or unnecessary. In one New York case, the court rejected a noncompete imposed on a — ormer employee with no managerial responsibilities, — inding that the restriction served no legitimate interest and posed a barrier to ordinary career progression.
Restrictive Covenants Cannot Violate
Public Policy
Brown & Brown, Inc. v. Johnson
25 N.Y.3d 364 (2015)
Brown & Brown, an insurance brokerage --- irm, sought to en --- orce a noncom-
pete against a junior employee who le --- t to join a competitor. The clause barred
the employee --- rom working in any capacity --- or a competing --- irm within a large
6406_Oranburg_Protecting Trade Secrets_1pp.indb 122 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 123
geographic region --- or two years. The court --- ound the restriction unen --- orceable,
holding that it was broader than necessary to protect client relationships or
trade secrets and imposed an unreasonable burden on the employee’s ability to
work. The ruling emphasized that covenants not to compete must be justi --- ied
by a speci --- ic, protectable interest — not simply the desire to avoid competition.
Public policy limits also a ---
ect how trade secret claims are evaluated. I — a restric- tive covenant is so broad that it appears to be a substitute — or trade secret protection rather than a supplement to it, courts may reject both the contract and the trade secret claim. A company that attempts to prevent competition by labeling all in — ormation as con — idential or using blanket restrictions on employee activity may lose credibility when it asserts that the in — ormation at issue quali — ies as a trade secret. Courts are more likely to — ind secrecy where the company has used calibrated protections, and they are more likely to reject it where the company has used expansive contracts to mask weak internal discipline. The policy trend in recent years has moved steadily in — avor o — employee rights. Legislatures and courts alike have sought to limit the use o — restrictive covenants that — unction as tools o — control rather than as legitimate protection. Employers must adapt their strategies accordingly. This does not mean that restrictive covenants are obsolete. It means that their role must be narrowly de — ined, care — ully justi — ied, and
irmly anchored in the actual risks the company — aces. A covenant that overreaches may not only — ail — it may erode the company’s ability to en — orce more modest protections. A covenant that is well-matched to the task, by contrast, will stand a stronger chance o — en — orcement and will support the broader claim that the company took its obligation to protect trade secrets seriously. In this way, public policy is not a barrier to trade secret en — orcement. It is a reminder that en — orcement must rest on real interests, not imagined ones.
4.4. Access Controls and Operational
Sa --- eguards
Restrictive covenants provide one layer o --- protection. Operational discipline pro-
vides another. Courts will not en --- orce a contract in the abstract; they look --- or evidence
that the company built secrecy into its everyday systems. The most compelling proo ---
that a business took reasonable steps to protect its trade secrets is not what it said in
an agreement but what it did in practice. That inquiry begins with access control.
A trade secret can only be protected i --- it is treated as secret. I --- con --- idential
in --- ormation is accessible to all employees regardless o --- role, i --- it is stored in shared
6406_Oranburg_Protecting Trade Secrets_1pp.indb 123 10/16/25 9:25 PM 124 4 • Mitigating Internal Vulnerabilities
olders without restriction, or i — it is le — t unsecured in physical spaces, courts may conclude that the company did not take secrecy seriously. Protection begins with limitation: who can see the in — ormation, under what circumstances, and through what systems. Role-based access is the — oundation o — control. Each employee or contractor should have access only to the materials necessary — or their speci — ic duties. This is not merely a technical best practice — it is a legal signal. I — the company can show that only a limited number o — individuals had access to a particular dataset, — ormula, or design, and that those individuals were bound by appropriate contractual and policy sa — e- guards, courts are more likely to — ind that the in — ormation was in — act kept secret. Access control also includes digital and physical security. Trade secrets o — ten reside in code repositories, product development systems, shared drives, email attachments, and internal messaging tools. They also live on whiteboards, in lab notebooks, in engineering mock-ups, and in physical product samples. Each o — these settings cre- ates opportunities — or exposure. Courts have looked closely at whether access to sen- sitive materials was password-protected, whether — ile permissions were restricted, whether laptops were encrypted, and whether physical rooms were badge-locked or surveillance-monitored. No one sa — eguard is dispositive, but the accumulation o —
many small controls creates a compelling record o --- reasonable e ---
ort. Labeling and version control rein — orce these protections. Materials that contain or re — lect trade secrets should be clearly marked as con — idential or proprietary. Where labels are missing, courts may treat the in — ormation as i — it were public. Version control also matters. I — a trade secret evolves over time, courts may ask whether earlier itera- tions were separately protected or i — the secret as a whole was diluted by open circula- tion o — partial versions. Document management is not just an internal convenience. It is part o — the legal in — rastructure that supports the claim. Monitoring and auditing provide the — eedback loop. It is not enough to restrict access. The company must also know when restrictions are breached, who has down- loaded sensitive — iles, when unusual access patterns occur, and whether any devices containing con — idential in — ormation have been lost or compromised. Modern log management systems can generate alerts when access levels are elevated, documents are exported, or downloads exceed baseline norms. These systems do not need to catch every breach. But they must exist, and they must be capable o — demonstrating, a — ter the — act, that access to the trade secret was not uncontrolled. Access controls cannot stand still. As employees move into new roles, as projects change, or as systems evolve, permissions must be updated. Former employees must be removed — rom repositories immediately upon separation. Temporary permissions must expire when tasks are complete. Vendors and contractors must have de — ined scopes o — access with limitations on onward sharing or retention. Where companies
ail to adjust access as circumstances change, courts may conclude that the protections were per — ormative, not real.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 124 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 125
When a court asks whether a company took reasonable steps to protect its trade
secrets, it is asking whether the organization acted like secrecy mattered. The answer
is --- ound not in the contract archive but in the permissions matrix, activity logs, email
servers, and badge swipe records. The best legal protection is the one the company
already built — be --- ore anyone asked to see it.
4.4.1. Role-Based Access Limitation
The simplest and most power --- ul way to reduce internal vulnerability is to ensure
that employees can only access the in --- ormation they need. This principle, o --- ten
re --- erred to as “least privilege” or “need to know,” is central to both operational secu-
rity and legal protection. Courts routinely ask whether a trade secret was shared only
with those who required it and whether the company limited access according to the
responsibilities o --- each role. A business that exposes its con --- idential in --- ormation to all
personnel, regardless o ---
unction, — aces an uphill battle in proving that the in — orma- tion was truly kept secret. Role-based access control means de — ining, in advance, which individuals or job categories are permitted to see which types o — in — ormation. In a development-driven company, this might mean that engineers have access to the product architecture but not to customer pricing. Sales personnel may see pricing tiers but not source code. Administrative sta —
may have access to scheduling tools but not to vendor contracts or prototype designs. Each role carries a di — — erent risk, and access must be tailored accordingly. This tailoring can take many — orms. Some companies de — ine access permissions in — ormal documentation, tying them to job descriptions or system pro — iles. Others implement access hierarchies through technical systems: password-protected drives, VPN limitations, project-based — ile shares, or departmental — older structures. The method matters less than the outcome. Courts want to see that the company knew where its secrets lived and made deliberate choices about who could see them. Role-based limitation also requires organizational discipline. I — access controls are de — ined but not en — orced — i — credentials are shared, i —
olders are broadly accessible, or i — employees routinely store sensitive — iles in personal drives — then the existence o — a policy will do little to support the claim. Courts do not evaluate intentions. They evaluate structure. The gap between stated policy and actual practice is o — ten the gap in legal protection. This structure must adapt as roles change. When employees move between depart- ments, are promoted, or shi — t projects, access should be reevaluated. I — a market- ing lead transitions to a strategic role, access to analytics or R&D documentation may need to be expanded or newly limited. Similarly, i — an employee leaves a project, their access to that material should be revoked. Temporary credentials should expire automatically. Project-based — olders should be archived or decommissioned once
6406_Oranburg_Protecting Trade Secrets_1pp.indb 125 10/16/25 9:25 PM 126 4 • Mitigating Internal Vulnerabilities
development ends. The point is that static access --- rameworks become obsolete, and
only dynamic systems can re --- lect the evolving structure o --- a real business.
Companies that implement strong role-based access controls have a clear advantage
in litigation. They can show who saw the secret, when, and under what conditions.
They can demonstrate that disclosure was limited by design, not just by accident. And
they can point to a system o --- permissions that tracks responsibility rather than one
that allows in --- ormation to circulate without restraint. When courts see this structure,
they are more likely to credit the company’s claim that the in --- ormation was secret
because it was treated as such.
4.4.2. Document Control, Labeling, and
Classi --- ication
A trade secret must be treated as a secret not in theory alone but rather in the way
it is stored, circulated, and labeled. Courts do not expect companies to mark every
email or Slack message. But they do expect a pattern o --- discipline — one that signals
to employees, contractors, and outsiders that certain categories o --- in --- ormation are
subject to con --- identiality restrictions. Labeling and document management are not
ormalities. They are part o — the — actual record that supports a trade secret claim. The most basic — orm o — document control is marking. When a company consis- tently labels documents containing con — idential in — ormation, it strengthens its ability to later claim that the in — ormation was understood as secret. Labels might include headers such as “Con — idential,” “Trade Secret,” or “Proprietary,” or they may use internal coding systems tied to document sensitivity. What matters is that the labels are visible, used systematically, and understood internally. Courts have given weight to labeling even where the underlying in — ormation was later challenged as too obvi- ous or too widely known. The presence o — a con — identiality label is not decisive, but it demonstrates that the company made a conscious e —
ort to identi — y what required protection. Classi — ication goes — urther. Many companies use tiered systems to identi — y levels o —
con --- identiality. A basic --- ramework might distinguish between “Internal Use,” “Con-
idential,” and “Restricted.” More detailed systems may include role-based clearance,
lags — or export control, or automatic redaction triggers. These systems serve two purposes. Internally, they in — orm employees about how in — ormation may be shared. Legally, they create a record o — how the company handled sensitive material. A — ile labeled “Restricted — Engineering Only” that resides on a segmented server and whose access is limited to a speci — ic team is — ar more de — ensible than an unlabeled document circulating in a shared drive. Version control supports these e —
orts. Many trade secrets are not static. They evolve through dra — ts, iterations, and collaborative input. I — earlier versions o — a secret are circulated without restriction, or i — dra — ts remain accessible in shared — olders long
6406_Oranburg_Protecting Trade Secrets_1pp.indb 126 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 127
a --- ter the --- inal product has been released, the claim o --- secrecy may be undermined.
Companies must be able to show which version o --- the in --- ormation was protected,
who had access to it, and how the transition between dra --- ts was managed. This is
especially important in so --- tware, where older versions o --- code may be reused or stored
in repositories with broader access than the --- inal release.
Email and messaging plat --- orms present special challenges. Trade secrets are o --- ten
discussed, re --- ined, and circulated in --- ragments — paragraphs, comments, screen-
shots — within systems that are not built --- or classi --- ication. While companies are not
expected to control every in --- ormal message, they are expected to control access to
attachments, limit circulation o ---
iles, and monitor whether key in — ormation is being handled appropriately. Policies that require labeling o — attached documents, restrict
orwarding outside authorized teams, or archive con — idential threads — or review can all support the company’s case. Document control also extends to retention and deletion. I — sensitive in — orma- tion remains accessible long a — ter a project ends, or i — con — idential dra — ts are retained inde — initely in unprotected systems, courts may conclude that the company — ailed to maintain secrecy. The standard is not per — ection. It is reasonableness. But a — ailure to purge, archive, or restrict obsolete materials can become evidence o — indi —
erence, and indi —
erence is rarely consistent with secrecy. When a trade secret is lost, the company must be able to show how it was handled be — ore the loss occurred. I — it was labeled, tracked, versioned, and stored according to de — ined rules, courts are — ar more likely to — ind that secrecy was preserved. I — it was treated no di —
erently — rom any other — ile, the legal claim may — ail be — ore it begins.
4.4.3. Monitoring, Auditing, and Insider
Activity Detection
Secrecy is not a one-time decision. It is a continuing obligation. A company can-
not protect its trade secrets merely by dra --- ting good policies or restricting access. It
must also be capable o --- knowing when those protections are being tested, bypassed, or
ignored. Monitoring and auditing are what make the system real. They convert --- ormal
controls into practical sa --- eguards. And they generate the kind o --- evidence courts rely
on when evaluating whether a company took secrecy seriously.
Monitoring begins with visibility. A business cannot protect what it cannot see. At
a minimum, systems should be con --- igured to log access to sensitive materials, includ-
ing who accessed what in --- ormation, when, and --- rom where. These logs provide the
historical record needed to identi --- y patterns, detect anomalies, and, in some cases,
prove misappropriation. When a departing employee is suspected o --- taking trade
secrets, access logs can reveal whether con --- idential --- iles were downloaded in the days
be --- ore departure, whether external storage devices were connected, or whether login
activity occurred outside normal working hours.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 127 10/16/25 9:25 PM 128 4 • Mitigating Internal Vulnerabilities
The presence o --- these logs can shape litigation. Courts do not require every company
to have a sophisticated intrusion detection system. But they do expect that sensitive sys-
tems are monitored and that unauthorized or suspicious activity triggers investigation.
In some cases, the --- ailure to monitor has been cited as evidence that the company did
not genuinely treat the in --- ormation as a secret. In others, the ability to pinpoint when
and how access occurred has made the di ---
erence between speculation and proo — . Auditing rein — orces these e —
orts. Regular reviews o — access permissions, user activ- ity, and policy compliance help ensure that the system remains e —
ective. Audits can identi — y dormant accounts that still have access, shared passwords, miscon — igured per- missions, or other silent vulnerabilities. Courts have given weight to companies that per — orm regular internal audits and act on the — indings. When a business can show that it reviewed its own systems, updated its controls, and corrected de — iciencies, it sends a clear message that con — identiality was not le — t to chance. Insider activity detection extends beyond technical logs. Behavioral signals also matter. Companies should have processes in place to detect when employees begin to act in ways that suggest intent to leave or to take in — ormation with them. These signals may include copying large numbers o —
iles, sending attachments to personal accounts, printing con — idential documents, or accessing areas o — the system outside the scope o —
a normal role. Detection tools can --- lag this activity, but they are only use --- ul i --- there
is a response protocol. A --- lagged activity must lead to inquiry. A pattern must lead to
review.
Monitoring and auditing are also relevant to policy en --- orcement. A company that
monitors activity but does nothing when violations occur will be seen as tolerating
breaches. Courts may ask whether policies were en --- orced uni --- ormly, whether training
was --- ollowed by veri --- ication, and whether known violations were addressed. Inconsistent
en --- orcement can undermine the entire system. By contrast, consistent --- ollow-through
rein --- orces the claim that trade secrets were not only de --- ined — they were de --- ended.
Finally, detection systems help companies respond in real time. When a breach is
identi --- ied early, the company may be able to seek an injunction, preserve evidence, or
limit the spread o --- the in --- ormation. I --- detection is delayed, the opportunity to act may
be lost. Trade secret protection is time-sensitive. The sooner the risk is identi --- ied, the
stronger the legal and practical options will be.
Monitoring, auditing, and detection are not simply security --- unctions. They are part
o --- the legal argument. They demonstrate that the company paid attention, took action,
and created systems to ensure that its policies were more than words. Courts do not
expect per --- ection. But they expect e ---
ort. And e —
ort leaves a trail. In sum, to promote secrecy and protect its trade secrets, companies should: • Log access to sensitive — iles and systems, including date, time, user, and location o — access. • Establish baseline activity patterns — or employees in sensitive roles to detect anomalies.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 128 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 129
• Monitor --- or red --- lags such as large downloads, late-night access, or o ---
-network activity. • Track use o — external storage devices, personal email, and unauthorized shar- ing plat — orms. • Conduct periodic audits o — user permissions to ensure access aligns with role requirements. • Document monitoring policies and ensure they are communicated to employ- ees in writing. • Create escalation protocols — or responding to detected irregularities. • Retain access and audit logs — or a de — ined period to support potential — uture investigations. • Integrate monitoring with exit procedures to review access activity prior to departure. • Review and update monitoring tools and audit procedures on a recurring schedule.
4.5. Onboarding and Training
Even the best systems --- ail i --- the people using them do not understand their pur-
pose. Contracts, access controls, and monitoring tools provide the technical and legal
ramework — or trade secret protection, but it is the work — orce that determines whether those sa — eguards are implemented, respected, and sustained. Courts evaluating trade secret claims o — ten look beyond the in — rastructure to ask what the company did to educate its employees. Did the organization tell people what counted as con — idential? Did it explain how to handle sensitive in — ormation? Did it remind them, over time, that the obligation o — secrecy continued? Onboarding is where these answers begin. A new employee must not only sign the relevant agreements but also understand what they mean. This includes the nondisclosure agreement, the invention assignment clause, and any applicable non-solicitation or noncompete provisions. But it also includes the policies that govern day-to-day behavior: how to store documents, where to save work, what sys- tems require credentials, and how to escalate questions or report concerns. Courts give weight to evidence that a company explained its policies at the outset o — the relationship and rein — orced them through orientation, training, and documented acknowledgement. Merely providing documents is not enough. Employees o — ten sign stacks o —
orms at the start o — a new role, and courts recognize that signatures alone do not guar- antee comprehension. Companies should take steps to ensure that the message o —
con --- identiality is clear. This may include onboarding sessions that explain trade secret
6406_Oranburg_Protecting Trade Secrets_1pp.indb 129 10/16/25 9:25 PM 130 4 • Mitigating Internal Vulnerabilities
protections in plain language, walkthroughs o --- how access systems work, or con --- irma-
tion emails summarizing key points. Some organizations require new employees to
pass short training modules or quizzes. Others use orientation videos or onboarding
portals. What matters is not the --- ormat but rather the --- act that the company made an
e ---
ort to in — orm. Training should not stop a — ter orientation. Most employees handle con — idential in — ormation in an evolving environment. New tools, new projects, and new team structures create ongoing risk. Regular training ensures that employees are reminded o — their obligations and are kept up to date on procedures. In some cases, courts have cited the absence o — any — ollow-up training as evidence that the company’s con — iden- tiality culture was per — ormative. Where training occurs regularly, is recorded, and includes examples tied to the actual business, it rein — orces the credibility o — the com pany’s claim that it protected its secrets. Ongoing training is particularly important in organizations where trade secrets are embedded in ordinary work — lows. In technical environments, employees may not recognize that internal benchmarks, process improvements, or operational decisions constitute proprietary in — ormation. In sales organizations, pricing models or cus- tomer segmentation data may not be seen as con — idential unless that expectation is clearly stated. Training helps bridge this gap. It makes the boundaries legible to those who are responsible — or maintaining them. Some o — the most damaging trade secret losses come not — rom malice but rather
rom misunderstanding. A well-meaning employee may reuse a presentation tem- plate, include a client list in a resume, or carry — orward a coding shortcut without realizing that it contains protected in — ormation. Courts recognize that mistakes hap- pen. But when those mistakes occur in a company with no training, no reminders, and no e —
ort to educate, the court may conclude that secrecy was not a real priority. Training also has cultural signi — icance. It shows that con — identiality is not merely a legal concern but also a shared responsibility. When managers rein — orce policies, when teams are brie — ed be — ore major product launches, or when exit interviews revisit con — identiality obligations, the message becomes institutional. Courts o — ten view this culture as one o — the strongest indicators o — reasonable e —
ort. A company that trains its people, documents its policies, and rein — orces its values is more likely to persuade the court that its secrets were treated as secrets. To help ensure that employees are educated about and understand company poli- cies, companies should implement an onboarding and training process that includes the — ollowing elements: • Ensure that new employees review and sign all relevant agreements, includ- ing NDA, invention assignment, and any applicable noncompete or non- solicitation clauses. • Explain what quali — ies as a trade secret in the context o — the company’s operations.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 130 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 131
• Provide practical examples o --- con --- idential in --- ormation employees will encoun-
ter in their role.
• Walk through internal policies on document storage, labeling, and access
restrictions.
• Demonstrate how to access secure systems and how credentials are managed.
• Review procedures --- or reporting security concerns or suspected misuse.
• Explain the employee’s ongoing duty o --- con --- identiality a --- ter employment ends.
• Require written acknowledgment o --- orientation completion and understanding.
• Document training delivery, including materials used and attendance records.
• Schedule --- ollow-up or re --- resher training as part o --- the employee’s integration
plan.
4.6. Exit Protocols and Post-
Employment Risk
The most dangerous moment in the li --- e o --- a trade secret is o --- ten when an employee
leaves. Departures concentrate vulnerability. They trigger downloads, --- ile trans --- ers,
hasty communications, and quiet copying. They also disrupt work --- lows, reassign
responsibilities, and create uncertainty about what in --- ormation will be taken, remem-
bered, or reused. Exit protocols are there --- ore not just administrative processes. They
are a --- inal opportunity to assert control.
Courts routinely examine what a company did when a key employee le --- t. Did it
disable access immediately? Did it conduct a review o --- system activity? Did it conduct
an exit interview and remind the departing employee o --- ongoing obligations? Did it
retrieve devices, secure documentation, and require acknowledgment o --- the duty to
maintain con --- identiality? Each o --- these questions points to the same larger inquiry:
Did the company act as i --- its secrets still mattered even a --- ter the person who knew
them was walking out the door?
An e ---
ective exit protocol begins be — ore the — inal day. Companies should have a checklist o — procedures tied to trade secret protection. These procedures may include deactivating user credentials, revoking access to repositories, collecting company- owned devices, reviewing recent downloads or trans — ers, and auditing cloud stor- age or personal email use. The scope o — review should match the sensitivity o — the in — ormation. A departing executive with access to product strategy requires di — — erent scrutiny than a junior team member with limited visibility. Courts do not require overreaction. They expect proportion. Exit interviews provide an opportunity to clari — y continuing obligations. Even where an employee signed a nondisclosure agreement at the outset, the company strengthens
6406_Oranburg_Protecting Trade Secrets_1pp.indb 131 10/16/25 9:25 PM 132 4 • Mitigating Internal Vulnerabilities
its position by restating those duties at the end. This may involve asking the employee
to con --- irm that no con --- idential in --- ormation has been retained, copied, or shared. It
may include reviewing what quali --- ies as a trade secret, reminding the employee that
contractual obligations survive termination, and con --- irming that the employee has
returned all materials. When these interviews are documented, they provide persua-
sive evidence that the company took the protection o --- its secrets seriously.
Some companies use separation agreements to restate key provisions, secure addi-
tional assurances, or establish speci --- ic representations about in --- ormation return.
These agreements may include con --- identiality rea ---
irmations, reminders about inven- tion assignment, or additional clauses about competitive conduct. Where en — orceable, they may also include release language or dispute resolution provisions. Courts o — ten give weight to post-employment agreements, particularly when they are signed with adequate consideration and clearly identi — y surviving obligations. Departures should also be — ollowed by internal adjustments. Access logs may need to be preserved. Systems may need to be recon — igured. Teams may need to be reminded not to — orward documents or communicate with the — ormer employee. In some cases, competitors may need to be noti — ied that the company considers certain in — ormation to be protected. These — ollow-up actions are not just — or show. They pre- vent misunderstanding, protect against inadvertent leaks, and ensure that the com pany’s trade secret protections remain intact. When a — ormer employee joins a competitor, the situation becomes more delicate. The company may choose to send a letter to the new employer outlining the depart- ing employee’s obligations and requesting assurance that trade secrets will not be accessed or used. These letters are not threats. They are records. Courts have cited them as evidence that the company acted to preserve secrecy and put others on notice. I — litigation arises, the company will be able to show that it did not wait passively — or harm to occur. Ultimately, post-employment risk is not just about what the — ormer employee chooses to do. It is about what the company chooses to control. Courts are — ar more likely to en — orce restrictive covenants, grant injunctive relie — , or award damages when they see that the company treated the departure as a moment o — risk and responded accordingly. Exit protocols turn vulnerability into preparedness. They are the — inal chapter in the story the company tells the court — and sometimes the most important one. To minimize post-employment risk, companies should: • Disable all system access on or be — ore the employee’s departure date, including email, VPN, and internal plat — orms. • Recover all company-owned devices, including laptops, phones, drives, and access cards. • Audit recent user activity — or irregular downloads, trans — ers, or access to sensi- tive systems.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 132 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 133
• Conduct an exit interview that includes a review o --- continuing con --- identiality
obligations.
• Require written certi --- ication that all company in --- ormation has been returned
or deleted.
• Reiterate post-employment restrictions stated in any applicable NDA, non-
compete, or non-solicit agreement.
• Document any known projects or --- iles the employee had access to at the time
o --- departure.
• Noti --- y relevant managers and team members o --- the employee’s departure and
rein --- orce noncommunication protocols i --- needed.
• Consider sending a notice to the new employer i --- there is a material risk o ---
misappropriation.
• Archive access logs, certi --- ications, and separation documentation --- or --- uture
re --- erence or litigation.
4.7. When Internal
Sa --- eguards Fail
No system is per --- ect. Even companies with strong policies, care --- ully dra --- ted con-
tracts, and well-calibrated controls will sometimes experience loss. A laptop goes
missing. A departing employee takes --- iles. A mistake is made, and sensitive in --- orma-
tion is exposed. When that happens, the question is not whether the company --- ailed.
It is how the company responded.
Trade secret law does not require absolute prevention. It requires reasonable e ---
orts. That standard allows — or the reality that human error, technical breakdowns, and even intentional misconduct can occur despite a company’s best intentions. But when sa — e- guards — ail, the company must act quickly and deliberately to preserve its legal rights. Delay, inaction, or con — usion may suggest that secrecy was not a real priority and that the company is reacting — or the — irst time rather than executing a plan. The most important step a — ter a — ailure is containment. I — a breach is suspected, access must be revoked immediately. Relevant logs should be preserved. Systems should be audited to determine what was taken, when, and by whom. I — devices are missing, they should be remotely wiped or deactivated i — possible. I — documents were emailed externally, recipients may need to be contacted. The company should act as i —
the in --- ormation still matters — because that is what the court will ask.
Investigation --- ollows containment. The company must determine whether the
incident involved a trade secret, whether any contractual obligations were breached,
and whether the recipient knew or should have known that the in --- ormation was
6406_Oranburg_Protecting Trade Secrets_1pp.indb 133 10/16/25 9:25 PM 134 4 • Mitigating Internal Vulnerabilities
con --- idential. This requires not only technical analysis, but legal evaluation. Counsel
must review relevant agreements, policies, training records, and employee acknowl
edgments. These materials will shape the company’s ability to assert claims or de --- end
its actions in court.
Communication must be handled care --- ully. Internally, managers and a ---
ected teams may need to be in — ormed. Access to shared drives may need to be restricted. New policies or reminders may be issued. Externally, the company may choose to send a cease-and-desist letter, noti — y a competitor, or — ile a motion — or injunctive relie — . In some cases, the company may be required to make public disclosures, — or example, under regulatory obligations or in the context o — an acquisition. But all such commu- nications should be vetted — or consistency and strategic alignment. Documentation is essential. Courts o — ten evaluate not just whether a company responded but also whether it can prove what actions it took. The internal inves- tigation should be documented in a privileged report. Communications should be recorded. Decisions about response, noti — ication, and remediation should be tied to the company’s broader trade secret protection plan. I — the case proceeds to litigation, this record will help establish that the company did not act out o — panic but instead
ollowed a disciplined approach. Sometimes, internal — ailure reveals weaknesses in the system itsel — . A breach may uncover outdated access protocols, overly broad permissions, or poor logging. These issues should be addressed immediately — not just — or operational reasons but also because the legal doctrine expects learning. Courts understand that — ailure is possible. They are less — orgiving when — ailure repeats. In rare cases, the breakdown is total. A product is leaked. A — ormula is disclosed. The secret is lost. Even then, legal action may still be available. Courts may grant dam- ages, issue injunctions to limit — urther use, or require competitors to return or destroy materials. But the company’s position will depend heavily on what it can show. I — the court concludes that the in — ormation was never really protected, the law will not treat its loss as a violation. This is why — ailure must be anticipated. A company that prepares — or — ailure is not admitting de — eat. It is preserving its ability to recover. Every trade secret protec- tion plan should include a response protocol, escalation paths, legal review proce- dures, and systems — or containment. When those are in place, the company will be ready — not just to limit the damage but also to prove that it never stopped taking secrecy seriously.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 134 10/16/25 9:25 PM 4 • Mitigating Internal Vulnerabilities 135
4.8. Turning Policy Into Practice
Trade secret protection begins inside the organization. It is shaped not only by
what the company knows to be sensitive but also by what it does to protect that knowl-
edge — day a --- ter day, across systems, contracts, and human behavior. This chapter
has traced the --- ull arc o --- internal discipline, --- rom the dra --- ting o --- restrictive cove-
nants to the en --- orcement o --- operational sa --- eguards. It has shown how trade secret
law rewards structure, punishes indi ---
erence, and holds companies accountable — or whether secrecy was real or merely presumed. The legal system does not demand per — ection. But it does demand seriousness. A company that knows what its trade secrets are, limits access accordingly, trains its people to treat in — ormation care — ully, and responds promptly to breaches has already done most o — the work the law expects. A company that writes ambitious policies but cannot show how they were implemented or that imposes sweeping restrictions with- out proportion may — ind that the law does not — ollow where the paperwork points. What distinguishes strong internal protection is not — ormality but credibility. Courts ask whether the protections in place re — lected the value o — the in — ormation, the vulnerability o — the system, and the roles o — the individuals involved. They exam- ine the words o — the contracts and the conduct o — the business. They look at what happened not when everything was — unctioning but rather when something went wrong. A company’s ability to respond to that scrutiny is what turns policies into protection. At its core, trade secret law does not create secrecy. It recognizes it. That recog- nition depends on whether the company treated its in — ormation like a secret in its day-to-day li — e. That means en — orcing restrictions. It means revoking access. It means monitoring, auditing, and responding to threats. It means educating employees and con — ronting risk. It means aligning internal discipline with external claims. And it means accepting that trade secrets are not sel — -executing rights — they are — ragile assets that exist only when the organization acts to preserve them. The work o — protection does not end at the walls o — the company. Many o — the most serious trade secret threats arise not — rom insiders but — rom third parties: vendors, partners, customers, collaborators. The next chapter addresses these external risks. It examines how companies can preserve secrecy while working with others, how to structure relationships that require in — ormation sharing, and how to build contractual and operational sa — eguards that extend beyond the boundaries o — internal control. The principles remain the same. But the terrain becomes more complex.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 135 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 136 10/16/25 9:25 PM Chapter 5 Mitigating External Vulnerabilities
A trade secret does not lose protection merely because it is shared with others. Yet
the moment con --- idential in --- ormation crosses organizational boundaries, it becomes
subject to a new set o --- vulnerabilities — some predictable, others uncertain. Unlike
internal disclosures, which can be governed by hierarchy, policy, and culture, external
disclosures depend almost entirely on the structure o --- the relationship. Courts do not
in --- er protection simply because in --- ormation was valuable or shared with caution.
Instead, they examine whether the disclosing party took a ---
irmative, reasonable steps to control how the in — ormation was used, accessed, and retained by third parties. External vulnerabilities arise in countless — orms: vendors with system-level access, partners in joint development e —
orts, customers evaluating early-stage prototypes, cloud plat — orms hosting proprietary code, and distribution channels with little vis- ibility into downstream users. Each interaction brings with it not only the risk o —
misappropriation but also the uncertainty o --- misalignment. A company may believe
it has limited use to a de --- ined purpose, while the recipient sees the in --- ormation as
reely usable once the — ormal project ends. These con — licts rarely turn on bad — aith. More o — ten, they result — rom ambiguous contracts, missing boundaries, or — ailure to anticipate how con — idential in — ormation will behave once embedded in shared sys- tems or deliverables. The law’s standard remains the same: a trade secret must be subject to reasonable e —
orts to maintain its secrecy. But in external contexts, what quali — ies as “reasonable” is no longer a matter o — internal discipline but o — design. Contracts must de — ine use and ownership with precision. Technical systems must limit access and record activ- ity. Termination clauses must ensure that trade secrets do not survive the deal but rather disappear — rom the recipient’s possession and systems. Above all, the relation- ship must be structured to create traceability: a clear path to determine who accessed what, when, and — or what purpose. Without that traceability, en — orcement becomes speculative, and legal protection collapses into a presumption o — waiver. This chapter examines how trade secret holders can mitigate these external vulner- abilities through thought — ul contract design, segmented access, targeted use restric- tions, and en — orceable exit provisions. Each section — ocuses on a di — — erent relationship
137
6406_Oranburg_Protecting Trade Secrets_1pp.indb 137 10/16/25 9:25 PM 138 5 • Mitigating External Vulnerabilities
type — vendors, collaborators, customers, or distributors — and explains how courts
have evaluated e ---
orts to protect trade secrets in these settings. Case law is integrated throughout, not to catalogue outcomes but to reveal where protection strategies suc- ceed or — ail in practice. Breakout boxes o —
er model contractual provisions along with dra — ting notes, illustrating how di — — erent clause variants shi — t the legal terrain. The goal is not to eliminate external vulnerability altogether. It is to contain it so that trade secrets remain de — ensible even when they must be shared.
5.1. External Vulnerability as
a Structural Problem
Trade secrets do not exist in isolation. They are o --- ten embedded in partnerships,
shared in vendor relationships, and exposed during customer engagement. What
makes these external interactions dangerous is not that they involve outsiders but
rather that they introduce a loss o --- structural control. When in --- ormation is shared
with employees, internal protocols and cultural expectations --- ill in the gaps. But when
in --- ormation is shared with another organization, the only source o --- discipline is what
the parties have agreed to. That agreement, whether contractual, procedural, or archi-
tectural, must carry the --- ull burden o --- secrecy.
The vulnerability here is both legal and operational. Legally, external disclosures
without clear constraints may destroy trade secret status entirely. Courts consistently
hold that sharing valuable in --- ormation without protective conditions is --- atal, even
i --- the disclosing party believed it was acting cautiously. Operationally, third-party
recipients are not subject to internal access controls or training. They may have their
own vendors, subcontractors, and plat --- orms, each o --- which introduces additional
exposure unless explicitly barred or constrained. The trade secret becomes a traveler,
not a resident.
These vulnerabilities are compounded by uncertainty. Many external relationships
are open-ended or exploratory: collaborative R&D, licensing talks, customer pilots.
The parties may not know what will be developed, what will be retained, or who will
ultimately own the resulting insight. Ambiguity about scope, ownership, and post-
termination rights is not just a business risk — it is a legal vulnerability. Courts evalu-
ating trade secret claims will ask whether the disclosing party took steps to prevent
the very ambiguity that now clouds the dispute.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 138 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 139
Contractual Sa --- eguards Are Essential --- or
Trade Secret Protection
Auto Channel, Inc. v. Speedvision Network, LLC
144 F. Supp. 2d 784 (W.D. Ky. 2001)
Auto Channel disclosed proprietary programming concepts and marketing
strategies to Speedvision during joint venture negotiations. No nondisclosure
agreement was signed. When Speedvision later launched a competing net-
work, Auto Channel sued --- or misappropriation. The court granted summary
judgment --- or the de --- endant, holding that the in --- ormation was not protected
because it had been disclosed without any --- ormal con --- identiality obligation.
The court emphasized that even valuable and original in --- ormation loses trade
secret status when shared without sa --- eguards. Caution alone is not enough.
Contractual protection is essential.
The lesson --- rom Auto Channel is not simply that NDAs matter but that structure
matters. A company that shares trade secrets externally must design the relationship
to preserve legal protection at every stage: be --- ore disclosure, during collaboration,
and a --- ter termination. The initial agreement should de --- ine what is con --- idential and
how it may be used. The working arrangement should control who has access and
what records are kept. The exit provisions should require return or destruction and
clari --- y that rights do not survive the deal. Without these constraints, even care --- ul
businesses may --- ind that their secrets no longer quali --- y --- or legal protection.
The --- ollowing sections examine these structural vulnerabilities in context, begin-
ning with vendor relationships — which are o --- ten the most underestimated source o ---
external exposure.
5.2. Vendor Relationships
Vendors are among the most common sources o --- external vulnerability. From
cloud service providers and IT contractors to supply chain partners and outsourced
engineering teams, vendors routinely gain access to the internal operations o --- a busi-
ness. In many cases, their technical privileges exceed those o --- most employees. Yet
vendors are not subject to company policies, internal training, or managerial over-
sight. Their only obligations are contractual. I --- those contracts are vague, permissive,
or silent, the legal structure collapses, and the company’s trade secrets may be exposed
without remedy.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 139 10/16/25 9:25 PM 140 5 • Mitigating External Vulnerabilities
5.2.1. Limiting Vendor Rights
The core problem in vendor relationships is not overt the --- t. It is misalignment. Ven-
dors may store con --- idential data in shared systems, retain access credentials beyond
the li --- e o --- the contract, or allow subcontractors to access sensitive environments.
These actions may be ordinary in the vendor’s operational model but catastrophic
or trade secret protection. The vulnerability is ampli — ied when the company does not monitor how its in — ormation is handled, cannot trace which personnel accessed what, or lacks exit protocols to ensure clean separation.
Digital Controls Strengthen
Trade Secret Rights
7EDU Impact Academy v. Ya You
2024 U.S. Dist. LEXIS 230110 (N.D. Cal. 2024)
In a dispute between an education company and a --- ormer employee, 7EDU
alleged misappropriation o --- proprietary course materials, customer data, and
business methods. The court granted a preliminary injunction, --- inding a likeli-
hood o --- trade secret protection based in part on the company’s e ---
orts to con- trol access through its digital plat — orm. The court noted that login protections, document labeling, and de — ined user roles contributed to the showing o — rea- sonable e —
orts even though some in — ormation was shared internally and exter- nally. The case underscores that in digital environments, plat — orm architecture and vendor con — iguration can make or break trade secret status.
The 7EDU case illustrates how technical in --- rastructure can support legal claims,
but only i --- it is intentional. Vendor contracts must incorporate both con --- identiality
obligations and operational constraints that ensure proper alignment between access
and accountability. A contract that governs vendor use o --- con --- idential in --- ormation
must de --- ine the scope o --- access, limit the individuals authorized to receive the in --- or-
mation, prohibit downstream disclosure or subcontracting, and impose --- irm obli-
gations regarding return or deletion at the end o --- the relationship. These terms are
not merely administrative. They --- orm the structure that courts rely on to determine
whether a company took reasonable steps to protect its secrets.
The --- ollowing sample clause shows how companies can structure vendor access
obligations to reduce these vulnerabilities.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 140 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 141
Vendor Access Clauses Limit Scope,
Personnel, and Retention
“Vendor shall access and use Con --- idential In --- ormation solely to per --- orm the
services de --- ined in this Agreement. Vendor shall restrict such access to named
personnel approved in writing by the Company, and shall maintain records o ---
all such access. Vendor shall not disclose or permit access to any subcontractor
or third party without the Company’s prior written consent. Upon termination
or completion o --- the services, Vendor shall promptly return or destroy all Con-
idential In — ormation in its possession, including any copies stored in backup systems or cloud environments.”
An e ---
ective vendor-relationship con — identiality clause constrains access both tech- nically and organizationally. It re — lects a disclosing party’s interest in traceability, con- tainment, and post-engagement closure. By speci — ying who may access in — ormation, limiting trans — er to other entities, and requiring return or destruction o — materials, the clause rein — orces secrecy with procedural en — orcement. Companies may also supple- ment this provision with periodic compliance certi — ications or system-level audits. Vendor relationships, which are managed by procurement or IT teams rather than legal counsel, o — ten operate in the background o — business operations. But when trade secret disputes arise, those relationships move to the center o — litigation. Courts will ask what sa — eguards were in place to prevent misuse, what records exist to reconstruct access, and whether the vendor agreement adequately limited downstream exposure.
