In today’s knowledge economy, a company’s most valuable assets are often intangible. Customer lists, manufacturing processes, proprietary formulas, and business strategies can be worth far more than physical property or equipment. Trade secret law protects these valuable information assets, but only if they truly qualify as trade secrets under the law. Understanding what information rises to the level of trade secret protection is crucial for businesses seeking to safeguard their competitive advantages.
Defining Trade Secrets
A trade secret is information that derives independent economic value from not being generally known or readily ascertainable by others and is subject to reasonable efforts to maintain its secrecy. This definition, adopted in various forms across U.S. jurisdictions, contains three essential elements that must all be present for information to qualify as a trade secret.
The Three Essential Elements
Economic Value from Secrecy
For information to be a trade secret, it must have actual or potential independent economic value because it is secret. This economic value can take many forms:
- Providing a competitive advantage in the marketplace
- Reducing costs or improving efficiency
- Attracting or retaining customers
- Enabling the business to charge premium prices
- Preventing competitors from duplicating products or processes without significant investment
The key is that the value must derive from the information being secret. If the information would have the same value even if widely known, it likely isn’t a trade secret. For example, a unique manufacturing process that allows cheaper production has economic value from secrecy. General business principles known throughout an industry do not.
Economic value doesn’t require that the information currently generate revenue—potential future value suffices. A research formula for a product still in development can be a trade secret if it has potential economic value.
Not Generally Known or Readily Ascertainable
Trade secrets must not be generally known to the public or within the relevant industry, and they must not be readily ascertainable by proper means. Information readily available through:
- Public sources
- Industry publications
- Reverse engineering of legally obtained products
- Independent development
- General knowledge and experience in the field
cannot be trade secrets, even if an individual company treats the information as confidential.
The “readily ascertainable” requirement is important. Information isn’t automatically disqualified just because someone could theoretically discover it through significant effort or expense. What matters is whether the information can be easily obtained through legitimate means without substantial time, effort, or cost.
Reasonable Efforts to Maintain Secrecy
Perhaps most importantly, the company claiming trade secret protection must have taken reasonable measures to keep the information secret. Courts won’t protect information that the owner failed to protect. What constitutes “reasonable” efforts varies based on:
- The value of the information
- The size and resources of the company
- Industry practices
- The nature of the information
- The number of people who need access
Reasonable measures typically include:
- Non-disclosure agreements with employees, contractors, and business partners
- Confidentiality policies and employee training
- Physical security measures (locked files, restricted access areas)
- Digital security (passwords, encryption, access controls)
- Marking documents as confidential
- Exit interviews with departing employees
- Limiting access on a need-to-know basis
Absolute secrecy isn’t required—trade secrets can be shared with employees, contractors, and others who need to know, provided appropriate confidentiality measures are in place. However, failing to take basic precautions will defeat trade secret claims.
Common Types of Trade Secrets
Trade secrets encompass a wide variety of information types:
Technical Information
- Manufacturing processes and methods
- Chemical formulas and compositions
- Software source code and algorithms
- Engineering designs and specifications
- Research and development data
- Quality control procedures
- Technical specifications
Business Information
- Customer lists and customer information
- Supplier lists and pricing
- Business methods and strategies
- Marketing plans and strategies
- Cost and pricing information
- Sales methods and techniques
- Business forecasts and projections
- Profit margins and financial data
Combinations of Known Elements
Even if individual pieces of information are publicly known, their specific combination or application can be a trade secret. For example:
- A recipe combining publicly available ingredients in a proprietary way
- A manufacturing process using standard equipment in a novel sequence
- A business strategy combining known techniques in a unique manner
The key is that the specific combination provides competitive advantage not readily available through public sources.
What Typically Doesn’t Qualify as a Trade Secret
Certain types of information generally cannot be trade secrets:
General Skills and Knowledge
Employees’ general skills, knowledge, and experience gained during employment are not trade secrets, even if learned on the job. An employee who becomes an expert in a field through employment can use that expertise elsewhere, as long as they don’t take or use specific proprietary information.
Publicly Available Information
Information available in:
- Published materials
- Patent filings
- Public records
- Industry publications
- Academic literature
cannot be trade secrets, even if the company compiles it in useful ways.
Information Disclosed Without Adequate Protection
If information is disclosed publicly without confidentiality restrictions, it generally loses trade secret protection. This can happen through:
- Publications or presentations
- Product sales that reveal the technology through reverse engineering
- Unprotected disclosure to third parties
- Social media posts or public statements
The Uniform Trade Secrets Act
Most U.S. states have adopted some version of the Uniform Trade Secrets Act (UTSA), which provides a consistent framework for trade secret protection. The UTSA defines trade secrets and provides remedies for misappropriation, though specific provisions vary by state.
