Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo

1.

Unlike patents and trademarks, the law requires that intellectual property consisting of trade secrets not be publicly disclosed. True or False?

  1. True.
  2. False.
2.

Which of the following best describes a trade secret?

  1. Information that many people do not know about how a product like a smartphone is made.
  2. Virtually any information that is of value as a result of not being generally known.
  3. Any information relating to the finances of a publicly held company.
3.

Trade secret theft or misappropriation costs the world’s richest 40 nations approximately how much of their gross domestic product, or GDP, each year?

  1. 1 to 3 percent.
  2. 4 to 6 percent.
  3. 7 to 10 percent.
4.

What are the two main requirements for information to be protectable as a trade secret?

  1. It must be novel and non-obvious.
  2. It must be original and expressed in a tangible form that can be seen or copied.
  3. It must be not generally known by others, and it must have been subject to reasonable efforts to avoid public disclosure.
5.

What is one key advantage of trade secret protection versus patent protection?

  1. It protects the information to be kept secret indefinitely.
  2. It prevents others from ever independently deriving the same information.
  3. Both of the above are correct.
6.

If you invent faster-than-light travel but believe someone will be able to reverse engineer it by examining your starship, should you patent it or keep it as a trade secret?

  1. Keep it as a trade secret.
  2. Patent it.
7.

What did the Supreme Court note in the case of Bonito Boats v. Thunder Craft Boats?

  1. One cannot legally misappropriate trade secrets.
  2. Nobody is above the law, not even a trade secret owner.
  3. The holder of a trade secret does not have protection against reverse engineering.
8.

If information is protected as a valid trade secret, a competitor can be stopped from using it no matter who he obtained it from. True or False?

  1. True.
  2. False.
9.

Trade secret protection is guaranteed by the federal government. True or False?

  1. True.
  2. False.
10.

In which country did trade secret law first originate in the early 1800s?

  1. France.
  2. The United States.
  3. England.
11.

What impact did the Uniform Trade Secrets Act (UTSA) of 1979 have on trade secret protection in the United States?

  1. It was the first trade secret law binding on every state.
  2. It served as a model that was adopted by 48 of the 50 U.S. states.
  3. It served as a model that was adopted by every state.
12.

Which of the following best describes the problem with the current lack of uniform federal protection of trade secrets?

  1. There is no real protection against misappropriation of trade secrets.
  2. The protections against trade secret theft are very uneven.
  3. A federal trade secret law would merely replicate state protections.
13.

Which of the following could be considered a trade secret so long as reasonable steps had been taken to prevent its disclosure?

  1. Sales information.
  2. Customer lists.
  3. Manufacturing techniques.
  4. All of the above.
14.

Is information not known to the public considered to be a trade secret?

  1. Yes.
  2. No.
  3. It depends.
15.

Would a customer list always be considered a trade secret?

  1. It depends on whether the customers want to be identified or not.
  2. To be considered a trade secret, the names of customers must not be available or discernable through public sources.
16.

Can a mere idea be considered a trade secret?

  1. No. Just as you cannot patent or copyright a mere idea, you cannot protect a mere idea with a trade secret.
  2. Yes. Under the Uniform Trade Secrets Act, even an idea can sometimes be considered a trade secret.
17.

To gain trade secret protection, what must the owner do with confidential information?

  1. Publicize it as widely as possible.
  2. Not disclose it.
  3. Take active steps to keep the information secret.
18.

What are the benefits of developing a written trade secret plan?

  1. It serves as a policy manual that prevents situations in which unwritten rules are followed and security procedures are ignored.
  2. In the event of litigation, it can serve as proof that you took active steps to keep the information secret.
  3. Both of these.
19.

How should companies handle written trade secrets?

  1. Shred them.
  2. Mark them “secret” or “confidential,” among other measures taken.
  3. Never store them on a computer.
20.

Which of these is an example of “passive disclosure” of a trade secret?

  1. Leaving confidential documents lying around for anyone to see.
  2. Inadvertently disseminating information at trade shows or conferences.
  3. Disclosing confidential information in press releases, newspaper articles, or marketing collateral.
21.

What is one way to guard against the active disclosure of trade secret information?

  1. Prevent employee attendance at trade shows and seminars.
  2. Appoint a trade secret committee to approve publications, speeches, and marketing collateral prior to disclosure.
  3. Avoid meeting with prospective buyers, customers, or licensees.
22.

Which of the following is NOT an example of misappropriation of a trade secret?

  1. Acquisition of a trade secret through improper means.
  2. Deliberate disclosure of a trade secret by the trade secret owner.
  3. Disclosure of a trade secret without consent.
23.

The UTSA not only prohibits the actual disclosure or use of a trade secret, it also protects against the “threatened” disclosure of trade secrets. When might a court intervene to stop a “threatened” disclosure before the actual disclosure takes place?

  1. An employee goes to work for another company in a different industry.
  2. An employee caught embezzling is fired and the employer believes the same lack of morals will lead to the fired employee disclosing trade secrets.
  3. An employee goes to work for an arch competitor in a comparable job position.
24.

The burden of proof in a threatened trade secret misappropriation case lies with whom?

  1. The trade secret owner.
  2. The former employee who leaves to go work for a competitor.
  3. The competitor, who must prove he did no wrong by hiring the ex-employee.
25.

What remedies does the UTSA provide for the misappropriation of trade secrets? (Choose all that apply.)

  1. Criminal penalties of up to five years for a first offense.
  2. Statutory damages.
  3. Injunctive relief.
  4. Exemplary damages.
  5. Attorneys’ fees.
26.

What remedies were imposed in the case of Mattel, Inc. v. MGA Entm’t, Inc. in 2013?

  1. An injunction barring a new employer from hiring the former employee of the trade secret owner.
  2. $85 million in exemplary (punitive) damages awarded to the trade secret owner.
Order a print copy

As an Amazon Associate we earn from qualifying purchases.

Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute The Michelson 20MM Foundation. Changes were made to the original material, including updates to art, structure, and other content updates.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/introduction-intellectual-property/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/introduction-intellectual-property/pages/1-introduction
Citation information

© Mar 31, 2023 The Michelson 20MM Foundation. The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.