5.2.2. Audit Rights and Oversight Clauses
Limiting access and logging usage are essential sa --- eguards, but sometimes the dis-
closing party needs more than technical constraints. In vendor relationships where
the in --- ormation is especially sensitive or the relationship is particularly complex,
companies may reserve the right to audit the recipient’s practices. An audit right
allows the trade secret owner to inspect how in --- ormation is handled, veri --- y compli-
ance with con --- identiality requirements, and investigate possible breaches. This right
is not limited to suspicion. It is a tool --- or ongoing oversight.
Audit clauses serve multiple purposes. They deter misuse by signaling that com-
pliance is not merely expected but also subject to veri --- ication. They also provide evi-
dence that the disclosing party took a ---
irmative steps to maintain secrecy — something courts consider when deciding whether legal protection should apply. In some indus- tries, audits are standard — or data security or regulatory compliance. But in trade secret protection, they serve a distinct — unction: they make secrecy en — orceable in real time, not just through later litigation.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 141 10/16/25 9:25 PM 142 5 • Mitigating External Vulnerabilities
The e ---
ectiveness o — an audit clause depends on its speci — icity. Open-ended rights to inspect “on demand” may be seen as intrusive or vague. A well-dra — ted provision typically de — ines the audit scope, timing, notice requirements, and cooperation obli- gations. Some agreements require periodic compliance certi — ications instead o —
ull audits. Others limit inspection rights to business hours or restrict access to speci — ic systems or locations. The clause must strike a balance between oversight and opera- tional — easibility.
Audit Clauses Provide Oversight Rights
and Con --- identiality Compliance
“Recipient shall maintain accurate and complete records regarding its
handling o --- the Discloser’s Con --- idential In --- ormation. Upon ten (10) business
days’ written notice, and no more than twice per calendar year, Discloser may
audit Recipient’s --- acilities, systems, and relevant records to veri --- y compliance
with the con --- identiality obligations in this Agreement. Recipient shall cooper-
ate in good --- aith and provide reasonable access to personnel, records, and sys-
tems necessary --- or the audit. Discloser shall bear the cost o --- such audits unless
material noncompliance is discovered.”
This clause gives the disclosing party a practical mechanism --- or en --- orce-
ment. It also imposes a recordkeeping obligation that can later support litiga-
tion. By --- raming the audit as a right — not just a reaction — the clause turns
vigilance into structure.
Audit rights are especially power --- ul when paired with technical controls. Together,
they create a system o --- external secrecy that is not only de --- ined by contract but also
observable in practice. When companies can monitor their vendors both through
plat --- orms and legal inspections, they trans --- orm risk into something measurable and,
more importantly, governable.
5.2.3. Indemnity and Liquidated
Damages Clauses
Legal en --- orcement is o --- ten reactive. But in high-risk external relationships, com-
panies can take a more proactive approach by assigning --- inancial responsibility --- or
trade secret loss in advance. Two tools are commonly used --- or this purpose: indem-
ni --- ication and liquidated damages. They may be included in vendor contracts as well
as other third-party relationships.
An indemnity clause shi --- ts liability. I --- the recipient causes exposure — by --- ailing
to comply with con --- identiality obligations, permitting unauthorized disclosure, or
6406_Oranburg_Protecting Trade Secrets_1pp.indb 142 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 143
mishandling trade secrets — the recipient agrees to compensate the disclosing party
or resulting losses. These losses may include not only direct damages but also legal
ees, regulatory costs, and reputational harm. The clause does not replace trade secret litigation. It supplements it with a contractual promise to make the disclosing party whole. A liquidated damages clause, by contrast, sets a predetermined — inancial conse- quence — or breach. This is particularly use — ul where actual damages would be di —
i- cult to prove or where the mere — act o — misappropriation could destroy the business’s competitive position. Courts will en — orce liquidated damages only i — the amount is reasonable and was negotiated in good — aith. Excessive or punitive — igures are likely to be rejected. These clauses are especially important in distribution, where trade secrets may be exposed to large numbers o — end users or incorporated into customer- — acing opera- tions. I — a distributor — ails to protect con — idential sales tools, pricing models, or imple- mentation methods, the cost o — exposure may exceed the company’s direct contractual remedies. Indemnity and liquidated damages provide a second line o — de — ense.
Indemnity and Liquidated Damages Clauses
Allocate Trade Secret Misappropriation Risk
“Recipient shall indemni --- y, de --- end, and hold harmless Discloser --- rom and
against any and all losses, damages, liabilities, costs, and expenses (including
reasonable attorneys’ --- ees) arising out o --- or related to any unauthorized use or
disclosure o --- Con --- idential In --- ormation by Recipient or its agents, employees,
or contractors. In the event o --- breach o --- the con --- identiality obligations in this
Agreement, the parties agree that actual damages would be di ---
icult to deter- mine, and Recipient shall pay Discloser liquidated damages in the amount o —
$250,000, which the parties acknowledge represents a reasonable estimate o ---
anticipated harm.”
This clause combines indemnity and liquidated damages to provide both
lexibility and predictability. The indemnity captures unknown downstream costs. The liquidated amount provides a — loor — or recovery and strengthens the deterrent e —
ect o — the agreement.
Let’s now address the second identi --- ied gap: indemnity and liquidated damages
provisions in external relationships.
These clauses are not about secrecy per se — they are about consequences. When
trade secrets are disclosed to vendors, distributors, or development partners, the
disclosing party may want to shi --- t the --- inancial risk o --- exposure through contract.
I --- the recipient mishandles the in --- ormation, --- ails to --- ollow procedures, or causes
6406_Oranburg_Protecting Trade Secrets_1pp.indb 143 10/16/25 9:25 PM 144 5 • Mitigating External Vulnerabilities
leakage — whether negligently or through breach — the disclosing party can seek com-
pensation under an indemni --- ication clause or pre-agreed payment under a liquidated
damages clause.
These tools are especially use --- ul in settings where actual damages may be hard to
quanti --- y or where a dispute could impose costs beyond the trade secret itsel --- , such as
regulatory penalties, customer churn, or loss o --- investor con --- idence.
5.3. Collaborative Development:
Blurred Boundaries and Ownership
Con --- usion
When companies work together to develop new technologies, processes, or
products, the resulting innovation o --- ten re --- lects the input o --- both parties. These
collaborations can generate enormous value, but they also create deep structural vul-
nerabilities. The most signi --- icant o --- these is uncertainty about ownership. A company
may contribute proprietary know-how to a project under the belie --- that it remains
the exclusive owner while its partner believes the resulting insights are jointly held or
reely usable. Without clear contractual delineation, courts may struggle to determine whether any trade secret rights remain intact. This vulnerability is distinct — rom the — t. The danger in collaborative development is not misappropriation by outsiders but rather ambiguity between partners. That ambiguity can arise at multiple levels: whether the disclosing party retains rights in its background technology, whether new in — ormation is considered jointly owned or subject to separate con — identiality obligations, and whether either party may use the in — ormation a — ter the collaboration ends. In many cases, courts are — orced to recon- struct the parties’ expectations — rom in — ormal communications and vague contracts, with mixed and unpredictable results.
De --- ining Boundaries Preserves Trade Secret
Rights in Collaboration
Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
226 Cal. App. 4th 26 (2014)
Altavion developed a method --- or embedding secure digital barcodes into
documents and disclosed it to Konica Minolta --- or potential integration into
Konica’s products. Although the parties operated under a con --- identiality agree-
ment, no development deal was --- inalized. Konica Minolta later --- iled patent
6406_Oranburg_Protecting Trade Secrets_1pp.indb 144 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 145
applications covering the same concepts. The Cali --- ornia Court o --- Appeal ruled
that Altavion had alleged a valid trade secret misappropriation claim, empha-
sizing that the in --- ormation was technical in nature, disclosed in con --- idence,
and not generally known. The decision turned in part on the absence o --- any
agreement trans --- erring ownership or permitting such use. The court rejected
the argument that technical ideas must be reduced to physical --- orm to be pro-
tected, underscoring that early-stage collaboration does not justi --- y appropria-
tion without permission.
The Altavion case illustrates a common scenario. A smaller company shares a
technical concept with a larger prospective partner, hoping --- or a joint venture or
integration. No deal is --- inalized, but the larger company moves --- orward with a simi-
lar product or patent. I --- the contract does not clearly state that shared in --- ormation
remains the property o --- the disclosing party and cannot be used absent --- urther agree-
ment, the legal consequences may depend on how courts interpret the relationship.
In Altavion, the court sided with the discloser. In other cases, the absence o --- de --- ined
boundaries may lead to the opposite result.
To mitigate these vulnerabilities, companies entering into joint development
arrangements must clearly distinguish three categories o --- intellectual property: back-
ground IP (what each party brings to the table), resulting IP (what is developed dur-
ing the collaboration), and residual or derivative knowledge (what individuals retain
or repurpose a --- ter the project ends). Each o --- these must be de --- ined in the contract,
along with speci --- ic rules governing ownership, use, and post-termination rights.
Ownership Clauses Preserve Rights in
Joint-D evelopment Proje cts
“Each party shall retain all right, title, and interest in and to its Background
IP. Except as expressly provided in this Agreement, nothing herein shall be
construed to grant any rights or licenses to the other party’s Background IP.
Any Resulting IP developed in the course o --- the collaboration shall be jointly
owned unless otherwise agreed in writing. The parties shall negotiate in good
aith any commercialization terms prior to use o — Resulting IP outside the scope o — this Agreement.” This clause preserves preexisting rights, allocates shared rights in joint outputs, and — lags the need — or — urther negotiation be — ore broader commer- cialization. More sophisticated versions may assign resulting IP based on con- tribution or include license-back mechanisms.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 145 10/16/25 9:25 PM 146 5 • Mitigating External Vulnerabilities
Even when ownership is clear, the contract must also address how trade secrets
may be used during and a --- ter the collaboration. Use restrictions are essential to pre-
vent a partner --- rom taking con --- idential in --- ormation, embedding it in a separate proj
ect, and claiming independent development or mutual license. The next subsection
explores how courts have evaluated such use, particularly in cases where the project
ends without a --- ormal agreement or proceeds in --- ormally based on goodwill.
5.3.1. Use Restrictions in Joint Development
Collaborative projects o --- ten begin in a spirit o --- openness. The parties may share
engineering speci --- ications, design concepts, technical drawings, or early-stage code
under the assumption that mutual bene --- it will --- ollow. But when the relationship
ends — whether through termination, non-renewal, or a simple lack o --- progress — the
question becomes whether those shared materials may still be used. I --- the contract
does not include en --- orceable use restrictions, a party may repurpose what it has
learned and argue that the disclosing party implicitly authorized that use by partici-
pating in the project.
This vulnerability is especially dangerous when a company contributes trade secrets
to a collaboration that ultimately bene --- its the other party more than itsel --- . Without
use restrictions, the contributing party may lose control not only over the in --- orma-
tion but also over its competitive position. Courts are reluctant to imply limitations
that were not expressed, even where the --- acts suggest an imbalance in outcome. That
makes express language essential.
Express Use Restrictions Preserve Trade
Secret Rights A --- ter Collaboration Ends
C3.ai Inc. v. Cummins, Inc.
2024 Del. Super. LEXIS 622 (2024)
C3.ai entered into a pilot project with Cummins to develop arti --- icial intel-
ligence tools --- or --- uel optimization. A --- ter the collaboration ended, Cummins
launched a similar product. C3.ai alleged that Cummins had used trade secrets
disclosed during the partnership. The court denied Cummins’s motion to dis-
miss, --- inding that C3.ai had plausibly alleged the in --- ormation was shared in
con --- idence, subject to use restrictions, and not intended --- or general application.
The case illustrates that courts will en --- orce use limitations even a --- ter a project
ends — i --- the parties structured their relationship with enough speci --- icity.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 146 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 147
The C3.ai case demonstrates that disclosing parties do not lose their rights when
a project ends, although they must be able to prove that the in --- ormation was subject
to continued protection. A general con --- identiality clause may be insu ---
icient unless it includes limits on how the in — ormation may be used, by whom, and — or what purpose. The more valuable and technical the trade secret, the more important it is to restrict derivative use.
Use Restriction Clauses Limit Applications
Outside the Proje ct
“Recipient shall use the Discloser’s Con --- idential In --- ormation solely --- or
purposes o --- per --- orming under this Agreement. Recipient shall not use such
in --- ormation to develop, test, commercialize, or support any product or service
outside the scope o --- the collaboration, either directly or through any a ---
iliate or third party, without Discloser’s prior written consent.” This clause limits both commercial and developmental uses, constrain- ing in — ormation to the agreed context. It also bars derivative use through related entities. Companies concerned about overreach may — urther require documentation o — all internal recipients and impose deletion requirements post-termination.
When contracts lack such restrictions, courts may look to circumstantial evidence:
how the parties behaved, what emails or meeting notes re --- lect, and whether there was
a shared understanding o --- purpose. But reliance on in --- erence introduces uncertainty.
A clearly dra --- ted use clause eliminates that uncertainty and strengthens the disclosing
party’s position. The next section turns to what happens a --- ter a project ends: whether
and how the trade secrets shared during the collaboration must be returned, deleted,
or otherwise withdrawn --- rom use.
5.3.2. Return and Destruction Obligations
at Termination
When a collaboration ends, the disclosing party must act to reestablish exclusive
control over its trade secrets. I --- con --- idential in --- ormation remains in the possession o --- a
ormer partner — whether stored on servers, embedded in dra — ts, or circulating among team members — the risk o — unintended use persists. Courts evaluating trade secret claims o — ten — ocus on whether the disclosing party took steps to secure the in — orma- tion a — ter the relationship ended. A — ailure to demand return or destruction can sug- gest abandonment or waiver, even i — there was no intent to relinquish protection.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 147 10/16/25 9:25 PM 148 5 • Mitigating External Vulnerabilities
The vulnerability here is temporal. Many agreements include con --- identiality obli-
gations that expire a --- ter a --- ixed period. Others require nondisclosure but say nothing
about what must happen to the in --- ormation at the end o --- the deal. In some cases, a
partner continues using in --- ormation it acquired during the relationship under the
assumption that it has some residual license. Courts are unlikely to supply stricter
protections than the contract provides. It is the responsibility o --- the disclosing party
to ensure that the exit terms support ongoing secrecy.
Failure to Formalize Return Obligations
Limits Trade Secret Protection
Bianco v. Globus Medical, Inc.
30 F. Supp. 3d 565 (E.D. Tex. 2014)
Dr. Bianco, a spinal surgeon, disclosed a concept --- or an intervertebral --- usion
device to Globus Medical during discussions about potential collaboration.
Globus went on to commercialize a similar product without entering into a --- or-
mal development agreement or returning any o --- the in --- ormation provided. The
court --- ound that Bianco had disclosed protectable trade secrets in con --- idence
and that Globus had misappropriated them. However, the absence o --- clear
documentation regarding post-engagement handling complicated the assess-
ment o --- damages and scope. The case shows how --- ailure to establish return or
destruction obligations can undermine trade secret en --- orcement, even when
misappropriation is proven.
The Bianco case re --- lects a broader pattern. In --- ormal relationships and early-stage
discussions o --- ten involve the exchange o --- valuable in --- ormation without clear terms
about what happens when those discussions end. A company that discloses trade
secrets in this context must assume that the de --- ault outcome is that the in --- ormation
remains in the recipient’s possession unless otherwise stated. To preserve protection,
the agreement should include a mandatory exit procedure and require written certi-
ication that all materials have been removed or returned.
Return and Destruction Clauses
Provide End-o --- -Project Protocols --- or
Con --- idential In --- ormation
“Upon expiration or termination o --- this Agreement, Recipient shall
promptly return or securely destroy all Con --- idential In --- ormation received --- rom
Discloser, including all copies, extracts, and derivative materials. Upon request,
6406_Oranburg_Protecting Trade Secrets_1pp.indb 148 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 149
Recipient shall certi --- y in writing that it has complied with these obligations.
This provision shall survive the termination o --- the Agreement.”
This clause establishes a clear obligation to eliminate retained materials and
provides a mechanism --- or veri --- ication. While en --- orcement may still depend
on practical cooperation, the existence o --- a certi --- ication requirement creates
a legal hook --- or demanding compliance and strengthens the disclosing party’s
position in any later dispute.
Without these mechanisms, companies expose their trade secrets to quiet appro-
priation. Even a partner acting in good --- aith may retain materials in backups, internal
wikis, or team notes that later in --- luence new projects. Trade secret protection depends
not only on initial disclosure discipline but on exit discipline as well. The next sec-
tion examines a di --- --- erent type o --- vulnerability: disclosures made to customers, where
exposure can occur through reverse engineering or insu ---
icient restriction during product evaluation.
5.4. Customer Disclosures: Evaluation,
Exposure, and Reverse Engineering
Customer relationships o --- ten require companies to reveal the very in --- ormation
they seek to protect. Demonstrations, pilot programs, and evaluation licenses are
common --- eatures o --- enterprise sales, especially when the product involves techni-
cal complexity or integration with customer systems. In these settings, companies
may grant access to source code, design speci --- ications, per --- ormance data, or even live
environments. But customer- --- acing disclosures are uniquely dangerous. The company
disclosing the in --- ormation has no control over how the customer stores it, who sees
it, or how long it persists in internal systems. Without a care --- ully designed structure,
the trade secret may not survive the sales process.
The vulnerability here is two --- old. First, trade secrets can be lost through law --- ul
reverse engineering. I --- a customer receives a product and there is no contractual
restriction on analysis, disassembly, or replication, then reverse engineering is a per-
mitted means o --- discovery. In that case, even the most valuable design or process loses
protection — not because the customer misbehaved, but because the disclosing com
pany --- ailed to impose en --- orceable limits. Courts routinely uphold reverse engineering
as a legitimate pathway to in --- ormation unless clearly prohibited.
Second, even where reverse engineering does not occur, the absence o --- clear evalu-
ation terms can create con --- usion about permissible use. A customer may believe it
is --- ree to retain a demo device, continue using sample data, or adapt the disclosed
6406_Oranburg_Protecting Trade Secrets_1pp.indb 149 10/16/25 9:25 PM 150 5 • Mitigating External Vulnerabilities
eatures into its own processes. I — the contract does not de — ine the limits o — use, these assumptions may go unchallenged. Trade secret law requires a —
irmative steps to pre- serve secrecy. It does not shield companies — rom the consequences o — ambiguity.
No-Reverse-Engineering Clauses Can
Protect Trade Secrets
Accent Packaging, Inc. v. Leggett & Platt, Inc.
707 F.3d 1318 (Fed. Cir. 2013)
Accent Packaging developed a bale tie machine and alleged that Leggett
& Platt acquired a sample product, reverse engineered it, and began selling
a similar device. Accent argued that its design constituted a trade secret. The
court disagreed, holding that because Leggett & Platt obtained the machine
law --- ully and no contract restricted analysis, reverse engineering was a permis-
sible means o --- discovery. The decision rein --- orces that trade secrets do not shield
in --- ormation that can be acquired through law --- ul reverse engineering — unless
an en --- orceable agreement says otherwise.
The lesson --- rom Accent Packaging and many similar cases is not that reverse engi-
neering is inevitable but rather that companies must act a ---
irmatively to prevent it. Contracts can impose en — orceable limits on analysis, but those terms must be writ- ten clearly and agreed to be — ore disclosure. Boilerplate con — identiality provisions are unlikely to su —
ice. Courts generally treat reverse engineering prohibitions as distinct
rom ordinary nondisclosure terms. The structure o — the evaluation matters just as much as the contract. Companies should consider how in — ormation is delivered, whether digital access can be time- limited, and whether logs can veri — y what was viewed or downloaded. I — so — tware is involved, code may be ob — uscated or hosted on secure servers with monitored user sessions. I — hardware is involved, sample products should be retrieved or disabled a — ter the evaluation ends. These operational details strengthen the argument that secrecy was preserved. To support these e —
orts, evaluation agreements should include narrow use restric- tions, explicit bans on reverse engineering, and clear obligations to return or delete all materials. The — ollowing clause re — lects these elements.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 150 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 151
Evaluation Clauses Limit Use and
Prohibit Reverse Engineering
“Recipient shall use the Evaluation Materials solely --- or the purpose o --- inter-
nal evaluation and shall not reverse engineer, decompile, disassemble, or other
wise attempt to derive the underlying structure, --- unction, or design. Recipient
shall not use the Evaluation Materials --- or any commercial, developmental, or
comparative purpose. All materials shall be returned or deleted upon comple-
tion o --- the evaluation period.”
This clause preserves the ability to engage potential customers while ensur-
ing that the scope o --- use is limited. By restricting reverse engineering and com-
mercial application, the disclosing party protects against loss o --- secrecy during
a legitimate business process. The return obligation rein --- orces the temporary
nature o --- the access.
General restrictions, while use --- ul, must be supplemented by documentation and
en --- orcement. A company should track what was shared, --- or how long, and with whom.
It should --- ollow up at the end o --- the trial period to request return or destruction. I --- these
steps are not taken, a court may later --- ind that the disclosing party --- ailed to maintain
secrecy — even i --- the customer acts in ways the company never intended or --- oresaw.
Customer access cannot be treated as a casual transaction. When trade secrets are
involved, even routine sales activities must be governed by structured agreements
and thought --- ul delivery mechanisms. Otherwise, the pursuit o --- new business can
become the pathway to irreversible loss. The next section turns to distribution rela-
tionships, where the challenge is not evaluation but control over in --- ormation that
passes through intermediaries and into broader markets.
5.5. Distribution Relationships and
Downstream Risk
Trade secrets o --- ten move beyond the original transaction. When companies rely
on distributors, licensees, or channel partners to deliver products and services, con-
idential in — ormation can travel — urther than anticipated. These relationships enable commercial growth, but they also expose trade secrets to indirect loss. The disclosing party may not know how many hands its in — ormation passes through, what systems are used to store it, or whether the agreed restrictions are understood by everyone with access. These vulnerabilities must be addressed both contractually and structurally.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 151 10/16/25 9:25 PM 152 5 • Mitigating External Vulnerabilities
This section examines three speci --- ic risks in distribution: in --- ormal relationships with-
out legal protection, uncontrolled downstream propagation, and post-termination
retention.
5.5.1. In --- ormal Channels and the
Absence o --- Control
Distribution o --- ten begins in --- ormally. A promising business opportunity emerges,
and in --- ormation is shared to support negotiations or initial rollout. Documentation
may come later, i --- at all. But when trade secrets are disclosed without a signed agree-
ment or with only vague terms in place, protection is rarely available. Courts evaluat-
ing misappropriation claims look not only at what was shared but also at how it was
shared. I --- the disclosing party cannot show that it took clear and deliberate steps to
impose con --- identiality, the in --- ormation may be treated as --- or --- eited.
This is especially true in joint venture discussions, regional distribution negotia-
tions, or exploratory sales channel arrangements. Companies may provide business
plans, marketing strategies, pricing models, or product designs without realizing that,
absent a --- ormal structure, these materials become unprotected once disclosed.
Contract --- or Con --- identiality to Protect
Shared In --- ormation
Auto Channel, Inc. v. Speedvision Network, LLC
144 F. Supp. 2d 784 (W.D. Ky. 2001)
Auto Channel disclosed business plans, programming strategies, and mar-
keting ideas to Speedvision while discussing a possible joint venture. No non-
disclosure agreement was signed. Speedvision later launched a similar network,
and Auto Channel sued --- or trade secret misappropriation. The court rejected
the claim, holding that Auto Channel had not taken reasonable steps to main-
tain secrecy. Without any written agreement or --- ormal controls, the in --- orma-
tion was not protected. The court did not question the value or originality o ---
the content but instead --- ocused entirely on the lack o --- structural sa --- eguards.
What makes Auto Channel notable is not the --- acts, which are common, but
the clarity with which the court dismissed the claim. Even highly sensitive com-
mercial in --- ormation cannot quali --- y as a trade secret i --- the owner treats it casually.
In --- ormal relationships, even with trusted partners, are not an excuse. They are a
vulnerability.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 152 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 153
5.5.2. Downstream Propagation and
Sub-Agent Risk
Even where a distribution agreement is in place, problems arise when the contract
protects the in --- ormation only in the hands o --- the primary recipient. Many distributors
operate through agents, subcontractors, or localized partners. These sub-agents o --- ten
per --- orm customer- --- acing work and receive access to trade secrets, but they may not be
bound by the same contractual terms as the original distributor. I --- the agreement --- ails
to impose --- low-down obligations, the disclosing company has little basis to pursue
en --- orcement when the in --- ormation leaks beyond the --- irst layer.
The risk is not always malice. In many cases, a distributor shares materials with
other actors --- or operational reasons. A training manual is --- orwarded to a service
partner. A con --- idential con --- iguration tool is installed by a subcontractor. A support
engineer uses internal documentation to answer customer questions. Without clear
contractual rules, these actions may --- all outside the scope o --- protection. Courts will
not presume that con --- identiality extends automatically.
To prevent this kind o --- exposure, contracts must require the distributor to bind all
personnel and sub-entities to equivalent obligations. The language must be speci --- ic,
en --- orceable, and durable.
Channel Con --- identiality Clauses Impose
Flow-D own Obligations
“Distributor shall maintain the con --- identiality o --- all Con --- idential In --- orma-
tion provided under this Agreement and shall not disclose such in --- ormation to
any third party without the prior written consent o --- the Company. Distributor
shall ensure that all employees, agents, contractors, and sub-distributors who
access Con --- idential In --- ormation are bound by written con --- identiality obliga-
tions no less restrictive than those set --- orth herein. These obligations shall sur-
vive the termination or expiration o --- this Agreement.”
This clause ensures that the obligations do not end with the primary party. It
closes the downstream gap and creates an en --- orceable --- ramework --- or holding
third-level recipients accountable.
A --- low-down clause is not a --- ormality. It is the only legal tool available to extend
protection beyond the initial handshake. In distribution, in --- ormation moves. The
contract must --- ollow it.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 153 10/16/25 9:25 PM 154 5 • Mitigating External Vulnerabilities
5.5.3. Termination and Retained Access
One o --- the most persistent threats in distribution is what happens a --- ter the rela-
tionship ends. Distributors o --- ten retain physical or digital materials containing trade
secrets. These may include technical documentation, training resources, implementa-
tion tools, or customer data. I --- the contract does not require return or deletion, and i ---
systems do not en --- orce revocation, the trade secret remains outside the control o --- its
owner. Over time, that exposure undermines both secrecy and en --- orceability.
This problem is structural, not behavioral. Even a distributor acting in good --- aith
may retain protected in --- ormation simply because no one asked --- or it back. Courts
evaluating these situations want to see evidence that the disclosing party took a ---
irma- tive steps to reclaim or disable access. I — nothing in the contract requires it, and i — the company cannot prove what was done at the end o — the relationship, the trade secret may be deemed abandoned. The solution is to treat termination as a process, not an event. Agreements should mandate the return or destruction o — all materials and require written con — irmation. Companies should also implement system-level controls to revoke login credentials, remove shared — iles, and disable support portals as part o — their o —
boarding process. I —
these steps are taken promptly and documented, the owner strengthens its legal claim
that secrecy was preserved.
Distribution expands a company’s reach. But every new hand that touches a trade
secret must be governed. When contracts are written with this reality in mind, the
risks o --- indirect disclosure become manageable. When they are not, the legal conse-
quences can be swi --- t and irreversible.
5.6. Architectural Sa --- eguards and
System-Level En --- orcement
Legal agreements de --- ine the boundaries o --- con --- identiality, but those boundaries
must be re --- lected in the way in --- ormation is actually handled. Trade secret law does not
protect in --- ormation in theory. It protects in --- ormation that is actively and consistently
kept secret. System architecture plays a critical role in meeting that standard. When
trade secrets are shared with external parties, protection depends not only on what the
contract says but also on how access is managed, monitored, and ultimately revoked.
System-level sa --- eguards are not a substitute --- or legal obligations, but they are o --- ten
the clearest evidence that a company took its obligations seriously. Courts regularly
ask whether the disclosing party limited access, tracked usage, and retained control
over who could see what. I --- a company can answer those questions with documenta-
tion and precision, its position is strengthened. I --- it cannot, no amount o --- contractual
language will rescue the claim.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 154 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 155
Access segmentation is one o --- the most e ---
ective tools — or external secrecy. Instead o — providing — ull access to a partner or vendor, companies should isolate the speci — ic in — ormation necessary — or the task and provide access only to that subset. This can be implemented through secure data rooms, password-protected — olders, user-speci — ic permissions, or cloud environments that allow time-limited access. Segmentation supports the argument that the company shared the in — ormation strategically and did not expose its — ull knowledge base. Monitoring is the next layer o — protection. A system that records who accessed which — iles, when they were viewed, and whether they were copied or trans — erred provides both deterrence and proo — . These logs can reveal patterns o — overuse, unau- thorized behavior, or data ex — iltration. They also allow the company to respond in real time i — something goes wrong. Without monitoring, a company may be unaware that a trade secret has already le — t its control. These architectural elements matter most when the relationship ends. I — a system allows the recipient to continue accessing shared in — ormation a — ter termination, or i —
iles remain in shared drives with no expiration mechanism, the company has likely
ailed to maintain secrecy. Revoking access, deleting shared accounts, and requiring con — irmation o — deletion are essential steps in restoring control.
Control and Monitor Access to
Protect Trade Secrets
GlobeRanger Corp. v. So --- tware AG USA, Inc.
836 F.3d 477 (5th Cir. 2016)
GlobeRanger entered into a reseller relationship with So --- tware AG involv-
ing proprietary middleware technology. Although the contract included
con --- identiality terms, the company --- ailed to implement clear technical sa --- e-
guards. Employees across both organizations had access to the in --- ormation,
and GlobeRanger did not restrict retention or monitor usage. When So --- t-
ware AG began developing similar technology, GlobeRanger sued --- or mis-
appropriation. The court allowed the claim to proceed, but it noted that the
absence o --- consistent access controls and monitoring made it harder to show
that GlobeRanger had taken reasonable steps to preserve secrecy. The result
was a weakened case that might have been stronger i --- architectural sa --- eguards
had been in place.
The court’s comments in GlobeRanger re --- lect a broader truth. Reasonable e ---
orts are not measured solely by intention. They are measured by the totality o — the system. When companies share in — ormation without knowing how it will be used, where it will be stored, or who will have access to it, they place their rights at risk. When they
6406_Oranburg_Protecting Trade Secrets_1pp.indb 155 10/16/25 9:25 PM 156 5 • Mitigating External Vulnerabilities
instead build secure channels, de --- ine access parameters, and maintain a record o ---
what was done, they convert legal theory into en --- orceable reality.
These principles can be rein --- orced through contract, but they are most e ---
ective when supported by design. The — ollowing clause shows how to align legal commit- ments with system-level en — orcement.
Access and Monitoring Clauses Mandate
Integrated Technical Controls
“Recipient shall access Con --- idential In --- ormation only through systems
designated by the Discloser. Such systems may include secure data rooms,
credentialed portals, or other plat --- orms subject to access logging and usage
monitoring. Recipient shall not disable, bypass, or otherwise inter --- ere with
these controls. Upon expiration or termination o --- this Agreement, access cre-
dentials shall be revoked and all Con --- idential In --- ormation shall be returned or
securely deleted.”
This clause does more than impose a legal duty. It anticipates a technical
process. By aligning the contract with the plat --- orm through which in --- orma-
tion is delivered, the company creates a de --- ensible record o --- how secrecy was
preserved.
System architecture is not always visible. But when trade secrets are shared exter-
nally, it becomes central. A company’s ability to track, limit, and withdraw access
re --- lects its commitment to secrecy. Without those capabilities, protection becomes
speculative. The --- inal section o --- this chapter o ---
ers a synthesis o — these lessons and shows how contract and architecture must work together to support containment and control.
5.7. Cybersecurity and
Trade Secret Exposure
Trade secret protection increasingly depends on the strength o --- an organization’s
digital in --- rastructure. In a world where con --- idential in --- ormation is stored in cloud
environments, accessed through vendor portals, and transmitted across global net-
works, cybersecurity is no longer just a technical issue. It is a legal one. Courts evalu-
ating whether a company took reasonable steps to maintain secrecy do not look only
at employment agreements or nondisclosure provisions. They also examine system
architecture, access control, encryption practices, and the ability to detect and contain
unauthorized use.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 156 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 157
This chapter has already shown how contracts, work --- lows, and technical sa --- e-
guards can help protect trade secrets when in --- ormation is shared externally. But even
well-dra --- ted agreements can be undone by insecure con --- igurations, poorly monitored
integrations, or shared credentials that outlive the relationship. The most disciplined
legal --- ramework cannot overcome the --- ailure to revoke access a --- ter termination, seg-
ment user privileges, or monitor who views sensitive data. In cybersecurity, expo-
sure is not always intentional. Sometimes it results --- rom indi ---
erence, legacy systems, or an unclear division o — responsibility between parties. But trade secret law does not distinguish between accidental and deliberate — ailure. The standard is e —
ort. The benchmark is control. Cybersecurity vulnerabilities also introduce en — orcement complexity. A company that cannot prove when in — ormation le — t its control or who had access to it may lose not because it lacks a valid claim but because it lacks evidence. That evidentiary gap becomes a legal — ailure. The solution is not simply to invest in technology but also to align legal and technical controls. Contracts must re — lect how systems are con — ig- ured. System logs must support contractual claims. Termination procedures must be executed both on paper and in the cloud. The subsections that — ollow examine the speci — ic ways in which cybersecurity — ail- ures create legal vulnerability. They address persistent access credentials, API integra- tions, multi-tenant cloud storage, en — orceable security obligations, incident response, and containment strategies. Each re — lects a simple premise: secrecy cannot survive in ungoverned digital environments. Where systems are porous, the law may presume waiver. Where they are structured, secrecy becomes de — ensible. The line between technical con — iguration and legal protection is no longer theoretical. It is the battle- ground — or modern trade secret en — orcement.
5.7.1. Persistent Access and Credential
Mismanagement
One o --- the most overlooked causes o --- trade secret exposure is the --- ailure to revoke
access. When employees, vendors, or collaborators are given credentials to access
con --- idential in --- ormation, those credentials o --- ten outlive the relationship. A termi-
nated contractor may retain access to a shared --- older. A --- ormer vendor may still have
administrative rights to a cloud plat --- orm. An internal user who has shi --- ted roles may
continue to hold read-write access to systems that no longer concern them. These
gaps are not unusual. But they are dangerous.
Persis
tent credentials create structural vulnerability. Courts have repeatedly
emphasized that trade secrets must be subject to ongoing control. I --- in --- ormation
remains accessible to individuals who are no longer authorized to receive it, or i --- the
company cannot document who has what level o --- access, it becomes di ---
icult to claim that the in — ormation was kept secret. This — ailure is not merely technical. It is legal.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 157 10/16/25 9:25 PM 158 5 • Mitigating External Vulnerabilities
When companies cannot terminate access promptly and veri --- y that access has in --- act
been terminated, they compromise their ability to prove reasonable e ---
orts. The problem o — ten arises in external relationships, where access is shared across organizations. A customer support partner may be given login credentials to a service plat — orm. A development vendor may receive access to a private repository. A sales agent may be issued a device containing preloaded pricing tools. In each case, the disclosing party must retain the ability to revoke access centrally and con — irm that it has been revoked. In — ormal arrangements, shared credentials, and decentralized access management systems all create traceability — ailures. And without traceability, secrecy cannot be en — orced. The legal response to this risk is two — old. First, companies must treat credential issuance and revocation as legal events, not just IT procedures. User access should be mapped to contractual terms and controlled through account provisioning systems that can generate logs, revoke permissions, and veri — y deletion. Second, agreements should require the recipient to cooperate in credential revocation and con — irm com- pliance. Where credentials are shared across teams or embedded in work — lows, com- panies may need to demand periodic access audits and deactivation reports.
Credential Revocation Clauses Govern
Termination o --- Access Upon Employee Separation
or Proje ct Conclusion
“Recipient shall ensure that all credentials, login in --- ormation, and system
access rights granted in connection with this Agreement are revoked immedi-
ately upon termination o --- the relationship or the reassignment o --- personnel no
longer requiring access. Recipient shall cooperate in veri --- ying that such revo-
cations have occurred and shall provide written con --- irmation upon request.
Continued access to Con --- idential In --- ormation --- ollowing termination shall con-
stitute a material breach o --- this Agreement.”
This clause trans --- orms access management into a legal obligation. It also
establishes non-revocation as breach — thus ensuring that --- orgotten credentials
carry en --- orceable consequences.
Credential mismanagement is not a rare --- ailure. It is a daily reality in many
organizations, especially where IT --- unctions are siloed --- rom legal operations. But --- or
trade secrets to remain protected, access must be closed when the relationship ends.
I --- not, a door is le --- t open, and the law may treat it as an invitation.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 158 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 159
5.7.2. API Access and Embedded Data Flows
Modern collaboration o --- ten occurs not through shared --- iles but through so --- tware
integrations. Trade secrets may be accessed, processed, or transmitted via application
programming inter --- aces, or APIs, that link systems across companies. These integra-
tions are o --- ten invisible once con --- igured. Data --- lows continuously, sometimes in real
time, --- rom one environment to another. The technical convenience o --- APIs intro-
duces a legal risk: trade secrets may pass through an external system without adequate
documentation, restriction, or monitoring. I --- that happens, secrecy may be lost even
i --- the in --- ormation never appears on a screen.
The vulnerability here lies in scope. Many API relationships are structured quickly,
especially in pilot projects or customer trials. An engineer may enable access to test
data or internal --- unctionality on the assumption that the integration will be limited.
But the API may expose more than intended by allowing external users to query, copy,
or store protected data without triggering alarms. Worse, i --- the integration remains
active a --- ter the project ends, the recipient may continue accessing con --- idential materi-
als inde --- initely. This can occur without new credentials or intentional misconduct. It
happens because the in --- ormation was never clearly --- enced.
Trade secret law does not distinguish between visible and invisible disclosures.
I --- a company enables external access to protected in --- ormation through an API and
does not limit that access through contract and con --- iguration, the company may be
deemed to have abandoned secrecy. Courts look at whether the disclosing party took
steps to control exposure, not whether the exposure was observed in real time. APIs
can create persistent, silent leakage.
Companies using API integrations must treat them as legal gateways. The
access scope should be documented, limited to necessary data --- ields, and subject to
role-based permissions. Logs should record what queries were made and by whom.
Sunset dates or access expiration terms should be imposed to ensure that integrations
do not outlive their purpose. Where high-value trade secrets are involved, the company
should disable the integration entirely at the conclusion o --- the project or engagement.
These expectations must also be re --- lected in contract. The agreement should de --- ine
the permitted scope o --- API use, prohibit unauthorized data capture, and require
access to be disabled when the relationship ends.
API Use Limitation Clauses Control Scope and
Duration o --- Data Access
“Recipient shall access the Discloser’s systems or data through API con-
nections only as expressly authorized in writing and solely --- or the purposes
described in this Agreement. Recipient shall not copy, store, analyze, or trans --- er
6406_Oranburg_Protecting Trade Secrets_1pp.indb 159 10/16/25 9:25 PM 160 5 • Mitigating External Vulnerabilities
any data retrieved via API access --- or purposes beyond the scope o --- this Agree-
ment. API credentials shall expire upon the conclusion o --- the project or termi-
nation o --- the Agreement, whichever occurs --- irst, and Recipient shall cooperate
in the prompt deactivation o --- all integrations.”
This clause sets legal limits on what technical integrations may do. It antici-
pates silent overreach and constrains it by contract.
APIs are e ---
icient, — lexible, and power — ul. But they are also pipelines. I — trade secrets pass through them without control, those secrets may be treated as disclosed. Com- panies that rely on integrations to deliver value must also design those integrations to preserve secrecy. Anything less leaves them vulnerable not just to technical misuse but also to legal — ailure.
