Trade secrets are valuable business assets that require protection from . Companies must safeguard their confidential information from , , and unauthorized . Understanding the types of misappropriation helps businesses identify and prevent potential threats.

Courts evaluate misappropriation claims using direct and . Threatened misappropriation allows owners to seek before actual theft occurs. The legal framework, including the and , provides tools for protecting these valuable assets.

Misappropriation of Trade Secrets

Misappropriation types for trade secrets

Top images from around the web for Misappropriation types for trade secrets
Top images from around the web for Misappropriation types for trade secrets
  • Misappropriation through
    • Acquiring trade secrets through methods contrary to honest commercial practices
    • Examples of improper means:
      • Theft involves taking trade secrets without the owner's consent (stealing documents or products)
      • Bribery entails offering something of value to obtain trade secrets (paying an employee for confidential information)
      • includes deceiving the owner to gain access to trade secrets (posing as a potential business partner)
      • Breach of a to maintain secrecy occurs when an individual with authorized access discloses trade secrets (an employee sharing confidential data with a competitor)
      • through electronic or other means involves using technology to acquire trade secrets (hacking into a company's database)
  • Misappropriation through disclosure of trade secrets
    • Disclosing or using trade secrets without the owner's consent
    • Disclosure scenarios:
      • Disclosing trade secrets known to be acquired through improper means (sharing stolen blueprints with a third party)
      • Disclosing trade secrets in breach of a duty to maintain secrecy (a former employee revealing confidential information to a new employer)
      • Disclosing trade secrets known to be acquired by accident or mistake (using confidential documents received in error)

Evidence of trade secret misappropriation

  • Direct evidence
    • provides firsthand accounts of misappropriation (a coworker witnessing the theft of confidential documents)
    • by the defendant involve statements acknowledging misappropriation (an email admitting to using stolen trade secrets)
    • Physical evidence showing the defendant possessed the trade secret (confidential prototypes found in the defendant's possession)
  • Circumstantial evidence
    • Showing the defendant had access to the trade secret (proving the defendant attended meetings where the trade secret was discussed)
    • Demonstrating similarities between the defendant's product or process and the trade secret (comparing the defendant's product to the plaintiff's patented design)
    • Establishing a timeline of events suggesting misappropriation (showing the defendant's product launch occurred shortly after a former employee joined their company)
    • Proving the defendant's product or process could not have been independently developed (demonstrating the complexity and uniqueness of the trade secret)
    • Showing the defendant did not use to obtain the trade secret

Threatened misappropriation in courts

  • Threatened misappropriation
    • Occurs when there is a high probability that misappropriation will occur if no preventive measures are taken
    • Allows trade secret owners to seek injunctive relief before actual misappropriation takes place (requesting a court order to prevent an employee from joining a competitor)
  • Factors courts consider in evaluating threatened misappropriation claims:
    • The existence of a non-disclosure or (an employee signing an agreement not to disclose trade secrets or work for a competitor)
    • The level of competition between the plaintiff and defendant (direct competitors in the same market)
    • The defendant's prior conduct or expressed intent (previous attempts to acquire the trade secret or statements indicating plans to use it)
    • The value of the trade secret to the plaintiff and defendant (the potential impact on the plaintiff's business and the defendant's gain from using the trade secret)
    • The extent of the defendant's preparation to use or disclose the trade secret (evidence of the defendant's plans or actions to utilize the trade secret)
    • Application of the , which assumes an employee will inevitably use or disclose trade secrets in their new position
  • Uniform Trade Secrets Act provides a model for state laws on trade secret protection
  • Economic Espionage Act criminalizes the theft of trade secrets at the federal level
  • must be taken by the trade secret owner to maintain secrecy

Key Terms to Review (21)

