Trade Secret Law for U.S. Businesses
Trade secret law governs the legal protection of confidential business information that derives economic value from remaining undisclosed. In the United States, this framework operates through both federal statute and state law, creating overlapping but distinct layers of protection and enforcement. This page covers the definition and scope of trade secret protection, the mechanisms through which it operates, common scenarios where it applies, and the boundaries that determine when protection attaches or fails.
Definition and scope
Federal trade secret law is grounded in the Defend Trade Secrets Act of 2016 (DTSA, 18 U.S.C. §§ 1836–1839), which created a private federal civil cause of action for the first time. Before the DTSA, businesses relied exclusively on state law, most commonly statutes modeled on the Uniform Trade Secrets Act (UTSA), which 48 states and the District of Columbia had adopted as of the DTSA's passage (Uniform Law Commission).
The DTSA defines a trade secret as any information — including formulas, patterns, compilations, programs, devices, methods, techniques, or processes — that meets two criteria:
- Independent economic value from not being generally known or readily ascertainable by competitors through proper means.
- Reasonable measures taken by the owner to maintain its secrecy.
State UTSA-based statutes use substantially identical language, though state courts have developed divergent interpretations on points such as what constitutes "reasonable measures" and whether a plaintiff must identify the alleged trade secret with specificity before discovery.
The scope of protectable information is broad. Customer lists, manufacturing processes, pricing algorithms, source code, and internal financial models have all been recognized as trade secrets in published federal and state court decisions. Unlike intellectual property law for businesses, trade secret protection does not require registration with any government agency, and there is no fixed term of protection — the right persists as long as the information remains secret and reasonable precautions continue.
How it works
Trade secret protection is self-executing: no filing, registration, or public disclosure is required. The legal mechanism activates upon misappropriation, which both the DTSA and the UTSA define as acquisition by improper means or disclosure or use of a trade secret without consent.
"Improper means" under 18 U.S.C. § 1839(6) includes theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, and espionage through electronic or other means. Independent development and reverse engineering, by contrast, are explicitly lawful under both the DTSA and the UTSA — a critical distinction that shapes litigation strategy.
Enforcement proceeds through civil litigation in federal or state court. The DTSA additionally permits the Department of Justice to pursue criminal charges under the Economic Espionage Act of 1996 (18 U.S.C. §§ 1831–1839), with penalties reaching $5 million per offense for individuals and $10 million or three times the value of the stolen trade secret for organizations, whichever is greater.
Civil remedies under the DTSA include:
- Injunctive relief — courts may issue orders to prevent actual or threatened misappropriation, though injunctions cannot conflict with applicable state law on employee mobility.
- Damages — actual loss plus unjust enrichment, or a reasonable royalty in cases where neither measure is provable.
- Exemplary damages — up to two times actual damages in cases of willful and malicious misappropriation (18 U.S.C. § 1836(b)(3)(C)).
- Attorney's fees — available when a claim or motion is made in bad faith, or misappropriation is willful and malicious.
The DTSA also authorizes ex parte seizure orders — emergency seizures of property without prior notice to the defendant — a remedy reserved for extraordinary circumstances where the defendant would destroy or conceal evidence if notified. This tool has no parallel in the UTSA framework.
Common scenarios
Trade secret disputes arise in recognizable patterns across industries. The four most common scenarios involve departing employees, competitive intelligence operations, vendor relationships, and M&A transactions.
Departing employees represent the highest-volume category of trade secret litigation. An employee who downloads customer contact databases, pricing models, or proprietary technical specifications before resigning triggers DTSA claims even if no non-compete and non-disclosure agreements were signed, provided the information meets the statutory definition. Courts have held that the mere retention of employer files on a personal device constitutes misappropriation where reasonable secrecy measures were in place.
Competitive intelligence becomes actionable when methods cross from public-domain research into impersonation, hacking, or inducing insiders to breach confidentiality obligations. The line between lawful reverse engineering and misappropriation often requires expert testimony on whether a process could have been independently reconstructed from publicly available information within a commercially reasonable time.
Vendor and supplier relationships create exposure when proprietary specifications, tolerances, or formulations are shared under non-disclosure agreements that a counterparty later violates — or when a vendor's personnel move to a competitor and carry the information with them. This scenario intersects with contract law for businesses because breach of the NDA and DTSA misappropriation are separate, concurrent claims with different remedies.
M&A due diligence routinely involves disclosure of trade secrets to potential acquirers. If the transaction fails and the prospective buyer uses disclosed information in its own operations, a misappropriation claim accrues from the date of unauthorized use, not from the date of disclosure.
Decision boundaries
Trade secret protection fails at identifiable thresholds. Understanding these boundaries determines whether a claim will survive dismissal or proceed to judgment.
Secrecy destroyed by public disclosure. Once information enters the public domain — through a patent application, a published paper, or an unprotected public release — it cannot be reclaimed as a trade secret. This creates a direct tension with intellectual property law for businesses: patent protection requires public disclosure; trade secret protection requires permanent concealment. Businesses must make a binary choice at the point of innovation.
Failure to take reasonable measures. Courts have denied trade secret status where the alleged owner:
- Distributed the information without confidentiality markings or agreements
- Permitted open access to sensitive data without access controls
- Failed to train employees on confidentiality obligations
- Allowed vendors unrestricted access to proprietary systems
The DTSA does not specify what measures are "reasonable," leaving this to fact-intensive judicial analysis on a case-by-case basis.
Independent development and reverse engineering. A competitor who develops the same formula through its own research, or who disassembles a publicly sold product to determine its composition, has not misappropriated. This is a complete defense under both federal and state law.
Statute of limitations. The DTSA imposes a 3-year limitations period from the date the misappropriation was discovered or should have been discovered with reasonable diligence (18 U.S.C. § 1836(d)). State UTSA periods vary — California applies a 3-year period under California Civil Code § 3426.6, while New York, which has not adopted the UTSA, applies a 3-year period under common law. Delayed discovery can toll the period in some jurisdictions, but courts split on how much investigation triggers the discovery clock.
Trade secret law intersects with business regulatory compliance when sensitive information regulated under other frameworks — such as personally identifiable information protected under data privacy law for businesses — also qualifies as a trade secret, layering both sets of obligations on the same data set.
References
- Defend Trade Secrets Act of 2016 — 18 U.S.C. §§ 1836–1839 (House.gov)
- Economic Espionage Act of 1996 — 18 U.S.C. §§ 1831–1839 (House.gov)
- Uniform Trade Secrets Act — Uniform Law Commission
- California Civil Code § 3426.6 — California Legislative Information
- [U.S. Department of Justice — Economic Espionage and Trade