5.7.3. Cloud Storage and Multi-Tenant
In --- rastructure
Cloud environments o ---
er — lexibility, scalability, and cost e —
iciency, but they also introduce signi — icant uncertainty into trade secret protection. When in — ormation is stored on a third-party plat — orm, the disclosing company o — ten has limited visibility into how that in — ormation is managed. It may not control which personnel at the cloud provider can access the data, how the data is backed up or replicated, or whether deletion procedures are actually — ollowed. These uncertainties matter. In a trade secret dispute, the company must be able to show that the in — ormation remained secret and was subject to reasonable e —
orts to maintain that secrecy. When cloud systems oper- ate as black boxes, that showing becomes more di —
icult. One o — the central vulnerabilities o — cloud storage is multi-tenancy. Many cloud services store data — or multiple customers on shared physical in — rastructure, relying on logical separation rather than physical segregation. This structure may be secure in practice, but i — the company cannot explain how access is restricted or demonstrate that no other party had visibility into its data, courts may question whether secrecy was truly preserved. This problem is exacerbated when the company lacks a detailed understanding o — the provider’s security controls or has no contractual rights to audit or inquire into data handling practices. Cloud-based collaboration also creates legal ambiguity. A — ile stored in a shared cloud — older may be downloaded, copied, or — orwarded without trace. Access logs may be incomplete or hard to retrieve. A project that ends in — ormally may leave legacy documents on a cloud drive that is still accessible to — ormer vendors, customers, or partners. I — those materials are later misused, the company may have no record o —
when the exposure occurred or who was responsible. Without that evidence, even a
valid trade secret claim may --- ail.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 160 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 161
To address these risks, companies should adopt cloud usage policies that align with
their trade secret obligations. This includes selecting providers that o ---
er granular access control, robust logging, and compliance with recognized security standards. It also includes maintaining internal inventories o — where trade secrets are stored, who can access them, and how that access is reviewed or revoked over time. Most importantly, companies must treat cloud environments as extensions o — their legal obligations, not as neutral plat — orms. Cloud service agreements should re — lect this approach. The contract should include representations about how data is stored, what security measures are in place, and whether the customer retains ownership and control. It should also allow — or inspec- tion, certi — ication, or inquiry when something goes wrong. Where trade secrets are involved, companies should avoid providers that disclaim all responsibility — or data loss or access control — ailures.
Cloud Security Clauses Bolster Trade Secret
Protections in Hosted Environments
“To the extent that Con --- idential In --- ormation is stored or processed on
cloud-based plat --- orms or services, Recipient shall ensure that such plat --- orms
implement access controls, data segregation, encryption in transit and at rest,
and audit logging consistent with industry standards --- or protection o --- sensitive
in --- ormation. Recipient shall not use any cloud service provider that does not
permit data ownership to remain with the customer or that prohibits veri --- ica-
tion o --- security controls upon request.”
This clause imposes minimum expectations and creates a contractual basis
or investigating mishandling. It treats cloud hosting as a legally meaning — ul act, not merely an in — rastructure choice.
The decision to store trade secrets in the cloud is not inherently --- lawed. But it must
be accompanied by measures that replicate the control and accountability available in
physical or on-premises systems. Without that replication, the trade secret may be lost
not through malice but through di ---
usion. Courts evaluating digital secrecy want to see intentional design. When cloud usage re — lects that design, legal protection becomes sustainable. When it does not, the legal consequences may be beyond recovery.
5.7.4. Security Standards and Contractual
Promises
When companies entrust trade secrets to third parties — especially vendors, service
providers, or cloud plat --- orms — they o --- ten rely on general contractual language
requiring the recipient to “maintain appropriate security.” But vague promises are not
6406_Oranburg_Protecting Trade Secrets_1pp.indb 161 10/16/25 9:25 PM 162 5 • Mitigating External Vulnerabilities
enough. In a legal dispute, the company must show that its trade secrets were subject
to speci --- ic, veri --- iable protections. Courts have increasingly looked to whether the
disclosing party demanded compliance with recognized cybersecurity --- rameworks
or industry certi --- ications. These standards serve as proxies --- or reasonableness and
provide a benchmark against which per --- ormance can be measured.
The most widely adopted --- rameworks include ISO 27001, SOC 2, and the NIST
Cybersecurity Framework. Each provides a structured approach to access control,
incident response, data integrity, and system monitoring. Requiring adherence to
such standards does not guarantee protection, but it demonstrates that the disclosing
party demanded a recognized level o --- care. This demand matters. When trade secrets
are exposed due to poor security practices, courts o --- ten ask whether the disclosing
party selected its partners care --- ully and imposed meaning --- ul constraints.
Certi --- ications alone are not enough. Companies should also require third parties
to maintain written security policies, per --- orm regular risk assessments, and update
their controls in response to evolving threats. These obligations should be written into
the agreement. When security is treated as an in --- ormal understanding, the resulting
protections are rarely en --- orceable. When it is documented in contract and veri --- ied
through audits or attestations, it becomes part o --- the structure o --- secrecy.
Security standards also --- unction as a --- orm o --- risk allocation. I --- a vendor agrees to
maintain a certain level o --- protection and later su ---
ers a breach due to its own — ailure, the disclosing party has a stronger claim that secrecy was lost due to the vendor’s conduct, not its own. This distinction can be critical in litigation. It may determine whether the trade secret owner is entitled to relie — or deemed to have — ailed the rea- sonable e —
orts standard.
Security Standards Clauses Require
Implementation o --- Recognized Cybersecurity
Frameworks
“Recipient shall implement and maintain administrative, physical, and tech-
nical sa --- eguards consistent with the ISO/IEC 27001 standard (or its succes-
sor), the SOC 2 Type II --- ramework, or an equivalent cybersecurity standard
approved in writing by Discloser. Recipient shall maintain written in --- ormation
security policies, conduct regular security assessments, and certi --- y compliance
with these standards on an annual basis or upon request. Failure to maintain
such sa --- eguards shall constitute a material breach o --- this Agreement.”
This clause makes cybersecurity expectations explicit. It also creates a
mechanism --- or accountability by tying contractual per --- ormance to veri --- iable
rameworks.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 162 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 163
Trade secret law is --- lexible. It does not mandate a particular security architecture
or standard. But it does require intentionality. When a company demands compliance
with recognized standards and con --- irms that those standards are being met, it builds
a record o --- care. That record may later be the di ---
erence between a viable claim and a
inding that secrecy was never truly protected. In external relationships, contracts are not just about access. They are about expectation. And when expectations are — ramed in the language o — security, they carry legal weight.
5.7.5. Incident Response and Noti --- ication
Obligations
No cybersecurity system is per --- ect. Even companies that implement strong techni-
cal controls and require their vendors to --- ollow industry standards must plan --- or --- ail-
ure. When trade secrets are exposed — whether through a system breach, misdirected
transmission, or internal misuse — the response can determine whether protection is
preserved or lost. Courts examining trade secret claims routinely ask how the com
pany reacted when something went wrong. Silence, delay, or lack o ---
ollow-up may suggest that secrecy was not treated as a serious obligation. This responsibility does not — all solely on the trade secret holder. In external rela- tionships, the risk o — exposure o — ten originates with the other party. A vendor may su —
er a ransomware attack. A customer may — orward con — idential materials to an unsecured system. A third-party service provider may accidentally grant access to an unauthorized user. In each case, the damage may be di —
icult to detect without cooperation. That is why trade secret protection requires not only preventive security measures but also a —
irmative duties to noti — y, coordinate, and investigate. Noti — ication obligations are essential. I — a breach occurs or is suspected, the recipi- ent o — the trade secret should be required to alert the disclosing party promptly and share all relevant in — ormation, including when the incident occurred, what systems were involved, which data may have been exposed, and what steps are being taken to contain the event. These details matter. They allow the disclosing party to assess legal exposure, noti — y regulators i — required, and take its own protective steps. Without a contractual obligation to disclose this in — ormation, the disclosing party may be le — t unaware until it is too late. Timeliness is also critical. Many companies set noti — ication windows o — 24 or 48 hours — or cybersecurity incidents. Courts do not require a speci — ic number o — hours, but they do look at whether the response was prompt and whether the delay contrib- uted to — urther harm. Contracts that de — ine clear timelines and content requirements help establish that the company took reasonable steps to preserve secrecy, even in moments o — vulnerability. Coordination is the third leg o — response. A company that receives notice o — an incident should have the right to participate in the investigation, request updates, and
6406_Oranburg_Protecting Trade Secrets_1pp.indb 163 10/16/25 9:25 PM 164 5 • Mitigating External Vulnerabilities
receive access logs or --- orensic --- indings. These rights can be built into the agreement
and tied to audit clauses or certi --- ication requirements. When a breach occurs, the
right to in --- ormation becomes a structural necessity.
Incident Response Clauses Require Breach
Noti --- ication and Investigation Cooperation
“Recipient shall noti --- y Discloser in writing within --- orty-eight (48) hours o ---
becoming aware o --- any actual or suspected unauthorized access, use, or disclo-
sure o --- Con --- idential In --- ormation. Such notice shall include the date and time
o --- the incident (i --- known), the nature and scope o --- the incident, the systems
a ---
ected, the identity o — any individuals involved, and the corrective actions taken or planned. Recipient shall cooperate — ully with Discloser in investigating the incident and mitigating its e —
ects, including by providing access to relevant logs, personnel, and third-party investigators upon request.” This clause ensures that the disclosing party is not le — t in the dark when secrecy is threatened. It establishes a timeline, de — ines the content o — the notice, and imposes an a —
irmative duty to cooperate.
A trade secret claim o --- ten hinges not on whether in --- ormation was exposed but
rather on how the owner responded. I --- the disclosing party acted quickly, demanded
documentation, and took steps to minimize harm, courts are more likely to --- ind that
secrecy was preserved. I --- it ignored warning signs, --- ailed to investigate, or relied on
in --- ormal channels, its claim may collapse. In a networked environment, incident
response is no longer just an IT --- unction. It is a legal obligation, and one that must be
shared across the contractual relationship.
5.7.6. Designing Digital Containment Systems
The legal standard --- or trade secret protection is not per --- ection. It is reasonable-
ness. But in digital environments, reasonableness cannot be improvised. It must be
designed. This is especially true in external relationships, where in --- ormation --- lows
across organizational boundaries and into systems the trade secret holder does not
control. In these cases, containment becomes the central challenge. The goal is not to
eliminate exposure entirely but to ensure that exposure remains knowable, limited,
and correctable.
Digital containment means structuring systems so that trade secrets do not travel
urther than intended. It means limiting access based on role, segregating sensitive data — rom other materials, and ensuring that every interaction with con — idential in — ormation is recorded, reviewable, and reversible. It also means building expiration
6406_Oranburg_Protecting Trade Secrets_1pp.indb 164 10/16/25 9:25 PM 5 • Mitigating External Vulnerabilities 165
into access, so that time-limited projects or evaluations do not create open-ended
vulnerability.
Containment also requires alignment between technical systems and legal struc-
tures. Contracts should mirror the way systems are con --- igured, and systems should
re --- lect what the contract demands. I --- a contract limits use to a particular team or
time --- rame, the system should en --- orce those limits. I --- the contract requires return
or destruction, the system should allow --- or veri --- ication. Mismatches between law
and in --- rastructure weaken both. When systems are not designed to support the legal
ramework, the legal — ramework becomes theoretical. Many companies assume that monitoring is enough. But monitoring without seg- mentation is like recording who walks through an open door. To protect trade secrets, the door must be closed — or at least visible, controlled, and time-limited. Contain- ment strategies should include revocable links, session timeouts, geo- — encing, encryp- tion, and — orensic watermarking. These tools are not just technical — eatures. They are evidence. They allow the company to show that it took secrecy seriously. The most e —
ective containment systems are those that prevent misuse without impeding productivity. Trade secrets o — ten need to be shared to generate value. The task is not to lock them away but rather to create environments where they can be used sa — ely. This requires thought — ul design, coordinated policy, and cross- — unctional cooperation among legal, engineering, security, and business teams. Containment is not a security protocol. It is a cultural and architectural commitment. Digital containment does not guarantee that trade secrets will remain secret. But it creates a record o — diligence, and that record is what courts rely on when determin- ing whether legal protection should survive. When the structure supports the claim, the law has something to en — orce. When it does not, the best intentions — all away. In external relationships, structure is not optional. It is the condition o — secrecy itsel — .
5.8. Conclusion
Trade secret law rewards structure. Nowhere is that more apparent than in the
context o --- external relationships. When in --- ormation is shared beyond the boundaries
o --- the organization, the strength o --- legal protection depends entirely on the systems
built to contain it. This chapter has shown that external risk is not a single prob
lem. It is a composite o --- legal ambiguity, technical integration, misaligned incentives,
and di ---
use accountability. The common thread is that secrecy cannot survive where responsibility is unclear. Every external interaction — whether with a vendor, collaborator, customer, or dis- tributor — introduces its own — orm o — vulnerability. Vendors may retain system-level access a — ter a project ends. Collaborators may misunderstand who owns the results. Customers may reverse engineer a product or continue using in — ormation a — ter a trial
6406_Oranburg_Protecting Trade Secrets_1pp.indb 165 10/16/25 9:25 PM 166 5 • Mitigating External Vulnerabilities
expires. Distributors may share materials downstream without proper constraints.
And in each o --- these cases, it is the disclosing party who bears the burden o ---
oresight. What this chapter o —
ers is not a checklist o — protections but rather a method o —
thinking. It urges companies to treat trade secrets not just as legal assets but as opera-
tional responsibilities. Agreements must do more than prohibit disclosure. They must
de --- ine scope, limit use, impose termination procedures, and extend obligations to
every recipient in the chain. Systems must do more than provide access. They must
restrict it, monitor it, and allow it to be withdrawn. And organizations must do more
than hope that others will behave. They must build relationships that are constrained
by design.
The underlying principle is containment. In external environments, secrecy can-
not be en --- orced unless it has been architected in advance. That architecture is legal,
technical, and cultural. It is expressed through audit rights, credential management,
reverse engineering clauses, and cloud security protocols. It is tested when something
goes wrong. And it is judged in hindsight, when the company must explain how its
trade secrets were protected — not in theory, but in --- act.
The next chapter turns --- rom prevention to en --- orcement. It asks what happens
when secrecy --- ails or someone crosses the line. But the strength o --- that en --- orcement
depends on what came be --- ore. Courts cannot en --- orce what was never de --- ined. They
cannot restore what was never controlled. And they cannot protect secrets that were
not kept. External protection begins long be --- ore any dispute arises. It begins with the
decision to build a structure where secrecy is not only preserved but also provable.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 166 10/16/25 9:25 PM Chapter 6 En — orcing Trade Secret Rights
Trade secret law protects the use o --- secrecy in commerce, not secrecy in isolation.
It does not demand that in --- ormation be hidden away or stripped o --- its economic
potential. Instead, it expects that those who use trade secrets in business take reason-
able steps to preserve their con --- identiality. The law --- ills the space between privacy and
exchange. It allows secrets to move through the economy — to be shared with employ-
ees, vendors, partners, and customers — without being lost along the way.
En --- orcement is what makes that structure meaning --- ul. A trade secret becomes
legally en --- orceable only when the in --- ormation is both protected and misappropriated.
There is no cause o --- action simply --- or possession. The law intervenes only when some-
thing has gone wrong: when a competitor acquires in --- ormation improperly, when
a --- ormer employee misuses con --- idential knowledge, or when a recipient violates a
promise to keep certain data secure. These moments o --- breach trans --- orm secrecy
rom an internal discipline into a legal claim. This chapter addresses how those claims are asserted, proven, and resolved. The two primary statutes are the UTSA, adopted in some — orm by nearly every state, and the — ederal DTSA, enacted in 2016. While the two laws are closely aligned, the DTSA provides access to — ederal courts and includes certain remedies and procedural tools unavailable under state law. In practice, many trade secret lawsuits assert claims under both statutes in parallel. The sections that — ollow walk through the major components o — trade secret en — orcement. They begin with the legal de — inition o — misappropriation and proceed to the core evidentiary requirement: proving that the in — ormation at issue quali — ies as a trade secret. From there, the chapter turns to remedies — injunctions, damages, seizure orders, and attorneys’ — ees — and concludes with a discussion o — criminal lia- bility and procedural strategy. Along the way, the doctrine is grounded in real cases: disputes where courts had to decide whether secrecy had been preserved, whether conduct was improper, and whether en — orcement was justi — ied. Trade secret en — orcement is not just about recovering losses. It is about validating the company’s protection system. Courts ask whether the plainti —
treated the in — or- mation as secret, whether it communicated those expectations to others, and whether it took action when those expectations were breached. A lawsuit is not the beginning o — trade secret protection. It is the — inal test. Everything that came be — ore — contracts,
167
6406_Oranburg_Protecting Trade Secrets_1pp.indb 167 10/16/25 9:25 PM 168 6 • En — orcing Trade Secret Rights
controls, culture, and communication — will be judged in the cold light o --- litigation.
This chapter explains how that process works.
6.1. The Statutory De --- inition o ---
Misappropriation
Every trade secret case begins with the allegation o --- misappropriation. This is not
a general claim that valuable in --- ormation was misused. It is a speci --- ic legal assertion
that the de --- endant acquired, disclosed, or used a trade secret by improper means
or in breach o --- a legal duty. The UTSA and the DTSA use nearly identical language
to de --- ine misappropriation, and courts interpreting both statutes have developed a
shared body o --- doctrine. That doctrine draws a clear distinction between ordinary
competition and wrong --- ul appropriation.
Under both statutes, misappropriation includes three distinct acts: improper
acquisition, improper disclosure, and improper use. A single case may involve more
than one. For example, a departing employee may take trade secrets when resign-
ing (acquisition), send them to a competitor (disclosure), and help that competitor
launch a new product based on the in --- ormation (use). But each --- orm o --- misappropria-
tion is independently actionable. A plainti ---
does not need to prove all three. The statutes also impose liability on recipients who acquire a trade secret — rom someone else but knew or should have known that it was misappropriated. This provi- sion expands liability to downstream actors and prevents companies — rom turning a blind eye to suspicious disclosures. Courts do not require actual knowledge, but they do examine what the de — endant should have understood — rom the circumstances. That standard can be satis — ied by timing, relationship history, or the nature o — the in — ormation involved. What these de — initions share is the requirement that the de — endant crossed a legal line. The conduct must have involved deception, breach o — duty, or some — orm o —
improper access. Trade secret law does not prohibit independent development. It does
not punish observation o --- publicly available products. It does not block reverse engi-
neering so long as the product was law --- ully acquired. The --- ocus is on --- airness and
trust. Misappropriation occurs when those expectations are violated.
The sections that --- ollow examine each type o --- misappropriation in turn — starting
with improper acquisition, the most direct and visible --- orm o --- trade secret the --- t.
6.1.1. Acquisition by Improper Means
The most straight --- orward --- orm o --- misappropriation is improper acquisition.
When a person or entity obtains a trade secret through the --- t, deception, or some
other wrong --- ul act, the violation occurs at the moment o --- acquisition, regardless o ---
6406_Oranburg_Protecting Trade Secrets_1pp.indb 168 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 169
whether the in --- ormation is later used or shared. Courts have little di ---
iculty recogniz- ing this — orm o — misappropriation. It is the clearest violation o — both legal duties and commercial ethics. The UTSA and the DTSA both de — ine “improper means” to include the — t, bribery, misrepresentation, breach or inducement o — a duty to maintain secrecy, and espionage through electronic or other means. These examples are illustrative, not exhaustive. Courts have extended the de — inition to cover creative or indirect tactics, including surveillance, trickery, and deliberate circumvention o — access restrictions. The essen- tial idea is that the in — ormation was acquired in a way that violated the rules governing its con — identiality. The case o — E.I. du Pont de Nemours v. Christopher is one o — the most iconic early examples. DuPont was constructing a chemical plant designed to produce methanol using proprietary processes. The plant was open to the air — or construction purposes but otherwise shielded — rom public view. The de — endants, acting on behal — o — a com- petitor, hired a pilot to take aerial photographs o — the site. DuPont sued — or trade secret misappropriation, arguing that the photography revealed con — idential design in — ormation.
Violating Commercial Norms Can Establish
“Improper Means”
E.I. du Pont de Nemours & Co. v. Christopher
431 F.2d 1012 (5th Cir. 1970)
De --- endants hired a pilot to --- ly over DuPont’s methanol plant construction
site and take photographs revealing structural --- eatures o --- a proprietary process.
Although the site was visible --- rom the air and not physically secured against
aerial observation, the court held that such surveillance constituted improper
means. It emphasized that trade secret law requires companies to guard against
only those intrusions that violate reasonable commercial norms, not all possi
ble intrusions. A competitor cannot claim innocence merely because the in --- or-
mation was obtained without trespassing.
The Fi --- th Circuit’s opinion in DuPont has remained in --- luential. It illustrates that
improper means is not limited to physical the --- t or direct misrepresentation. It also
includes conduct that, while technically legal in another context, becomes unlaw --- ul
when used to acquire con --- idential in --- ormation. The test is not whether the method
was creative — rather, it is whether it respected the norms o --- con --- identiality that make
trade secret protection possible.
Improper acquisition also occurs in more conventional settings. Employees
who download con --- idential --- iles be --- ore resigning, vendors who copy proprietary
6406_Oranburg_Protecting Trade Secrets_1pp.indb 169 10/16/25 9:25 PM 170 6 • En — orcing Trade Secret Rights
materials outside the scope o --- a project, and researchers who smuggle internal data
to a competitor all --- all within the statute. In many o --- these cases, the act o --- acquisition
itsel --- is a breach o --- contract or --- iduciary duty. But even where no --- ormal relationship
exists, the circumstances may impose a duty not to seek access through trickery or
coercion.
One o --- the challenges in modern litigation is distinguishing improper acquisition
rom passive receipt. A person who stumbles upon a con — idential document without seeking it out may not be liable unless they had reason to know it was protected. But a person who solicits, extracts, or manipulates their way into access — especially i — the in — ormation is marked con — idential or clearly sensitive — takes on legal risk. The more deliberate the conduct, the stronger the in — erence o — impropriety. The next section turns to a di — — erent kind o — violation: improper use o — trade secrets that were law — ully acquired. While acquisition o — ten de — ines the — ront end o — misap- propriation, many cases are built on what the de — endant did with the in — ormation once they had it.
6.1.2. Improper Use
A person who law --- ully acquires a trade secret may still be liable --- or misappropria-
tion i --- they use it in violation o --- a duty. This --- orm o --- liability does not depend on the --- t,
deception, or surveillance. It depends on how the in --- ormation is used once it is in the
de --- endant’s hands. The core idea is that trade secret protection --- ollows the in --- orma-
tion — not just how it is obtained, but how it is exploited.
Improper use occurs when a person leverages a trade secret --- or their own bene --- it
or --- or the bene --- it o --- a third party in a way that violates an obligation o --- con --- identiality
or breaches the expectations under which the in --- ormation was shared. This includes
using the secret to develop a competing product, in --- orm internal strategy, accelerate
timelines, or bypass costly research and development. The use need not be visible to
the public or result in a --- inal product. Even internal application can trigger liability i ---
it con --- ers a commercial advantage and violates the terms under which the in --- orma-
tion was received.
Improper use claims o --- ten arise in collaborative settings. A company shares a proto-
type, process, or dataset with a partner under the terms o --- a joint project or evaluation
agreement. The partner then applies that knowledge in another context, sometimes
unintentionally, sometimes deliberately. The legal question is not whether the in --- orma-
tion was help --- ul but whether its use exceeded the scope o --- the agreed purpose.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 170 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 171
Improper Use o --- Properly Acquired
In --- ormation Can Be Misappropriation
Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
226 Cal. App. 4th 26 (Cal. Ct. App. 2014)
Altavion disclosed a digital authentication concept to Konica Minolta --- or
evaluation in connection with possible collaboration. Konica Minolta later
iled patent applications incorporating the core ideas. Altavion sued — or trade secret misappropriation. The court held that the disclosed in — ormation, while not a — inished product, quali — ied as a trade secret and that Konica’s use in pat- ent — ilings was actionable. The case con — irmed that misuse o — con — idential ideas — even when received under a business relationship — can constitute improper use.
Altavion is illustrative o --- a broader principle. Companies do not lose trade secret
protection simply because they share in --- ormation in the hope o --- collaboration. But
when that in --- ormation is used outside the bounds o --- the relationship, especially
in ways that con --- er exclusive control or public recognition, the law treats that as
misappropriation.
Improper use also arises within employment. Employees may take knowledge
acquired on the job and apply it in a new role --- or a competitor. Courts do not prohibit
the use o --- general experience or publicly known practices. But when the employee
draws on speci --- ic, nonpublic in --- ormation that provided a competitive edge, and does
so in a way that violates a contractual or implied duty o --- con --- identiality, liability may
ollow.
Internal Use o --- Con --- idential In --- ormation
Can Be Misappropriation
3M v. Pribyl
259 F.3d 587 (7th Cir. 2001)
An employee le --- t 3M and joined a competitor, taking with him knowledge
o --- internal manu --- acturing processes that were not publicly disclosed. He used
these insights to improve production at the new company. The court held that
the use o --- the con --- idential process in --- ormation gained during prior employ-
ment and subject to ongoing con --- identiality obligations constituted misappro-
priation. The --- act that the employee did not take physical documents did not
alter the outcome.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 171 10/16/25 9:25 PM 172 6 • En — orcing Trade Secret Rights
The 3M case makes clear that trade secrets do not need to be copied or disclosed to
be misused. I --- the de --- endant internalizes the in --- ormation and applies it in a way that
substitutes --- or independent development, the law may impose liability.
Improper use can be subtle. It o --- ten occurs without --- an --- are or direct communica-
tion. But where the --- acts show that a de --- endant derived value --- rom con --- idential in --- or-
mation in breach o --- an expectation, the law treats that conduct as a --- orm o --- the --- t. The
next section turns to improper disclosure — where the secret is not used by the de --- en-
dant but rather passed to others in violation o --- the duty to maintain con --- identiality.
6.1.3. Improper Disclosure
Disclosure o --- a trade secret without authorization is a standalone basis --- or liabil-
ity. It does not require that the de --- endant bene --- it personally or use the in --- ormation
or competitive purposes. The legal wrong lies in breaking the expectation that the in — ormation would remain con — idential. Disclosure o — ten causes greater harm than use because it multiplies the number o — actors who now possess the secret. Once in — ormation is shared without control, legal remedies may still exist, but practical containment is — ar more di —
icult. Improper disclosure occurs when someone entrusted with a trade secret pro- vides access to another person or entity who is not authorized to receive it. This can happen through an intentional leak, a negligent communication, or an indirect hando —
— such as uploading a con — idential — ile to a public — older or — orwarding an email without redacting sensitive material. In each case, the key issue is whether the de — endant had a duty to keep the in — ormation secret and whether that duty was breached. Employees and — ormer employees are the most common de — endants in disclosure cases. I — a person learns a trade secret in the course o — their work and then shares it with a competitor, colleague, or new employer without permission, they have likely committed misappropriation. The same is true — or contractors, vendors, or consultants who receive con — idential in — ormation under a nondisclosure agreement or implied duty o — con — identiality. Disclosure in violation o — those obligations breaches both legal norms and commercial trust. In Air — acts v. Amezaga, the plainti —
, an aviation data — irm, alleged that a depart- ing employee had emailed proprietary — light records and analysis tools to his per- sonal account be — ore leaving the company. The court — ound that the in — ormation was not adequately protected (there was no nondisclosure agreement and access was not clearly limited), but it still addressed the question o — disclosure. The employee’s act o — trans — erring data outside the company’s systems constituted potential misap- propriation through improper disclosure, even i — the in — ormation was not — urther disseminated.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 172 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 173
Improper Disclosure (Without Use) Can
Constitute Misappropriation
Air --- acts, Inc. v. Amezaga
909 F.3d 84 (4th Cir. 2018)
An employee emailed internal aviation data to himsel --- be --- ore resigning.
The company alleged misappropriation, and the court acknowledged that
even without later use, the act o --- removing con --- idential in --- ormation --- rom the
company’s control could be actionable as improper disclosure. However, the
court ultimately denied relie --- due to insu ---
icient evidence that the company had taken reasonable steps to protect the in — ormation as a trade secret.
The Air --- acts case illustrates how closely courts link disclosure with secrecy. Even
when the act o --- disclosure is clear, a plainti ---
cannot prevail unless it also shows that the in — ormation was treated as con — idential. Disclosure alone is not enough. The law protects secrets — not merely data. Other cases involve more public — orms o — dissemination. In Allstate v. Fougere, a departing insurance agent was accused o — providing business strategy documents and customer data to a rival — irm. The court evaluated whether the materials were shared in violation o — contract and whether the disclosures rendered the in — ormation no lon- ger secret. Improper disclosure is a double injury: it violates the duty o — con — identiality and may destroy the very trade secret status the plainti —
seeks to protect. Improper disclosure is o — ten harder to prove than improper use. Documents may be shared through private channels, and the plainti —
may only discover the leak a — ter damage has occurred. Courts look at circumstantial evidence, such as email logs, overlapping timelines, and parallel product — eatures, to assess whether the de — endant likely disclosed the in — ormation to others. Where the evidence is strong, relie — may include not just damages but also injunctions barring — urther dissemination. Trade secrets are o — ten shared internally under assumptions o — trust. But when those assumptions break down, improper disclosure becomes a gateway to irrevers- ible harm.
6.1.4. Liability --- or Knowing Receipt
Trade secret law does not limit liability to those who originally misappropriate
in --- ormation. It also imposes liability on recipients who acquire trade secrets --- rom
others and who knew or had reason to know that the in --- ormation was obtained
through improper means. This provision serves a critical role in modern business
contexts, where con --- idential in --- ormation is o --- ten passed between entities, across
6406_Oranburg_Protecting Trade Secrets_1pp.indb 173 10/16/25 9:25 PM 174 6 • En — orcing Trade Secret Rights
transactions, or through intermediaries. It prevents companies --- rom insulating them-
selves by claiming that they were not the original wrongdoer, even as they bene --- it
rom the misappropriation. The key element is knowledge. The statute requires that the recipient “knew or had reason to know” that the in — ormation was misappropriated. Courts interpret this stan- dard objectively. It does not require that the recipient be told explicitly that the trade secret was stolen. Instead, it asks whether a reasonable person in the same position would have understood that the in — ormation came with baggage. Factors include the timing o — disclosure, the nature o — the parties’ relationship, the level o — detail involved, and whether the in — ormation was subject to protective markings or obligations. Cases involving departing employees — requently raise this issue. A new employer who receives valuable in — ormation — rom a recent hire may — ace liability i — the context suggests that the knowledge was obtained — rom the — ormer employer in violation o —
a duty. Courts expect companies to per --- orm diligence, especially when hiring --- rom
competitors in sensitive roles. Failing to ask questions or choosing not to know can
be treated as will --- ul blindness.
Constructive Knowledge o --- Insider In --- ormation
Can Be “Threatened” Misappropriation
PepsiCo, Inc. v. Redmond
54 F.3d 1262 (7th Cir. 1995)
Redmond, a --- ormer PepsiCo executive, accepted a position with Quaker, a
direct competitor. PepsiCo sought an injunction on the grounds that Redmond
would inevitably use trade secrets in his new role. The court --- ound that Red-
mond had knowledge o --- PepsiCo’s con --- idential pricing and marketing strate-
gies and that Quaker had hired him into a role that would bene --- it --- rom those
secrets. The court held that Quaker either knew or should have known that it
would receive and use the in --- ormation improperly, even i --- no documents were
taken or disclosures made.
PepsiCo illustrates that courts do not require direct evidence o --- misappropriation
when the circumstances strongly suggest that trade secrets will be used or disclosed.
When a new employer places a --- ormer competitor’s insider in a position to exploit that
knowledge, the law may impute liability. Knowledge can be in --- erred --- rom context.
Liability --- or knowing receipt o --- con --- idential in --- ormation also arises in joint ven-
tures, licensing discussions, and mergers and acquisitions. A company reviewing
another party’s con --- idential materials under a nondisclosure agreement may later be
accused o --- misuse even i --- it believed the materials were not protected. I --- the in --- orma-
tion was clearly marked as con --- idential and shared in a structured way, the recipient
6406_Oranburg_Protecting Trade Secrets_1pp.indb 174 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 175
has little excuse. Courts are skeptical o --- claims that the recipient did not understand
the material’s status, particularly when the parties had negotiated access under spe-
ci --- ic legal terms.
Knowing Receipt o --- Con --- idential In --- ormation
Can Establish Misappropriation Liability
Bimbo Bakeries USA, Inc. v. Botticella
613 F.3d 102 (3d Cir. 2010)
Botticella, a senior executive at Bimbo Bakeries, accepted an o ---
er — rom a competitor while still employed. He continued to access con — idential product development — iles a — ter accepting the new role. The court held that the new employer had reason to know that the in — ormation Botticella possessed had been obtained in violation o — his duties to Bimbo. The risk o — disclosure was inherent in the role, and the circumstances surrounding Botticella’s departure raised red — lags that the recipient company — ailed to address.
A takeaway --- rom Bimbo Bakeries is that recipients cannot ignore obvious warn-
ing signs. When someone departs --- rom a position with access to sensitive materials
and immediately moves to a competitor, courts expect the recipient to investigate.
A --- ailure to do so may convert the recipient into a participant in the misappropria-
tion — even without active solicitation.
The legal theory behind knowing receipt is simple. Trade secret protection depends
on rein --- orcing commercial ethics. I --- companies could bene --- it --- rom stolen or misused
in --- ormation simply by not asking questions, the doctrine would collapse. By imposing
liability on those who should have known, the law promotes diligence, --- airness, and
structural accountability.
6.1.5. Limits o --- the Statutory Scope
Trade secret law does not protect everything a business pre --- ers to keep private. The
statutes impose rigorous limits on what quali --- ies as a trade secret, requiring plainti ---
s to demonstrate that the in — ormation at issue is speci — ic, nonpublic, and subject to reasonable protection e —
orts. The cases in this section de — ine the outer boundaries o — the doctrine and serve to rein — orce the principle that protection is earned through discipline, not presumed by law. Some claims — ail because the alleged trade secret is too vague. Courts require a reasonably speci — ic description o — the in — ormation at issue — enough to distinguish it
rom general business practices or publicly available materials.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 175 10/16/25 9:25 PM 176 6 • En — orcing Trade Secret Rights
Trade Secret Claims Require Speci --- icity
Aday v. West --- ield Ins. Co.
2021 WL 1173003 (W.D. Ky. Mar. 29, 2021)
The plainti ---
alleged that West — ield Insurance misappropriated his “claims handling process,” which he claimed was con — idential. The court dismissed the claim, holding that the process was described only in general terms and lacked the speci — icity needed to quali — y as a trade secret. The court emphasized that business acumen or pro — essional judgment is not protectable unless tied to concrete, identi — iable in — ormation.
A common pit --- all --- or plainti ---
s is the — ailure to precisely articulate what they believe is a trade secret. In Aday, the plainti —
accused an insurer o — misappropriat- ing a “claims handling process” yet never described that process in speci — ic detail. The court dismissed the case on the pleadings, emphasizing that trade secret law can only protect in — ormation when it is clearly de — ined and distinguishable — rom general business practices or a pro — essional’s “know-how.” Abstract re — erences, conclusory labels, or vague allusions are not enough. Trade secret statutes do not provide retro- active protection — or instructional materials, processes, or systems that are already widely used in an industry. For content or processes to quali — y as a “trade secret,” the plainti —
must demonstrate genuine secrecy and originality, not just commercial value or e —
ort expended.
Public Disclosure Destroys Trade Secret
Protection
Religious Technology Center v. Lerma
908 F. Supp. 1362 (E.D. Va. 1995)
The plainti ---
alleged that movie industry in — ormation posted online by a
ormer employee constituted a trade secret. The court disagreed, holding that once the content had been published to the internet and circulated publicly, it no longer satis — ied the secrecy requirement. The court declined to impose liability — or use o — in — ormation that was already in the public domain.
Even where a trade secret once existed, its protection is not permanent. In Lerma,
proprietary in --- ormation was posted online and rapidly circulated in the public
6406_Oranburg_Protecting Trade Secrets_1pp.indb 176 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 177
domain. The court held that the moment in --- ormation becomes widely accessible,
it instantaneously loses its status as a protectable secret. The law does not permit a
trade secret owner to “recapture” con --- identiality a --- ter allowing public access. Relent-
less discipline in controlling access, use, and distribution is mandatory; once lost,
trade secret protection cannot be restored.
These decisions underscore the structural nature o --- trade secret law. To be pro-
tected, the in --- ormation must be clearly de --- ined, objectively secret, and actively treated
as con --- idential. Courts do not stretch the statute to cover business grievances that
arise --- rom weak protections, broad generalizations, or post hoc claims o --- con --- idential-
ity. At the boundary o --- the doctrine, the law insists on discipline — and denies protec-
tion to those who --- ail to impose it.
6.2. Limits o --- Liability and
Early Dismissal
The substantive limits discussed above have direct procedural consequences.
Unlike patent or copyright suits, which begin with a registered right, trade secret
litigation requires the plainti ---
to prove at the outset that a protectable secret existed. I — the complaint — ails to plausibly allege the — oundational elements — a speci — ic secret, reasonable security measures, and improper conduct — the case is vulnerable to early dismissal. This section reviews these common — ailure modes in early-stage litigation. Courts apply the law with discipline, not to deny protection but rather to ensure that it applies only where the statutory requirements are met. The — ollowing subsections group early dismissal cases according to the speci — ic legal de — iciency alleged by the de — endant.
6.2.1. Failure to Allege a Cognizable
Trade Secret
A trade secret plainti ---
must describe the secret it seeks to protect with enough speci — icity to give the de — endant — air notice and allow the court to assess whether the in — ormation quali — ies — or protection. While a plainti —
is not expected to reveal the entire secret in a public — iling, the complaint must contain more than vague re — erences to “proprietary processes” or “con — idential strategies.” Claims that — ail this standard are o — ten dismissed be — ore discovery begins, as courts are skeptical o — complaints that rely on conclusory language to protect general business concepts.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 177 10/16/25 9:25 PM 178 6 • En — orcing Trade Secret Rights
Vague Allegations o --- Secrets Are Subject to
Early Dismissal
Aday v. West --- ield Ins. Co.
2021 WL 1173003 (W.D. Ky. Mar. 29, 2021)
The plainti ---
alleged that West — ield Insurance misappropriated his “claims handling process,” but he did not describe the process in concrete terms. The court dismissed the case on the pleadings, holding that the plainti —
’s descrip- tion was too general to support a trade secret claim. Without more detail, the court could not determine whether the process was novel, valuable, or non- obvious to others in the industry.
The procedural consequences o ---
ailing to meet the speci — icity requirement are illustrated clearly in Aday. The plainti —
’s claim that West — ield Insurance misappro- priated his “claims handling process” was dismissed on the pleadings because the description was too abstract. The court could not determine whether the process was novel, valuable, or non-obvious to others in the industry. This outcome serves as a critical lesson — or litigators: I — the court cannot distinguish the alleged secret — rom general business acumen or publicly available in — ormation based on the complaint’s allegations, the claim will not survive a motion to dismiss. A plainti —
must be pre- pared to articulate the speci — ic boundaries o — their secret — rom day one.
6.2.2. Failure to Show Reasonable E ---
orts to Maintain Secrecy The most — requently misunderstood requirement in trade secret litigation is the obligation to take reasonable e —
orts to maintain secrecy. Plainti —
s o — ten assume that the importance o — the in — ormation speaks — or itsel — or that its con — idential nature is obvious within the organization. But trade secret law does not rely on assumption. It requires evidence — evidence that the in — ormation was treated as a secret in policy, in practice, and in communication. Courts do not demand per — ection. The standard is not absolute security but rather reasonable conduct under the circumstances. What counts as reasonable will vary depending on the sensitivity o — the in — ormation, the structure o — the business, the size o — the team, and the nature o — the relationship between the parties. But certain basic expectations apply across industries: the use o — nondisclosure agreements, access lim- itations, document labeling, employee training, and termination procedures. Where these are absent or inconsistently applied, courts are quick to — ind that the secrecy element has not been met.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 178 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 179
The --- ollowing case shows how the complete absence o --- these controls can be --- atal
to the plainti ---
’s claim.
