Fiveable

๐Ÿ’กIntro to Intellectual Property Unit 5 Review

QR code for Intro to Intellectual Property practice questions

5.2 The Foundations of Trade Secrets Law

5.2 The Foundations of Trade Secrets Law

Written by the Fiveable Content Team โ€ข Last updated August 2025
Written by the Fiveable Content Team โ€ข Last updated August 2025
๐Ÿ’กIntro to Intellectual Property
Unit & Topic Study Guides

Trade secrets law gives businesses a way to protect valuable confidential information from being stolen or misused. Understanding how this area of law developed helps you see why modern protections work the way they do and how they differ from other forms of intellectual property like patents or copyrights.

Historical Development of Trade Secret Law

Trade secret protection in the United States started with common law principles, meaning courts recognized these rights through case decisions rather than through a specific statute.

  • Peabody v. Norfolk (1868) was the first major case to recognize a business's right to protect confidential information. This established the foundational idea that secret business knowledge deserves legal protection.
  • The Restatement of Torts (1939) provided the first widely accepted definition of trade secrets. It laid out factors courts should consider, such as how much effort a business put into keeping the information secret and how valuable that information was to the business and its competitors.
  • The Restatement (Third) of Unfair Competition (1995) updated and refined the definition. It added considerations like how easy or difficult it would be for someone else to properly acquire or duplicate the information on their own.
  • The Economic Espionage Act (1996) made trade secret theft a federal crime. It applies to trade secrets connected to products or services in interstate or foreign commerce, covering industries like pharmaceuticals and software.

Notice the progression: courts recognized trade secrets first, then legal scholars formalized the definitions, and finally Congress stepped in to add criminal penalties. Each step built on the last.

Historical development of trade secret law, Intellectual Property โ€“ Mastering Strategic Management โ€“ 1st Canadian Edition

Key Provisions of the Uniform Trade Secrets Act (UTSA)

The UTSA is a model law drafted by the Uniform Law Commission in 1979. It has been adopted by 48 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands, which means trade secret law is now fairly consistent across most of the country.

What counts as a trade secret under the UTSA:

The information must derive independent economic value from not being generally known to others who could benefit from it. This covers a wide range: formulas, patterns, compilations, programs, devices, methods, techniques, or processes.

What counts as misappropriation:

Misappropriation is the improper acquisition, use, or disclosure of a trade secret. The UTSA draws a clear line between legitimate competitive research and wrongful conduct.

Remedies available under the UTSA:

  • Injunctive relief to stop actual or threatened misappropriation
  • Damages covering actual losses, unjust enrichment, or reasonable royalties
  • A 3-year statute of limitations for filing trade secret claims
  • Protective orders during litigation to keep the secrets from becoming public through court proceedings (for example, sealing records or restricting who can access confidential filings)
Historical development of trade secret law, Departing Employees, Confidentiality Clauses and European Trade Secret Protection | SpringerLink

Concept of Trade Secret Misappropriation

Misappropriation can happen in two main ways: improperly acquiring a trade secret, or using/disclosing one without the owner's consent.

Improper acquisition includes theft, bribery, misrepresentation, breach of a duty to maintain secrecy (like violating a non-disclosure agreement), or espionage (hacking into systems, even dumpster diving for discarded documents).

Unauthorized use or disclosure applies to:

  1. A person who acquired the trade secret through improper means (for example, an industrial spy)
  2. A person who knew or should have known the information was improperly obtained (for example, a company that hires a competitor's former employee specifically to extract that competitor's secrets)

Remedies for misappropriation:

  • Injunctive relief prohibits further use or disclosure of the stolen information
  • Compensatory damages cover actual losses like lost profits, or the wrongdoer's unjust enrichment (disgorgement of profits gained through misappropriation), or a reasonable royalty
  • Exemplary damages of up to double the actual damages can be awarded when the misappropriation was willful and malicious
  • Attorney's fees may be awarded in cases involving bad faith or willful and malicious conduct

Economic and Competitive Aspects of Trade Secrets

Trade secrets matter because they let companies maintain a competitive edge without publicly disclosing their innovations (which is what a patent would require). A secret formula, a proprietary algorithm, or a unique manufacturing process can give a business a commercial advantage that lasts as long as the information stays confidential.

Unlike patents, which expire after a set term, trade secret protection can theoretically last forever. The tradeoff is that if someone independently develops the same information or reverse-engineers your product through legitimate means, you have no legal claim against them. Trade secret law only protects against improper acquisition, not independent discovery.

This is why companies invest heavily in security measures, NDAs, and access controls. The protection is only as strong as the secrecy itself.