Admissions: Admissions, in the context of misappropriation of trade secrets, refers to the voluntary acknowledgment or confession of information related to the unlawful acquisition, use, or disclosure of a company's confidential and proprietary data. This term is crucial in understanding the legal implications and evidentiary requirements surrounding the misappropriation of trade secrets.
Bribery: Bribery is the act of offering, giving, receiving, or soliciting of something of value to influence the actions of an official or other person in charge of a public or legal duty. It is a form of corruption that undermines the integrity of various systems, including the legal and economic realms.
Circumstantial Evidence: Circumstantial evidence refers to indirect evidence that implies or infers a fact or conclusion, rather than directly proving it. It is evidence that relies on an inference to connect it to a conclusion of fact, as opposed to direct evidence that supports the fact at issue.
Confidentiality: Confidentiality is the ethical and legal obligation to protect sensitive or private information from unauthorized access, use, or disclosure. It is a fundamental principle in various fields, including intellectual property, that ensures the security and trust of information entrusted to an individual or organization.
Disclosure: Disclosure refers to the act of revealing or making known information that was previously private or confidential. In the context of intellectual property and trade secrets, disclosure is a crucial concept that governs the protection and potential loss of trade secret status.
Duty: Duty refers to the legal obligation or responsibility that an individual or entity has to act in a certain way or to refrain from certain actions. It is a fundamental concept in various areas of law, including intellectual property, and plays a crucial role in the context of misappropriation of trade secrets.
Economic Espionage Act: The Economic Espionage Act is a federal law enacted in 1996 that criminalizes the theft of trade secrets, both for the benefit of a foreign government and for commercial or economic advantage. This law is closely tied to the concepts of trade secret protection, the foundations of trade secrets law, the secrecy requirement, and the misappropriation of trade secrets.
Espionage: Espionage is the act of obtaining secret or confidential information, often through covert means, for the purpose of benefiting another party, typically a rival organization or nation. It is a critical component in the context of misappropriation of trade secrets, as it involves the unauthorized acquisition of sensitive business information.
Eyewitness Testimony: Eyewitness testimony refers to the evidence provided by a person who has observed an event or incident and can provide an account of what they witnessed. This type of testimony is often crucial in legal proceedings, as it can be used to corroborate or contradict other evidence presented in a case.
Improper Means: Improper means refers to the unlawful or unethical methods used to acquire trade secrets or confidential information that belongs to another party. It is a key concept in the foundations of trade secrets law and the misappropriation of trade secrets.
Inevitable Disclosure Doctrine: The inevitable disclosure doctrine is a legal principle that allows an employer to prevent a former employee from working for a competitor if it is highly probable that the employee will inevitably disclose the employer's trade secrets in their new role. This doctrine is closely tied to the protection of trade secrets and the foundations of trade secrets law.
Injunctive Relief: Injunctive relief is a court-ordered remedy that requires a party to take or refrain from taking a specific action. It is a powerful tool used in various legal contexts, including trademark, trade secret, and intellectual property law, to prevent or stop harmful conduct.
Misappropriation: Misappropriation refers to the unauthorized use or disclosure of trade secrets, often through improper means such as theft, bribery, or breach of confidentiality agreements. It is a central concept in the field of trade secret law, as it forms the basis for legal action against individuals or entities that improperly acquire and utilize valuable, confidential business information.
Misrepresentation: Misrepresentation is the act of making a false or misleading statement about a material fact, with the intent to deceive or induce another party to take a particular action. It is a crucial concept in the context of trade secret misappropriation, as it can lead to the unlawful acquisition and use of confidential business information.
Non-Compete Agreement: A non-compete agreement is a contract that restricts an employee from working for a competitor or starting a competing business for a certain period of time after leaving their current employer. It aims to protect an employer's trade secrets, client relationships, and investment in employee training.
Non-Disclosure Agreement: A non-disclosure agreement (NDA) is a legal contract that establishes a confidential relationship between two or more parties, restricting the disclosure of sensitive or proprietary information to unauthorized individuals or entities. It is a crucial tool in protecting trade secrets and preventing the misappropriation of confidential information.
Reasonable Measures: Reasonable measures refer to the steps taken by a trade secret owner to protect the confidentiality and secrecy of their valuable information. This term is crucial in the context of trade secret protection, the foundations of trade secrets law, the elements of a trade secret, the secrecy requirement, and the misappropriation of trade secrets.
Reverse Engineering: Reverse engineering is the process of analyzing a product or system to understand its design, functionality, and underlying principles. It involves disassembling or deconstructing an object to examine its components and mechanisms, with the goal of recreating or replicating the original item or creating a similar product.
Theft: Theft is the unlawful taking of property or services belonging to another person or entity without their consent. In the context of intellectual property, theft can occur through the misappropriation of trade secrets, which involves the unauthorized acquisition, use, or disclosure of confidential business information.
Trade Secret: A trade secret is a valuable piece of confidential information that provides a business with a competitive advantage. It is protected under trade secrets law, which aims to incentivize innovation and protect the commercial value of proprietary knowledge.
Uniform Trade Secrets Act: The Uniform Trade Secrets Act (UTSA) is a model law that provides a legal framework for the protection of trade secrets. It establishes a consistent set of principles and guidelines for the definition, misappropriation, and remedies available for trade secret violations across different jurisdictions.
© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.