Reasonable E ---
orts Require Foundational Sa — eguards
Air --- acts, Inc. v. Amezaga
909 F.3d 84 (4th Cir. 2018)
A --- ormer employee allegedly disclosed proprietary airline data a --- ter leaving
the company. The court --- ound that Air --- acts had not taken reasonable steps to
protect the in --- ormation. There were no signed nondisclosure agreements, no
documented access restrictions, and no internal protocols indicating that the
in --- ormation was treated as con --- idential. Because the company had --- ailed to
impose even minimal protections, the court ruled that the in --- ormation was not
a trade secret under the statute.
This case illustrates the structural nature o --- the secrecy requirement. It is
not enough --- or in --- ormation to be internal or use --- ul. I --- the company has not
documented its protections, de --- ined its expectations, or limited access to those
with a need to know, courts are likely to conclude that it --- or --- eited any claim to
secrecy, whether intentionally or not.
Some cases present closer questions. The company may have some protections in
place but --- ail to apply them uni --- ormly. Courts are especially wary o --- inconsistency:
when a company treats similar materials di ---
erently or allows exceptions to its own rules, it undermines its position in litigation. The next case demonstrates how these internal contradictions can unravel a trade secret claim.
Reasonable E ---
orts Must Be Consistently Applied
Allstate Ins. Co. v. Fougere
2021 WL 4441348 (D. Mass. Sept. 28, 2021)
Allstate alleged that a --- ormer insurance agent took con --- idential customer
in --- ormation and internal training materials to a competitor. The court --- ound
that Allstate had not applied its secrecy policies consistently. Some materials
were shared widely without restriction, while others were protected. Because
the company had not made a clear and uni --- orm e ---
ort to designate the in — orma- tion as con — idential, the court dismissed the trade secret claim in part.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 179 10/16/25 9:25 PM 180 6 • En — orcing Trade Secret Rights
Fougere re --- lects a broader judicial concern: I --- the company itsel --- was unclear about
what was con --- idential, how could a third party be expected to understand the bound
aries? Trade secret law assumes that secrets must be signaled. It is not enough that
they are understood internally; rather, they must be actively communicated and
en --- orced. Lapses, ambiguity, or silence create vulnerability not just to misuse but also
to legal --- ailure.
These cases also re --- lect the evidentiary posture o --- early-stage litigation. Courts do
not wait --- or discovery to test the secrecy element. They look --- or concrete allegations
in the complaint that show reasonable e ---
orts were made, i.e., that the plainti —
had a plan, that the plan was — ollowed, and that the secret was protected accordingly. When those details are missing, the claim may not proceed. Reasonable e —
orts are not a matter o — checklists or boilerplate. They require align- ment between what the company values and how it behaves. Courts reward that align- ment. They do not supply it a — ter the — act.
6.2.3. Failure to Allege Improper Conduct
The --- inal category o --- early dismissal involves claims where the de --- endant’s conduct,
even i --- commercially aggressive, does not quali --- y as misappropriation. Trade secret law
does not prohibit competition, independent development, or the use o --- general indus-
try knowledge. It prohibits the acquisition, use, or disclosure o --- trade secrets through
improper means or in breach o --- a duty. I --- the complaint --- ails to allege that kind o --- con-
duct, the case is likely to be dismissed, even i --- the outcome --- eels un --- air to the plainti ---
. Improper means must involve some — orm o — deception, breach o — trust, or cir- cumvention o — access restrictions. This includes the — t, misrepresentation, violation o —
nondisclosure agreements, or leveraging insider knowledge obtained under a duty o ---
con --- identiality. But many plainti ---
s allege only that the de — endant developed a com- peting product or bene — ited — rom access to ideas discussed in a business meeting. Without more, those — acts do not establish liability. The law is designed to protect secrets, not to preserve advantage inde — initely a — ter the in — ormation is shared. The case below illustrates a common mistake: pleading commercial harm without showing a breach o — legal obligation.
Misappropriation Claims Must
Allege Improper Conduct
American Registry, LLC v. Hanaw
2013 WL 6332971 (M.D. Fla. Dec. 5, 2013)
The plainti ---
alleged that a — ormer business associate used customer data and business methods to start a competing service. The court dismissed the trade
6406_Oranburg_Protecting Trade Secrets_1pp.indb 180 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 181
secret claim, holding that the complaint --- ailed to describe how the in --- orma-
tion was protected or how the de --- endant’s conduct quali --- ied as improper. Even
assuming the data had value, there was no allegation o --- breach, deception, or
contractual duty. The court --- ound that the plainti ---
’s claims amounted to a complaint about competition, not misappropriation.
Hanaw demonstrates that trade secret claims must be rooted in clear legal theory.
Courts expect plainti ---
s to identi — y the duty that was breached, whether contractual,
iduciary, or circumstantial, and to show how the de — endant’s conduct crossed the line. I — the complaint does not allege improper acquisition, unauthorized disclosure, or misuse o — con — idential in — ormation, it will not survive. This limitation also protects legitimate reverse engineering and independent devel- opment. A company that creates a similar product based on public materials or its own research does not commit misappropriation, even i — the — inal result resembles that o — a competitor. The statutes are not designed to punish similarity. They punish breach. Courts apply this boundary with increasing discipline. As trade secret claims have become more common in business disputes, judges have grown wary o — plainti —
s attempting to use trade secret law to block — air competition or to dress up — ailed busi- ness negotiations as torts. To avoid early dismissal, the complaint must identi — y spe- ci — ic conduct that quali — ies as wrong — ul under the statute and connect that conduct to a protectable secret. Anything less, and the claim will not proceed.
6.3. Proving the Trade Secret
at the Time o --- Suit
Trade secret status is not established by allegation alone. Even i --- a plainti ---
survives a motion to dismiss, it must eventually prove that the in — ormation at issue quali — ies — or protection under the law. This proo — must be made with evidence. It is not su —
icient that the in — ormation was secret at some point in the past; rather, it must have been a trade secret at the time o — the alleged misappropriation. This requirement imposes a continuing obligation on trade secret holders to maintain control, to monitor access, and to treat the in — ormation as con — idential over time. Courts apply a three-part standard derived — rom the statutory de — inition. The plainti —
must prove that the in — ormation (1) is a — orm o — knowledge or expression covered by the statute; (2) has (a) independent economic value — rom being (b) not generally known and (c) not readily ascertainable by proper means; and (3) was subject to reasonable e —
orts to keep it secret. This standard applies at every stage
6406_Oranburg_Protecting Trade Secrets_1pp.indb 181 10/16/25 9:25 PM 182 6 • En — orcing Trade Secret Rights
o --- litigation — --- rom preliminary injunction to summary judgment to --- inal verdict.
Plainti ---
s who — ail to meet it cannot prevail, no matter how egregious the de — endant’s conduct may appear. Proving secrecy is o — ten the most demanding element. It requires both internal and external evidence. Internally, the plainti —
must show that access was limited, that recipients were trained or bound by agreement, and that controls were in place to prevent leakage. Externally, the plainti —
must show that the in — ormation was not available through public sources or independent research. General statements that the in — ormation was “con — idential” or “valuable” are not enough. Courts expect speci — icity and structure.
Trade Secret Protection Extends to
Early-S tage Concepts
Altavion, Inc. v. Konica Minolta Systems Laboratory, Inc.
226 Cal. App. 4th 26 (2014)
Altavion disclosed a digital stamping method to Konica Minolta during dis-
cussions about collaboration. Konica later --- iled patent applications covering
the disclosed ideas. Altavion sued --- or misappropriation. The court held that
the in --- ormation quali --- ied as a trade secret even though it was not embodied in
a commercial product. It emphasized that trade secret status depends not on
the stage o --- development but rather on secrecy, value, and control. Altavion had
documented the concept, disclosed it under a con --- identiality agreement, and
kept it out o --- the public domain. That was enough.
Altavion con --- irms that trade secrets do not need to be market-ready to be pro-
tectable. What matters is whether the in --- ormation was treated as con --- idential and
whether it con --- erred a potential advantage because it was not known to others. Early-
stage technical concepts, internal algorithms, and business strategies may all quali --- y
i --- handled with care.
Secrecy must also be maintained through the li --- e o --- the dispute. In --- ormation that
leaks during litigation or was already disclosed be --- ore the de --- endant’s alleged miscon-
duct may lose protection. Courts --- ocus on what was happening at the moment o --- the
alleged misappropriation. Plainti ---
s who — ail to monitor access or who allow secrets to spread uncontrolled may — ind that the legal claim evaporates — even i — the in — ormation still — eels proprietary.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 182 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 183
Individual Discipline Can Satis --- y Reasonable
Secrecy E ---
orts
Bianco v. Globus Medical, Inc.
30 F. Supp. 3d 565 (E.D. Tex. 2014)
Dr. Bianco disclosed a spinal implant concept to Globus Medical during dis-
cussions about possible collaboration. No agreement was reached, but Globus
later commercialized a similar design. The court held that the disclosed con-
cept quali --- ied as a trade secret. Although Bianco did not patent or manu --- acture
the device himsel --- , he had developed detailed documentation, shared it only
under con --- identiality, and kept it out o --- the public sphere. The court awarded
damages based on lost licensing value.
Bianco demonstrates that even solo inventors and individual contributors can pre-
vail i --- they take --- ormal steps to preserve secrecy. Courts do not require corporate
in --- rastructure. They require discipline. When the evidence shows that the in --- orma-
tion was economically valuable, closely held, and improperly used, protection --- ollows.
What emerges --- rom these cases is a picture o --- trade secret litigation as an eviden-
tiary challenge. The plainti ---
must show not just what the in — ormation is but how it was treated and why it matters. That showing must be made with precision. A trade secret cannot be proven by assertion. It must be demonstrated through documentation, access logs, contractual structure, and commercial context. That burden — proving the secret — is the — irst true test o — every plainti —
’s case.
6.3.1. Secrecy, Value, and Control
Trade secret status rests on three interrelated pillars: secrecy, economic value,
and control. These elements must be proven together. In --- ormation that is secret but
trivial will not be protected. In --- ormation that is valuable but widely known is not a
secret. And in --- ormation that is both secret and valuable but handled carelessly may
be treated by the court as abandoned. Trade secret law protects only what the owner
has chosen to protect and has taken steps to keep protected over time.
Secrecy does not mean absolute invisibility. Courts recognize that trade secrets are
o --- ten shared within organizations and disclosed to business partners. What matters is
that the in --- ormation is not generally known or readily ascertainable and that its cir-
culation is controlled. Access must be limited. Sharing must be governed by contract
or clear expectation. Courts --- requently ask: Who had access, under what conditions,
and what obligations were imposed?
6406_Oranburg_Protecting Trade Secrets_1pp.indb 183 10/16/25 9:25 PM 184 6 • En — orcing Trade Secret Rights
Value is assessed by how the in --- ormation --- unctions in the marketplace. Does it
provide a competitive edge? Could a rival replicate it easily without access to the
secret? Is it the result o --- substantial investment, insight, or iteration? These questions
help distinguish trade secrets --- rom pro --- essional knowledge or public in --- ormation
assembled with e ---
ort. Trade secret law protects commercial advantage derived — rom con — identiality — not e —
ort alone. Control is about conduct. Plainti —
s must demonstrate that they took reasonable measures to prevent loss o — secrecy. This includes both — ormal steps, like nondisclo- sure agreements and system restrictions, and in — ormal norms, such as access disci- pline and employee training. Courts are not interested in theoretical controls. They want to see what was actually done. A well-dra — ted policy that was never implemented carries little weight. A pattern o — con — idential treatment that can be corroborated by witnesses and records carries much more. These — actors o — ten rise and — all together. Weak controls cast doubt on whether the in — ormation was secret. Ambiguous documentation casts doubt on value. The plainti —
must weave a coherent narrative showing that the in --- ormation was distinctive, closely
held, and signi --- icant. That narrative must be supported by evidence, and it must hold
up when challenged under oath.
6.3.2. Evidentiary Burdens and
Typical De --- enses
Once litigation begins, the burden shi --- ts --- rom pleading to proo --- . The plainti ---
must not only describe the trade secret with speci — icity but also support each element with admissible evidence. This includes showing what the trade secret is, how it was pro- tected, when it was misappropriated, and by whom. These are not abstract questions. Courts require concrete, — act-speci — ic answers, and de — endants o — ten mount aggressive challenges to each part o — the claim. At summary judgment, the plainti —
must present evidence su —
icient to create a triable issue o —
act. That includes documents, sworn testimony, internal records, and expert analysis. Vague statements that the in — ormation was “con — idential” or “impor tant to the business” are not enough. Courts look — or speci — icity: the exact nature o —
the secret, the mechanisms o --- protection, the ways in which it was used, and how it
provided a competitive advantage. Plainti ---
s who — ail to provide that detail may lose without reaching trial. De — endants o — ten attack trade secret claims by arguing that the in — ormation was not actually secret or that it was already known in the industry. They may introduce evidence — rom public websites, academic publications, prior patents, or testimony
rom industry pro — essionals to show that the in — ormation could have been obtained through proper means. I — the trade secret is — unctionally available to others, the claim
ails, regardless o — whether the de — endant actually used those sources.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 184 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 185
Another common de --- ense is that the plainti ---
ailed to take reasonable steps to pro- tect the in — ormation. This is o — ten supported by pointing to gaps in documentation, inconsistent en — orcement o — policies, or in — ormal practices that allowed broad access. For example, a company that stores all — iles on an open-access server or — ails to revoke credentials — or — ormer employees may struggle to show control. Courts weigh these
acts heavily when deciding whether the plainti —
met its burden. A related de — ense is that the de — endant developed the in — ormation independently. I —
the de --- endant can show that its work was derived --- rom public sources, internal exper-
tise, or a development timeline that preceded any alleged disclosure, that can de --- eat
the claim. Courts do not presume misappropriation merely because the end product
is similar. They require proo --- that the secret was taken and that it made a di ---
erence. These de — enses underscore the central reality o — trade secret litigation: plainti —
s bear the burden not only to claim secrecy but also to prove it — under conditions where the de — endant is — ree to deny, distinguish, and reinterpret the — acts. That burden is signi — icant. It can be met, but only with care — ul preparation, detailed records, and internal discipline that existed long be — ore the lawsuit began.
6.3.3. Litigation-Stage Reasonableness
Analysis
The question o --- whether reasonable e ---
orts were taken to maintain secrecy is not assessed in the abstract. Courts evaluate it based on what the plainti —
actually did be — ore and during the alleged misappropriation. This includes how the in — orma- tion was stored, labeled, transmitted, and accessed; what policies were in place; and whether those policies were — ollowed in practice. Crucially, courts examine whether secrecy was preserved at the time o — the alleged breach, not just at some earlier stage when the in — ormation may have — irst been developed. This litigation-stage assessment o — ten reveals weaknesses in trade secret protection systems that went unnoticed internally. For example, a company may have required employees to sign nondisclosure agreements but never trained them on how to handle con — idential — iles. Or a system may have had theoretical access controls, but the pass- word was shared among teams or never changed. These kinds o — implementation
ailures matter. Courts do not en — orce good intentions. They en — orce what actually happened. Timing also plays a key role. Trade secrets can be lost by exposure. I — a plainti —
allowed in --- ormation to circulate without restrictions or --- ailed to notice that a third
party had published or leaked it, protection may be lost be --- ore the case even begins.
Courts ask whether the in --- ormation was still a trade secret at the time o --- the alleged
misappropriation. I --- secrecy had already lapsed, there is nothing le --- t to en --- orce.
Litigation also puts internal consistency under a microscope. Plainti ---
s who describe the same in — ormation di —
erently in di — — erent contexts, such as telling regulators one
6406_Oranburg_Protecting Trade Secrets_1pp.indb 185 10/16/25 9:25 PM 186 6 • En — orcing Trade Secret Rights
story and courts another, risk undercutting their claim. So do plainti ---
s who try to reclassi — y in — ormation as con — idential a — ter the — act. Courts look — or contemporaneous evidence that the in — ormation was understood to be sensitive and that appropriate steps were taken to protect it in real time. Reasonableness is also judged relative to industry norms. Courts o — ten ask whether companies o — similar size and sophistication would have done more to protect similar in — ormation. This is especially true in technology, — inance, healthcare, and other — ields where expectations around data protection are evolving rapidly. A plainti —
that lags behind its peers may struggle to show that its practices were reasonable, particularly i — the de — endant — ollowed stronger protocols or acted based on di — — erent assumptions about what was protected. Ultimately, this stage o — litigation reveals whether the company’s protection e —
orts were built to withstand scrutiny. Trade secret law rewards structure and — oresight. The plainti —
must not only convince the court that a trade secret exists but also that it was preserved through deliberate, consistent, and timely action. That is the — oundation on which every remedy depends.
6.4. Injunctive Relie ---
Injunctive relie --- plays a signi --- icant role in trade secret litigation, but it is not always
the primary remedy. The decision to grant an injunction depends on the --- acts o --- each
case, the harm caused by the alleged misappropriation, and the nature o --- the trade
secret itsel --- . Injunctive relie --- is most commonly sought when the plainti ---
can dem- onstrate that monetary damages will not be su —
icient to remedy the harm caused by continued use or disclosure o — the trade secret. However, courts weigh the interests o — both the plainti —
and the de — endant, balancing the need — or protection against the de — endant’s business interests. Temporary Restraining Orders (TROs) and preliminary injunctions are typically sought in the early stages o — litigation to prevent — urther harm be — ore a — ull trial can take place. These — orms o — relie — serve to stop the de — endant’s actions while the case is ongoing, but they are not permanent solutions. Permanent injunctions, issued a — ter a trial, provide more lasting protection. The — ollowing subsections examine the require- ments and considerations — or granting TROs, preliminary injunctions, and perma- nent injunctions.
6.4.1. Temporary Restraining Orders
A Temporary Restraining Order (TRO) is a short-term emergency remedy that can
be granted without notice to the de --- endant in certain situations. A TRO is typically
issued to preserve the status quo and prevent immediate harm to the plainti ---
, such as
6406_Oranburg_Protecting Trade Secrets_1pp.indb 186 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 187
the continued use or disclosure o --- a trade secret. Because TROs are generally granted
ex parte — meaning the de --- endant is not present to contest the order — courts apply a
heightened standard. The plainti ---
must show that they will su —
er irreparable harm i —
the TRO is not granted and that the balance o --- hardships --- avors the plainti ---
. The primary purpose o — a TRO is to stop immediate harm be — ore a — ull hearing can be held. It is a temporary measure that usually lasts only a — ew days to a — ew weeks, enough to give the plainti —
time to prepare — or a more comprehensive hearing on a preliminary injunction. Courts will grant a TRO only i — the plainti —
demonstrates that they are likely to succeed on the merits o — their case and that there is no adequate remedy at law. TROs are power — ul tools, but they are short-lived. I — the plainti —
cannot convert the TRO into a preliminary injunction, the relie — is temporary and may not provide the long-term protection the plainti —
seeks. Courts exercise discretion in granting TROs, recognizing that they may disrupt the de — endant’s business operations and impose burdens even be — ore the allegations are — ully tested.
6.4.2. Preliminary Injunctions
A preliminary injunction is another --- orm o --- interim relie --- granted be --- ore trial, but
unlike a TRO, it is issued a --- ter a hearing in which both parties have the opportunity
to present evidence. A preliminary injunction is intended to prevent --- urther harm
while the case is pending and is generally more comprehensive than a TRO. Courts
issue preliminary injunctions when the plainti ---
demonstrates that there is a likeli- hood o — success on the merits, that irreparable harm will occur i — the injunction is not granted, and that the balance o — hardships — avors the plainti —
. A preliminary injunction serves to protect the plainti —
’s interests while the — ull case is litigated. The plainti —
must show that they have a strong case on the under lying merits o — the trade secret claim: they must show not just that they may even- tually win, but that the harm to their trade secret cannot be remedied by money damages alone. In addition, the court will consider whether the de — endant will su —
er undue harm — rom the injunction and whether the public interest would be served by granting the order. In many trade secret cases, the harm caused by the unauthorized use or disclosure o — the trade secret cannot be adequately measured in monetary terms. In these cases, the plainti —
is likely to succeed in obtaining a preliminary injunction, particularly i —
they can demonstrate that the continued use o --- the trade secret will undermine their
competitive advantage and cause ongoing damage.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 187 10/16/25 9:25 PM 188 6 • En — orcing Trade Secret Rights
“Inevitable Disclosure” Can Justi --- y
a Preliminary Injunction
PepsiCo, Inc. v. Redmond
54 F.3d 1262 (7th Cir. 1995)
PepsiCo sought an injunction to prevent a --- ormer employee, Redmond,
rom working — or Quaker Oats. The company argued that Redmond would inevitably use PepsiCo’s con — idential pricing strategies and marketing plans at Quaker. The court held that PepsiCo had shown a reasonable likelihood o — success on the merits o — its claim and granted the injunction. The court’s decision was rooted in the inevitable disclosure doctrine, which allows — or injunctive relie — when it is shown that the de — endant’s new employment would almost certainly lead to the use o — the plainti —
’s trade secrets, even without direct disclosure.
6.4.3. Permanent Injunctions and
Post-Trial Remedies
Once a court has --- ully adjudicated a trade secret misappropriation claim, it may
issue a permanent injunction to stop --- urther harm caused by the de --- endant’s actions.
A permanent injunction is typically issued a --- ter a trial and is meant to provide long-
term protection to the plainti ---
. Unlike temporary or preliminary injunctions, which are interim measures, a permanent injunction is intended to provide — inal relie —
a --- ter the court has determined that the de --- endant’s conduct constitutes trade secret
misappropriation.
A permanent injunction can include a range o --- remedies, including prohibiting the
de --- endant --- rom continuing to use or disclose the trade secret, requiring the return o ---
con --- idential in --- ormation, and barring the de --- endant --- rom engaging in speci --- ic com-
petitive activities --- or a designated period o --- time. The scope o --- the permanent injunc-
tion will depend on the --- acts o --- the case, including the nature o --- the trade secret, the
extent o --- the de --- endant’s misuse, and the potential harm to the plainti ---
.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 188 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 189
An Ongoing Threat o --- Misuse Can Justi --- y
a Permanent Injunction
Bimbo Bakeries USA, Inc. v. Botticella
613 F.3d 102 (3d Cir. 2010)
Bimbo Bakeries sought a permanent injunction to prevent Botticella, a --- or-
mer employee, --- rom using or disclosing trade secrets related to the company’s
product --- ormulations. The court granted the injunction, --- inding that the com
pany had demonstrated that the --- ormer employee would use the con --- idential
in --- ormation in his new employment with a competitor. The court reasoned
that the in --- ormation was essential to Bimbo’s success and that allowing the
de --- endant to use it would cause irreparable harm to the company’s competitive
position.
In granting permanent injunctions, courts take into account both the de --- endant’s
role in the misappropriation and the potential ongoing harm to the plainti ---
. A per- manent injunction serves as a long-term sa — eguard, ensuring that the trade secrets are not — urther exploited. Courts also consider the public interest in preventing trade secret the — t and promoting — air competition, particularly in cases where the de — en- dant’s actions have broader implications — or the industry.
6.5. Monetary Remedies
While injunctive relie --- is o --- ten the most immediate remedy in trade secret litiga-
tion, monetary damages are central to any case involving misappropriation. Courts
award damages to compensate the plainti ---
or the harm caused by the misappropria- tion, to deter — uture misconduct, and, in some cases, to punish egregious behavior. Monetary remedies in trade secret cases are generally divided into three categories: actual loss, unjust enrichment, and reasonable royalty. Each category addresses a di —
erent aspect o — the harm caused by the misappropriation and can be awarded inde pendently or in combination, depending on the — acts o — the case. The goal o — damages is not just to compensate the plainti —
but also to ensure that the de — endant does not bene — it — rom its wrong — ul actions. Courts o — ten look at the — ull extent o — the de — endant’s misconduct and the economic advantage gained through misappropriation. In some cases, the plainti —
may not know the — ull extent o — the loss, especially i — the de — endant has used the trade secrets to develop products that have already been marketed or sold. In such cases, courts may rely on expert testimony or other evidence to estimate the damages.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 189 10/16/25 9:25 PM 190 6 • En — orcing Trade Secret Rights
6.5.1. Actual Loss
Actual loss damages aim to compensate the plainti ---
or the actual harm caused by the de — endant’s wrong — ul actions. This category o — damages includes lost pro — its, damage to business relationships, and any other direct — inancial losses resulting — rom the misappropriation. In determining actual loss, courts look at how the misappro- priation has harmed the plainti —
’s competitive position, whether it has caused a loss o — market share, and how the de — endant’s use o — the trade secret has a —
ected the plain- ti —
’s ability to compete. The plainti —
must prove the extent o — its losses by presenting evidence o — the eco- nomic value o — the trade secret, the market conditions, and the amount o — business or pro — it that was lost due to the misappropriation. In some cases, the plainti —
may need to show how the de — endant’s use o — the trade secret allowed them to achieve a competitive advantage or to develop a competing product or service.
Lost Licensing Value Can Establish Actual
Loss Damages
Bianco v. Globus Medical, Inc.
30 F. Supp. 3d 565 (E.D. Tex. 2014)
Dr. Bianco disclosed a spinal implant concept to Globus Medical during dis-
cussions about possible collaboration. No agreement was reached, but Globus
later commercialized a similar design. The court awarded damages based on the
licensing value o --- the concept, recognizing that Dr. Bianco had lost the oppor-
tunity to license his idea to a competitor. The award was based on the potential
economic bene --- it Bianco had lost due to Globus’s use o --- his trade secret.
In Bianco, the court calculated actual loss damages by --- ocusing on the licensing
potential o --- the trade secret. This case demonstrates that when the harm caused
by misappropriation is quanti --- iable — such as lost licensing opportunities or lost
sales — actual loss damages can be substantial.
6.5.2. Unjust Enrichment
Unjust enrichment damages are intended to strip the de --- endant o --- any pro --- its
gained through the misappropriation o --- trade secrets. Unlike actual loss, which com-
pensates the plainti ---
or their direct harm, unjust enrichment seeks to eliminate any bene — it the de — endant gained — rom the wrong — ul use o — the trade secret. This — orm
6406_Oranburg_Protecting Trade Secrets_1pp.indb 190 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 191
o --- damages is meant to ensure that the de --- endant does not pro --- it --- rom their illegal
actions.
In calculating unjust enrichment, courts look at the pro --- its the de --- endant made as a
result o --- using the trade secret, such as the value o --- products sold or services provided
using the misappropriated in --- ormation. The key question is whether the de --- endant’s
pro --- its were directly tied to the use o --- the trade secret and whether those pro --- its would
have been earned without it.
De --- endant’s Pro --- its --- rom Misappropriation
Can Be Awarded as Unjust Enrichment
3M v. Pribyl
259 F.3d 587 (7th Cir. 2001)
3M alleged that --- ormer employees had misappropriated proprietary trade
secrets regarding manu --- acturing processes. The court awarded damages based
on the de --- endant’s unjust enrichment, recognizing that the de --- endant’s sales
o --- products developed using 3M’s trade secrets represented an un --- air pro --- it
gained through wrong --- ul conduct. The court emphasized that the de --- endant
should not bene --- it --- rom the misappropriation.
In 3M v. Pribyl, the court awarded unjust enrichment damages to 3M, --- ocusing on
the de --- endant’s pro --- its earned --- rom the use o --- proprietary manu --- acturing processes.
This case shows how courts calculate unjust enrichment damages: by looking at the
bene --- it the de --- endant gained --- rom the trade secrets and then determining a dam-
ages award su ---
icient to ensure that the de — endant does not pro — it — rom its unlaw — ul conduct.
6.5.3. Reasonable Royalty
In cases where actual loss and unjust enrichment are di ---
icult to quanti — y, courts may award damages based on a reasonable royalty. A reasonable royalty is an amount that represents what the plainti —
would have received i — the de — endant had negotiated
or the right to use the trade secret. This approach is o — ten used when the plainti —
cannot establish actual loss or the de --- endant’s pro --- its; it provides a way to compensate
the plainti ---
based on the value o — the trade secret. Reasonable royalty damages are typically calculated based on expert testimony, industry standards, and hypothetical licensing negotiations. Courts may look at
6406_Oranburg_Protecting Trade Secrets_1pp.indb 191 10/16/25 9:25 PM 192 6 • En — orcing Trade Secret Rights
--- actors such as the plainti ---
’s actual licensing history, the market value o — similar trade secrets, and the de — endant’s use o — the trade secret in its products or services.
Misappropriation Damages Can Be Estimated
by a “Reasonable” Royalty
Mattel, Inc. v. MGA Entertainment, Inc.
616 F.3d 904 (9th Cir. 2010)
In a battle over the Bratz dolls, Mattel alleged that MGA had used its trade
secrets in the development o --- a competing line o --- dolls. The court awarded a
reasonable royalty re --- lecting the licensing value o --- the trade secrets that Mattel
would have earned had it licensed the in --- ormation to MGA. The court relied
on expert testimony to determine the value o --- the trade secrets in the context
o --- the doll market.
In Mattel v. MGA Entertainment, the court awarded a reasonable royalty to Mattel
or the misappropriation o — trade secrets related to the development o — dolls. This case illustrates how reasonable royalty damages can be applied when actual loss or unjust enrichment is di —
icult to measure, and it shows how courts use expert testimony to determine the value o — the trade secret. This section illustrates how courts determine the appropriate monetary remedy depending on the — acts and circumstances o — the case. Actual loss compensates the plainti —
or the harm caused by the de — endant’s actions, unjust enrichment removes the de — endant’s ill-gotten gains, and reasonable royalty damages — ill the gap when other remedies are di —
icult to calculate.
6.6. Ex Parte Seizure
The UTSA provides a unique and power --- ul remedy --- or trade secret holders: the
right to seek ex parte seizure o --- misappropriated trade secrets. This remedy allows
the plainti ---
to seize the de — endant’s property — such as documents, — iles, or electronic devices — be — ore the de — endant has an opportunity to contest the action. It is an extraordinary remedy, available only in speci — ic and urgent circumstances. Ex parte seizure is typically sought when there is a risk that the de — endant will destroy or con- ceal the trade secrets, or when immediate relie — is necessary to prevent irreparable harm to the plainti —
’s competitive position.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 192 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 193
The DTSA sets out an eight-part test that must be satis --- ied be --- ore a court can grant
ex parte seizure. These requirements are strict because o --- the severe nature o --- the
remedy. Courts will only grant such orders i --- the plainti ---
demonstrates that: 1. Immediate and irreparable harm would result — rom the misappropriation o —
the trade secret.
2. The plainti ---
is likely to succeed on the merits o — the trade secret claim. 3. The de — endant would destroy or move the trade secrets unless the court inter- venes immediately. 4. The seizure is necessary to prevent — urther misuse o — the trade secrets. 5. The plainti —
has made reasonable e —
orts to preserve the con — identiality o — the trade secret. 6. The plainti —
has provided su —
icient in — ormation about the trade secret and the misappropriation. 7. The harm to the de — endant — rom the seizure does not outweigh the harm to the plainti —
. 8. The plainti —
has provided an adequate bond to cover potential damages to the de — endant. These criteria re — lect the exceptional nature o — the seizure remedy. It is a drastic measure, which is why the law requires plainti —
s to prove an immediate need — or relie —
that is backed by strong evidence o --- misappropriation and the likelihood o --- harm. Ex
parte seizure is not typically used --- or routine trade secret disputes but --- or cases where
the de --- endant’s conduct has been egregious and time is o --- the essence.
An Ex Parte Seizure Requires a Strong
Showing o --- Extraordinary Urgency
Janssen Prods. L.P. v. Evenus Pharms. Labs. Inc.
85 F.4th 147 (3d Cir. 2023)
Janssen Pharmaceuticals sought an ex parte seizure order to recover misap-
propriated trade secrets --- rom Evenus Pharmaceuticals, alleging that Evenus
was using con --- idential data related to drug --- ormulations. The court denied
the seizure, --- inding that Janssen had not shown the urgency or imminent risk
required --- or such an extraordinary remedy. The decision rein --- orced the narrow
application o --- ex parte seizure under the DTSA, emphasizing that it is avail-
able only in situations where the de --- endant’s actions pose an immediate and
irreparable threat to the plainti ---
’s business interests.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 193 10/16/25 9:25 PM 194 6 • En — orcing Trade Secret Rights
A court’s decision to grant an ex parte seizure order is based on rigorous standards
that plainti ---
s must meet to obtain the remedy. While Janssen presented a strong case o — misappropriation, the court — ound that the evidence did not meet the high thresh- old required — or such drastic action. This case demonstrates how courts weigh the urgency o — the situation and the potential harm to both the plainti —
and de — endant be — ore granting such an intrusive remedy. Ex parte seizure is a power — ul tool, but its application is limited. Plainti —
s who seek seizure orders must demonstrate not just that they have a valid claim but also that the de — endant’s actions are likely to cause immediate and irreparable harm. This remedy is used sparingly and is generally reserved — or cases where there is clear evidence o —
concealment or destruction o --- trade secrets.
Even when the seizure order is granted, it is not a comprehensive solution. Once
the in --- ormation is seized, the plainti ---
must still go through the normal litigation process to prove the existence o — the trade secret, misappropriation, and the appro- priate remedy. The seizure order serves as an emergency intervention, not as a — inal judgment in the case.
6.7. Attorneys’ Fees and
Enhanced Damages
In addition to compensating plainti ---
s — or their actual loss or unjust enrichment, trade secret law provides — or the recovery o — attorneys’ — ees and, in some cases, enhanced damages. These remedies are particularly relevant when the de — endant’s conduct is — ound to be will — ul, malicious, or otherwise egregious. The goal is to deter wrong — ul conduct and to ensure that trade secret owners are not penalized — or having to bring a lawsuit to protect their secrets. The UTSA and the DTSA both allow — or the award o — attorneys’ — ees in cases where the de — endant’s misappropriation is deemed will — ul and malicious. Courts are gener- ally reluctant to award — ees in trade secret cases, but when they do, it is o — ten because the de — endant’s conduct has been particularly egregious or has involved bad- — aith litigation tactics. Attorneys’ — ees serve as a deterrent and as a means o — compensating the plainti —
or the expense o — de — ending its rights. In cases where the misappropriation was will — ul, courts may also award enhanced damages. Under the UTSA and the DTSA, enhanced damages can be awarded up to two times the amount o — actual damages, provided the de — endant’s conduct was egre- gious. This means that i — the de — endant acted with knowledge that their actions were wrong — ul or with deliberate disregard — or the plainti —
’s rights, the court may increase the damages award to provide a stronger deterrent. One example o — a case where enhanced damages were awarded — or will — ul conduct is Amnet v. CrossCountry Mortgage. In that case, the de — endant was — ound to have
6406_Oranburg_Protecting Trade Secrets_1pp.indb 194 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 195
knowingly misappropriated the plainti ---
’s trade secrets and to have engaged in bad-
aith litigation tactics. As a result, the court awarded attorneys’ — ees and enhanced damages to the plainti —
. This case highlights how courts will use these remedies to punish de — endants who act with disregard — or the law and to prevent them — rom pro — - iting — rom wrong — ul conduct.
Will --- ul and Malicious Misappropriation
Can Trigger Enhanced Damages
Amnet v. CrossCountry Mortgage
2020 WL 3489317 (N.D. Ill. June 26, 2020)
Amnet accused CrossCountry Mortgage o --- misappropriating its proprietary
mortgage underwriting so --- tware. The court --- ound that CrossCountry had will-
ully misappropriated the so — tware, and it awarded Amnet both attorneys’ — ees and enhanced damages. The court noted that CrossCountry had engaged in bad- — aith litigation by attempting to delay the proceedings and avoid produc- ing key evidence. The award o — enhanced damages was aimed at punishing this conduct and deterring similar behavior in the — uture.
The award o --- attorneys’ --- ees and enhanced damages emphasizes that trade secret
law is not just about compensating the plainti ---
or losses. It is also about ensuring that the de — endant is not allowed to bene — it — rom wrongdoing and to deter — uture violations. These remedies are particularly important in cases where the de — endant’s actions were not merely negligent but involved will — ul misconduct. I — the court — inds that the de — endant’s behavior was particularly egregious or mali- cious, it may impose additional penalties as part o — its judgment. This serves as a warning to potential de — endants that misappropriating trade secrets or engaging in bad- — aith litigation will have signi — icant legal consequences beyond the standard dam- ages award.
6.8. Criminal En --- orcement
While trade secret misappropriation is primarily a civil matter, there are circum-
stances where the the --- t o --- trade secrets can lead to criminal prosecution under the
Economic Espionage Act (EEA). The EEA criminalizes the the --- t or misappropriation
o --- trade secrets with the intent to bene --- it a --- oreign government or to gain a competi-
tive advantage. The law provides --- or signi --- icant penalties, including --- ines and impris-
onment, --- or those --- ound guilty o --- trade secret the --- t under criminal statutes.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 195 10/16/25 9:25 PM 196 6 • En — orcing Trade Secret Rights
The key di ---
erence between civil and criminal en — orcement is the burden o — proo — . In criminal cases, the government must prove its case beyond a reasonable doubt, which is a higher standard than the “preponderance o — the evidence” standard used in civil cases. This makes criminal en — orcement more di —
icult to pursue. Criminal pros- ecution is typically reserved — or cases involving large-scale the — t, industrial espionage, or the — t with — oreign connections. Under the EEA, penalties — or criminal misappropriation can be severe. Individu- als convicted under the Act can — ace up to 10 years in prison and — ines up to $5 mil- lion. Organizations — ound guilty o — violating the Act may — ace even larger penalties, including — ines o — up to $10 million or three times the value o — the stolen trade secrets, whichever is greater. The EEA’s criminal provisions are designed to serve as a deter- rent, particularly in cases o — economic espionage, where the the — t o — trade secrets can undermine national security or economic interests. Although criminal en — orcement is less common in trade secret cases, it plays an important role in deterring high-level the — t, particularly when the de — endant’s con- duct involves — oreign governments or actors. The government may initiate a criminal investigation and prosecution independently o — any civil case, or criminal charges may be brought alongside a civil claim.
The Economic Espionage Act Imposes Criminal
Liability --- or Trade Secret “The --- t”
United States v. Aleynikov
676 F.3d 71 (2d Cir. 2012)
In this case, Sergey Aleynikov, a --- ormer employee o --- Goldman Sachs, was
convicted under the Economic Espionage Act --- or stealing proprietary computer
code related to high- --- requency trading algorithms. Aleynikov had downloaded
the code to his personal computer be --- ore leaving the company, intending to use
it --- or a --- uture employer. The court --- ound that the trade secrets in question were
valuable to Goldman Sachs, and Aleynikov’s actions were in violation o --- the
EEA. His conviction was overturned on appeal due to technical issues in how
the law was applied, but the case demonstrated the reach o --- criminal en --- orce-
ment --- or trade secret the --- t.
The Aleynikov case illustrates the broad scope o --- the Economic Espionage Act and
how it applies to high-level the --- t in the --- inancial industry. It shows that criminal liabil-
ity can attach even when the misappropriation is not immediately damaging to the
original company, especially when the trade secret involved has substantial value in
the industry or national security context.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 196 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 197
The key advantage o --- criminal prosecution is the severity o --- the penalties. Crimi-
nal de --- endants --- ace not only --- inancial penalties but also the threat o --- imprisonment.
This makes criminal en --- orcement an important tool --- or deterring large-scale the --- t
and espionage. However, because the burden o --- proo --- in criminal cases is so high, the
government typically only pursues criminal prosecution in cases o --- clear and egre-
gious misconduct.