The federal Defend Trade Secrets Act (DTSA), enacted in 2016, provides a federal civil cause of action for trade secret misappropriation, complementing state law protections.
Trade Secrets vs. Patents
Companies often must choose between trade secret protection and patent protection for innovations. Understanding the differences is crucial:
Trade Secrets
Advantages:
- No disclosure required
- Unlimited duration if secrecy maintained
- Protection begins immediately
- No registration costs
- Protection for information not patentable
Disadvantages:
- No protection against independent discovery or reverse engineering
- Lost if secrecy is breached
- Difficult to enforce
- No absolute right to exclude others
Patents
Advantages:
- Absolute right to exclude others, even independent developers
- Public record of invention
- Prestige and credibility
- Licensing opportunities
Disadvantages:
- Requires full public disclosure
- Limited term (generally 20 years)
- Expensive and time-consuming to obtain
- Requires novelty and non-obviousness
Some innovations, like the Coca-Cola formula, are better protected as trade secrets because they could theoretically be kept secret indefinitely, whereas patent protection would require disclosure and expire after 20 years.
Protecting Your Trade Secrets
To maintain trade secret protection, companies should implement comprehensive protective measures:
Identify Trade Secrets
Conduct audits to identify what information qualifies as trade secrets and assess their value. Not all confidential information is a trade secret, and focusing protection on genuinely valuable secrets is more effective than treating everything as confidential.
Implement Physical Security
- Restrict access to areas where trade secrets are stored or used
- Lock filing cabinets and offices containing sensitive information
- Control visitor access
- Use security cameras in sensitive areas
- Implement clean desk policies
Implement Digital Security
- Require strong passwords and multi-factor authentication
- Encrypt sensitive data
- Use access controls and logs
- Monitor data access and transfer
- Implement data loss prevention systems
- Secure remote access
- Conduct regular security audits
Use Confidentiality Agreements
Require non-disclosure agreements from:
- All employees before they access trade secrets
- Contractors and consultants
- Business partners and vendors
- Potential investors or buyers
- Anyone else who may access sensitive information
Employee Training and Policies
- Train employees on trade secret identification and protection
- Implement clear confidentiality policies
- Include confidentiality obligations in employment agreements
- Conduct exit interviews emphasizing ongoing confidentiality obligations
- Remind employees regularly of their obligations
Mark Documents Appropriately
Label confidential documents, files, and materials clearly, making it obvious that the information is proprietary and protected.
Limit Disclosure
Share trade secrets only with those who need to know, and only to the extent necessary. The wider the disclosure, the harder it is to maintain secrecy and enforce rights.
Monitor Compliance
Regularly audit security measures and monitor compliance with policies. Update protections as threats evolve and business needs change.
When Trade Secret Protection Fails
Trade secret protection can be lost through:
- Public disclosure without confidentiality restrictions
- Failure to take reasonable protective measures
- Abandonment (ceasing to treat information as confidential)
- Independent discovery by others
- Reverse engineering of lawfully obtained products
- Good-faith disclosure in legal proceedings or to regulators
Once lost, trade secret protection generally cannot be recovered for that information.
Litigating Trade Secret Claims
Trade secret litigation involves several key issues:
Identifying the Trade Secret
Plaintiffs must specifically identify what constitutes the trade secret—broad, vague descriptions are insufficient. Courts require precision to determine whether information actually qualifies as a trade secret and whether misappropriation occurred.
Proving the Elements
Plaintiffs must prove the information qualifies as a trade secret under the three-part test, which requires demonstrating value, secrecy, and reasonable protective measures.
Showing Misappropriation
Plaintiffs must prove that the defendant acquired, used, or disclosed the trade secret through improper means or breach of confidentiality obligations.
Calculating Damages
Trade secret damages can include:
- Actual losses from misappropriation
- Unjust enrichment of the defendant
- Reasonable royalties
- In some cases, exemplary damages for willful and malicious misappropriation
How Anunobi Law Can Help
At Anunobi Law, we help businesses protect their most valuable information assets through comprehensive trade secret counseling and aggressive enforcement when misappropriation occurs. Our services include:
- Conducting trade secret audits to identify protectable information
- Implementing protective policies and procedures
- Drafting confidentiality and non-disclosure agreements
- Prosecuting trade secret misappropriation claims
- Defending against trade secret allegations
- Seeking injunctive relief to prevent disclosure or use
- Recovering damages for trade secret theft
We understand that trade secrets are often the lifeblood of modern businesses, and we’re committed to protecting these critical assets with sophisticated legal strategies tailored to each client’s unique circumstances.
Legal Disclaimer: This article is provided for informational purposes only and does not constitute legal advice. Trade secret law varies by jurisdiction, and whether specific information qualifies as a trade secret depends on the particular facts and circumstances. For advice regarding your specific situation, please consult with a qualified attorney. Reading this article does not create an attorney-client relationship.