Skip to Content
OpenStax Logo
Introduction to Intellectual Property

5.5 Misappropriation of Trade Secrets

Introduction to Intellectual Property5.5 Misappropriation of Trade Secrets
  1. Preface and Foreword
  2. 1 Patent Basics
    1. Introduction
    2. 1.1 The Foundations of Patent Protection
    3. 1.2 The Weakness of Early Patent Systems
    4. 1.3 America’s Uniquely Democratic Patent System
    5. 1.4 The Role of the U.S. Legal System
    6. 1.5 What the U.S. Patent System Wrought
    7. 1.6 Patent-Eligible Inventions
    8. 1.7 Criteria for Patenting
    9. 1.8 Other Types of Patents
    10. 1.9 The Patenting Process
    11. Assessment Questions
  3. 2 Patent Enforcement
    1. Introduction
    2. 2.1 The Right to Enforce Patents
    3. 2.2 Deciding Whether and How to Enforce a Patent
    4. 2.3 Patent Litigation
    5. 2.4 Getting Started
    6. 2.5 Pretrial Procedures
    7. 2.6 Trial
    8. 2.7 Post-Trial Procedures
    9. 2.8 Appeals
    10. 2.9 Litigation Alternatives
    11. 2.10 Patent Trolls and Efforts to Thwart Them
    12. Assessment Questions
  4. 3 Copyright Basics
    1. Introduction
    2. 3.1 The Basics of Copyright
    3. 3.2 Early Copyright Systems
    4. 3.3 Copyright in America
    5. 3.4 Eligible Works
    6. 3.5 Rights and Term
    7. 3.6 Infringement and Remedies
    8. 3.7 The Fair Use Defense
    9. 3.8 Changes in Copyright Law
    10. 3.9 New Technology Challenges to Copyright
    11. 3.10 Alternative Forms of Copyright
    12. 3.11 Copyright in a Changing World
    13. Assessment Questions
  5. 4 Trademark Basics
    1. Introduction
    2. 4.1 Core Concepts
    3. 4.2 Early Trademark Systems
    4. 4.3 U.S. Trademark Law
    5. 4.4 The Four Types of Trademarks
    6. 4.5 The Subject Matter of Trademarks
    7. 4.6 The Spectrum of Distinctiveness
    8. 4.7 Bars to Trademark
    9. 4.8 Establishing Trademark Protection
    10. 4.9 Trademark Infringement
    11. 4.10 Trademark Remedies
    12. 4.11 Fair Use of Trademarks
    13. Assessment Questions
  6. 5 Trade Secret Basics
    1. Introduction
    2. 5.1 Trade Secret Protection
    3. 5.2 The Foundations of Trade Secrets Law
    4. 5.3 Elements of a Trade Secret
    5. 5.4 The Secrecy Requirement
    6. 5.5 Misappropriation of Trade Secrets
    7. 5.6 Remedies Available for the Misappropriation of Trade Secrets
    8. Assessment Questions
  7. Glossary
  8. Answer Key
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
  9. Index

Learning Objectives

After completing this section, you will be able to

  • Describe the differences between the misappropriation of a trade secret through improper means and disclosure without consent.
  • Explain how trade secret owners use direct evidence and circumstantial evidence to prove that a misappropriation of trade secrets has occurred.

The enforcement provisions of the UTSA allow companies and individuals to protect information that qualifies as a trade secret. The protections allowed for by the UTSA are triggered by the actual or threatened “misappropriation” of trade secrets. “Misappropriation” is defined in two ways: (1) acquisition of a trade secret through improper means, or (2) disclosure or use of a trade secret without consent.

Misappropriation through Improper Means

The first type of misappropriation under the UTSA is acquisition of a trade secret through improper means. Specifically, the UTSA prohibits the “acquisition of a trade secret of another, by a person who knows or has reason to know the trade secret was acquired by improper means.”xxii “Improper means” includes theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means.xxiii In short, the first type of misappropriation is the mere possession of a trade secret that has been acquired through theft or the breach of a duty to maintain the secrecy of the trade secret.

Misappropriation through Disclosure

The second type of misappropriation under the UTSA is the disclosure or use of someone else’s trade secret without their express or implied consent. Although the statutory definition is somewhat complicated, the UTSA essentially prohibits the disclosure or use of a trade secret that is possessed as a result of theft, breach of a duty to maintain its secrecy, or an accident or mistake on the part of the trade secret owner.xxiv

In short, the UTSA prohibits the disclosure or use of a trade secret that is possessed as a result of “improper means” as defined in the preceding paragraph. The rule of thumb is that if you possess, disclose, or use a trade secret that you know or have reason to know is not intended to be revealed to you, beware.