Criminal en --- orcement also intersects with civil trade secret claims in certain cases.
It is not uncommon --- or a de --- endant who is --- acing civil litigation --- or trade secret mis-
appropriation to also be prosecuted criminally, especially i --- the case involves --- oreign
espionage or the the --- t o --- highly sensitive in --- ormation. In these cases, the civil case may
proceed independently o --- the criminal prosecution, but the potential --- or criminal
penalties adds an additional layer o --- deterrence and consequence.
6.9. Strategic and Procedural
Dynamics
In trade secret litigation, the legal arguments are only part o --- the story. The strategy
behind the case — how and when to --- ile, how to manage discovery, and how to pre
sent the evidence — can determine the outcome just as much as the substance o --- the
claims. Trade secret cases o --- ten involve highly con --- idential and technical in --- ormation,
and the parties will battle not just over legal de --- initions but also over how the --- acts are
ramed and how the law is applied to the evidence. One o — the — irst strategic decisions involves venue and jurisdiction. This decision can a —
ect the entire course o — the case, — rom how quickly it moves through the court system to what rules govern the litigation. A — ter — iling, the litigation strategy continues with critical decisions about discovery — what evidence to pursue and how to protect con — idential materials during the process. This section breaks down these strategic considerations and explains how to navigate them.
6.9.1. Venue and Jurisdiction
Choosing the right venue is critical in trade secret litigation. The rules that apply
to trade secret claims can vary depending on the jurisdiction, and where a case is
iled can signi — icantly impact both procedural and substantive outcomes. For — ederal claims brought under the DTSA, venue is governed by the general — ederal venue stat- ute, 28 USC § 1391. This means a DTSA claim may be brought in any — ederal district where a de — endant resides or where a substantial part o — the events giving rise to the claim occurred. While plainti —
s do not have un — ettered discretion to choose any district court, they may still have some strategic — lexibility in selecting among proper
6406_Oranburg_Protecting Trade Secrets_1pp.indb 197 10/16/25 9:25 PM 198 6 • En — orcing Trade Secret Rights
venues, --- or example, by --- avoring jurisdictions with experience in complex intellectual
property litigation or those where the de --- endant has a business presence.
However, when a trade secret claim is brought under state law — such as under a
state’s adoption o --- UTSA — venue is determined by the relevant state’s venue statutes
and rules o --- civil procedure. Typically, venue is proper in the county or judicial district
where the de --- endant resides, where the misappropriation occurred, or where the injury
was sustained. However, trade secret owners should care --- ully evaluate not only the
substantive law but also the local court’s experience and receptivity to complex com-
mercial or intellectual property cases, as some jurisdictions are more --- amiliar with the
nuances o --- trade secret law and may administer the litigation more e ---
ectively. For example, in a case involving multiple jurisdictions — such as when the misap- propriation took place in one state but the de — endant operates nationally or inter- nationally — the plainti —
may need to assess the convenience o — the venue — or their witnesses, the location o — the evidence, and whether the chosen court has experience handling multijurisdictional litigation.
Strategic Venue Sel ection Can Provide
Procedural Advantages
Amgen, Inc. v. Sandoz Inc.
791 F.3d 1313 (Fed. Cir. 2015)
In this case, Amgen sued Sandoz --- or trade secret misappropriation in rela-
tion to a biologic drug. The court --- ound that Amgen had selected an appro-
priate venue --- or its case, emphasizing that the venue chosen had the proper
jurisdiction and experience in handling complex intellectual property claims.
The court’s analysis demonstrated the strategic value o --- venue selection in IP
litigation.
This case highlights the importance o --- making care --- ul venue decisions early on.
Strategic venue choices can impact procedural advantages, such as access to special-
ized judges or the speed with which the case progresses.
6.9.2. Discovery, Protective Orders, and
Evidence Management
Discovery is a critical phase in trade secret litigation. Plainti ---
s and de — endants alike must be prepared to handle highly sensitive and con — idential in — ormation, and the management o — this data can determine whether the case proceeds smoothly or becomes bogged down in disputes over access and secrecy. Trade secret owners o — ten — ace the challenge o — ensuring that their con — idential materials remain protected
6406_Oranburg_Protecting Trade Secrets_1pp.indb 198 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 199
during discovery, particularly when they are shared with experts, consultants, or
opposing counsel.
A protective order is essential in these cases. Courts routinely issue protective
orders to ensure that con --- idential in --- ormation disclosed during discovery is not mis-
used or disclosed outside the bounds o --- the litigation. Protective orders can limit
access to speci --- ic individuals (such as attorneys or experts) and establish protocols
or how con — idential documents should be handled, stored, and destroyed. Plainti —
s seeking a protective order must typically demonstrate that the in — ormation quali — ies as a trade secret and that its disclosure would cause harm to their business. De — endants may seek to limit the plainti —
’s ability to review certain documents or restrict the plainti —
’s access to speci — ic con — idential in — ormation, arguing that the doc- uments are irrelevant or not properly protected under the trade secret claim. Courts are o — ten tasked with balancing the need — or — ull disclosure with the protection o — sen- sitive materials. This makes e —
ective evidence management a crucial aspect o — trade secret litigation. Plainti —
s must ensure that they can prove their trade secret status with admissible evidence while minimizing the risk o — improper disclosure.
Protective Orders Can Limit Disclosure
During Discovery
Bimbo Bakeries USA, Inc. v. Botticella
613 F.3d 102 (3d Cir. 2010)
In this case, Bimbo Bakeries sought to protect its trade secrets during dis-
covery in a case involving --- ormer employees who disclosed con --- idential busi-
ness plans. The court issued a protective order to limit the distribution o ---
con --- idential documents to a select group o --- experts and attorneys. The decision
rein --- orced the importance o --- managing sensitive materials during litigation to
prevent --- urther harm or misuse.
Bimbo Bakeries, an o --- t-cited case in trade secret law, highlights the practical neces-
sity o --- securing protective orders during discovery. A well-managed discovery process
helps ensure that con --- idential materials are not disclosed beyond the litigation team,
and it reduces the likelihood o --- inadvertent disclosure.
6.9.3. Summary Judgment and Early
Disposition
Trade secret cases are complex and o --- ten heavily reliant on --- actual disputes. How-
ever, there are instances where a case can be resolved be --- ore trial through summary
judgment. In trade secret litigation, summary judgment motions typically arise when
6406_Oranburg_Protecting Trade Secrets_1pp.indb 199 10/16/25 9:25 PM 200 6 • En — orcing Trade Secret Rights
one party argues that the plainti ---
has not met its burden o — proo — or that the de — en- dant’s actions do not quali — y as misappropriation under the law. Summary judgment motions are particularly important when the evidence is clear or when one party’s claims — ail to meet the necessary legal standards. For example, a plainti —
may — ail to identi — y a protectable trade secret, or a de — endant may dem- onstrate that they independently developed the alleged trade secret. In such cases, summary judgment can be used to eliminate claims that are — actually unsupported.
Plainti ---
s Must Prove Secrecy-i n-Fact to Survive Summary Judgment
Air --- acts, Inc. v. Amezaga
909 F.3d 84 (4th Cir. 2018)
In this case, the court granted summary judgment in --- avor o --- the de --- endant
because the plainti ---
had not demonstrated that its data quali — ied as a trade secret. The court emphasized that without adequate evidence showing that the data was treated as con — idential, the case could not proceed to trial. This decision illustrates the importance o — strong — actual evidence in trade secret litigation.
The Air --- acts case highlights how summary judgment can serve as a tool --- or de --- en-
dants in trade secret litigation. When plainti ---
s — ail to prove the basic elements o — trade secret protection, including secrecy and reasonable e —
orts to protect the in — ormation, courts may dismiss the claim be — ore trial.
6.9.4. Litigation Timing and Investigative
Coordination
In trade secret litigation, timing is crucial. Once a trade secret is misappropriated,
time is o --- the essence. The longer the de --- endant uses or discloses the trade secret, the
greater the harm to the plainti ---
’s competitive position. Plainti —
s must act quickly to preserve evidence and secure injunctions. Courts are more likely to grant injunc- tive relie — when the plainti —
can show that they acted swi — tly upon discovering the misappropriation. Timing is also important in managing the investigative process. Trade secret claims o — ten involve complex technical details, and both sides may rely on expert testimony to explain the value o — the trade secret and how it was misappropriated. Ensuring that investigations are thorough but not overly prolonged is critical to maintaining momentum in the litigation. Coordination among legal teams, — orensic experts, and
6406_Oranburg_Protecting Trade Secrets_1pp.indb 200 10/16/25 9:25 PM 6 • En — orcing Trade Secret Rights 201
internal stakeholders helps ensure that all relevant evidence is gathered and preserved
in a timely manner.
Unreasonable Delay Can Jeopardize
Injunctive Relie ---
Janssen Prods. L.P. v. Evenus Pharms. Labs. Inc.
85 F.4th 147 (3d Cir. 2023)
Janssen sought to recover misappropriated trade secrets related to drug
ormulation methods. However, the court — ound that Janssen had delayed its response and — ailed to take action quickly enough to mitigate the harm. This delay weakened its case — or immediate injunctive relie — . The court’s decision highlighted the importance o — timely litigation and investigation in protecting trade secrets.
The Janssen case underscores the critical role that timing plays in trade secret liti-
gation. Delays in taking action, especially in seeking protective relie --- or noti --- ying the
court o --- misappropriation, can signi --- icantly damage the plainti ---
’s chances o — success.
6.10. En --- orcement Plans as
Reasonable Steps
Trade secret en --- orcement is a dynamic process that hinges on both legal princi
ples and practical realities. Unlike intellectual property rights that are granted auto-
matically, trade secrets are only protected when the owner takes reasonable steps to
preserve their con --- identiality. The protection provided by the law is not absolute, and
the measures required to keep secrets sa --- e are not static — they evolve with the nature
o --- the in --- ormation, the business environment, and the relationships through which
the secrets --- low. En --- orcement o --- trade secret rights re --- lects not only the value o --- the
in --- ormation at issue but also the strength o --- the systems in place to sa --- eguard it.
In this chapter, we have explored the core tools --- or en --- orcing trade secrets: prov-
ing the existence o --- a trade secret, understanding the legal de --- initions o --- misappro-
priation, securing remedies through injunctive relie --- and damages, and managing
the strategic dynamics o --- the litigation process. We have also examined the proce-
dural hurdles that plainti ---
s — ace in ensuring that their claims survive early dismissal, including the necessity o — proving secrecy, value, and reasonable e —
orts to maintain con — identiality.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 201 10/16/25 9:25 PM 202 6 • En — orcing Trade Secret Rights
One key takeaway --- rom this chapter is that en --- orcement does not exist in a vac-
uum. The e ---
ectiveness o — a trade secret lawsuit is deeply connected to the protection e —
orts that precede it. The ability to prove a trade secret claim rests not just on legal arguments but also on the robustness o — the company’s protection system. Courts will evaluate whether the trade secret was treated as such at every stage, — rom internal policies to contractual agreements to the technical systems used to restrict access. When those protections are weak or inconsistent, even the most valid claim o — misap- propriation can — alter. As we transition to the next chapter, it is important to consider that trade secret protection is not just a legal issue. It is a strategic one — a combination o — legal — rame- works, technical in — rastructure, business policies, and company culture. Building a robust Trade Secret Protection Plan (TSPP) requires a multidisciplinary approach. The TSPP is not merely a set o — legal documents. It is a blueprint — or how a company treats its con — idential in — ormation. It involves clear communication across depart- ments; coordination among legal, technical, and business teams; and a commitment to upholding con — identiality at every level o — the organization.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 202 10/16/25 9:25 PM Chapter 7 The Living TSPP: Sustaining and Adapting Trade Secret Protection
Throughout this book, you have been building a house --- or your trade secrets: lay-
ing a --- oundation, erecting walls, and installing systems to keep your most valuable
knowledge secure. You have learned how to identi --- y secrets, assess risks, and imple-
ment sa --- eguards. You have dra --- ted policies, trained employees, and operationalized a
TSPP that works in practice. In short, you have acted as the builder and the technician
by making sure each circuit connects and every door locks.
Now, this chapter invites you to become the architect and the structural engineer.
It asks not just how trade secret protection works but also why it works. Why does the
law require “reasonable e ---
orts”? Why do courts — avor injunctions in some cases and damages in others? Why do some NDAs en — orce secrecy, while others collapse under scrutiny? These are not just philosophical questions. They de — ine the outer limits o —
what your TSPP can do.
Legal protection --- or trade secrets does not come --- rom --- ormality alone. It comes
rom courts’ seeing genuine, continuous e —
ort — and that standard is rooted in theory as much as practice. The “reasonable e —
orts” requirement, — or instance, re — lects pol- icy tradeo —
s between innovation and competition, — lexibility and — airness. Likewise, en — orcement strategy draws on — oundational debates about property rules and liability rules, while organizational design raises questions about whether secrecy is a control mechanism or a learned routine. This chapter introduces those debates, not as abstract theory but rather as the sca — -
olding behind the legal rules and business strategies you have already encountered. Each section sur — aces a core tension and then explores how courts, scholars, and organizations have tried to resolve it. You will meet in — luential voices in the — ield, — rom economists to doctrinal theorists, and see how their work shapes (and complicates) everyday decisions about NDAs, training, audits, and AI governance. By the end o — this chapter, you will not just know how to protect secrets — you will understand why some strategies work, why others back — ire, and how to cra — t a TSPP
203
6406_Oranburg_Protecting Trade Secrets_1pp.indb 203 10/16/25 9:25 PM 204 7 • Sustaining and Adapting Trade Secret Protection
that evolves with both law and context. You will be ready to lead the conversation, not
just --- ollow the checklist.
7.1. The Li --- ecycle o --- a TSPP:
Why Static Plans Fail
A Trade Secret Protection Plan (TSPP) is not a checklist to complete and --- ile away.
It is a living system that must evolve with your organization and adapt to new risks,
technologies, and business realities. The law recognizes this by requiring “reasonable
e ---
orts” to maintain secrecy — not just at the outset, but continuously over time. To understand why, we must look beyond black-letter law to the legal doctrines, economic incentives, and policy debates that shape trade secret protection across its li — ecycle. At the heart o — trade secret law is the principle that protection is not automatic. Courts require companies to take visible, active steps to sa — eguard their secrets — not as a — ormality but instead as a core doctrinal requirement. This emphasis on ongo- ing e —
ort is grounded in economic theory. Brian Love argues that trade secret law’s primary — unction is not simply to reward innovation but also to prevent — irms — rom relying on socially harm — ul sel — -help measures. Without legal recourse, companies might over-invest in secrecy or impose sweeping contractual restrictions that chill mobility and sti — le competition. The “reasonable e —
orts” standard encourages sys- tematic, transparent protection strategies that balance the interests o — innovators, competitors, and the public.
Theory in Tension
Does Trade Secret Law Incentivize or Chill Innovation?
Trade secret law is o --- ten de --- ended on incentive grounds: by allowing --- irms to
keep valuable know-how con --- idential, the law encourages investment in inno-
vation and knowledge creation. This logic is well-articulated in Landes and
Posner’s The Economic Structure o --- Intellectual Property Law, where
they describe trade secrets as a “second-best” mechanism --- or capturing returns
on innovation without the disclosure costs o --- patenting.
But that same logic has critics. David Levine and Joshua Sarno ---
argue that overbroad trade secret protection can create an “in — ormation paradox”:
irms may assert secrecy over in — ormation that should be disclosed, such as public health data or algorithmic bias, thereby undermining transparency,
6406_Oranburg_Protecting Trade Secrets_1pp.indb 204 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 205
competition, and accountability. In their view, trade secrecy can --- unction as a
regulatory shield impeding disclosure obligations that serve the public interest.
This tension has real implications --- or TSPP design. Should a --- irm treat all
business knowledge as protectable or reserve that label --- or genuinely propri-
etary innovations? The more aggressive the claim, the greater the legal risk,
especially i --- disclosure becomes necessary or compelled. A living TSPP must
walk this line: strong enough to protect valuable assets but mind --- ul o --- the
public- --- acing risks o --- overreach.
Levine and Sarno ---
’s work regards how trade secret law can undermine public interests, and it highlights the complexity o — the “in — ormation paradox”: it is o — ten impossible to determine whether in — ormation should be protected or disclosed with- out revealing it — irst. This dilemma sits at the heart o — many contemporary disputes,
rom biased algorithms to toxic spills. Courts and policymakers are more sensitive than ever to the risks o — overprotection, making vigilance and adaptability essential. Empirical work rein — orces these insights. Ivan Png’s study o — UTSA adoption — inds that stronger trade secret protections correlate with increased R&D investment in secrecy-intensive sectors. This evidence supports the view that robust TSPPs do more than check a box. They — uel innovation and rein — orce competitive advantage. To remain e —
ective, TSPPs must be treated as adaptive systems. They should be revisited a — ter business pivots, technology shi — ts, or leadership changes. Training must continue beyond onboarding, and organizations must establish — eedback channels to learn — rom incidents and near-misses. These are not “nice to haves.” They’re part o —
what makes a TSPP legally credible.
Consider a --- ast-growing startup. At --- irst, the --- ounders implement NDAs, restrict
access to code, and manage everything themselves. But as they scale, new hires arrive,
access spreads, and the original protocols --- ray. When litigation arises, a court --- inds
no consistent pattern o --- reasonable e ---
ort, and the company loses protection. This scenario is not uncommon. It shows that even strong initial controls will — ail without
ollow-through. By rooting your TSPP in both doctrine and economic logic, you move — rom rote compliance to strategic stewardship. You are not just en — orcing secrecy. You are build- ing an adaptive, de — ensible system that evolves with your organization.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 205 10/16/25 9:25 PM 206 7 • Sustaining and Adapting Trade Secret Protection
7.2. Property Rules, Liability Rules,
and En --- orcement Strategy
Trade secret law is distinguished not only by its requirement --- or ongoing protec-
tion but also by the nature o --- the remedies it provides. A --- oundational distinction, --- irst
articulated by Guido Calabresi and A. Douglas Melamed, divides legal entitlements
into property rules and liability rules. This --- ramework is essential --- or understanding
how courts en --- orce trade secret rights and how companies should design en --- orcement
strategies.
Property rules allow the owner to prevent unauthorized use through injunctive
relie --- . In trade secret law, this means that courts will o --- ten issue injunctions to stop
misappropriation, recognizing that once a secret is disclosed, its value may be irre-
trievably lost. The law’s pre --- erence --- or property rules re --- lects its concern with preserv-
ing exclusivity and the irreparable harm that can result --- rom disclosure.
Liability rules, by contrast, permit unauthorized use so long as the user pays com-
pensation. While trade secret doctrine generally de --- aults to property rules, liability
rules emerge in certain contexts: compulsory licensing during emergencies, strategic
business resolutions, or government-imposed access mandates. In such cases, courts
may award damages instead o --- blocking use altogether.
Remedy Design
Should Misappropriation Be Stopped
or Just Compensated?
Trade secret remedies operate on a spectrum between property rules
(injunctions barring use) and liability rules (damages --- or unauthorized use).
Calabresi and Melamed’s --- oundational --- ramework explains this dichotomy:
property rules protect exclusivity, while liability rules permit use with compen-
sation. In trade secret law, courts traditionally --- avor property rules — issuing
injunctions to prevent irreversible harm --- rom disclosure.
But this pre --- erence --- aces modern challenges. Levine and Sarno ---
argue that in public health crises (e.g., vaccine production shortages), liability rules should temporarily override secrecy to allow compulsory licensing o — trade secrets. Similarly, Mark Lemley notes that in — ast-moving tech markets, injunc- tions can sti — le — ollow-on innovation by locking competitors out o —
ounda- tional knowledge. For TSPP designers, the implication is strategic: anticipate when to seek exclusion and when to seek compensation. Property rules remain the de — ault
6406_Oranburg_Protecting Trade Secrets_1pp.indb 206 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 207
or core secrets — but liability rules may better serve the — irm when public inter- est demands access, when litigation lags behind market cycles, or when secrecy is only partially breached. In each case, en — orcement planning must re — lect both doctrinal realities and ethical considerations.
This distinction has direct implications --- or TSPP en --- orcement. Companies should
plan --- or swi --- t action to stop unauthorized use — knowing that courts generally --- avor
injunctions — but also prepare --- or liability-based outcomes in exceptional cases.
E ---
ective strategy requires documenting misappropriation clearly and early, selecting
orums that align with en — orcement goals, and evaluating whether monetary remedies may sometimes serve business or public needs better than exclusion. Recent scholarship has explored the boundaries o — this — ramework. Levine and Sarno —
, — or example, argue — or broader use o — liability rules in cases where secrecy thwarts urgent public needs — like access to pharmaceutical know-how or environ- mental disclosures. Their work underscores the need — or — lexibility and ethical sensi- tivity in trade secret en — orcement. By grounding en — orcement in this property/liability — ramework, TSPPs become not only more doctrinally sound but also more responsive to real-world risk and opportunity. The goal is not simply to protect secrets at all costs but to deploy legal tools strategically, in ways that align with both legal trends and market realities.
7.3. The Contract–Trade Secret
Inter --- ace
Trade secret protection is deeply intertwined with the use o --- contracts, which serve
as both evidence o --- protection e ---
orts and substantive tools — or de — ining rights and obligations. Deepa Varadarajan’s scholarship provides a — oundational — ramework — or understanding this complex relationship by showing how contracts shape and are shaped by trade secret doctrine. Unlike patents, which are publicly registered, trade secrets gain legal recognition in part through contractual signals that demarcate con-
idential in — ormation. Well-dra — ted contracts identi — y speci — ic secrets, establish clear duties — or recipients, and create an evidentiary trail that proves reasonable protection e —
orts. Courts increasingly rely on such contracts as objective proo — that in — ormation was treated as secret and thus satis — ies the “reasonable e —
orts” requirement under the UTSA. Recent empirical work by Camilla Hrdy and Christopher Seaman highlights a trou- bling trend: many nondisclosure agreements (NDAs) — unction as de — acto noncom- petes by prohibiting the use or disclosure o — in — ormation — ar beyond what is legally
6406_Oranburg_Protecting Trade Secrets_1pp.indb 207 10/16/25 9:25 PM 208 7 • Sustaining and Adapting Trade Secret Protection
protectable as a trade secret. Their analysis o ---
ederal cases reveals that a substantial majority o — NDAs contain no temporal or geographic limits, cover “any in — ormation disclosed” rather than genuine secrets, and impose injunctive relie — and attorneys’ — ees
or breaches. Such overbroad contracts risk invalidation under emerging legal stan- dards, and the Federal Trade Commission’s 2023 rule banning noncompetes explicitly warns that NDAs may be scrutinized as unlaw — ul restraints on trade i — they e —
ectively prevent workers — rom seeking employment.
Private Agreements
Tools --- or Trade Secret Protection or Unlaw --- ul
Restraints on Trade?
Contracts play a pivotal role in trade secret protection, but what exactly
do they do? Deepa Varadarajan argues that con --- identiality agreements serve
a critical notice --- unction: they de --- ine what counts as a trade secret, establish
expectations o --- con --- identiality, and provide objective evidence that the in --- or-
mation was treated as valuable and secret. On this view, contracts help satis --- y
the “reasonable e ---
orts” requirement under the Uni — orm Trade Secrets Act not by replacing the statute but rather by rein — orcing it. But what happens when contracts go too — ar? Camilla Hrdy and Chris- topher Seaman’s empirical analysis o — over 100 — ederal NDA cases reveals widespread overreach. Many agreements prohibit the use or disclosure o — any in — ormation, lack temporal or geographic limits, and automatically impose injunctive relie — — even when the in — ormation would not quali — y as a trade secret under law. Such terms, they argue, risk trans — orming NDAs into de — acto noncompetes that chill employee mobility and undermine the legitimacy o —
trade secret en --- orcement.
TSPP implication: The contract–trade secret inter --- ace must be tight but not
taut. Strong NDAs support trade secret claims, but overbroad ones invite legal
challenges, regulatory scrutiny, and employee resistance. Practitioners should
ensure that agreements track real secrets, use de --- ensible language, and evolve
with doctrine and en --- orcement trends.
These contractual tensions are especially acute when secrecy claims intersect with
employee mobility — a --- lashpoint --- or courts, policymakers, and practitioners alike.
See box.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 208 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 209
Secrecy and Mobility
Where Do a Company’s Rights End and
an Employee’s Rights Begin?
Trade secret law protects --- irms. But what about the people who power them?
The tension between secrecy and labor mobility lies at the heart o --- modern
innovation policy. Camilla Hrdy argues that secrecy creates value by enabling
irms to commercialize ideas without disclosure, but it can also chill mobility and sti — le knowledge spillovers that drive innovation ecosystems. Deepa Varadarajan similarly warns that overreliance on secrecy, especially when coupled with broad NDAs and noncompetes, can morph into a tool — or employee lock-in. Courts have long struggled with the inevitable disclosure doctrine, where employers seek to block — ormer employees — rom working — or competitors on the theory that they’ll “inevitably” use trade secrets. While some courts accept this logic, others see it as an end-run around employment
reedom. For TSPP design, the message is clear: trade secret en — orcement should not become a proxy — or unlaw — ul labor restrictions. NDAs should be narrowly tai- lored to actual secrets, not to generalized experience, and should avoid language that implies permanent in — ormation ownership. Managers must be trained to distinguish between law — ul protection and anti-competitive constraints. The best de — ense is o — ten clarity — — irms must de — ine what is protectable, document what is disclosed, and respect what employees legitimately carry with them: their skills, memories, and know-how.
In practice, organizations must care --- ully navigate the contract–trade secret inter-
ace to ensure their protection strategies are both legally de — ensible and operationally e —
ective. This means dra — ting contracts that are precise in their de — initions, tailored to genuine trade secrets, and regularly reviewed to avoid overreach. It also means educating employees about their obligations and the limits o — con — identiality, and maintaining clear documentation o — all protection e —
orts. The goal is to rein — orce statutory trade secret boundaries rather than attempt to expand them beyond what the law will support. Consider, — or example, a so — tware company protecting its AI training method- ologies. Rather than relying on blanket NDAs, it implements a tiered approach to con — identiality agreements, with di — — erent levels o — restriction based on the sensitivity and business value o — the in — ormation. Public algorithms might be unrestricted, pro- prietary datasets subject to limited use prohibitions, and core architecture protected
6406_Oranburg_Protecting Trade Secrets_1pp.indb 209 10/16/25 9:25 PM 210 7 • Sustaining and Adapting Trade Secret Protection
by permanent nondisclosure provisions. Dynamic annexes listing current secrets
and sunset provisions --- or expiring restrictions help ensure that contracts remain
aligned with both legal requirements and business needs. This approach exempli --- ies
Varadarajan’s ideal o --- contracts that “rein --- orce rather than replace” statutory trade
secret boundaries.
Key TSPP contract practices include dra --- ting contracts with precise de --- initions o ---
trade secrets and clear duties --- or recipients, regularly auditing and updating con --- iden-
tiality agreements to avoid overreach, educating employees on their obligations and
the limits o --- con --- identiality, and maintaining documentation o --- all protection e ---
orts to satis — y evidentiary requirements.
7.4. Organizational Culture and
Continuous Improvement
Trade secret protection cannot be sustained by legal doctrine and contracts alone.
The most robust Trade Secret Protection Plans (TSPPs) are those that are embed-
ded within the organizational culture, supported by leadership, and continuously
improved through --- eedback and adaptation. Recent scholarship in management sci-
ence and organizational behavior underscores the importance o --- culture, routines,
and incentives in making secrecy a living process rather than a static set o --- rules.
Leadership plays a pivotal role in setting the tone --- or trade secret protection.
When executives and managers consistently signal the importance o --- con --- idential-
ity — through their words, actions, and resource allocation — employees are more
likely to internalize the value o --- secrecy and adhere to established protocols. This
cultural rein --- orcement is o --- ten more e ---
ective than — ormal policies alone, as it cre- ates a shared understanding and collective responsibility — or protecting sensitive in — ormation. Continuous improvement is another hallmark o — e —
ective TSPPs. Organizations must create — eedback loops that allow employees to report concerns, suggest improve- ments, and learn — rom incidents or near-misses. Regular audits, training sessions, and “a — ter-action” reviews o — breaches or vulnerabilities help ensure that protection strate- gies remain current and responsive to changing circumstances. Ionela Andreicovici, Sara Bormann, and Katharina Hombach’s research demonstrates that strong trade secret en — orcement can actually — acilitate internal in — ormation sharing by reducing the perceived risk o — leaks, thus leading to greater integration and better decision- making within the — irm. This — inding challenges the assumption that secrecy neces- sarily leads to organizational silos; instead, it suggests that a well-designed TSPP can balance con — identiality with the need — or collaboration and innovation.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 210 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 211
Organizational Culture o --- Secrecy
Legal Shield or Dynamic Capability?
What makes a Trade Secret Protection Plan (TSPP) stick? Many companies
treat secrecy as a compliance matter — write the NDA, limit access, check the
box. But organizational scholars argue that lasting protection comes not --- rom
static controls but --- rom secrecy-as-capability: a routinized, adaptive practice
woven into the --- abric o --- how --- irms operate.
Oleksandra Ozcan and colleagues argue that trade secret protection should
be understood as a --- orm o --- dynamic capability — a --- irm’s ability to sense risks,
seize opportunities, and recon --- igure internal processes in response to change.
On this view, secrecy is not a static shield; it is an organizational routine that
evolves through training, re --- lection, and learning --- rom incidents.
A related study by Ionela Andreicovici, Sara Bormann, and Katharina Hom-
bach challenges the assumption that secrecy sti --- les collaboration. Their empiri-
cal research shows that robust trade secret en --- orcement can enhance internal
in --- ormation sharing by reducing --- ear o --- leaks, thereby enabling greater integra-
tion across departments. Instead o ---
ostering silos, a well-designed TSPP builds trust, clari — ies expectations, and supports knowledge — low. For TSPP implementation, the implication is clear: Secrecy must be lived, not just documented. This means investing in onboarding, recurring training, incident debrie — s, and leadership modeling. It also means designing systems that support transparency within the — irm while keeping sensitive material insulated — rom external threats. In short: to protect secrets, build habits.
Yet strong culture alone is not enough. As organizations grow, routines that once
ensured secrecy can erode, thus raising the stakes --- or scale-conscious design.
Secrecy at Scale
Can Trade Secret Protection Plans Survive
Organizational Growth?
Building a TSPP is hard. Scaling it is harder. As --- irms grow — especially
through hiring, acquisitions, remote work, or international expansion — sys-
tems that once worked can quietly --- ail. Trade secrets may be documented but
not updated, or disclosed to vendors without proper controls, or --- orgotten by
new managers --- ocused on speed over structure.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 211 10/16/25 9:25 PM 212 7 • Sustaining and Adapting Trade Secret Protection
Organizational research shows that rapid growth increases the likelihood o ---
“protection gaps”: inconsistencies in training, contract en --- orcement, or access
controls that undermine legal protection. Even companies with strong startup
protocols o --- ten see these systems degrade under the pressure o --- scaling, espe-
cially when legal teams lag behind hiring or product expansion.
Andreicovici, Bormann, and Hombach’s empirical study reveals that secrecy
en --- orcement can actually --- oster internal in --- ormation sharing — but only when
irms proactively manage integration. This supports a key insight — rom Ozcan et al.: secrecy routines must evolve alongside the — irm’s dynamic capabilities. What worked with 20 engineers and 1 — ounder-lawyer may collapse at 200 employees across 3 countries. The lesson — or TSPPs is simple but vital: growth is a vulnerability. Trade secret protection must scale with systems, not individuals. That means updat- ing contracts during onboarding surges, re — reshing access protocols a — ter reorgs, and auditing cultural gaps between legacy teams and new hires. The best secrecy plans are modular, adaptable, and built — or institutional — not just
ounder-level — memory.
In short, leaders must model con --- identiality, organizations must invest in continual
eedback and training, and protection plans must balance secrecy with collabora- tion. When these principles are embedded into organizational routines, trade secret protection becomes more than just a legal obligation. It becomes a durable source o —
competitive advantage.
7.5. Technology, Globalization, and
Emerging Challenges
The landscape o --- trade secret protection is being reshaped by rapid advances in
technology and the increasing globalization o --- business. These developments intro-
duce new risks, complicate en --- orcement, and require organizations to continuously
adapt their Trade Secret Protection Plans (TSPPs) to remain e ---
ective. Camilla Hrdy’s recent work on generative AI illustrates how digital trans — ormation is creating novel challenges — or trade secret law and practice. Companies are now grappling with the risks o — inadvertent disclosure through AI tools, the need to protect AI-generated outputs that may not quali — y — or other — orms o — intellectual property protection, and the use o — restrictive contracts to sa — eguard technology even when traditional legal protections — all short. This evolving environment demands that TSPPs include robust technical controls, such as encryption, access logs, and closed-source architectures,
6406_Oranburg_Protecting Trade Secrets_1pp.indb 212 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 213
alongside clear contractual terms that de --- ine permissible and impermissible uses o ---
sensitive in --- ormation.
Secrecy with Arti --- icial Intelligence
Can Firms Leverage Innovative Technologies Without
Giving Up Intellectual Property Rights?
Can you keep a secret — when your algorithm cannot? As generative AI
trans --- orms business operations, it also exposes --- ault lines in trade secret doc-
trine. Camilla Hrdy warns that AI systems both rely on and produce trade
secrets, but their opacity raises hard questions: How do we protect the data that
trains the model, the model itsel --- , and its outputs, especially when disclosure
is integral to their use?
Hrdy identi --- ies a doctrinal gap: Trade secret law demands reasonable
e ---
orts to maintain secrecy, yet AI tools are o — ten integrated into cloud-based work — lows or accessed through third-party APIs, especially when tools are embedded in external plat — orms or accessed via cloud vendors outside the
irm’s control. This makes traditional con — identiality measures — ragile, i — not impossible. When models “leak” outputs or training data, courts may con- clude that no secret was e —
ectively kept. In response, companies increasingly turn to restrictive licenses or end-user agreements to compensate — or legal gaps — which raises concerns that private governance may override demo cratic accountability. This doctrinal uncertainty echoes broader policy debates. Mark Lemley cau- tions that courts should be skeptical o — “secrecy through obscurity” — particu- larly when AI systems produce outputs with signi — icant social consequences, such as hiring recommendations or predictive policing. In such contexts, trans- parency and accountability may outweigh the interests o — secrecy. For TSPP designers, the implication is clear: secrecy strategies must now account — or technical realities, legal ambiguities, and growing public demand
or explainability. Rather than treating AI-generated assets as wholly private and controllable, — irms should clari — y what in — ormation is genuinely protect- able, adopt sa — eguards that match deployment environments, and be pre- pared to justi — y their secrecy claims when systems a —
ect rights, markets, or reputations.
Globalization --- urther complicates the picture. As --- irms expand across borders,
they must navigate a patchwork o --- legal regimes with di ---
ering standards — or trade secret protection, en — orcement mechanisms, and cultural attitudes toward secrecy.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 213 10/16/25 9:25 PM 214 7 • Sustaining and Adapting Trade Secret Protection
Marta Arroyabe and colleagues’ empirical research on mergers and acquisitions
shows that while strong trade secret protection can make companies more attractive
to domestic buyers, it may also create in --- ormation asymmetries that deter --- oreign
acquirers, who may pre --- er minority investments or additional sa --- eguards to mitigate
risk. These --- indings highlight the importance o --- tailoring TSPPs to the speci --- ic legal
and business environments in which a --- irm operates, and o --- ensuring that protec-
tion strategies are communicated clearly to partners, suppliers, and employees across
jurisdictions.
Globalization and Risk
Can International Firms Protect Trade Secrets Across Legal
Borders?
In a global economy, trade secrets do not stay put. They cross borders with
employees, contractors, suppliers, and servers — o --- ten --- aster than legal protec-
tions can --- ollow. For companies operating internationally, the biggest challenge
is legal asymmetry: what counts as a protectable secret and how it is en --- orced
varies dramatically across jurisdictions.
Empirical research by Marta Arroyabe and colleagues illustrates this chal-
lenge in the M&A context. Their --- indings show that stronger trade secret
regimes can both attract and deter investment: domestic buyers value secrecy
en --- orcement, but --- oreign acquirers may avoid deals i --- legal uncertainty or dis-
closure risks create asymmetries in bargaining power or integration. Secrecy,
in other words, a ---
ects deal structure. Comparative scholars, like Tanya Aplin and Jorge Contreras, also high- light diverging approaches. The US model, especially post-DTSA, emphasizes aggressive en — orcement and broad injunctions. In contrast, EU regimes o — ten weigh secrecy against transparency, competition, and labor rights. China’s recent re — orms increase penalties — or the — t but still lack procedural parity, which raises due process concerns — or — oreign — irms. Implication — or TSPPs: Global — irms must design protection plans that travel well. This means mapping legal environments in every country o — operation, tailoring controls and contracts to local norms and en — orceability, and central- izing en — orcement readiness. A strong home jurisdiction strategy can serve as a legal anchor, even when misappropriation occurs abroad.
Internal in --- ormation integration is another area where technology and globaliza-
tion intersect. Andreicovici, Bormann, and Hombach’s work demonstrates that robust
trade secret en --- orcement can actually enhance internal collaboration by reducing
6406_Oranburg_Protecting Trade Secrets_1pp.indb 214 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 215
the perceived risk o --- leaks, thus allowing employees to share knowledge more --- reely
within the organization. Modern IT systems, such as enterprise management plat-
orms with secure access controls, enable — irms to balance the need — or secrecy with the bene — its o — internal transparency and innovation. This approach is particularly valuable — or multinational companies, where in — ormation must — low e —
iciently across geographically dispersed teams while remaining protected — rom external threats. In summary, the combined — orces o — digital trans — ormation and legal asymmetry demand that TSPPs be not only secure but also portable and explainable. They must be able to withstand both technical disruption and global legal complexity. By design- ing protection plans that anticipate new risks, accommodate diverse legal environ- ments, and leverage technological solutions, — irms can ensure that their most valuable assets remain protected in an increasingly complex and interconnected world.
7.6. Synthesis: The Living TSPP
The preceding sections have demonstrated that sustaining a Trade Secret Protec-
tion Plan (TSPP) is not a matter o --- dra --- ting a single document or implementing a set
o --- static controls. Instead, it is a dynamic, living process that must evolve with the
organization, its environment, and the broader legal and technological landscape. This
synthesis weaves together the doctrinal, economic, organizational, and operational
insights that make a TSPP not just legally de --- ensible but also strategically essential.
At the core o --- trade secret law is the requirement --- or “reasonable e ---
orts” to main- tain secrecy — a standard that is inherently dynamic and context-dependent. As Sha- ron Sandeen and others have shown, this requirement re — lects a deliberate policy choice: trade secrets are not protected in the abstract but rather only when the owner demonstrates ongoing vigilance and adaptation. The law does not reward mere intent; it requires visible, consistent action. Yet what counts as “reasonable” is — ar — rom set- tled. See Box.
The “Reasonable E ---
orts” Doctrine
Flexible Standard or Unpredictable Risk?
What counts as “reasonable e ---
orts” to protect trade secrets? The statute is — amously vague, leaving courts signi — icant discretion to decide whether a company’s sa — eguards are su —
icient to trigger legal protection. Traditionally, courts looked — or evidence o — access controls, NDAs, and training programs. But recent cases show a growing divergence: some courts apply the standard
lexibly, adapting to modern business realities, while others demand rigorous
ormalities, creating uncertainty — or — irms.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 215 10/16/25 9:25 PM 216 7 • Sustaining and Adapting Trade Secret Protection
Sharon Sandeen argues that this ambiguity is not a bug but a --- eature. The
“reasonable e ---
orts” standard is context-sensitive by design, meant to balance
lexibility — or innovators with — airness to third parties. Yet that very — lexibility creates risk. As Camilla Hrdy notes, what quali — ies as “reasonable” may shi — t as norms evolve or high-pro — ile breaches raise judicial expectations. Courts have become more skeptical o — boilerplate policies and more attentive to implementa- tion: a pristine NDA is no substitute — or sloppy onboarding or ignored training. Meanwhile, AI-driven compliance systems and data-loss prevention tools are reshaping what courts might expect. I — technical sa — eguards are widely available but not used, is that still “reasonable”? As expectations rise, what was de — ensible yesterday may be de — icient tomorrow. Implication — or TSPP design: The “reasonable e —
orts” threshold is a moving target. Protection plans must be tailored, documented, and — above all — lived. Judges are increasingly asking not just what rules were written but also how they were applied. To — uture-proo — your secrets, treat compliance as an evolving conversation, not a checklist.
