Skip to ContentGo to accessibility page
OpenStax Logo
Introduction to Intellectual Property

5.2 The Foundations of Trade Secrets Law

Introduction to Intellectual Property5.2 The Foundations of Trade Secrets Law
  1. Preface and Foreword
  2. 1 Patent Basics
    1. Introduction
    2. 1.1 The Foundations of Patent Protection
    3. 1.2 The Weakness of Early Patent Systems
    4. 1.3 America’s Uniquely Democratic Patent System
    5. 1.4 The Role of the U.S. Legal System
    6. 1.5 What the U.S. Patent System Wrought
    7. 1.6 Patent-Eligible Inventions
    8. 1.7 Criteria for Patenting
    9. 1.8 Other Types of Patents
    10. 1.9 The Patenting Process
    11. Assessment Questions
  3. 2 Patent Enforcement
    1. Introduction
    2. 2.1 The Right to Enforce Patents
    3. 2.2 Deciding Whether and How to Enforce a Patent
    4. 2.3 Patent Litigation
    5. 2.4 Getting Started
    6. 2.5 Pretrial Procedures
    7. 2.6 Trial
    8. 2.7 Post-Trial Procedures
    9. 2.8 Appeals
    10. 2.9 Litigation Alternatives
    11. 2.10 Patent Trolls and Efforts to Thwart Them
    12. Assessment Questions
  4. 3 Copyright Basics
    1. Introduction
    2. 3.1 The Basics of Copyright
    3. 3.2 Early Copyright Systems
    4. 3.3 Copyright in America
    5. 3.4 Eligible Works
    6. 3.5 Rights and Term
    7. 3.6 Infringement and Remedies
    8. 3.7 The Fair Use Defense
    9. 3.8 Changes in Copyright Law
    10. 3.9 New Technology Challenges to Copyright
    11. 3.10 Alternative Forms of Copyright
    12. 3.11 Copyright in a Changing World
    13. Assessment Questions
  5. 4 Trademark Basics
    1. Introduction
    2. 4.1 Core Concepts
    3. 4.2 Early Trademark Systems
    4. 4.3 U.S. Trademark Law
    5. 4.4 The Four Types of Trademarks
    6. 4.5 The Subject Matter of Trademarks
    7. 4.6 The Spectrum of Distinctiveness
    8. 4.7 Bars to Trademark
    9. 4.8 Establishing Trademark Protection
    10. 4.9 Trademark Infringement
    11. 4.10 Trademark Remedies
    12. 4.11 Fair Use of Trademarks
    13. Assessment Questions
  6. 5 Trade Secret Basics
    1. Introduction
    2. 5.1 Trade Secret Protection
    3. 5.2 The Foundations of Trade Secrets Law
    4. 5.3 Elements of a Trade Secret
    5. 5.4 The Secrecy Requirement
    6. 5.5 Misappropriation of Trade Secrets
    7. 5.6 Remedies Available for the Misappropriation of Trade Secrets
    8. Assessment Questions
  7. A | Glossary
  8. Answer Key
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
  9. Index

Learning Objectives

After completing this section, you will be able to

  • Identify the roots of trade secret law in the United States.
  • Explain the purpose of the Uniform Trade Secrets Act.

Unlike patents and copyrights that are issued in accordance with federal law, trade secret protection until very recently emanated from state law. But on May 11, 2016, the federal Defend Trade Secrets Act (DTSA) was signed into law, thereby creating a federal cause of action for trade secret misappropriation that largely mirrors the current state of the law under the Uniform Trade Secrets Act (UTSA), which has been adopted by 48 states.

Trade secret law in the United States is largely rooted in the English legal tradition, and was first incorporated through the court-made common law. The general consensus is that trade secret law originated in England in the early 1800s.iii Early cases dealt with trade secret concepts not in modern trade secret vernacular but instead through the guise of jurisdictional or restraint of trade terms. The trade secret concept began in American jurisprudence in the case of Vickery v. Welch , 36 Mass. 523 (1837). The Massachusetts Supreme Court first expounded on trade secret law in modern terms in Peabody v. Norfolk , 98 Mass. 452 (1868). In the 145 years since the Peabody decision, the courts, including numerous federal courts, have addressed trade secret issues and have contributed to the current body of trade secret law. However, because each state may regulate trade secret law independently, each state has developed its own legal regime, involving a mixture of both statutes and common law, to regulate and protect trade secrets.

Uniform Trade Secrets Act

In an effort to harmonize and standardize trade secret law in the United States, the Uniform Law Commissioniv published the Uniform Trade Secrets Act (UTSA) in 1979. The UTSA sought to create a uniform trade secret law regime from state to state. However, the UTSA itself was not binding upon states at publication. In order for the UTSA to be successful, the states themselves needed to adopt and enact the model UTSA statute created by the commission. In 1980, Minnesota became the first state to adopt the UTSA. Since 1980, most states have adopted the UTSA, many with the 1985 amendments to the act. New York and Massachusetts remain the last states that have yet to adopt the UTSA. Although the UTSA harmonized various state law approaches to trade secrets, each state enacts the UTSA with any modifications or customizations the state legislature desires to make. Thus, although most states have adopted the UTSA, each state may have a slightly different adaptation of the UTSA.

One important provision of the UTSA is section 7, which deals with the interaction of the UTSA and state law. Section 7 preempts certain state law causes of action. Section 7 “displaces conflicting tort, restitutionary, and other law…providing civil remedies for misappropriation of a trade secret.”

Trade Secret Misappropriation

Although this section seems to indicate that the UTSA broadly replaces all state laws dealing with misappropriation of trade secrets, there is debate as to what constitutes “conflicting tort, restitutionary, and other law.” Additionally, what it means for a common law remedy to be “based on” misappropriation of a trade secret is often contested. Owners seeking to recover damages for misappropriation generally argue that only common law causes of action that have elements identical to the UTSA are preempted, while defendants argue that any cause of action used to protect trade secrets is preempted because it is duplicative of the UTSA. Despite this potential conflict between the UTSA and state common law, this chapter focuses on the main body of trade secret law as governed by the UTSA.

Footnotes

  • iii Michael Risch, Why Do We Have Trade Secrets?, 11 Intellectual Property L. Rev. 1 (2007) (citing Restatement (Third) of Unfair Competition § 39 cmt. a (1995).
  • iv The Uniform Law Commission, also known as the National Conference of Commissioners on Uniform State Laws, is a nonpartisan, nonprofit organization that promotes the uniformity of law from state to state. The Commission publishes “model laws” that states are then able to adopt and enact.
Citation/Attribution

Want to cite, share, or modify this book? This book is Creative Commons Attribution License 4.0 and you must attribute The Michelson 20MM Foundation. Changes were made to the original material, including updates to art, structure, and other content updates.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/introduction-intellectual-property/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/introduction-intellectual-property/pages/1-introduction
Citation information

© May 14, 2021 The Michelson 20MM Foundation. The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.