UTSA’s Definition of Misappropriation

The UTSA’s definition of misappropriation is rather broad. The protection granted to trade secret owners under the UTSA is further expanded by prohibiting not only the actual, but also the threatened, misappropriation of trade secrets. The distinction between these two types of misappropriation is basically one of timing. The UTSA prohibits the actual disclosure of trade secrets and provides remedies for those whose trade secrets have already been misappropriated. A more difficult question arises, however, with respect to a trade secret owner’s rights prior to the actual misappropriation of trade secrets. To address a trade secret owner’s legitimate concerns that misappropriation may occur in the future, the UTSA prohibits “threatened” misappropriation.

A trade secret owner may assert legal rights subsequent to any actual unauthorized disclosure or use of trade secrets. In such situations, the wrong has already occurred and the trade secret owner may seek judicial intervention concerning any legal rights that were violated. This is true regardless of whether the misappropriator obtained the secret without the owner’s consent, or originally with consent but later used the secret for the misappropriator’s own gain.

The burden of proof in an actual misappropriation case is still squarely on the shoulders of the trade secret owner who is alleging that trade secrets have been misappropriated. This burden of proof requires the trade secret owner to demonstrate that he or she was in possession of knowledge or information that was not generally known and was valuable precisely because it was not generally known, and that the knowledge or information was subject to efforts that were reasonable under the circumstances to maintain its secrecy. Depending on the facts and circumstances of a given case, together with the nature of the intellectual property to be protected, proving the elements necessary to make out a trade secret case can be a challenging undertaking. The best way to establish a foundation for successful prosecution of trade secret misappropriation is to follow closely the provisions of a written trade secret protection plan, and take measures to ensure the security of the information as discussed above.

Perhaps the most interesting trade secret cases involve the alleged threatened misappropriation of trade secrets. In these cases, the trade secret owner does not contend that their trade secrets have already been compromised, but rather that unless some action is taken to halt the current progress of events, their trade secrets will be misappropriated at some time in the future. Threatened misappropriation cases often arise when a highly skilled or trained employee who has been exposed to a company’s trade secrets leaves the company’s employ and goes to work for a competitor. On the one hand, the former employer may well have legitimate concerns about possible disclosure of its trade secrets to a competitor; on the other hand, the employee has a right to choose an employer. Consequently, courts are required to balance these competing interests. The result often depends on the legitimacy of the trade secret owner’s concerns of misappropriation and the nature of the evidence that is available to substantiate those concerns.

When faced with a situation where an employee who has been exposed to trade secrets leaves to work for a new employer, courts typically consider three factors: (1) whether the former employer and the new employer are competitors, (2) whether the employee’s new position is comparable to the former position, and (3) the efficacy of steps taken by the new employer to prevent the misappropriation of trade secrets.xxv

Mere suspicion that another party may have wrongfully disclosed or used one’s trade secrets, in and of itself, does not enable the trade secret owner to assert these rights successfully. Courts will not prohibit the wrongful use or disclosure of trade secrets based upon the mere uneasiness or suspicions of the trade secret owner that some misappropriation may occur. Rather, the trade secret owner is required to demonstrate that the concerns of misappropriation are legitimate. In most situations, this means that the trade secret owner will be required to present evidence, either direct or circumstantial, that misappropriation is likely to occur.

A trade secret owner may present direct or circumstantial evidence to demonstrate that there is an imminent threatened misappropriation of trade secrets. Direct evidence exists when the trade secret owner can demonstrate that action has already been taken, or words have already been spoken, that indicate that misappropriation of trade secrets is going to occur. Common examples of direct evidence supporting a trade secret owner’s legitimate concerns of threatened misappropriation are statements made by the former employee or the new employer. Former employees might make statements about the relative lack of weight they give to their former employer’s confidentiality policies. Similarly, the new employer might make statements about the purpose of hiring the new employee, why other potential employees were rejected, or the nature of the duties the new employee will be required to perform. Based on evidence of such actions or statements, a court is likely to protect trade secrets by enjoining prospectively their wrongful use or disclosure.

In the Courtroom

However, in most situations, direct evidence concerning the likelihood of misappropriation does not exist. In such cases, a trade secret owner can present circumstantial evidence to demonstrate that the unauthorized use or disclosure of trade secrets is imminently threatened. Circumstantial evidence demonstrating that imminent misappropriation is likely to occur consists of two types: (1) evidence demonstrating the intent of a party to elicit the wrongful disclosure of the trade secret, and (2) evidence demonstrating that the wrongful disclosure or use of a trade secret is inevitable regardless of any party’s intentions.