Economically, trade secret protection is justi --- ied as a means o --- encouraging inno-
vation by allowing companies to capture the value o --- their investments in knowl-
edge and know-how. Landes and Posner’s analysis underscores that trade secrecy is
a “second-best” mechanism --- or innovation, one that balances the need --- or disclosure
and competition with the value o --- secrecy. Further supporting this view is recent
empirical work by Ivan Png demonstrating that stronger trade secret protection
leads to increased R&D investment in sectors where secrecy is most valuable. This
eedback loop — where robust protection encourages innovation, and innovation in turn increases the value o — protection — rein — orces the importance o — a living, evolv- ing TSPP. From an organizational perspective, the e —
ectiveness o — a TSPP depends on its integration into the daily rhythms and culture o — the company. Oleksandra Ozcan and colleagues emphasize that trade secret strategies must be treated as part o — a — irm’s dynamic capabilities because they require continuous sensing o — threats, seizing o —
opportunities, and recon --- iguring o --- resources. Ionela Andreicovici, Sara Bormann,
and Katharina Hombach’s research adds that strong trade secret en --- orcement can
actually --- acilitate internal in --- ormation sharing by reducing the perceived risk o --- leaks,
which can lead to greater integration and better decision-making within the --- irm. This
challenges the assumption that secrecy necessarily leads to silos; instead, it suggests
that a well-designed TSPP can balance con --- identiality with the need --- or collaboration
and innovation.
The contract–trade secret inter --- ace --- urther illustrates the importance o --- ongoing
adaptation. Deepa Varadarajan’s work highlights how contracts serve both evidentiary
6406_Oranburg_Protecting Trade Secrets_1pp.indb 216 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 217
and substantive roles in trade secret law and create a web o --- obligations that courts
scrutinize when assessing whether secrecy was maintained. Camilla Hrdy and Chris-
topher Seaman’s empirical analysis warns against the overuse o --- nondisclosure agree-
ments that --- unction as de --- acto noncompetes, underscoring the need --- or contracts
that are precise, tailored, and regularly reviewed to avoid overreach.
Technological change and globalization add --- urther layers o --- complexity. Camilla
Hrdy’s analysis o --- generative AI and digital trans --- ormation shows how new technolo-
gies introduce novel risks and require updated protection strategies. Marta Arroyabe
and colleagues’ research on mergers and acquisitions demonstrates that strong trade
secret protection can make companies more attractive to domestic buyers but also
may create in --- ormation asymmetries that deter --- oreign acquirers, highlighting the
need --- or tailored, context-sensitive protection strategies.
In practice, these insights mean that a TSPP must be both robust and --- lexible. It
must be grounded in a clear understanding o --- what in --- ormation is valuable and why
and be implemented through a combination o --- technical, legal, and cultural controls.
It must be regularly reviewed and updated to re --- lect changes in the business, the legal
environment, and the threat landscape. And it must be embedded in the culture o ---
the organization so that protection is not just a compliance exercise but a shared
responsibility.
Across the literature and doctrine, a set o --- recurring tensions emerges: the need
to balance secrecy and disclosure, to align statutory baselines with contractual sa --- e-
guards, to promote innovation without chilling competition, and to protect employer
interests without restricting employee mobility. These tensions are not --- laws in the
system — they are the design. They re --- lect the policy tradeo ---
s and institutional judg- ments that give trade secret law its shape. They also re — lect the real-world complexity
aced by organizations that operate across borders, integrate new technologies, and rely on intangible knowledge as a core asset. Ultimately, a living TSPP is not a checklist or a — ormality. It is a strategic response to the law’s demand — or visible, continuous e —
ort. It is a system that evolves with the organization, learns — rom experience, and is sustained by the people who live it. By grounding your protection plan in these legal, economic, organizational, and ethical principles, you move beyond compliance and into stewardship, where you can build a trade secret strategy that is not only de — ensible but also durable.
Conclusion: The Partner-Level Mindset
As you reach the end o --- this chapter, re --- lect on the path you have taken — --- rom
the concrete work o --- building a Trade Secret Protection Plan to the exploration o ---
deeper --- oundations o --- law, economics, organizational design, and strategic --- oresight.
The shi --- t --- rom practice to theory is not just academic. It marks the di ---
erence between executing instructions and leading with purpose.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 217 10/16/25 9:25 PM 218 7 • Sustaining and Adapting Trade Secret Protection
A living TSPP is not a static document or compliance checklist. It is a dynamic
system that evolves with your business, anticipates new risks, and withstands legal
scrutiny. Its strength lies in continuous attention and adaptation. It is grounded in the
law’s demand --- or “reasonable e ---
orts,” shaped by policy choices and incentive struc- tures, and sustained by culture, governance, and technical systems. This chapter has invited you to step into the role o — architect — where you are not just wiring the circuits but designing the structure. You now understand why the
oundation matters, what pressures it must bear, and how its integrity a —
ects every thing above it. With this knowledge, you are prepared to engage in partner-level conversations that shape not simply policies, compliance, and protection but also strategy, leadership, and stewardship.
Re --- erences
Sharon K. Sandeen, The Evolution o --- Trade Secret Law and Why Courts Commit
Error When They Do Not Follow the Uni --- orm Trade Secrets Act, 33 Hamline L. Rev.
493 (2010).
Guido Calabresi & A. Douglas Melamed, Property Rules, Liability Rules, and
Inalienability: One View o --- the Cathedral, 85 Harv. L. Rev. 1089 (1972).
Oleksandra Ozcan, David Pickernell, & Paul Trott, A Trade Secrets Framework and
Strategic Approaches, IEEE Transactions on Eng’g Mgmt. (2023), https://doi.org
/10.1109/TEM.2023.3285292.
Ionela Andreicovici, Sara Bormann, & Katharina Hombach, Trade Secret Protec-
tion and the Integration o --- In --- ormation Within Firms, TRR 266 Working Paper No. 78
(2023), https://dx.doi.org/10.2139/ssrn.3881395.
Tun-Jen Chiang, The Economic Structure o --- Trade Secret Law, George Mason L. &
Econ. Res. Paper No. 25-03 (2024), https://dx.doi.org/10.2139/ssrn.4942344.
William M. Landes & Richard A. Posner, The Economic Structure o --- Intel-
lectual Property Law (Harv. Univ. Press 2003).
David S. Levine & Joshua D. Sarno ---
, Compelling Trade Secret Sharing, 74 Hast- ings L. J. 987 (2023). I. P. L. Png, Secrecy and Patents: Theory and Evidence — rom the Uni — orm Trade Secrets Act, 2(3) Strategy Science 176–93, https://doi.org/10.1287/stsc.2017.0035. Mark A. Lemley, The Surprising Virtues o — Treating Trade Secrets as IP Rights, 61 Stan. L. Rev. 311 (2010). Deepa Varadarajan, The Trade Secret–Contract Inter — ace, 103 Iowa L. Rev. 1543 (2018). Camilla A. Hrdy & Christopher B. Seaman, Beyond Trade Secrecy: Con — identiality Agreements That Act Like Noncompetes, 133 Yale L.J. 669 (2024).
6406_Oranburg_Protecting Trade Secrets_1pp.indb 218 10/16/25 9:25 PM 7 • Sustaining and Adapting Trade Secret Protection 219
Camilla A. Hrdy, The Value in Secrecy, 91 Fordham L. Rev. 129 (2022).
Charles Tait Graves, Intentionality in Trade Secret Law, 39 Berkeley Tech. L. J. 721
(2024), https://doi.org/10.15779/Z38000018N.
Camilla A. Hrdy, Keeping ChatGPT a Trade Secret While Selling It Too, 40 Berke-
ley Tech. L.J. 75 (2025), https://doi.org/10.15779/Z38FT8DM21.
Christopher Bucca --- usco, Jonathan S. Masur, & Deepa Varadarajan, Trade Secrecy’s
In --- ormation Paradox, 100 Notre Dame L. Rev ___ ( --- orthcoming 2025), https://dx
.doi.org/10.2139/ssrn.4909857.
Camilla A. Hrdy, Christopher Bucca --- usco, Jonathan S. Masur, & Deepa Varada-
rajan, Does Trade Secrecy Have an “In --- ormation Paradox”?, Rutgers Inst. --- or In --- o.
Pol’y & L. (2025), https://perma.cc/PRN9-2ENV.
Marta F. Arroyabe, Christopher Grimpe, & Katrin Hussinger, Sa --- eguarding Secrets,
Shaping Acquisitions: Trade Secret Protection and the Role o --- Distance Between Acquirer
and Target, ZEW — Ctr. --- or European Econ. Res. Discussion Paper No. 25-007 (2025),
https://dx.doi.org/10.2139/ssrn.5116418.
Tanya Aplin, The Inter --- ace Between Trade Secrets and Freedom o --- Expression:
A Comparative Perspective, in The Law o --- Trade Secrets (Rochelle C. Drey --- uss
& Katherine J. Strandburg eds., Edward Elgar Publ’g 2d ed. 2020).
Jorge L. Contreras, Trade Secret, Concurrences Global Dictionary o --- Com-
petition Law (2023).
6406_Oranburg_Protecting Trade Secrets_1pp.indb 219 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 220 10/16/25 9:25 PM Epilogue
Trade secret law is easy to underestimate. It lacks the dramatic disclosures o --- patent
prosecution, the public visibility o --- trademarks, or the rhetorical --- orce o --- copyright
in --- ringement. It rarely commands headlines. And yet, in practice, it governs some o ---
the most critical and contested knowledge in the modern economy.
What makes trade secret law power --- ul is also what makes it quiet. It protects not
what is made public but rather what is kept back. It rewards diligence over disclosure,
continuity over --- ormality. And it re --- lects a core insight about innovation in real li --- e:
that many o --- the most valuable ideas are not made in the lab or --- iled in the PTO.
Rather, they are developed in --- ormally, iterated privately, and sa --- eguarded through
shared e ---
ort and institutional design. This book aims to bridge two domains: the legal doctrine that de — ines trade secret misappropriation and the organizational realities that shape how secrecy is main- tained. The result is a body o — law that demands both theoretical precision and practi- cal engagement. It is doctrinally rich, culturally contingent, and deeply embedded in the structures o — trust, discretion, and control that govern economic li — e. Students o — trade secret law must learn to think in multiple registers. They must read cases with care but also ask how those disputes arose: what broke down inside the company, what assumptions were unexamined, what controls — ailed, and what stories convinced the court. They must learn to advise clients not just on litigation risk but also on in — ormation architecture. They must see law as a living constraint — and a
ramework — or proactive design. The — uture o — trade secret law will not be determined solely in courtrooms. It will be shaped in boardrooms, design studios, codebases, supply chains, and Zoom calls. It will depend on how companies manage internal knowledge, how they govern external collaborations, and how they adapt to emerging threats that legal doctrine may not yet — ully anticipate. What this area o — law demands, more than anything, is judgment. Judgment about what is worth protecting. Judgment about how to protect it. And judgment about what trade secret law is truly trying to preserve — not secrecy — or its own sake but rather the integrity o — innovation in a world where trust is scarce and knowledge moves — ast. That is the work. And that is the invitation.
221
6406_Oranburg_Protecting Trade Secrets_1pp.indb 221 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 222 10/16/25 9:25 PM Appendix A [New Hampshire] Uni — orm Trade Secrets Act
1. De --- initions
As used in this chapter, unless the context requires otherwise:
I. “Improper means” includes the --- t, bribery, misrepresentation, breach or induce-
ment o --- a breach o --- a duty to maintain secrecy, or espionage through electronic or
other means.
II. “Misappropriation” means:
(a) Acquisition o --- a trade secret o --- another by a person who knows or has reason
to know that the trade secret was acquired by improper means; or
(b) Disclosure or use o --- a trade secret o --- another without express or implied
consent by a person who:
(1) Used improper means to acquire knowledge o --- the trade secret; or
(2) At the time o --- disclosure or use, knew or had reason to know that his
knowledge o --- the trade secret was derived --- rom or through a person who
had utilized improper means to acquire it; or acquired under circum-
stances giving rise to a duty to maintain its secrecy or limit its use; or
derived --- rom or through a person who owed a duty to the person seek-
ing relie --- to maintain its secrecy or limit its use; or
(3) Be --- ore a material change o --- his position, knew or had reason to know
that it was a trade secret and that knowledge o --- it had been acquired by
accident or mistake.
III. “Person” means a natural person, corporation, business trust, estate, trust,
partnership, association, joint venture, government, governmental subdivision or
agency, or any other legal or commercial entity.
IV. “Trade secret” means in --- ormation, including a --- ormula, pattern, compilation,
program, device, method, technique, or process, that:
(a) Derives independent economic value, actual or potential, --- rom not being
generally known to, and not being readily ascertainable by proper means
223
6406_Oranburg_Protecting Trade Secrets_1pp.indb 223 10/16/25 9:25 PM 224 Appendix A
by, other persons who can obtain economic value --- rom its disclosure or use;
and
(b) Is the subject o --- e ---
orts that are reasonable under the circumstances to main- tain its secrecy.
2. Injunctive Relie ---
I. Actual or threatened misappropriation may be enjoined. Upon application to
the court, an injunction shall be terminated when the trade secret has ceased to exist,
but the injunction may be continued --- or an additional reasonable period o --- time in
order to eliminate commercial advantage that otherwise would be derived --- rom the
misappropriation.
II. In exceptional circumstances, an injunction may condition --- uture use upon
payment o --- a reasonable royalty --- or no longer than the period o --- time --- or which use
could have been prohibited. Exceptional circumstances include, but are not limited to,
a material and prejudicial change o --- position prior to acquiring knowledge or reason
to know o --- misappropriation that renders a prohibitive injunction inequitable.
III. In appropriate circumstances, a ---
irmative acts to protect a trade secret may be compelled by court order.
3. Damages
I. Except to the extent that a material and prejudicial change o --- position prior
to acquiring knowledge or reason to know o --- misappropriation renders a monetary
recovery inequitable, a complainant is entitled to recover damages --- or misappropria-
tion. Damages can include both the actual loss caused by misappropriation and the
unjust enrichment caused by misappropriation that is not taken into account in com-
puting actual loss. In lieu o --- damages measured by any other methods, the damages
caused by misappropriation may be measured by imposition o --- liability --- or a reason-
able royalty --- or a misappropriator’s unauthorized disclosure or use o --- a trade secret.
II. I --- will --- ul and malicious misappropriation exists, the court may award exem-
plary damages in an amount not exceeding twice any award made under paragraph I.
4. Attorneys’ Fees
The court may award reasonable attorneys’ --- ees to the prevailing party when:
I. A claim o --- misappropriation is made in bad --- aith;
II. A motion to terminate an injunction is made or resisted in bad --- aith; or
III. Will --- ul and malicious misappropriation exists.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 224 10/16/25 9:25 PM Appendix A 225
5. Preservation o --- Secrecy
In an action under this chapter, a court shall preserve the secrecy o --- an alleged
trade secret by reasonable means, which may include granting protective orders in
connection with discovery proceedings, holding in-camera hearings, sealing the rec
ords o --- the action, and ordering any person involved in the litigation not to disclose
an alleged trade secret without prior court approval.
6. Statute o --- Limitations
An action --- or misappropriation shall be brought within 3 years a --- ter the misap-
propriation is discovered or by the exercise o --- reasonable diligence should have been
discovered. For the purposes o --- this section, a continuing misappropriation consti-
tutes a single claim.
7. E ---
ect on Other Law I. Except as provided in paragraph II, this chapter displaces con — licting tort, res- titutionary, and other law o — this state providing civil remedies — or misappropriation o — a trade secret. II. This chapter shall not a —
ect: (a) Contractual remedies, whether or not based upon misappropriation o — a trade secret; (b) Other civil remedies that are not based upon misappropriation o — a trade secret; or (c) Criminal remedies, whether or not based upon misappropriation o — a trade secret.
8. Uni --- ormity o --- Application
and Construction
This chapter shall be applied and construed to e ---
ectuate its general purpose to make uni — orm the law with respect to the subject o — this chapter among states enact- ing it.
9. Short Title
This chapter may be cited as the New Hampshire [Uni --- orm] Trade Secrets Act.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 225 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 226 10/16/25 9:25 PM Appendix B De — end Trade Secrets Act (DTSA, 18 USC § 1836 et seq.)
(a) The Attorney General may, in a civil action, obtain appropriate injunctive relie ---
against any violation o --- this chapter 18 USCS §§ 1831 et seq.
(b) Private civil actions.
(1) In general. An owner o --- a trade secret that is misappropriated may bring a
civil action under this subsection i --- the trade secret is related to a product
or service used in, or intended --- or use in, interstate or --- oreign commerce.
(2) Civil seizure.
(A) In general.
(i) Application. Based on an a ---
idavit or veri — ied complaint satis — y- ing the requirements o — this paragraph, the court may, upon ex parte application but only in extraordinary circumstances, issue an order providing — or the seizure o — property necessary to pre- vent the propagation or dissemination o — the trade secret that is the subject o — the action. (ii) Requirements — or issuing order. The court may not grant an application under clause (i) unless the court — inds that it clearly appears — rom speci — ic — acts that — (I) an order issued pursuant to Rule 65 o — the Federal Rules o —
Civil Procedure or another --- orm o --- equitable relie --- would
be inadequate to achieve the purpose o --- this paragraph
because the party to which the order would be issued would
evade, avoid, or otherwise not comply with such an order;
(II) an immediate and irreparable injury will occur i --- such sei-
zure is not ordered;
(III) the harm to the applicant o --- denying the application out-
weighs the harm to the legitimate interests o --- the person
against whom seizure would be ordered o --- granting the
application and substantially outweighs the harm to any
third parties who may be harmed by such seizure;
227
6406_Oranburg_Protecting Trade Secrets_1pp.indb 227 10/16/25 9:25 PM 228 Appendix B
(IV) the applicant is likely to succeed in showing that —
(aa) the in --- ormation is a trade secret; and
(bb) the person against whom seizure would be
ordered —
(AA) misappropriated the trade secret o --- the appli-
cant by improper means; or
(BB) conspired to use improper means to misap-
propriate the trade secret o --- the applicant;
(V) the person against whom seizure would be ordered has
actual possession o --- —
(aa) the trade secret; and
(bb) any property to be seized;
(VI) the application describes with reasonable particular-
ity the matter to be seized and, to the extent reasonable
under the circumstances, identi --- ies the location where
the matter is to be seized;
(VII) the person against whom seizure would be ordered,
or persons acting in concert with such person, would
destroy, move, hide, or otherwise make such matter inac-
cessible to the court, i --- the applicant were to proceed on
notice to such person; and
(VIII) the applicant has not publicized the requested seizure.
(B) Elements o --- order. I --- an order is issued under subparagraph (A), it
shall —
(i) set --- orth --- indings o ---
act and conclusions o — law required — or the order; (ii) provide — or the narrowest seizure o — property necessary to achieve the purpose o — this paragraph and direct that the seizure be con- ducted in a manner that minimizes any interruption o — the busi- ness operations o — third parties and, to the extent possible, does not interrupt the legitimate business operations o — the person accused o — misappropriating the trade secret; (iii) (I) be accompanied by an order protecting the seized prop- erty — rom disclosure by prohibiting access by the appli- cant or the person against whom the order is directed, and prohibiting any copies, in whole or in part, o — the seized property, to prevent undue damage to the party against whom the order has issued or others, until such parties have an opportunity to be heard in court; and
6406_Oranburg_Protecting Trade Secrets_1pp.indb 228 10/16/25 9:25 PM Appendix B 229
(II) provide that i --- access is granted by the court to the applicant
or the person against whom the order is directed, the access
shall be consistent with subparagraph (D);
(iv) provide guidance to the law en --- orcement o ---
icials executing the seizure that clearly delineates the scope o — the authority o — the o —
icials, including — (I) the hours during which the seizure may be executed; and (II) whether — orce may be used to access locked areas; (v) set a date — or a hearing described in subparagraph (F) at the ear- liest possible time, and not later than 7 days a — ter the order has issued, unless the party against whom the order is directed and others harmed by the order consent to another date — or the hear- ing, except that a party against whom the order has issued or any person harmed by the order may move the court at any time to dissolve or modi — y the order a — ter giving notice to the applicant who obtained the order; and (vi) require the person obtaining the order to provide the security determined adequate by the court — or the payment o — the dam- ages that any person may be entitled to recover as a result o — a wrong — ul or excessive seizure or wrong — ul or excessive attempted seizure under this paragraph. (C) Protection — rom publicity. The court shall take appropriate action to protect the person against whom an order under this paragraph is directed — rom publicity, by or at the behest o — the person obtaining the order, about such order and any seizure under such order. (D) Materials In custody o — court. (i) In general. Any materials seized under this paragraph shall be taken into the custody o — the court. The court shall secure the seized material — rom physical and electronic access during the seizure and while in the custody o — the court. (ii) Storage medium. I — the seized material includes a storage medium, or i — the seized material is stored on a storage medium, the court shall prohibit the medium — rom being connected to a network or the Internet without the consent o — both parties, until the hearing required under subparagraph (B)(v) and described in subpara- graph (F). (iii) Protection o — con — identiality. The court shall take appropriate measures to protect the con — identiality o — seized materials that are unrelated to the trade secret in — ormation ordered seized pur- suant to this paragraph unless the person against whom the order is entered consents to disclosure o — the material.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 229 10/16/25 9:25 PM 230 Appendix B
(iv) Appointment o --- special master. The court may appoint a spe-
cial master to locate and isolate all misappropriated trade secret
in --- ormation and to --- acilitate the return o --- unrelated property and
data to the person --- rom whom the property was seized. The spe-
cial master appointed by the court shall agree to be bound by a
non-disclosure agreement approved by the court.
(E) Service o --- order. The court shall order that service o --- a copy o --- the
order under this paragraph, and the submissions o --- the applicant to
obtain the order, shall be made by a Federal law en --- orcement o ---
icer who, upon making service, shall carry out the seizure under the order. The court may allow State or local law en — orcement o —
icials to partici- pate, but may not permit the applicant or any agent o — the applicant to participate in the seizure. At the request o — law en — orcement o —
i- cials, the court may allow a technical expert who is una —
iliated with the applicant and who is bound by a court-approved non-disclosure agreement to participate in the seizure i — the court determines that the participation o — the expert will aid the e —
icient execution o — and minimize the burden o — the seizure. (F) Seizure hearing. (i) Date. A court that issues a seizure order shall hold a hearing on the date set by the court under subparagraph (B)(v). (ii) Burden o — proo — . At a hearing held under this subparagraph, the party who obtained the order under subparagraph (A) shall have the burden to prove the — acts supporting the — indings o —
act and conclusions o — law necessary to support the order. I — the party
ails to meet that burden, the seizure order shall be dissolved or modi — ied appropriately. (iii) Dissolution or modi — ication o — order. A party against whom the order has been issued or any person harmed by the order may move the court at any time to dissolve or modi — y the order a — ter giving notice to the party who obtained the order. (iv) Discovery time limits. The court may make such orders modi — y- ing the time limits — or discovery under the Federal Rules o — Civil Procedure as may be necessary to prevent the — rustration o — the purposes o — a hearing under this subparagraph. (G) Action — or damage caused by wrong — ul seizure. A person who su —
ers damage by reason o — a wrong — ul or excessive seizure under this para- graph has a cause o — action against the applicant — or the order under which such seizure was made, and shall be entitled to the same relie —
as is provided under section 34(d)(11) o --- the Trademark Act o --- 1946
(15 U.S.C. 1116(d)(11)). The security posted with the court under
6406_Oranburg_Protecting Trade Secrets_1pp.indb 230 10/16/25 9:25 PM Appendix B 231
subparagraph (B)(vi) shall not limit the recovery o --- third parties --- or
damages.
(H) Motion --- or encryption. A party or a person who claims to have an
interest in the subject matter seized may make a motion at any time,
which may be heard ex parte, to encrypt any material seized or to be
seized under this paragraph that is stored on a storage medium. The
motion shall include, when possible, the desired encryption method.
(3) Remedies. In a civil action brought under this subsection with respect to
the misappropriation o --- a trade secret, a court may —
(A) grant an injunction —
(i) to prevent any actual or threatened misappropriation described
in paragraph (1) on such terms as the court deems reasonable,
provided the order does not —
(I) prevent a person --- rom entering into an employment rela-
tionship, and that conditions placed on such employment
shall be based on evidence o --- threatened misappropriation
and not merely on the in --- ormation the person knows; or
(II) otherwise con --- lict with an applicable State law prohibiting
restraints on the practice o --- a law --- ul pro --- ession, trade, or
business;
(ii) i --- determined appropriate by the court, requiring a ---
irmative actions to be taken to protect the trade secret; and (iii) in exceptional circumstances that render an injunction inequi- table, that conditions — uture use o — the trade secret upon payment o — a reasonable royalty — or no longer than the period o — time — or which such use could have been prohibited; (B) award — (i) (I) damages — or actual loss caused by the misappropriation o —
the trade secret; and
(II) damages --- or any unjust enrichment caused by the misappro-
priation o --- the trade secret that is not addressed in comput-
ing damages --- or actual loss; or
(ii) in lieu o --- damages measured by any other methods, the damages
caused by the misappropriation measured by imposition o --- liabil-
ity --- or a reasonable royalty --- or the misappropriator’s unauthor-
ized disclosure or use o --- the trade secret;
(C) i --- the trade secret is will --- ully and maliciously misappropriated, award
exemplary damages in an amount not more than 2 times the amount
o --- the damages awarded under subparagraph (B); and
6406_Oranburg_Protecting Trade Secrets_1pp.indb 231 10/16/25 9:25 PM (D) i — a claim o — the misappropriation is made in bad — aith, which may be established by circumstantial evidence, a motion to terminate an injunction is made or opposed in bad — aith, or the trade secret was will — ully and maliciously misappropriated, award reasonable attor- ney’s — ees to the prevailing party. (c) Jurisdiction. The district courts o — the United States shall have original juris- diction o — civil actions brought under this section. (d) Period o — limitations. A civil action under subsection (b) may not be com- menced later than 3 years a — ter the date on which the misappropriation with respect to which the action would relate is discovered or by the exercise o — reasonable diligence should have been discovered. For purposes o — this subsection, a continuing misap- propriation constitutes a single claim o — misappropriation.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 232 10/16/25 9:25 PM Appendix C Economic Espionage Act (EEA, including § 1831 and § 1832)
(a) In general. Whoever, intending or knowing that the o ---
ense will bene — it any
oreign government, — oreign instrumentality, or — oreign agent, knowingly — (1) steals, or without authorization appropriates, takes, carries away, or con- ceals, or by — raud, arti — ice, or deception obtains a trade secret; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret; (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any o —
ense described in any o — paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any o —
ense described in any o — paragraphs (1) through (3), and one or more o — such persons do any act to e —
ect the object o — the conspiracy, shall, except as provided in subsection (b), be — ined not more than $5,000,000 or imprisoned not more than 15 years, or both. (b) Organizations. Any organization that commits any o —
ense described in sub- section (a) shall be — ined not more than the greater o — $10,000,000 or 3 times the value o — the stolen trade secret to the organization, including expenses — or research and design and other costs o — reproducing the trade secret that the organization has thereby avoided.
18 USC § 1832.
The --- t o --- trade secrets
(a) Whoever, with intent to convert a trade secret, that is related to a product or
service used in or intended --- or use in interstate or --- oreign commerce, to the economic
bene --- it o --- anyone other than the owner thereo --- , and intending or knowing that the
o ---
ense will, injure any owner o — that trade secret, knowingly —
233
6406_Oranburg_Protecting Trade Secrets_1pp.indb 233 10/16/25 9:25 PM 234 Appendix C
(1) steals, or without authorization appropriates, takes, carries away, or con-
ceals, or by --- raud, arti --- ice, or deception obtains such in --- ormation;
(2) without authorization copies, duplicates, sketches, draws, photographs,
downloads, uploads, alters, destroys, photocopies, replicates, transmits,
delivers, sends, mails, communicates, or conveys such in --- ormation;
(3) receives, buys, or possesses such in --- ormation, knowing the same to have
been stolen or appropriated, obtained, or converted without authorization;
(4) attempts to commit any o ---
ense described in paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any o —
ense described in paragraphs (1) through (3), and one or more o — such persons do any act to e —
ect the object o — the conspiracy, shall, except as provided in subsection (b), be — ined under this title or imprisoned not more than 10 years, or both. (b) Any organization that commits any o —
ense described in subsection (a) shall be
ined not more than the greater o — $5,000,000 or 3 times the value o — the stolen trade secret to the organization, including expenses — or research and design and other costs o — reproducing the trade secret that the organization has thereby avoided.
18 USC § 1833.
Exceptions to prohibitions
(a) In general. This chapter [18 USCS §§ 1831 et seq.] does not prohibit or create
a private right o --- action --- or —
(1) any otherwise law --- ul activity conducted by a governmental entity o --- the
United States, a State, or a political subdivision o --- a State; or
(2) the disclosure o --- a trade secret in accordance with subsection (b).
(b) Immunity --- rom liability --- or con --- idential disclosure o --- a trade secret to the gov-
ernment or in a court --- iling.
(1) Immunity. An individual shall not be held criminally or civilly liable under
any Federal or State trade secret law --- or the disclosure o --- a trade secret
that —
(A) is made —
(i) in con --- idence to a Federal, State, or local government o ---
icial, either directly or indirectly, or to an attorney; and (ii) solely — or the purpose o — reporting or investigating a suspected violation o — law; or (B) is made in a complaint or other document — iled in a lawsuit or other proceeding, i — such — iling is made under seal.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 234 10/16/25 9:25 PM Appendix C 235
(2) Use o --- trade secret in --- ormation in anti-retaliation lawsuit. An individual
who --- iles a lawsuit --- or retaliation by an employer --- or reporting a suspected
violation o --- law may disclose the trade secret to the attorney o --- the indi-
vidual and use the trade secret in --- ormation in the court proceeding, i --- the
individual —
(A) --- iles any document containing the trade secret under seal; and
(B) does not disclose the trade secret, except pursuant to court order.
(3) Notice.
(A) In general. An employer shall provide notice o --- the immunity set --- orth
in this subsection in any contract or agreement with an employee that
governs the use o --- a trade secret or other con --- idential in --- ormation.
(B) Policy document. An employer shall be considered to be in compliance
with the notice requirement in subparagraph (A) i --- the employer pro-
vides a cross-re --- erence to a policy document provided to the employee
that sets --- orth the employer’s reporting policy --- or a suspected violation
o --- law.
(C) Non-compliance. I --- an employer does not comply with the notice
requirement in subparagraph (A), the employer may not be awarded
exemplary damages or attorney --- ees under subparagraph (C) or (D)
o --- section 1836(b)(3) [18 USCS § 1836(b)(3)] in an action against an
employee to whom notice was not provided.
(D) Applicability. This paragraph shall apply to contracts and agreements
that are entered into or updated a --- ter the date o --- enactment o --- this
subsection [enacted May 11, 2016].
(4) Employee de --- ined. For purposes o --- this subsection, the term “employee”
includes any individual per --- orming work as a contractor or consultant --- or
an employer.
(5) Rule o --- construction. Except as expressly provided --- or under this subsec-
tion, nothing in this subsection shall be construed to authorize, or limit
liability --- or, an act that is otherwise prohibited by law, such as the unlaw --- ul
access o --- material by unauthorized means.
18 USC § 1834.
Criminal --- or --- eiture
For --- eiture, destruction, and restitution relating to this chapter [18 USCS §§ 1831 et
seq.] shall be subject to section 2323 [18 USCS § 2323], to the extent provided in that
section, in addition to any other similar remedies provided by law.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 235 10/16/25 9:25 PM 236 Appendix C
18 USC § 1835.
Orders to preserve con --- identiality
(a) In general. In any prosecution or other proceeding under this chapter [18
USCS §§ 1831 et seq.], the court shall enter such orders and take such other action as
may be necessary and appropriate to preserve the con --- identiality o --- trade secrets, con-
sistent with the requirements o --- the Federal Rules o --- Criminal and Civil Procedure,
the Federal Rules o --- Evidence, and all other applicable laws. An interlocutory appeal
by the United States shall lie --- rom a decision or order o --- a district court authorizing
or directing the disclosure o --- any trade secret.
(b) Rights o --- trade secret owners. The court may not authorize or direct the dis-
closure o --- any in --- ormation the owner asserts to be a trade secret unless the court
allows the owner the opportunity to --- ile a submission under seal that describes the
interest o --- the owner in keeping the in --- ormation con --- idential. No submission under
seal made under this subsection may be used in a prosecution under this chapter [18
USCS §§ 1831 et seq.] --- or any purpose other than those set --- orth in this section, or
otherwise required by law. The provision o --- in --- ormation relating to a trade secret to
the United States or the court in connection with a prosecution under this chapter [18
USCS §§ 1831 et seq.] shall not constitute a waiver o --- trade secret protection, and the
disclosure o --- in --- ormation relating to a trade secret in connection with a prosecution
under this chapter [18 USCS §§ 1831 et seq.] shall not constitute a waiver o --- trade
secret protection unless the trade secret owner expressly consents to such waiver.
18 USC § 1837.
Applicability to conduct outside
the United States
This chapter [18 USCS §§ 1831 et seq.] also applies to conduct occurring outside
the United States i --- —
(1) the o ---
ender is a natural person who is a citizen or permanent resident alien o —
the United States, or an organization organized under the laws o --- the United States or
a State or political subdivision thereo --- ; or
(2) an act in --- urtherance o --- the o ---
ense was committed in the United States.
18 USC § 1838.
Construction with other laws
Except as provided in section 1833(b) [18 USCS § 1833(b)], this chapter [18 USCS
§§ 1831 et seq.] shall not be construed to preempt or displace any other remedies,
whether civil or criminal, provided by United States Federal, State, commonwealth,
6406_Oranburg_Protecting Trade Secrets_1pp.indb 236 10/16/25 9:25 PM Appendix C 237
possession, or territory law --- or the misappropriation o --- a trade secret, or to a ---
ect the otherwise law — ul disclosure o — in — ormation by any Government employee under sec- tion 552 o — title 5 (commonly known as the Freedom o — In — ormation Act).
18 USC § 1839.
De --- initions
As used in this chapter [18 USCS §§ 1831 et seq.] —
(1) the term “ --- oreign instrumentality” means any agency, bureau, ministry, com-
ponent, institution, association, or any legal, commercial, or business organization,
corporation, --- irm, or entity that is substantially owned, controlled, sponsored, com-
manded, managed, or dominated by a --- oreign government;
(2) the term “ --- oreign agent” means any o ---
icer, employee, proxy, servant, del- egate, or representative o — a — oreign government; (3) the term “trade secret” means all — orms and types o —
inancial, business, sci- enti — ic, technical, economic, or engineering in — ormation, including patterns, plans, compilations, program devices, — ormulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphi- cally, photographically, or in writing i — — (A) the owner thereo — has taken reasonable measures to keep such in — orma- tion secret; and (B) the in — ormation derives independent economic value, actual or poten- tial, — rom not being generally known to, and not being readily ascertain- able through proper means by, another person who can obtain economic value — rom the disclosure or use o — the in — ormation; (4) the term “owner”, with respect to a trade secret, means the person or entity in whom or in which right — ul legal or equitable title to, or license in, the trade secret is reposed; (5) the term “misappropriation” means — (A) acquisition o — a trade secret o — another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (B) disclosure or use o — a trade secret o — another without express or implied consent by a person who — (i) used improper means to acquire knowledge o — the trade secret; (ii) at the time o — disclosure or use, knew or had reason to know that the knowledge o — the trade secret was — (I) derived — rom or through a person who had used improper means to acquire the trade secret;
6406_Oranburg_Protecting Trade Secrets_1pp.indb 237 10/16/25 9:25 PM 238 Appendix C
(II) acquired under circumstances giving rise to a duty to maintain
the secrecy o --- the trade secret or limit the use o --- the trade secret;
or
(III) derived --- rom or through a person who owed a duty to the per-
son seeking relie --- to maintain the secrecy o --- the trade secret or
limit the use o --- the trade secret; or
(iii) be --- ore a material change o --- the position o --- the person, knew or had
reason to know that —
(I) the trade secret was a trade secret; and
(II) knowledge o --- the trade secret had been acquired by accident or
mistake;
(6) the term “improper means” —
(A) includes the --- t, bribery, misrepresentation, breach or inducement o --- a
breach o --- a duty to maintain secrecy, or espionage through electronic or
other means; and
(B) does not include reverse engineering, independent derivation, or any
other law --- ul means o --- acquisition; and
(7) the term “Trademark Act o --- 1946” means the Act entitled “An Act to provide
or the registration and protection o — trademarks used in commerce, to carry out the provisions o — certain international conventions, and — or other purposes, approved July 5, 1946 (15 U.S.C. 1051 et seq.) (commonly re — erred to as the ‘Trademark Act o —
1946’ or the ‘Lanham Act’)”.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 238 10/16/25 9:25 PM Appendix D Glossary
This comprehensive taxonomy organizes key concepts related to trade secrets
into structured categories and provides a concise hashtag --- or each concept. It priori-
tizes US trade secret law (covering statutes like the UTSA and DTSA, case law, and
en --- orcement) while also including important international --- rameworks (e.g., WIPO
guidelines, the EU Trade Secrets Directive, GDPR impacts, Chinese trade secret
laws). Beyond legal doctrines, it encompasses business strategies (like licensing and
M&A), operational practices (security measures and employee training), technical
threats (cybersecurity and AI risks), and policy issues (compliance and competition
law). Each hashtag is de --- ined with its meaning, importance, and context, and cross-
re --- erences to related hashtags are provided to show how these concepts intersect.
General Concepts and
Importance
This category lays the groundwork by de --- ining what trade secrets are, why con --- iden-
tiality is critical, and how these concepts drive competitive advantage and innovation.
# TS — Trade secrets: Con --- idential business in --- ormation (such as --- ormulas, processes,
customer lists, or strategies) that derives its economic value --- rom not being generally
known and is maintained through active, reasonable measures. A company’s trade
secrets are the cornerstone o --- its competitive edge, as they enable innovation and cost
leadership. To preserve this protection, businesses must implement security proto-
cols, train employees, and use legal tools like #NDA. This term connects closely with
#FactualSecrecy and #Con --- identialIn --- o, ensuring that in --- ormation remains exclusive
and supports the --- irm’s overall #CompetitiveAdvantage.
# FactualSecrecy — In --- ormation claimed as a trade secret is genuinely unknown or
not easily accessible to others. Even i --- some components derive --- rom public sources,
the speci --- ic combination or details must remain hidden. This concept rein --- orces trade
secrets (#TS) by emphasizing that true secrecy is essential --- or maintaining competi-
tive advantage and is directly linked to #Con --- identialIn --- o.
239
6406_Oranburg_Protecting Trade Secrets_1pp.indb 239 10/16/25 9:25 PM 240 Appendix D
# IP — Intellectual property: The broad legal category encompassing patents, copy-
rights, trademarks, and trade secrets. Within this --- ramework, trade secrets (#TS) do
not require registration but depend on maintaining con --- identiality. Each method o ---
protection o ---
ers distinct advantages and limitations, and #IP connects all these — orms under one umbrella — or an organization’s innovation strategy. # Con — identialIn — o — Con — idential in — ormation: Re — ers to any nonpublic data that a business actively protects to preserve its competitive edge. Proper handling — e.g., using #NDAs, access restrictions, and secure systems — is essential to maintain in — or- mation as a trade secret (#TS) and uphold a #CompetitiveAdvantage. # CompetitiveAdvantage — Competitive advantage is the bene — it a company gains when it outper — orms its rivals, o — ten by leveraging exclusive or con — idential in — orma- tion. Trade secrets (#TS) and con — idential in — ormation (#Con — identialIn — o) are key drivers o — this advantage because they prevent competitors — rom easily replicating success — ul methods. # In — oMosaic — In — ormation mosaic: Describes the concept that a unique combination or arrangement o — data points can — orm a protectable trade secret even i — individual elements are public. This unique compilation supports a company’s #CompetitiveAd- vantage by creating value that remains con — idential. # IntangibleAssets — These are non-physical resources — like trade secrets, patents, and goodwill — that hold signi — icant economic value. For trade secrets (#TS), their value lies in the exclusive knowledge they represent and is maintained through con- tinuous protection e —
orts and secrecy. # Innovation — Re — ers to the creation o — new products, processes, or ideas that are o — ten sa — eguarded as trade secrets. By protecting innovative concepts as #TS rather than immediately disclosing them (e.g. via patents), companies maintain an edge over competitors and rein — orce their #CompetitiveAdvantage through a culture o — proac- tive con — identiality.
Legal Frameworks and
Statutes
This category covers the statutory and doctrinal --- oundations --- or trade secret pro-
tection, detailing US and international laws that govern trade secrets and the legal
tools available --- or en --- orcement.
US Doctrines
Key statutes and legal principles in US law de --- ine trade secrets and provide rem-
edies --- or misappropriation.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 240 10/16/25 9:25 PM Appendix D 241
# UTSA — Uni --- orm Trade Secrets Act: A model statute adopted by most US states
that clearly de --- ines trade secrets and misappropriation and requires in --- ormation to
be protected by #ReasonableMeasures. The UTSA is --- oundational --- or establishing
legal rights over #TS at the state level and guides private en --- orcement (it also provides
standard remedies, like damages and #Injunctions).
# DTSA — De --- end Trade Secrets Act: A --- ederal law that provides a nationwide cause o ---
action --- or trade secret misappropriation and that aligns with the UTSA while o ---
ering unique remedies such as #ExParteSeizure. Enacted in 2016, it enhances protection o —
#TS by --- acilitating access to --- ederal courts and ensuring consistency across state lines.
The #DTSA also explicitly does not preempt state law, so plainti ---
s can pursue both
ederal and state trade secret claims. # EEA — Economic Espionage Act: A — ederal law that criminalizes the the — t o — trade secrets, especially when such misappropriation bene — its — oreign entities. The EEA targets deliberate acts o — industrial or economic espionage and the — t, rein — orcing pro- tection through criminal penalties — or #CriminalTSThe — t and complementing civil remedies under the #DTSA. # Misappropriation — The wrong — ul acquisition, disclosure, or use o — trade secrets without authorization. This core wrong — ul act underlies all trade secret disputes, giv- ing rise to claims — or both civil damages and, in some cases, criminal penalties (under statutes like the #EEA). # ImproperMeans — Re — ers to illegal or unethical methods — such as the — t, bribery,
raud, or espionage — used to obtain trade secrets. Demonstrating that a de — endant used improper means is critical to a misappropriation claim, and it underscores the need — or companies to take #ReasonableMeasures to sa — eguard their secrets (since proper means like independent discovery or #ReverseEngineering are legal). # IndependentDevelopment — A de — ense whereby a de — endant claims they created the in — ormation on their own, without relying on the plainti —
’s trade secrets. It dis- tinguishes genuine innovation — rom wrong — ul copying o — #TS, and a showing o —
independent development will de --- eat a misappropriation claim.
# InevitableDisclosure— A doctrine suggesting that an employee with deep knowledge
o --- trade secrets will unavoidably reveal or rely on them when joining a competitor. This
principle has been used to justi --- y #NonCompete agreements or injunctions preventing
an employee --- rom certain employment, and it directly impacts #EmployeeMobility in
jurisdictions that recognize the doctrine.
# Whistleblower — Whistleblower protections (in the trade secret context) apply to
employees who disclose a company’s con --- idential in --- ormation --- or the sole purpose o ---
reporting legal violations (e.g., reporting --- raud or wrongdoing to authorities or attor-
neys). Under the DTSA, such whistleblowers have immunity in certain circumstances,
ensuring they are not penalized under trade secret laws i --- their disclosure was made
in con --- idence and solely to report misconduct. This concept distinguishes legitimate
6406_Oranburg_Protecting Trade Secrets_1pp.indb 241 10/16/25 9:25 PM 242 Appendix D
whistleblowing --- rom misappropriation and is linked to proper #EmployeeMobility
(employees changing jobs should not take secrets, but they can report illegality).
# EmployeeMobility — Addresses the tension between an employee’s right to change
jobs and an employer’s need to protect trade secrets (#TS). It is directly in --- luenced by
the doctrine o --- #InevitableDisclosure and the en --- orceability o --- agreements like #Non-
Compete clauses. Law and public policy seek to balance --- ree labor mobility with rea-
sonable restrictions to prevent trade secret the --- t when employees move to competitors.
International and Regional
Frameworks
Statutory and treaty instruments that harmonize trade secret protection globally,
establishing common minimum standards across jurisdictions.
# EUTradeSecrets — EU Trade Secrets Directive: An EU-wide directive (Directive
(EU) 2016/943) that harmonizes trade secret laws among member states, ensuring
consistent protection and en --- orcement practices --- or #TS across the European Union. It
requires all EU countries to provide measures against unlaw --- ul acquisition, use, or dis-
closure o --- trade secrets, raising the baseline protection in regions that previously relied
on disparate laws (such as the UK’s breach o --- con --- idence or varying national statutes).
# TRIPS — Trade-Related Aspects o --- Intellectual Property Rights: A WTO agreement
that sets minimum global standards --- or intellectual property protection, including
trade secrets. TRIPS (particularly Article 39) in --- luenced many countries’ domestic
laws (including guiding the principles in #UTSA and #DTSA) by requiring protection
or “undisclosed in — ormation” that is secret, has commercial value because it is secret, and is subject to reasonable protective measures. # ParisConvention — An international treaty (1883, as revised) providing baseline intellectual property protections and addressing un — air competition. While it pri- marily deals with patents, trademarks, etc., it indirectly supports the protection o —
trade secrets as part o --- the broader #IP --- ramework through its general provisions
against un --- air competition (which member countries interpret to include trade secret
misappropriation).
# WIPO — World Intellectual Property Organization: An international body that
coordinates intellectual property policies worldwide and promotes best practices.
WIPO provides guidance and resources that support trade secret protection princi
ples (even though no single WIPO treaty --- ocuses solely on trade secrets). It helps
countries develop laws consistent with international standards and --- acilitates coop-
eration on IP issues, trade secrets included.
# TradeSecretsDirective — The --- ormal EU mandate (another term --- or the EU Trade
Secrets Directive) requiring member states to align their national trade secret laws. It
6406_Oranburg_Protecting Trade Secrets_1pp.indb 242 10/16/25 9:25 PM Appendix D 243
ensures uni --- orm de --- initions o --- trade secrets and remedies --- or misappropriation across
Europe, reducing country-by-country discrepancies in protecting con --- idential in --- or-
mation. (See also #EUTradeSecrets, which re --- ers to this harmonized EU --- ramework.)
# USMCA — United States–Mexico–Canada Agreement: A North American trade
pact that includes strong provisions --- or protecting trade secrets, rein --- orcing domestic
standards, and ensuring cross-border en --- orcement. The USMCA requires all three
countries to provide civil and criminal penalties --- or trade secret the --- t (including
cyber-the --- t and state-sponsored misappropriation) and prohibits --- orced disclosure
o --- source code or algorithms as a condition o --- doing business, thus bolstering #TS
protection in international trade.
# GDPR — General Data Protection Regulation: Although primarily --- ocused on per-
sonal data privacy in the EU, the GDPR in --- luences how companies handle all sensitive
in --- ormation. It intersects with trade secret protection because stringent data handling
and security requirements apply to con --- idential business data as well. GDPR compli-
ance (e.g., on data access or deletion requests) may sometimes con --- lict with maintain-
ing #Con --- identialIn --- o secrecy, posing compliance challenges (#GDPRRisk) --- or trade
secret holders.
# ChinaTradeSecrets — Chinese trade secret law: China’s trade secret protection is
governed largely by the Anti-Un --- air Competition Law. Recent amendments (2018 and
2019) signi --- icantly strengthened the law’s de --- initions and remedies --- or trade secret
in --- ringement by expanding who can be held liable (including third-party recipients o ---
misappropriated secrets), shi --- ting certain burdens o --- proo --- to alleged in --- ringers, and
increasing potential damages. These changes signal China’s growing commitment to
curbing trade secret the --- t and aligning with international standards under #TRIPS.
(They were partly spurred by obligations in US–China trade agreements and aim to
improve cross-border en --- orcement cooperation.)
# TradeAgreements — Re --- ers broadly to other bilateral or multilateral accords that
incorporate trade secret provisions and support a cohesive global --- ramework --- or #TS
protection. Examples include treaties like NAFTA (and its successor #USMCA), the
Comprehensive and Progressive Agreement --- or Trans-Paci --- ic Partnership (CPTPP),
and various US–EU or regional agreements that commit parties to sa --- eguard trade
secrets. These agreements o --- ten require countries to adopt or en --- orce certain trade
secret laws and --- acilitate cooperation against cross-border the --- t.
Other Legal Frameworks
Additional legal doctrines and regulatory measures interact with trade secret law
to enhance protection and en --- orcement.
# ReverseEngineering — The law --- ul process o --- analyzing a publicly available product
to deduce its design, --- ormula, or --- unctionality (which may include discovering trade
6406_Oranburg_Protecting Trade Secrets_1pp.indb 243 10/16/25 9:25 PM 244 Appendix D
secrets), provided no contractual restrictions (such as an #NDA) are violated. Trade
secret law permits reverse engineering as a legitimate means o --- discovery, meaning
a company’s #TS will not be protected i --- a competitor --- igures it out on their own
through analysis o --- a law --- ully obtained product.
# ExportControls — Regulatory measures that restrict the international trans --- er o ---
sensitive technologies and in --- ormation. They help protect trade secrets by prevent-
ing certain technical data or products (which may embody trade secrets) --- rom being
shared with or exported to unauthorized --- oreign parties. Export controls act as a legal
sa --- eguard by complementing trade secret policies, especially --- or industries dealing
with de --- ense or high-tech in --- ormation (and relate to #TradeRegulations and interna-
tional en --- orcement).
# LawEn --- orcement — In this context, it encompasses government actions and investi-
gations to combat trade secret the --- t. It includes the work o --- agencies (like the FBI or
DOJ in the United States ) using statutes such as the #EEA to investigate and prosecute
the --- t or economic espionage. Strong law en --- orcement cooperation, sometimes involv-
ing international agencies like #Interpol, is vital --- or addressing criminal trade secret
cases that cross borders.
# Interpol — Interpol is an international policing organization that supports cross-
border investigations into crimes, including intellectual property the --- t and trade
secret misappropriation. Through Interpol’s coordination, countries work together
to track and apprehend individuals involved in --- oreign or #EconomicEspionage, rein-
orcing global en — orcement e —
orts against trade secret the — t.
Related Legal Fields
These are adjacent legal domains that intersect with trade secret law. They a ---
ect its scope, en — orcement, and strategic use within a broader intellectual property port — olio. Many trade secret issues arise at the intersection o — these — ields. # PatentLaw — Protects inventions by granting exclusive rights in exchange — or public disclosure o — the invention. Unlike trade secrets (#TS), patents require — ull disclosure but then protect against independent development or reverse engineering by others. Patent law is a complementary — orm o — #IP that must be weighed against trade secret protection; companies o — ten — ace a strategic choice between patenting an invention or keeping it as a trade secret (the patent vs. trade secret decision). # CopyrightLaw — Sa — eguards original works o — authorship — ixed in a tangible medium, such as so — tware code, writings, or designs. It overlaps with trade secret protection when companies have con — idential source code or algorithms: they may keep them secret or release them and rely on copyright. However, copyright does not protect underlying ideas or con — idential know-how, so it cannot — ully substitute — or trade secret protection o — things like — ormulas or processes.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 244 10/16/25 9:25 PM Appendix D 245
# TrademarkLaw — Protects brand identi --- iers, like logos, names, and slogans. While
largely unrelated to the substance o --- trade secrets, a strong trademark coupled with
secret business methods or --- ormulas (e.g., a --- amous brand plus a secret recipe) can
strengthen a company’s overall #CompetitiveAdvantage. Trade secret law might also
protect proprietary branding strategies or product launch plans that are kept con --- i-
dential be --- ore execution.
# PropertyLaw — Governs ownership rights in both tangible and intangible assets,
including trade secrets. There is scholarly debate about whether trade secrets are true
property rights or just contractual/privacy rights, but in practice they are treated as
valuable #IntangibleAssets that can be bought, sold (licensed), or counted as assets
o --- a company.
# ContractLaw — Is central to trade secrets because con --- identiality agreements and
related contracts are --- oundational protective tools. En --- orcing #NDAs, invention
assignment agreements, and #NonCompete clauses relies on contract law. Strong con-
tract law allows companies to bind employees and partners to secrecy obligations,
which directly supports the protection o --- #Con --- identialIn --- o.
# EmploymentLaw — Governs the workplace relationship and sets limits on what
employers can require o --- employees. It a ---
ects the en — orceability o — #NonCompete agreements and the handling o — con — identiality obligations in employment contracts. Employment law strikes a balance between employees’ rights (to change jobs or use general skills) and the employer’s interest in protecting #TS, and it provides remedies
or breaches (o — ten overlapping with trade secret misappropriation claims). #AntitrustLaw — Antitrust (competition) law ensures — air competition in the mar- ketplace. It can come into play i — a company’s trade secret en — orcement is so aggres- sive that it sti — les legitimate competition ( — or example, collusion through trade secret licensing or using #NonCompete agreements broadly). Antitrust law and #Competi- tionLaw may also limit how competitors can jointly use in — ormation (to avoid mar- ket allocation or price- — ixing masked as trade secret protection). Generally, antitrust issues are rare in trade secret cases, but they remind companies not to misuse trade secrets to violate competition laws. # CyberLaw — Covers legal issues related to cybersecurity, hacking, and data breaches. With most trade secrets stored digitally, cyber law is critical: it establishes obliga- tions and liability around protecting electronic trade secrets. It intersects with trade secret law when prosecuting hackers, determining corporate liability — or #DataBreach incidents, and setting standards (like #PrivacyLaw or data security regulations) that companies must — ollow to protect their #TSProtection e —
orts. # PrivacyLaw — Regulates the handling o — personal and sensitive data (examples include the #GDPR in the EU and laws like CCPA in Cali — ornia). Privacy require- ments o — ten overlap with trade secret management, as companies must handle per- sonal data (perhaps o — customers or employees) within their in — ormation systems. In some cases, privacy laws can con — lict with trade secret practices (e.g., an individual’s
6406_Oranburg_Protecting Trade Secrets_1pp.indb 245 10/16/25 9:25 PM 246 Appendix D
right to their personal data versus a company’s desire to keep records con --- idential),
requiring care --- ul compliance (#GDPRCompliance) to protect secrets without violat-
ing privacy rights.
# WhiteCollarCrime — Re --- ers to --- inancially motivated, nonviolent crime typically
committed by business pro --- essionals. Trade secret the --- t and economic espionage --- all
into this category. Prosecuting trade secret the --- t under laws like the #EEA or --- raud
statutes is part o --- white collar crime en --- orcement. This highlights that misappropria-
tion is not just a civil matter but can rise to serious criminal conduct with signi --- icant
penalties.
# CorporateLaw — Involves the governance o --- business entities and --- iduciary duties
o --- directors/o ---
icers. It intersects with trade secrets in areas like #CorporateGover- nance (ensuring company leadership protects key assets like #TS) and in transactions (board decisions about protecting or sharing secrets in deals). Also, i — insiders misap- propriate secrets, it could breach their — iduciary duty to the company, giving rise to corporate law claims alongside trade secret claims. E —
ective #TSManagement is o — ten considered part o — good corporate stewardship o — intellectual assets. # CommercialLitigation — The process o — resolving business disputes in court, includ- ing trade secret misappropriation lawsuits. Many trade secret en — orcement actions end up as commercial litigation, so understanding the procedures and strategies o —
commercial litigation (e.g., discovery, injunction practice, use o --- #EvidenceLaw) is
important --- or en --- orcing #TS rights. This --- ield also covers breach o --- contract cases (like
broken NDAs), which --- requently accompany trade secret claims.
# TortLaw — Provides civil remedies --- or wrong --- ul acts causing harm. Trade secret mis-
appropriation can be pleaded as a tort (e.g., as “un --- air competition” or conversion
in some jurisdictions, though the UTSA preempts many tort claims in the United
States). Tort law principles also come into play with #Un --- airCompetition practices
and when seeking #Damages or #ExemplaryDamages --- or will --- ul misconduct.
# CompetitionLaw — Competition law (another term --- or antitrust, especially in an
international context) regulates market competition. In the trade secret arena, com-
petition law might limit how companies share in --- ormation (e.g., in joint ventures
or standard-setting) or guard against companies’ using trade secret claims to harass
competitors. It is related to #AntitrustRisk and ensures that protecting secrets does
not cross into anti-competitive territory.
# EvidenceLaw — Governs what evidence can be presented in legal proceedings. In
trade secret litigation, courts must balance the need to prove a case with the need to
keep the trade secrets themselves con --- idential. Evidence law questions (like when to
allow in-camera review, protective orders, or sealed --- ilings) are crucial in #TSLawsuit
procedures. Proper handling o --- evidence (e.g., showing that in --- ormation was secret
and misappropriated) o --- ten determines success in trade secret cases.
# AdminLaw — Covers the regulations and procedures o --- government agencies. It can
a ---
ect trade secrets in contexts like #ExportControl en — orcement (agencies regulating
6406_Oranburg_Protecting Trade Secrets_1pp.indb 246 10/16/25 9:25 PM Appendix D 247
technology exports) or when companies submit trade secret data to agencies (e.g.,
FDA or EPA --- ilings) and rely on administrative protections against disclosure.
Administrative processes (such as the ITC’s Section 337 investigations --- or IP the --- t)
also provide alternative --- orums --- or trade secret en --- orcement outside the court system.
# BankruptcyLaw — Addresses how assets are handled when a company becomes
insolvent. Trade secrets, as #IntangibleAssets, are part o --- the debtor’s estate. Bank-
ruptcy law ensures trade secrets are valued and trans --- erred properly (sometimes
they may be sold to satis --- y creditors, which requires maintaining secrecy during due
diligence). It also raises questions about the assumption or rejection o --- NDAs and
the continuation o --- con --- identiality obligations i --- a business is sold out o --- bankruptcy.
Business and Commercial
Considerations
This category highlights how trade secrets --- actor into business strategies, transac-
tions, and collaborative ventures. It covers the commercial use and valuation o --- trade
secrets, and how companies share or protect these assets in deals and partnerships.
# Licensing — The commercial strategy o --- granting another party rights to use a trade
secret under a contract, typically in exchange --- or --- ees or royalties. Proper licensing
o --- trade secrets requires maintaining con --- identiality (through strict #Con --- identiality-
Agreement terms and oversight) so the secret is not publicly disclosed. It can be a way
to monetize #TS (e.g., licensing a proprietary manu --- acturing process to a partner),
but it carries #AntitrustRisk i --- done between competitors and always requires trust
and veri --- ication that the licensee upholds secrecy obligations (related to #TechTrans-
er and #JointVenture scenarios). # TechTrans — er — The controlled sharing o — trade secrets or proprietary technology between entities, o — ten through collaborative agreements, research partnerships, or joint development projects. This can occur via #Licensing deals, university–industry collaborations, or cross-border partnerships. Managing tech trans — er involves ensur- ing the receiving party implements adequate protections and complies with any #ExportControl laws. It is closely related to #JointVenture arrangements and o — ten necessitates detailed contracts de — ining permitted use o — the shared know-how. # JointVenture — A business arrangement where two or more companies collabo- rate ( — orming a new entity or a — ormal alliance) and may need to share their respec- tive trade secrets or know-how to achieve a common goal. In a JV, care — ul legal and operational sa — eguards are required: each side should disclose only what is necessary (#NeedToKnowFailure must be avoided), and agreements must speci — y ownership and permitted use o — any contributed #Con — identialIn — o. JVs tie into #TechTrans — er (as a mechanism o — sharing) and pose #ThirdPartyRisk i — one partner mishandles the other’s secrets.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 247 10/16/25 9:25 PM 248 Appendix D
# MergersAcq — Mergers and Acquisitions: Trade secrets o --- ten play a signi --- icant role
in M&A transactions as valuable assets that can enhance the acquiring company’s
competitive position. This concept covers how trade secrets are handled during merg-
ers, acquisitions, or divestitures — including their evaluation and pricing (#Valu-
ation); disclosure to the acquirer under con --- identiality during #DueDiligence; and
post-transaction integration, where combining work --- orces and systems must be done
without losing secrecy. #M&ARisk is a related concept --- ocusing on the risk o --- leaks
during these deal processes.
# DueDiligence — The process o --- assessing assets and risks be --- ore entering a business
transaction such as an investment, partnership, or acquisition. In the context o --- trade
secrets, due diligence involves evaluating the target’s #TSProtection measures, identi-
ying key trade secrets, and ensuring that any required disclosure o — those secrets (to potential buyers, investors, etc.) is done under strict #NDA and data room security. E —
ective due diligence will mitigate #M&ARisk and in — orm proper #Valuation o — the trade secret assets.
# Valuation — Determining the --- inancial worth o --- trade secrets --- or purposes o --- trans-
actions, litigation, or internal strategy. Companies per --- orm valuation o --- trade secrets
during #MergersAcq (to set a price or assess goodwill), when licensing technology,
or when seeking damages in a #TSLawsuit (where a reasonable royalty or lost pro --- its
may be calculated). Accurate valuation re --- lects a trade secret’s contribution to #Com-
petitiveAdvantage and may consider --- actors like development cost savings, --- uture
income streams, and risk o --- loss. It ties into treating trade secrets as #IntangibleAssets
on the balance sheet.
# OpenInnovation — Re --- ers to collaborative innovation initiatives where a company
works with external parties (such as open-source communities, crowdsourcing plat-
orms, or industry consortia) to develop new ideas. The challenge in open innovation is balancing collaboration with secrecy; participants share knowledge but must be care — ul not to reveal core #TS. Companies engaged in open innovation o — ten delin- eate what in — ormation can be openly shared and what must remain internal. This concept intersects with #ThirdPartyRisk (external collaborators could leak in — o) and may require a shi — t — rom a strict #CultureO — Secrecy to a more nuanced approach that still protects key secrets.
# Outsourcing — Outsourcing involves hiring external --- irms or contractors to per --- orm
services or develop products, which can expose trade secrets i --- those external enti-
ties handle sensitive in --- ormation. Protecting #TS during outsourcing requires robust
contracts (#Con --- identialityAgreement clauses, clear IP ownership) and oversight o ---
the vendor’s security practices. This concept highlights the need to extend internal
#SecurityPolicy and #TSProtection measures to third parties. It is closely related to
#VendorRisk and #ThirdPartyRisk, since an outsourcer’s weak security or its person-
nel could lead to misappropriation o --- the client company’s secrets.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 248 10/16/25 9:25 PM Appendix D 249
Risks and Threats
This category identi --- ies the dangers that can lead to the misappropriation or loss
o --- trade secrets, including external threats, legal pit --- alls, regulatory challenges, eco-
nomic pressures, and technological vulnerabilities.
External Risks
Risks arising --- rom external actors or --- actors that may expose or compromise trade
secrets.
# EconomicEspionage — Involves deliberate the --- t o --- trade secrets --- or --- inancial or
competitive gain, o --- ten orchestrated by businesses or state-sponsored actors target-
ing --- oreign companies. Such actions undermine a company’s #CompetitiveAdvantage
and are punishable under criminal laws like the #EEA (which speci --- ically addresses
espionage bene --- iting --- oreign entities).
# IndustrialEspionage — The covert collection o --- con --- idential in --- ormation by com-
petitors seeking a market edge. This can include spying on a competitor’s --- acilities,
in --- iltrating their work --- orce, or eavesdropping on communications. It --- requently over-
laps with economic espionage tactics and can encompass both #CorporateEspionage
and #CyberThreats modes o --- operation.
# CorporateEspionage — Re --- ers to espionage activities carried out by or against com-
panies (as opposed to state actors) to illicitly obtain con --- idential business data. This
threatens #TS by enabling competitors to acquire proprietary know-how or strategies.
It impacts #CompetitiveAdvantage and o --- ten involves #ImproperMeans, such as brib-
ing insiders or covert surveillance.
# ForeignEspionage — Involves the the --- t o --- trade secrets by state-sponsored agents
or entities a ---
iliated with — oreign governments. The goal is o — ten to bolster national industries or military capabilities using stolen technology. Such acts are a — ocus o — the #EEA (which has provisions — or — oreign government-sponsored the — t) and underscore the need — or international cooperation and robust #LawEn — orcement e —
orts. # CyberThreats — Include digital attacks such as hacking, malware, ransomware, or phishing that target a company’s con — idential in — ormation systems. Modern trade secrets are — requently stored digitally, so cyberattacks can compromise #TSProtection measures and lead to massive #DataBreach incidents. Companies must counter cyber threats with strong #EndpointSecurity, network monitoring, and incident response plans. # DataBreach — A data breach is the unauthorized access, acquisition, or disclosure o —
sensitive in --- ormation, o --- ten through cyberattack or accidental exposure. I --- the com-
promised data includes trade secrets or #Con --- identialIn --- o, the breach can destroy the
6406_Oranburg_Protecting Trade Secrets_1pp.indb 249 10/16/25 9:25 PM 250 Appendix D
in --- ormation’s secrecy and value. Data breach incidents can result --- rom insu ---
icient security, #InsiderThreat, or external hacking, and they o — ten trigger legal obligations to respond and possibly noti — y authorities (though companies try to avoid disclosing exact trade secrets publicly even when reporting breaches). # SupplyChainRisk — Supply chain risk arises when third-party vendors, suppliers, or partners with access to a company’s in — ormation — ail to secure it properly. A weakness anywhere in the supply chain (e.g., a parts manu — acturer or an IT services provider) can lead to trade secret leakage. This concept highlights that a company’s #TS is only as secure as the weakest link among its external collaborators, tying into #ThirdPar- tyRisk and emphasizing the need — or #SupplyChainSecurity practices. # ThirdPartyRisk — Third-party risk is the possibility that external partners, contrac- tors, or vendors may mishandle or inadvertently expose con — idential data entrusted to them. When companies share #Con — identialIn — o with outside parties ( — or out- sourcing, partnerships, cloud services, etc.), those parties’ security lapses or internal threats become an indirect risk. Third-party risk underscores why contracts, due dili- gence, and ongoing oversight o — partners are critical — or protecting #TS outside the organization’s walls. # OverrelianceOnNDAs — The mistaken belie — that nondisclosure agreements alone are su —
icient to protect trade secrets. While #NDAs are essential legal tools, the risk is that a company might neglect technical and administrative #ReasonableMeasures (like access controls, encryption, and monitoring) based on the belie — that paper agreements will prevent leaks. Overreliance on NDAs can give a — alse sense o — secu- rity: i — an NDA is breached, the damage may already be done unless other protections are in place. # CompetitorThreat — Re — ers to the active e —
orts by rival companies to acquire a target company’s con — idential in — ormation in order to weaken that target’s #Com- petitiveAdvantage. Competitors might use #CorporateEspionage, #TalentPoaching, aggressive #ReverseEngineering, or other tactics that, i — crossing legal lines, amount to misappropriation. This concept underscores that competition is not always — air and that companies must be vigilant about competitor-driven risks. # TalentPoaching — The deliberate hiring away o — a competitor’s employees with the intent to gain access to their expertise or trade secret knowledge. While recruiting experienced talent is legal, doing so speci — ically to obtain con — idential know-how can lead to inevitable disclosure o — the — ormer employer’s #TS. This practice raises con- cerns under #EmployeeMobility: it tests the limits o — what a new hire can use — rom memory versus what is protected, and it o — ten triggers #NonCompete disputes or litigation i — there is suspicion o — trade secret the — t. # WhistleblowerRisk — The potential that an employee, in disclosing wrongdoing to authorities or the public, might inadvertently or intentionally reveal trade secrets. It blurs the line between legitimate reporting (protected by #Whistleblower laws) and
6406_Oranburg_Protecting Trade Secrets_1pp.indb 250 10/16/25 9:25 PM Appendix D 251
trade secret misappropriation. Companies mitigate this risk by having internal com-
pliance programs (so issues can be reported internally under con --- identiality) and by
narrowly tailoring secrecy policies so they do not unlaw --- ully silence whistleblowing.
Legal Risks
Risks arising --- rom legal challenges, disputes, or weaknesses in a company’s intel-
lectual property strategy that could weaken trade secret protection.
# LitigationRisk — The potential --- or costly and damaging legal disputes over trade
secret issues. This includes the risk o --- being sued --- or misappropriation (de --- ense costs,
injunctions stopping your product) or the need to sue another (which can be expen-
sive and expose your secrets in court). High-pro --- ile #TSLawsuits can also damage a
company’s reputation or distract management. E ---
ective #IPStrategy and clear agree- ments can reduce litigation risk, but i — a dispute arises, skilled #CommercialLitigation management is needed. # WeakIPStrategy — Re — ers to a company’s choosing the wrong — orm o — intellectual property protection or not adequately protecting an innovation at all. For example, patenting an invention that would have been better kept as a secret (thereby disclosing it to competitors), or vice versa, or — ailing to identi — y key trade secrets to protect. This misstep can leave valuable in — ormation exposed or unprotected, undermining overall #TS security. It is related to #PatentLaw vs. trade secret decisions and can be revealed during #DueDiligence or #EmploymentDisputes when gaps are discovered. # EmploymentDisputes — Con — licts with current or — ormer employees over trade secret issues. This can include claims that an employee stole secrets to bene — it a new employer, wrong — ul termination suits a — ter an employee is — ired — or suspected misap- propriation, or battles over the scope o — #NonCompete and non-solicitation agree- ments. Such disputes can result in trade secret litigation and a —
ect #EmployeeMobility broadly within an industry (e.g., a well-known case might deter other employees — rom jumping ship with knowledge). # BreachO — Contract — This risk arises when con — identiality agreements, NDAs, or other contracts meant to protect trade secrets are violated. I — an ex-employee or busi- ness partner breaks their promise and discloses a secret, the contract breach not only undermines #Con — identialIn — o security but also — orces the company to seek remedies through litigation. This risk underlines the importance o — en — orcing #ContractLaw provisions and possibly obtaining #Injunctions quickly when a breach is discovered. #AntitrustRisk — Antitrust risk (competition law risk) is the possibility that actions taken to protect or share trade secrets may run a — oul o — competition laws. For instance, i — competitors secretly agree to share certain technical in — ormation only with each other (excluding others), it could be seen as collusion. Or overly broad #NonCompete agreements could attract antitrust scrutiny — or suppressing competition. Companies
6406_Oranburg_Protecting Trade Secrets_1pp.indb 251 10/16/25 9:25 PM 252 Appendix D
must ensure their trade secret en --- orcement or collaboration practices do not inadver-
tently limit market competition, linking this risk to #CompetitionLaw compliance.
Regulatory and Compliance Risks
Risks associated with the evolving regulatory landscape and the challenges o ---
meeting legal disclosure or compliance requirements while protecting trade secrets.
# DataProtectionLaws — Data protection laws such as the EU’s GDPR or Cali --- ornia’s
CCPA impose strict requirements on how sensitive data (including certain business
data) is handled, stored, and trans --- erred. Compliance with these laws can complicate
trade secret management: --- or example, responding to a regulatory inquiry or data
subject access request could risk revealing #Con --- identialIn --- o. Failure to comply is its
own risk ( --- ines, penalties), so companies must reconcile data privacy obligations with
maintaining #TS secrecy.
# ExportControls — Regulations limiting the trans --- er o --- sensitive technology or in --- or-
mation across national borders. Noncompliance can result in legal penalties and also
inadvertently expose trade secrets (e.g., i --- a company must apply --- or a license, it might
need to describe the technology). Adhering to #ExportControl laws protects against
unauthorized --- oreign access to trade secrets but can be complex and impact collab-
orative research or international hiring. It is a compliance risk that intersects with
trade secret strategy, especially in high-tech and de --- ense sectors.
# CrossBorderIP — Re --- ers to the di ---
iculties in protecting trade secrets across multiple jurisdictions. Di — — erent countries may have varying de — initions o — trade secrets or lev- els o — en — orcement, complicating a uni — ied protection strategy. For instance, pursuing a misappropriator who — lees to another country can be hard i — that country’s laws are weaker. This risk underscores the need — or awareness o — international — rameworks (like #TRIPS and local laws such as #ChinaTradeSecrets) and, sometimes, — or pursu- ing remedies like #Interpol notices or multinational litigation. # GDPRRisk — Re — ers to the speci — ic challenges posed by the EU’s data protection regime (GDPR) to trade secret practices. For example, GDPR might require a com pany to divulge certain personal data it holds i — an individual requests it, even i — that data is part o — an internal database a company considers secret. There is also a risk that stringent security and minimization rules a —
ect how companies collect and store proprietary data. Balancing GDPR compliance with #Con — identialIn — o preservation is an ongoing compliance tightrope — or global companies. # TradeSecretDisclosure — The danger that a company’s con — idential in — ormation might be revealed during legal or regulatory processes. This can happen in litigation (through #EvidenceLaw requirements or discovery) or in government — ilings (e.g., required submissions to patent o —
ices, courts, or agencies). I — not managed with pro- tective orders or con — identiality provisions, such disclosures can destroy #TS status. Companies mitigate this risk by seeking court orders to seal records, by limiting detail
6406_Oranburg_Protecting Trade Secrets_1pp.indb 252 10/16/25 9:25 PM Appendix D 253
in public --- ilings, and by aggressive legal strategies to avoid compelled disclosure o ---
the “crown jewels.”
Economic Risks
Financial pressures and market dynamics that may lead to the loss or devaluation
o --- trade secrets.
# VendorRisk — The potential --- or external suppliers or service providers to mis-
handle con --- idential data, thereby exposing trade secrets and compromising #TSPro-
tection. It highlights that outsourcing or relying on third-party technology (like cloud
services or consultants) can introduce vulnerabilities i --- those vendors do not have
strong security. Contractual clauses and vendor audits are common mitigations, but
this risk is ever-present in complex supply chains (see #SupplyChainRisk).
# M&ARisk — M&A risk arises during mergers, acquisitions, or due diligence when
sensitive in --- ormation must be shared with the other party. There is a risk a deal may
all through and the would-be buyer walks away with knowledge o — the target’s secrets or that during integration, employees — rom the acquiring company improperly access the acquired company’s con — idential in — o. Such scenarios can undermine a company’s #IntangibleAssets value. Care — ul staging o — disclosure (only as needed), use o — clean teams, and strong legal remedies in deal contracts help reduce M&A-related trade secret risk. # EconomicDownturnRisk — Re — ers to increased vulnerability o — trade secrets dur- ing tough economic times. In recessions or budget-cutting phases, companies might reduce spending on security or personnel training, or they may lay o —
employees (who could leave with knowledge or be disgruntled). Financial strain can also lead some to be more susceptible to selling secrets. Maintaining #TSProtection as a prior- ity during downturns is critical despite pressure to cut costs. # InvestorRisk — The possibility that during — undraising rounds or investor meetings, a startup or company might inadvertently disclose trade secrets to potential investors or analysts, reducing its #CompetitiveAdvantage. While investors o — ten sign con — i- dentiality agreements, the more people who know a secret, the greater the risk o —
leaks. Additionally, once investors are on board, they receive reports and data that
could contain secrets. Companies must strike a balance between transparency with
investors and sa --- eguarding key details.
Technological Risks
Risks stemming --- rom digital vulnerabilities and emerging technologies that could
compromise trade secrets.
# AITradeSecretThe --- t — Re --- ers to the risk that advanced arti --- icial intelligence tools
could be used to in --- er or extract con --- idential in --- ormation --- rom available data. For
6406_Oranburg_Protecting Trade Secrets_1pp.indb 253 10/16/25 9:25 PM 254 Appendix D
example, an AI might analyze outputs or patterns ( --- rom a product or code) to recon-
struct the underlying secret algorithm. As AI grows more power --- ul, traditional #TS
sa --- eguards may be challenged, which will require new methods (like monitoring AI
outputs or employing AI to detect anomalies) to protect secrets.
# WeakEncryption — A vulnerability where a company’s data encryption is out-
dated or insu ---
icient, allowing attackers to decipher stolen data. I — trade secret — iles or communications are not properly encrypted, a breach could immediately expose their contents. Weak encryption undermines #Con — identialIn — o protection. This risk prompts organizations to — ollow strong cryptographic practices and to update encryption methods in anticipation o — threats like #QuantumRisk (quantum comput- ing attacks on encryption). # QuantumRisk — Quantum risk is the threat that emerging quantum computing technology could break current encryption methods, putting digitally stored trade secrets at risk. Much o — today’s secure storage relies on encryption that quantum com- puters may eventually crack. This risk is driving interest in “post-quantum” cryptog- raphy. It also relates to #CyberLaw and national security policy, as governments and companies prepare — or a — uture where quantum attackers might target secret data archives. # CloudSecurityRisk — Arises when a company stores trade secrets in cloud services or remote servers that are not adequately secured or con — igured. While reputable cloud providers invest in security, miscon — igurations (like leaving a storage bucket public) or breaches at the provider could expose secrets. This risk underscores the need — or strong #TSProtection policies speci — ically — or cloud usage: encryption o — data at rest, care — ul identity and access management, and vetting cloud providers’ security protocols. # ZeroTrustFailure — Occurs when an organization’s “zero trust” security model (which assumes no user or device is trustworthy by de — ault) is not properly imple- mented, thus allowing unauthorized access to sensitive data. I — zero trust principles
ail (due to miscon — iguration or user workarounds), sensitive #TS could be accessed by threat actors who penetrated one part o — the network. This highlights that even modern security — rameworks require continuous assessment. A zero trust approach, when working, can greatly strengthen #TSProtection, but — ailure in any link can open a door to attackers. # ShadowIT — The use o — unauthorized hardware, so — tware, or cloud services within an organization, outside the o —
icial IT in — rastructure. Employees might use personal apps or devices to handle work data — or convenience. This practice bypasses o —
icial security controls and can lead to trade secret exposure ( — or example, an engineer using an unapproved — ile-sharing app might inadvertently leak a con — idential design document). Shadow IT is a challenge — or #SecurityPolicy en — orcement and calls — or employee training (#EmployeeTraining) to prevent unsanctioned tech use.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 254 10/16/25 9:25 PM Appendix D 255
# DeviceSecurity — This risk involves threats like lost, stolen, or compromised devices
(laptops, USB drives, smartphones) that contain trade secret in --- ormation. I --- an
employee’s laptop with unencrypted con --- idential --- iles is stolen, the trade secrets could
be revealed. This risk is managed by #EndpointSecurity measures such as encryption,
remote wipe capabilities, and strong authentication. It reminds organizations that
physical loss o --- hardware can be as damaging as a cyber breach i --- not mitigated.