Evidence demonstrating the intent of the new employer to elicit trade secrets from its new employee takes many forms. Often, a trade secret owner can show that the new employer desires the trade secret and has unsuccessfully attempted to acquire the trade secret information by proper means, either from the trade secret owner, other parties, or independent derivation or reverse engineering.xxvi The new employer’s intent to misappropriate trade secrets can also be demonstrated by showing that the new employer solicited the trade secret owner’s employees and has not made any efforts to solicit employees from the industry in general. Other facts, such as access to a common supplier, access to a former consultant, or failed prior attempts to duplicate technology can also contribute to a circumstantial showing of intent.

Second, in addition to circumstantial evidence demonstrating an intention to elicit improper disclosure of trade secrets, a trade secret owner can show that such disclosure is inevitable by virtue of the particular circumstances of the situation. This showing is most frequently demonstrated by evidence that the work to be performed by the former employee is very similar to the work previously performed for the trade secret owner, and that the former employee will be unable to perform the new job conscientiously without revealing trade secrets previously learned.

Although circumstantial evidence is generally not considered as strong as direct evidence, it is clear that courts will issue injunctions prohibiting the misappropriation of trade secrets based solely on circumstantial evidence that indicates such activity is imminently likely to occur. For example, in PepsiCo, Inc. v. Redmond , 54 F.3d 1262, the defendant moved from a senior position at PepsiCo to a position at rival Quaker Oats Company (then owner of the Gatorade brand, which is now owned by Pepsi). The court held that it was proper for the district court to conclude that based on the defendant’s access to Pepsi’s trade secrets, it was inevitable as part of the defendant’s new employment that the trade secrets would be relied on. The district court concluded that unless the defendant possessed “an uncanny ability to compartmentalize information,” he would necessarily make decisions for the new employer by relying on the trade secrets. This was true even though there was no direct evidence that Redmond disclosed any of Pepsi’s trade secrets.

Act Fast

A trade secret owner who suspects that either actual or threatened misappropriation has occurred or is likely to occur must act promptly to enforce their legal rights. Although the statute of limitations under the UTSA is three years, courts have the power to deny the relief requested by trade secret owners even when an action has been initiated within the statute of limitations period, if the action has not been initiated reasonably promptly. The UTSA assumes that a trade secret owner who suspects misappropriation will move with reasonable alacrity to protect intellectual property, and recognizes that if such action is not taken, then third parties may materially change their positions in a good-faith belief that no trade secret rights have been violated. Under such circumstances, a court may find that the trade secret owner has been estopped from exercising, or waived their right to seek protection under the UTSA. These principles essentially allow the court to find that even though the information that a party seeks to protect meets the requirements of a trade secret, equity demands that the information not be protected as a trade secret because protecting it would harm a third party.xxvii

Footnotes

  • xxii See Unif. Trade Secrets Act § 1(2)(i), U.L.A (1985).
  • xxiii See Unif. Trade Secrets Act § 1(1), U.L.A (1985).
  • xxiv See Unif. Trade Secrets Act §§ 2(2)(ii)(A)-(C), U.L.A (1985).
  • xxv Surgidev Corp. v. Eye Technology Inc., 648 F. Supp. 661, 695 (D. Minn. 1986), aff’d, 828 F.2d 452 (8th Cir. 1987).
  • xxvi For example, in Convolve, Inc. v. Compaq Computer Corp., 2006 U.S. Dist. LEXIS 13848, the plaintiffs asserted that the defendants were misappropriating trade secrets in violation of a nondisclosure agreement. As evidence of this violation, the plaintiffs showed that the defendants tried unsuccessfully to reverse engineer the trade secret-protected software. That evidence, interalia, was sufficient to withstand a motion for summary judgment.
  • xxvii See Watermark Solid Surface, Inc. v. Sta-Care, Inc., 2009 WL 723199 (W.D. Wis. 2009) (discussing waiver of trade secret protection); Christianson v. Colt Industries Operating Corp., 766 F.Supp. 670 (C.D. Ill. 1991) (outlining common equitable defenses in trade secrets cases).
Citation/Attribution

Want to cite, share, or modify this book? This book is Creative Commons Attribution License 4.0 and you must attribute The Michelson 20MM Foundation. Changes were made to the original material, including updates to art, structure, and other content updates.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/introduction-intellectual-property/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/introduction-intellectual-property/pages/1-introduction
Citation information

© Feb 3, 2021 The Michelson 20MM Foundation. The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.