# DeepFakeThreat — Re --- ers to the use o --- AI-generated audio or video impersonations
to deceive individuals into disclosing con --- idential in --- ormation. For example, a deep-
ake could mimic an executive’s voice on a phone call to trick an employee into shar- ing a trade secret. This is a novel social-engineering risk that challenges traditional veri — ication methods. Combating it requires updated policies (like multi- — actor veri — i- cation — or sensitive requests) and awareness training, linking it to both #CyberThreats and human — actor vulnerabilities.
Internal Risks
This category --- ocuses on risks originating within the organization due to employee
behavior, management practices, or organizational culture that can lead to the inad-
vertent or deliberate loss o --- trade secrets.
# InsiderThreat — The risk that employees, contractors, or other trusted insiders will
intentionally or unintentionally disclose con --- idential in --- ormation. Insiders have
legitimate access to #Con --- identialIn --- o, so their actions ( --- rom malicious the --- t to care-
less handling) can undermine trade secret protection. E ---
ective mitigation includes monitoring, access controls (“need-to-know” principles), and — ostering loyalty and awareness to reduce the likelihood o — insiders turning into threats. # EmployeeNegligence — Re — ers to inadvertent mistakes by sta —
— such as mishandling documents, using weak passwords, — alling — or phishing scams, or losing devices — that result in exposure o — trade secrets. This highlights the human error component o —
security. Regular #EmployeeTraining, clear #SecurityPolicy, and technical sa --- eguards
(like requiring encryption on devices) are used to combat negligence-related leaks.
# OnboardingRisk — The danger that new hires may bring proprietary in --- ormation
rom their — ormer employer (which is not legally theirs to bring) or that they might mishandle their old employer’s secrets within their new role. This can inadvertently compromise the new employer and violate the old employer’s trade secret rights. Companies mitigate this risk by training new hires not to reveal others’ secrets, using “clean room” designs — or sensitive projects, and sometimes delaying start o — assign- ments to avoid #InevitableDisclosure claims. # ExitInterviewRisk — The possibility that departing employees may take or — ail to return con — idential in — ormation when they leave a company. I — the o —
boarding process is lax — no check o — devices, no reminders o — obligations — an employee might
6406_Oranburg_Protecting Trade Secrets_1pp.indb 255 10/16/25 9:25 PM 256 Appendix D
walk out with trade secret --- iles or simply rely on memory o --- sensitive in --- ormation at a
new job. Conducting thorough exit interviews and exit protocols (collecting devices,
disabling access, reiterating #NDA obligations) is essential to maintain #TSProtection
post-employment.
# NeedToKnowFailure — Occurs when con --- idential in --- ormation is shared internally
with individuals who do not require it --- or their work. I --- a company does not en --- orce
need-to-know principles, then more employees than necessary will know a given
trade secret, which will increase the odds o --- accidental or intentional leaks. Such --- ail-
ures weaken internal controls and can be exploited by insiders or through social engi-
neering. Maintaining proper #AccessControl and compartmentalization o --- secrets
helps prevent this risk.
# CultureO --- Secrecy — Means --- ostering an environment where con --- identiality is a pri-
ority and employees understand the importance o --- protecting in --- ormation. A --- ailure
in this culture (i.e., a culture that does not emphasize secrecy) increases the likelihood
o --- trade secret disclosures because employees may not take policies seriously or may
share in --- ormation casually. Conversely, a strong culture o --- secrecy supports all other
measures by making security “everyone’s responsibility.” Balancing this with openness
or innovation is important (too much secrecy can sti — le collaboration), so leadership must promote prudent con — identiality.
Operational Protections
This category outlines proactive internal measures and policies that organizations
implement to secure their trade secrets against both internal and external threats.
These are the best practices and tools --- or prevention.
# TSProtection — In practice, this encompasses the overall strategies, policies, and
physical/digital sa --- eguards an organization uses to secure con --- idential in --- ormation
and maintain its secrecy. It is an umbrella concept that includes legal agreements,
technical security, employee training, and any other method deployed to prevent mis-
appropriation or leaks o --- #TS.
# TSManagement — The systematic process o --- identi --- ying, classi --- ying, and maintain-
ing trade secrets within an organization. This involves creating a registry or inven-
tory o --- what the company considers its trade secrets, labeling and securing them
appropriately, and regularly auditing these assets. Good #TSManagement ensures
no important secret is overlooked and that all are adequately protected through
#ReasonableMeasures.
# TSPP — Trade Secret Protection Program: A --- ormal, comprehensive --- ramework
that a company establishes to sa --- eguard its trade secrets. A #TSPP typically inte-
grates multiple elements (asset inventory, risk assessment, employee policies, inci-
dent response plans) into one cohesive program. It o --- ten involves cross-department
6406_Oranburg_Protecting Trade Secrets_1pp.indb 256 10/16/25 9:25 PM Appendix D 257
coordination (legal, IT, HR, physical security) and is reviewed and updated over time
as new threats emerge.
# ReasonableMeasures — The practical, proportionate steps that a trade secret owner
is expected to take to keep in --- ormation secret. Laws like the UTSA/DTSA require
owners to implement such measures --- or in --- ormation to quali --- y as a trade secret.
Examples include using #NDAs, restricting access on a need-to-know basis, encryp-
tion o ---
iles, — acility security, #EmployeeTraining, and monitoring. What is “reason- able” may scale with the value o — the secret; extremely valuable secrets might warrant very extensive measures (like the Coca-Cola vault example). # NDA — Nondisclosure agreement: A legally binding contract in which one or more parties agree to keep speci — ied in — ormation con — idential and not disclose it to others. NDAs are — oundational in protecting trade secrets when sharing in — ormation with employees, contractors, or business partners. A well-dra — ted #NDA de — ines the con-
idential in — ormation, the permitted uses, and the duration o — secrecy. It provides a contractual basis to sue — or #BreachO — Contract i — someone leaks a secret, and it o — ten deters casual disclosures. # Con — identialityAgreement — A broad term — or contracts that impose con — idential- ity obligations, o — which #NDAs are a common example. It can also include clauses within larger contracts (like employment agreements, joint venture agreements, or service contracts) that require parties to keep shared in — ormation secret. These agree- ments both rein — orce and complement trade secret protections by legally binding parties to secrecy. (In essence, this is synonymous with an NDA, but the term can encompass various — orms such obligations take in di — — erent contracts.) # NonCompete — An agreement that restricts an employee (or business seller, etc.)
rom working — or competitors or starting a competing business — or a speci — ied period a — ter leaving a company. The primary aim is to prevent the #InevitableDisclosure o —
trade secrets and sensitive know-how to competitors via employee mobility. Non-
competes must be reasonable in duration and scope to be en --- orceable, and their use
is regulated or restricted in many jurisdictions --- or policy reasons. They are o --- ten used
alongside NDAs to protect #TS, although their en --- orceability varies by state/country.
# EmployeeTraining — Involves, in the context o --- trade secret protection, educating
sta ---
about the company’s con — identiality policies, its security procedures, and employ- ees’ personal obligations to protect sensitive in — ormation. Regular training sessions and reminders reduce #EmployeeNegligence by making employees aware o — social engineering tricks (like phishing), proper document handling, and reporting protocols
or suspected leaks. By instilling good practices, training supports a stronger #Cul- tureO — Secrecy and helps every employee become a line o — de — ense — or #TSProtection. # SecurityPolicy — Re — ers to the internal rules and procedures a company establishes to sa — eguard its in — ormation and systems. This includes written policies on topics like clean desk rules, document classi — ication, password requirements, device use, remote access, incident response, and more. A robust security policy underpins trade secret
6406_Oranburg_Protecting Trade Secrets_1pp.indb 257 10/16/25 9:25 PM 258 Appendix D
protection by setting clear expectations and guidelines --- or behavior. It works hand-in-
hand with technical measures and #EmployeeTraining, and it provides a --- ramework
to en --- orce discipline i --- someone violates security protocols (which could lead to an
#InsiderThreat incident i --- not addressed).
# EndpointSecurity — Encompasses protective measures --- or end-user devices (com-
puters, smartphones, tablets, USB drives) that store or access company data. For trade
secrets, endpoint security means ensuring that devices are encrypted, require strong
authentication, are kept updated against malware, and can be remotely wiped i --- lost.
Since many breaches occur through lost or compromised devices (#DeviceSecurity
issues), maintaining strict endpoint security is a critical part o --- #ReasonableMeasures
to guard #Con --- identialIn --- o.
En --- orcement and Remedies
This category details the legal avenues and remedies available to trade secret owners
when misappropriation occurs, including both civil and criminal actions.
# Injunction — A court order that requires a party to do or re --- rain --- rom doing speci --- ic
acts. In trade secret cases, injunctions are o --- ten used to stop --- urther misappropriation
or disclosure o --- secrets; --- or example, a court might bar a de --- endant --- rom using the
stolen secret or sharing it with others. Injunctions (especially temporary restraining
orders or preliminary injunctions) are crucial early remedies to prevent ongoing harm
and preserve the status quo while a case is litigated.
# ExParteSeizure — A unique remedy introduced by the #DTSA that allows a court to
order the seizure o --- property (e.g., computers, documents) containing misappropri-
ated trade secrets without prior notice to the de --- endant. It is used only in extraordi-
nary circumstances where there is a high risk that the de --- endant would destroy or
hide the evidence i --- warned. This remedy helps quickly secure the stolen trade secret
material and is --- ollowed by a hearing shortly a --- ter. It is a power --- ul but sparingly used
tool to prevent imminent threats.
# Damages — Re --- ers to monetary compensation awarded to a trade secret owner --- or
losses resulting --- rom misappropriation. Under trade secret law, damages can include
the actual loss su ---
ered by the plainti —
(e.g., lost pro — its or costs incurred — rom the the — t) and/or the unjust enrichment obtained by the de — endant (pro — its the wrongdoer gained — rom using the secret). In some cases where calculating these is di —
icult, courts may impose a reasonable royalty — or the unauthorized use o — the secret. Damages aim to make the injured party whole. # ExemplaryDamages — Also known as punitive damages, these are additional dam- ages awarded to punish and deter particularly egregious behavior. Under the UTSA and the DTSA, i — the misappropriation is — ound to be will — ul and malicious, courts
6406_Oranburg_Protecting Trade Secrets_1pp.indb 258 10/16/25 9:25 PM Appendix D 259
may award up to double the amount o --- normal damages as exemplary damages. These
are not meant to compensate the owner but to penalize the wrongdoer and send a
message. Exemplary damages, along with possible #AttorneysFees, serve as a deter-
rent against intentional trade secret the --- t.
#AttorneysFees — The legal costs incurred by the parties. In trade secret cases, courts
can order the losing party to pay the prevailing party’s attorneys’ --- ees, but typically
only in scenarios o --- bad --- aith or will --- ul/malicious misappropriation (under UTSA/
DTSA provisions). This is to discourage --- rivolous claims or will --- ul wrongdoing. The
possibility o --- attorneys’ --- ees recovery can in --- luence the strategy o --- litigation (e.g., a
company might be more willing to sue a will --- ul thie --- , knowing they could recover
legal costs).
# CriminalTSThe --- t — Re --- ers to the prosecution o --- trade secret misappropriation under
criminal laws (such as the #EEA in the United States or similar statutes elsewhere).
Unlike civil #Litigation brought by the trade secret owner, criminal cases are brought
by the government and can result in --- ines and imprisonment --- or the o ---
enders. This emphasizes that stealing trade secrets is not just a civil wrong but can be a crime, especially i — it involves — oreign espionage (#ForeignEspionage) or large-scale the — t. # Litigation — The process o — resolving disputes through the court system. In the con- text o — trade secrets, litigation typically means a civil lawsuit — iled by a trade secret owner against an alleged misappropriator (a #TSLawsuit). Litigation encompasses pleadings, discovery (where evidence is exchanged — o — ten tricky when the evidence is a secret), motions, trial, and possibly appeals. It is a key en — orcement mecha- nism when other measures (like negotiations or cease-and-desist letters) — ail to stop misappropriation. # TSLawsuit — Re — ers to a speci — ic civil action initiated by a trade secret owner to seek legal redress — or misappropriation. Such a lawsuit can be — iled under state law (UTSA-based) or — ederal law (#DTSA), or both. In a #TSLawsuit, the plainti —
aims to prove that the in — ormation was a protectable trade secret and that the de — endant misappropriated it, in the hope o — obtaining remedies like #Injunctions, #Damages, or permanently halting the de — endant’s use o — the secret. #TSLawsuits o — ten involve complex evidence (technical data, — orensic records o — access) and may be — iled in con- junction with other claims, like breach o — contract. # StatuteO — Limitations — The legally prescribed time period within which a trade secret claim must be — iled. Under the DTSA and most versions o — the UTSA, the statute o — limitations is 3 years — rom when the misappropriation was discovered or reasonably should have been discovered. This rule encourages prompt action by trade secret owners once they learn o — a the — t. I — a company waits too long and the statute expires, they lose the right to bring a lawsuit, regardless o — the merits.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 259 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 260 10/16/25 9:25 PM Appendix E Table o — Cases
3M 3M v. Pribyl 259 F.3d 587 7th Cir. 2001
7EDU Impact Acad. Inc. v. 2024 U.S. Dist.
7EDU Impact N.D. Cal. 2024
Ya You LEXIS 230110
Accent Accent Packaging, Inc. v.
707 F.3d 1318 Fed. Cir. 2013
Packaging Leggett & Platt, Inc.
Am. Ctr. --- or Excellence in
ACE Surgical Assisting, Inc. v. 315 F. Supp. 3d 1044 N.D. Ill. 2018
Cmty. College Dist. 502
2022 FED App.
Aday Aday v. West --- ield Ins. Co. 6th Cir. 2022
0036N
Air --- acts Air --- acts, Inc. v. Amezaga 30 F.4th 359 4th Cir. 2022
Aleynikov United States v. Aleynikov 676 F.3d 71 2d Cir. 2012
Allstate Allstate Ins. Co. v. Fougere 79 F.4th 172 1st Cir. 2023
Altavion, Inc. v.
Altavion Konica Minolta Systems 226 Cal. App. 4th 26 Cal. Ct. App. 2014
Laboratory, Inc.
Am. Can Co. v.
American Can 742 F.2d 314 7th Cir. 1984
Mansukhani
American Registry, LLC v. 2014 U.S. Dist.
Am. Registry M.D. Fla. 2014
Hanaw LEXIS 101158
Amnet ESOP Corp. v. 2023 U.S. Dist.
Amnet N.D. Ga. 2023
CrossCountry Mortg., Inc. LEXIS 232869
Anywhere Anywherecommerce, Inc.
665 F. Supp. 3d 181 D. Mass. 2023
commerce v. Ingenico Inc.
ATS Grp. LLC v. Legacy
ATS Group 407 F. Supp. 3d 1186 W.D. Okla. 2019
Tank & Indus. Servs. LLC
Aubin Indus. Aubin Indus., Inc. v. Smith 321 Fed. Appx. 422 6th Cir. 2008
261
6406_Oranburg_Protecting Trade Secrets_1pp.indb 261 10/16/25 9:25 PM 262 Appendix E
Auto Channel, Inc. v.
Auto Channel 144 F. Supp. 2d 784 W.D. Ky. 2001
Speedvision Network, LLC
Avery Dennison Corp. v.
Avery Dennison 118 F. Supp. 2d 848 S.D. Ohio 2000
Kitsonas
Basic Am. Basic Am., Inc. v. Shatila 133 Idaho 726 Idaho Sup. Ct. 1999
Bianco v.
Bianco 30 F. Supp. 3d 565 E.D. Tex. 2014
Globus Med., Inc.
Big Vision Private, Ltd. v.
Big Vision E.I. Dupont De Nemours 1 F. Supp. 3d 224 S.D.N.Y. 2014
& Co.
Bimbo Bakeries USA, Inc.
Bimbo Bakeries 613 F.3d 102 3d Cir. 2010
v. Botticella
Bonito Boats, Inc. v. U.S. Supreme
Bonito Boats 489 U.S. 141 1989
Thunder Cra --- t Boats, Inc. Ct.
Broker Genius Broker Genius, Inc. v. Zalta 280 F. Supp. 3d 495 S.D.N.Y. 2017
Bowers v.
Bowers 320 F.3d 1317 Fed. Cir. 2003
Baystate Techs., Inc.
The Bull Bag, LLC v. 2017 U.S. Dist.
Bull Bag D. Conn. 2017
Remorques Savage, Inc. LEXIS 139567
Burten v.
Burten 763 F.2d 461 1st Cir. 1985
Milton Bradley Co.
C3.Ai Inc. v. 2024 Del. Super.
C3.ai Del. Super. Ct. 2024
Cummins, Inc. LEXIS 622
CAE Integrated, L.L.C. v.
CAE Integrated 44 F.4th 257 5th Cir. 2022
Moov Techs., Inc.
Catalyst Advisors, L.P. v. 2022 U.S. Dist.
Catalyst Advisors S.D.N.Y. 2022
Catalyst Advisors, Inc. LEXIS 55392
CheckPoint Fluidic Sys.
CheckPoint 888 F. Supp. 2d 780 E.D. La. 2012
Int’l, Ltd. v. Guccione
Cheryl & Co. Cheryl & Co. v. Krueger 536 F. Supp. 3d 182 S.D. Ohio 2021
CheckPoint Fluidic Sys.
CheckPoint 888 F. Supp. 2d 780 E.D. La. 2012
Int’l, Ltd. v. Guccione
Che --- s Diet Acquisition 2016 U.S. Dist.
Che --- s Diet S.D.N.Y. 2016
Corp. v. Lean Che --- s, LLC LEXIS 133299
Cheryl & Co. Cheryl & Co. v. Krueger 536 F. Supp. 3d 182 S.D. Ohio 2021
Chicago Lock Co. v.
Chicago Lock 676 F.2d 400 9th Cir. 1982
Fanberg
6406_Oranburg_Protecting Trade Secrets_1pp.indb 262 10/16/25 9:25 PM Appendix E 263
E. I. du Pont de Nemours
Christopher 431 F.2d 1012 5th Cir. 1970
& Co. v. Christopher
Cigna Cigna Corp. v. Bricker 103 F.4th 1336 8th Cir. 2024
ClearOne ClearOne Advantage, LLC 2024 U.S. Dist.
D. Md. 2024
Advantage v. Kersen LEXIS 205636
ClearOne ClearOne Communs., Inc.
643 F.3d 735 10th Cir. 2011
Communications v. Bowers
Compuli --- e So --- tware, Inc. v.
Compuli --- e 111 F.4th 1147 11th Cir. 2024
Newman
Computer Computer Assocs. Int’l v.
831 F. Supp. 1516 D. Colo. 1993
Associates American Fundware, Inc.
Computer Computer Assocs. Int’l v.
831 F. Supp. 1516 D. Colo. 1993
Associates American Fundware, Inc.
Continental Continental Car-Na-Var
24 Cal. 2d 104 Cal. 1944
Car-Na-Var Corp. v. Moseley
Continental Continental Group, Inc. v.
422 F. Supp. 838 D. Conn. 1976
Group Kinsley
Convolve, Inc. v.
Convolve 527 Fed. Appx. 910 Fed. Cir. 2013
Compaq Computer Corp.
Daniels Health Scis., LLC
Daniels Health v. Vascular Health Scis., 710 F.3d 579 5th Cir. 2013
LLC
Data Gen. Corp. v.
Data General Grumman Sys. Support 36 F.3d 1147 1st Cir. 1994
Corp.
Del Monte Fresh Produce
Del Monte 136 F. Supp. 2d 1271 S.D. Fla. 2001
Co. v. Dole Food Co.
Detsis v. 2006 U.S. Dist.
Detsis S.D.N.Y. 2006
Victoria’s Secret Stores, Inc. LEXIS 73992
Diamond Power Int’l, Inc.
Diamond Power 540 F. Supp. 2d 1322 N.D. Ga. 2007
v. Davidson
DigitalGlobe, Inc. v.
DigitalGlobe 269 F. Supp. 3d 1112 D. Colo. 2017
Paladino
Direct Biologics, L.L.C. v.
Direct Biologics 63 F.4th 1015 5th Cir. 2023
McQueen
Doeblers’ Pa. Hybrids, Inc.
Doeblers 442 F.3d 812 3d Cir. 2006
v. Doebler
6406_Oranburg_Protecting Trade Secrets_1pp.indb 263 10/16/25 9:25 PM 264 Appendix E
Dow Chem. Co. v. U.S. Supreme
Dow Chemical 476 U.S. 227 1986
United States Ct.
2018 U.S. Dist.
Dra --- tKings Dra --- tKings, Inc. v. Benson D. Mass. 2018
LEXIS 210435
Dravo Smith v. Dravo Corp. 203 F.2d 369 7th Cir. 1953
DVD Copy DVD Copy Control Assn.
31 Cal. 4th 864 Cal. Sup. Ct. 2003
Control v. Bunner
Dynamics Dynamics Research Corp.
9 Mass. App. Ct. 254 Mass. App. Ct. 1980
Research v. Analytic Sciences Corp.
EarthWeb EarthWeb, Inc. v. Schlack 71 F. Supp. 2d 299 S.D.N.Y. 1999
ECIMOS, LLC v.
ECIMOS 971 F.3d 616 6th Cir. 2020
Carrier Corp.
Edwards v.
Edwards 44 Cal. 4th 937 Cal. Sup. Ct. 2008
Arthur Andersen LLP
Electro-Cra --- t Corp. v.
Electro-Cra --- t 332 N.W.2d 890 Minn. Sup. Ct. 1983
Controlled Motion, Inc.
Elsevier Inc. v. 2018 U.S. Dist.
Elsevier S.D.N.Y. 2018
Doctor Evidence, LLC LEXIS 10730
Epic Sys. Corp. v.
Epic Systems 980 F.3d 1117 7th Cir. 2020
Tata Consultancy Servs.
Eubanks People v. Eubanks 14 Cal. 4th 580 Cal. Sup. Ct. 1996
Experian In --- o. Solutions v. 2016 U.S. Dist.
Experian D. Ariz. 2016
Nationwide Mktg. Servs. LEXIS 199607
Fail-Sa --- e, LLC v.
Fail-Sa --- e 674 F.3d 889 7th Cir. 2012
A.O. Smith Corp.
Fairchild Engine &
Fairchild 50 N.Y.S.2d 643 N.Y. Sup. Ct. 1944
Airplane Corp. v. Cox
Financial
Fin. In --- o. Techs., LLC v.
In --- ormation 21 F.4th 1267 11th Cir. 2021
Icontrol Sys. USA, LLC
Technologies
Flotec, Inc. v.
Flotec 16 F. Supp. 2d 992 S.D. Ind. 1998
Southern Research, Inc.
FMC Corp. v.
FMC Corporation 899 F. Supp. 1477 D. Nev. 1995
Cyprus Foote Mineral Co.
Freda Freda v. Commissioner 656 F.3d 570 7th Cir. 2011
GateGuard, Inc. v. 2023 U.S. Dist.
GateGuard S.D.N.Y. 2023
Amazon.com Inc. LEXIS 26905
6406_Oranburg_Protecting Trade Secrets_1pp.indb 264 10/16/25 9:25 PM Appendix E 265
Gov’t Emps. Ins. Co. v.
GEICO 262 F. Supp. 3d 153 E.D. Pa. 2017
Nealey
General Water Gen. Water Techs. Inc. v.
2022 UT App 90 Utah Ct. App. 2022
Technologies Van Zweden
Giasson Giasson Aero. Sci., Inc. v.
680 F. Supp. 2d 830 E.D. Mich. 2010
Aerospace RCO Eng’g, Inc.
GlobeRanger Corp. v.
GlobeRanger 836 F.3d 477 5th Cir. 2016
So --- tware AG USA, Inc.
Gordon Gordon v. Landau 49 Cal. 2d 690 Cal. Sup. Ct. 1958
2008 U.S. Dist.
Harsco Harsco Corp. v. Piontek M.D. Tenn. 2008
LEXIS 17104
Hawg Tools, LLC v.
Hawg Tools Newsco Int’l Energy 2016 COA 176M Colo. Ct. App. 2016
Servs., Inc.
Heartland Payment Sys.,
Heartland 446 F. Supp. 3d 1275 N.D. Ga. 2020
LLC v. Stockwell
Henry Hope X-Ray Prods.
Henry Hope 674 F.2d 1336 9th Cir. 1982
v. Marron Carrel, Inc.
Hertz Hertz v. Luzenac Group 576 F.3d 1103 10th Cir. 2009
Hickory Hickory Specialties, Inc. v.
12 F. Supp. 2d 760 M.D. Tenn. 1998
Specialties Forest Flavors Int’l, Inc.
Howley United States v. Howley 707 F.3d 575 6th Cir. 2013
Hsu United States v. Hsu 155 F.3d 189 3d Cir. 1998
Integrated Cash
ICM Mgmt. Servs. v. Digital 920 F.2d 171 2d Cir. 1990
Transactions, Inc.
Iconics Iconics, Inc. v. Massaro 266 F. Supp. 3d 449 D. Mass. 2017
IDS Li --- e IDS Li --- e Ins. Co. v. Royal
266 F.3d 645 7th Cir. 2001
Insurance Alliance Assocs.
Incase Incase Inc. v. Timex Corp. 488 F.3d 46 1st Cir. 2007
Town & Country
Ingenious 2022 U.S. Dist.
Linen Corp. v. S.D.N.Y. 2022
Designs LEXIS 125154
Ingenious Designs LLC
Insulet Corp. v.
Insulet 104 F.4th 873 Fed. Cir. 2024
EOFlow, Co.
Inteliclear, LLC v.
Inteliclear 978 F.3d 653 9th Cir. 2020
ETC Global Holdings, Inc.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 265 10/16/25 9:25 PM 266 Appendix E
Iowa Film Iowa Film Prod. Servs. v.
818 N.W.2d 207 Iowa 2012
Production Iowa Dep’t o --- Econ. Dev.
Jacked Up, LLC v. Sara Lee
Jacked Up 854 F.3d 797 5th Cir. 2017
Corp.
Janssen Prod., LP v.
Janssen Products 109 F. Supp. 3d 650 D. Del. 2015
Lupin Ltd.
Jelec USA, Inc. v.
Jelec 498 F. Supp. 2d 945 S.D. Tex. 2007
Sa --- ety Controls, Inc.
United States v.
Jin 833 F. Supp. 2d 977 N.D. Ill. 2012
Hanjuan Jin
Jobscience, Inc. v. 2014 U.S. Dist.
Jobscience N.D. Cal. 2014
CVPartners, Inc. LEXIS 64350
Kadant, Inc. v.
Kadant 244 F. Supp. 2d 19 N.D.N.Y. 2003
Seeley Mach., Inc.
Kelly Services, Inc. v.
Kelly Services 530 F. Supp. 2d 940 E.D. Mich. 2008
Eidnes
Kewanee Oil Co. v. U.S. Supreme
Kewanee 416 U.S. 470 1974
Bicron Corp. Court
E.I. DuPont de Nemours
Kolon & Co. v. 431 F.2d 1012 5th Cir. 1971
Kolon Industries, Inc.
LA Potencia, LLC v.
LA Potencia 733 F. Supp. 3d 1238 D. Colo. 2024
Chandler
Lange v.
Lange 297 Minn. 399 Sup. Ct. Minn. 1973
National Biscuit Co.
Learning Curve Toys, Inc.
Learning Curve 342 F.3d 714 7th Cir. 2003
v. PlayWood Toys, Inc.
Leo Sil --- en Leo Sil --- en, Inc. v. Cream 278 N.E.2d 636 Ct. App. NY 1972
Religious Technology
Lerma 908 F. Supp. 1362 E.D. Va. 1995
Center v. Lerma
Li --- e Spine, Inc. v.
Li --- e Spine 8 F.4th 531 7th Cir. 2021
Aegis Spine, Inc.
Light v.
Light 883 S.W.2d 642 Tex. 1994
Centel Cellular Co.
Linkco Linkco, Inc. v. Fujitsu Ltd. 232 F. Supp. 2d 182 S.D.N.Y. 2002
Litton Sys. v.
Litton Systems 750 F.2d 952 Fed. Cir. 1984
Sundstrand Corp.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 266 10/16/25 9:25 PM Appendix E 267
LuckyShot LLC v. 2021 U.S. Dist.
LuckyShot D. Colo. 2021
Runnit CNC Shop, Inc. LEXIS 65364
Mallet Mallet & Co. v. Lacayo 16 F.4th 364 3d Cir. 2021
Mattel, Inc. v. MGA
Mattel 782 F. Supp. 2d 911 C.D. Cal. 2010
Entertainment, Inc.
E. I. du Pont de Nemours U.S. Supreme
Masland 244 U.S. 100 1917
Powder Co. v. Masland Ct.
Mavel, a.s. v.
Mavel 626 F. Supp. 3d 331 D. Mass. 2022
Rye Dev., LLC
McClain McClain v. State 269 S.W.3d 191 Tex. App. 2008
2022 U.S. Dist.
Medcor Medcor, Inc. v. Garcia N.D. Ill. 2022
LEXIS 6761
Metallurgical Metallurgical Indus. v.
790 F.2d 1195 5th Cir. 1986
Industries Fourtek, Inc.
Miller UK Ltd. v.
Miller UK 859 F. Supp. 2d 941 N.D. Ill. 2012
Caterpillar Inc.
Mirtech Inc. v.
Mirtech 561 F. Supp. 3d 447 D. Del. 2021
Agro --- resh Inc.
Modern Controls, Inc. v.
Modern Controls 578 F.2d 1264 8th Cir. 1978
Andreadakis
2020 U.S. Dist.
Moss Moss Holding Co. v. Fuller N.D. Ill. 2020
LEXIS 39068
Mtivity, Inc. v.
Mtivity 525 F. Supp. 3d 433 E.D.N.Y. 2021
O ---
ice Depot, Inc. National Nat’l Specialty Pharm., Specialty 734 F. Supp. 3d 922 N.D. Cal. 2024 LLC v. Padhye Pharmacy
nClosures Inc. v.
nClosures 770 F.3d 598 7th Cir. 2014
Block & Co.
Religious Technology
Center v. Netcom
Netcom 907 F. Supp. 1361 N.D. Cal. 1995
Online Communication
Service, Inc.
Neural Magic, Inc. v.
Neural Magic 659 F. Supp. 3d 138 D. Mass. 2023
Meta Plat --- orms, Inc.
Niemi Niemi v. NHK Spring Co. 543 F.3d 294 6th Cir. 2008
Nosal United States v. Nosal 676 F.3d 854 9th Cir. 2012
6406_Oranburg_Protecting Trade Secrets_1pp.indb 267 10/16/25 9:25 PM 268 Appendix E
NOVA Chems., Inc. v.
NOVA Chemicals 579 F.3d 319 3d Cir. 2009
Sekisui Plastics Co.
Novus Grp., LLC v.
Novus Group 74 F.4th 424 6th Cir. 2023
Prudential Fin., Inc.
Palltronics, Inc. v. Bankr. E.D.
Palltronics 647 B.R. 76 2022
PALIoT Sols., Inc. Mich.
2008 U.S. Dist.
Papermaster IBM v. Papermaster S.D.N.Y. 2008
LEXIS 95516
Patient Depot, LLC v. Fla. Dist. Ct.
Patient Depot 360 So. 3d 399 2023
Acadia Enters., Inc. App.
Patriot Homes, Inc. v.
Patriot Homes 512 F.3d 412 7th Cir. 2008
Forest River Housing, Inc.
Pauwels Pauwels v. Deloitte LLP 83 F.4th 171 2d Cir. 2023
Payment Alliance Int’l, Inc.
Payment Alliance 530 F. Supp. 2d 477 S.D.N.Y. 2007
v. Ferreira
Peabody Peabody v. Nor --- olk 98 Mass. 452 Mass. Sup. Ct. 1868
Pegasystems Inc. v.
Pegasystems 424 F. Supp. 3d 214 D. Mass. 2021
Appian Corp.
Penthol, LLC v. Vertex
Penthol 722 F. Supp. 3d 660 S.D. Tex. 2024
Energy Operating, LLC
PepsiCo PepsiCo, Inc. v. Redmond 54 F.3d 1262 7th Cir. 1995
2011 U.S. Dist.
PhoneDog PhoneDog v. Kravitz N.D. Cal. 2011
LEXIS 129229
Physiotherapy Physiotherapy Assocs.,
592 F. Supp. 3d 1032 N.D. Ala. 2022
Associates Inc. v. ATI Holdings, LLC
Pie Dev, Inc. v. Pie 2022 U.S. Dist.
Pie Dev D.D.C. 2022
Insurance Holdings, Inc. LEXIS 88714
Powell Products Powell Products v. Marks 948 F. Supp. 1469 D. Colo. 1996
Pre-Paid Legal Servs., Inc. 2008 U.S. Dist.
Pre-Paid Legal E.D. Okla. 2008
v. Cahill LEXIS 12301
Pressure Science, Inc. v. 2023 U.S. Dist.
Pressure Science D. Mass. 2023
Thermo Fisher Scienti --- ic LEXIS 56432
Purchasing Purchasing Power, LLC v.
851 F.3d 1218 11th Cir. 2017
Power Bluestem Brands, Inc.
Puroon, Inc. v.
2018 U.S. Dist.
Puroon Midwest Photographic N.D. Ill. 2018
LEXIS 187623
Res. Ctr., Inc.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 268 10/16/25 9:25 PM Appendix E 269
QSRSo --- t, Inc. v. 2006 U.S. Dist.
QSRSo --- t N.D. Ill. 2006
Restaurant Technology, Inc. LEXIS 76120
Quantum Sail Design
Quantum Sail
Grp., LLC v. 827 Fed. Appx. 485 6th Cir. 2020
Design
Jannie Reuvers Sails, Ltd.
Regas Christou v.
Regas Christou 849 F. Supp. 2d 1055 D. Colo. 2012
Beatport, LLC
Reliant Hosp. Partners,
Reliant Hospital LLC v. Cornerstone
374 S.W.3d 488 Tex. App. 2012
Partners Healthcare Group
Holdings, Inc.
REXA REXA, Inc. v. Chester 42 F.4th 652 7th Cir. 2022
Rivendell Forest Rivendell Forest Prods. v.
28 F.3d 1042 10th Cir. 1994
Products Georgia-Paci --- ic Corp.
RoadRunner
2023 U.S. Dist.
RoadRunner Recycling, Inc. v. N.D. Cal. 2023
LEXIS 229227
Recycle Track Sys., Inc.
Rockwell Graphic
Rockwell Systems, Inc. v. 925 F.2d 174 7th Cir. 1991
DEV Industries, Inc.
Rockwell Graphic
Rockwell Graphic
Systems, Inc. v. 925 F.2d 174 7th Cir. 1991
Systems
DEV Industries, Inc.
Roton Barrier, Inc. v.
Roton 79 F.3d 1112 Fed. Cir. 1996
Stanley Works
Ruckelshaus v. U.S. Supreme
Ruckelshaus 467 U.S. 986 1984
Monsanto Co. Court
ScentSational Techs., LLC
ScentSational 773 Fed. Appx. 607 Fed. Cir. 2019
v. PepsiCo, Inc.
Scott v.
Scott 732 F. Supp. 1034 N.D. Cal. 1990
Snelling & Snelling, Inc.
SCR-Tech LLC v. Evonik N.C. Super.
SCR-Tech 2011 NCBC 26 2011
Energy Servs. LLC Ct.
Shamrock Technologies,
Shamrock
Inc. v. Medical 903 F.2d 789 Fed. Cir. 1990
Technologies
Sterilization, Inc.
Shatterproo --- Glass Corp. v.
Shatterproo ---
322 F. Supp. 854 E.D. Mich. 1970
Guardian Glass Co.
Shell Oil Shell Oil Co. v. Franco 2015 WL 4760660 S.D. Tex. 2015
6406_Oranburg_Protecting Trade Secrets_1pp.indb 269 10/16/25 9:25 PM 270 Appendix E
Sing Sing v. Reliant Techs., Inc. 147 F.3d 929 9th Cir. 1998
Southwest Southwest Stainless, LP v.
582 F.3d 1176 10th Cir. 2009
Stainless Sappington
State Farm Mut. Auto.
State Farm 174 Cal. App. 2d 418 Cal. Ct. App. 1959
Ins. Co. v. Dempster
StorageCra --- t Tech. Corp.
StorageCra --- t 744 F.3d 1183 10th Cir. 2014
v. Kirby
Structured Capital
Structured
Solutions, LLC v. 177 F. Supp. 3d 816 S.D.N.Y. 2016
Capital Solutions
Commerzbank AG
Tabor Tabor v. Tabor 388 S.W.3d 322 Tex. App. 2012
Telex Telex Corp. v. IBM 510 F.2d 894 10th Cir. 1975
Tianrui Grp. Co. v.
Tianrui 661 F.3d 1322 Fed. Cir. 2011
Int’l Trade Comm’n
TLS Mgmt. & Mktg. Servs.,
TLS Management 966 F.3d 46 1st Cir. 2020
LLC v. Rodríguez-Toledo
Total Quality Logistics,
Total Quality 2024-Ohio-2597 Ohio Ct. App. 2024
LLC v. BBI Logistics LLC
Town & Country
Town & Country 2021 U.S. Dist.
Linen Corp. v. S.D.N.Y. 2021
Linen LEXIS 57345
Ingenious Designs LLC
Town & Country House
Town & Country
& Home Service, Inc. v. 3 N.Y.2d 554 Ct. App. NY 1958
House & Home
Newbery
Uniram Tech., Inc. v.
UniRAM Taiwan Semiconductor 617 F. Supp. 2d 938 N.D. Cal. 2009
M --- g. Co.
United States v.
USM 833 F. Supp. 2d 977 N.D. Ill. 2012
Hanjuan Jin
Vault Corp. v.
Vault Corp 847 F.2d 255 5th Cir. 1988
Quaid So --- tware Ltd.
Vickery Vickery v. Welch 36 Mass. 523 Mass. Sup. Ct. 1837
Vulcan Detinning Co. v. Ct.
Vulcan Detinning 67 N.J. Eq. 243 1904
American Can Co. Chancery N.J.
Waring Waring v. Dunlea 26 F. Supp. 338 E.D.N.C. 1939
Waymo LLC v.
Waymo 870 F.3d 1350 Fed. Ct. App. 2017
Uber Technologies, Inc.
6406_Oranburg_Protecting Trade Secrets_1pp.indb 270 10/16/25 9:25 PM Appendix E 271
Weed Eater, Inc. v.
Weed Eater 562 S.W.2d 898 Tex. App. 1978
Dowling
Weightman Weightman v. State 975 S.W.2d 621 Tex. App. 1998
Wellogix, Inc. v.
Wellogix 716 F.3d 867 5th Cir. 2013
Accenture, L.L.P.
Wexler Wexler v. Greenberg 399 Pa. 569 Pa. Sup. Ct. 1960
Williams Williams v. Weisser 78 Cal. Rptr. 542 Cal. Ct. App. 1969
Williams-Sonoma Direct,
Williams-Sonoma 109 F. Supp. 3d 1009 W.D. Tenn. 2015
Inc. v. Arhaus, LLC
Religious Technology
Wollersheim 796 F.2d 1076 9th Cir. 1986
Center v. Wollersheim
Wyeth v.
Wyeth 395 F.3d 897 8th Cir. 2005
Natural Biologics, Inc.
Xtec, Inc. v. 2014 U.S. Dist.
Xtec S.D. Fla. 2014
CardSmart Techs., Inc. LEXIS 184597
Yammine v. Toolbox --- or
HR Spolka z Ograniczona 2023 U.S. Dist.
Yammine D. Ariz. 2023
Odpowiedzialnoscia LEXIS 138908
Spolka Komandytowa
6406_Oranburg_Protecting Trade Secrets_1pp.indb 271 10/16/25 9:25 PM 6406_Oranburg_Protecting Trade Secrets_1pp.indb 272 10/16/25 9:25 PM