There’s No Trade Secret Troll Hiding Under The Bridge

了解《捍卫商业秘密法》(DTSA)规定的举报人豁免权
Last Updated: 3 月 14, 2026
Updated by: Chris Buntel

Table Of Content

When most people think of intellectual property enforcement, patent trolls often come to mind: non-practicing entities (NPEs) that exploit the patent system to generate revenue through litigation or settlements. But in the world of trade secrets, the same type of behavior is practically nonexistent. That raises an important question: Why aren’t there “trade secret trolls”? And what does that mean for your company’s approach to IP strategy and confidential data protection?

There’s no trade secret troll hiding under the bridge

The idea of a “trade secret troll” is rarely discussed, but it is an interesting concept. We are all familiar with “non-practicing entities” (NPEs), “patent assertion entities” (PAEs), or “patent trolls” – companies that acquire large collections of patents, and license or litigate in search of equally large royalty or settlement amounts.

With trade secret damages reaching staggering heights in the last few years, one would expect NPEs to take interest and look out from beneath their bridge. This isn’t happening. Why?

First, patents can be asserted against anyone infringing the patent’s claims in the patent’s geography. There’s no need for any kind of relationship between the patent owner and the alleged infringer. There can be large numbers of infringers to pursue. For trade secrets, there are usually only a single person or a small team of people who steal the trade secret.
Second, trade secret misappropriation is closer to a “theft” or “embezzlement” model than patent infringement. Trade secrets are typically taken by someone who once had legitimate access (such as an employee, collaboration partner, vendor, and so on), but something changed. Maybe the employee left the company, taking valuable information with them to a competitor, or maybe a partner or vendor used the company’s confidential information to help other clients in violation of their contract with the trade secret owner. This requirement for a trusted relationship limits the number of targets for an NPE to pursue. Patent infringement functions more like a land mine – patents go after anyone who steps on their claims.

Third, while technically possible to license or sell a trade secret, it doesn’t happen very often. Trade secrets are sometimes licensed along with patents, but there really isn’t a real marketplace for the exchange or sale of trade secrets.
It is relatively easy to build your own collection of trade secrets if you are an operating company (you have way more than you think!), but it is difficult to acquire a collection of trade secrets for an assertion model.

Taking care of your trade secrets is serious, but don’t spend much time worrying about trade secret trolls.

Disclosure: Tim Londergan and Chris Buntel both previously worked for Intellectual Ventures.

What You Should Worry About: Internal IP Risk

While “trade secret trolls” aren’t a threat, the real danger lies in the people you trust most: employees, partners, and vendors. This is where trade secret misappropriation tends to occur—and why proactive trade secret management is critical.

Businesses today are handling an unprecedented volume of proprietary data. R&D files, customer lists, pricing models, algorithms, internal tools—these are all trade secrets when kept confidential and treated appropriately. But without the right policies, systems, and oversight, they’re at risk of being lost or stolen.

How to Strengthen Your Trade Secret Protection Program

Here are three immediate actions your company can take to reduce IP exposure and protect your competitive edge:

  1. Identify your trade secrets
    Create a clear inventory of what qualifies as confidential and commercially valuable across departments.

     

  2. Limit and track access
    Ensure only the right people can access sensitive information, and document that access over time—especially for offboarding and vendor relationships.

3. Establish formal protections
Develop a company-wide trade secret policy, implement NDAs, and train staff on confidentiality protocols.

Final Takeaway: No Trolls, but Real Threats

The absence of trade secret trolls shouldn’t lull companies into complacency. If anything, it highlights how essential it is for operating companies to take trade secret protection into their own hands. There’s no third party waiting to assert your rights for you. You are the front line of defense.

from our blog

Blog, Featured Blogs

Tangibly Achieves SOC 2 Compliance, Reinforcing Our Commitment to Security and Trade Secret Protection

We are proud to share that Tangibly has successfully completed its SOC 2 audit again this year, marking an important milestone in our continued commitment to enterprise...
Blog, Case Law & Industry Trends, Trade Secret Strategy

What’s happening in the Epic Games trade secret lawsuit over Fortnite leaks?

Another Epic lawsuit! This case is another great, Epic even, example of how 70% of trade secret problems come from insider leaks like employee or contractor misconduct....
Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

What is litigation funding?

With the recent press release from SIM IP and Tangibly, a client recently asked me a simple but important question: how does litigation funding actually work? The...
Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

SIM IP and Tangibly Launch Trade Secret Litigation Financing Partnership

Miami – Jan 15, 2026 – Sauvegarder Investment Management, Inc. (“SIM IP”), a global leader in intellectual property-based investment and monetization, and Tangibly, an...
Blog, Trade Secret Strategy

How do litigation funding companies evaluate trade secret claims?

Trade secret misappropriation cases can produce substantial recoveries, but they are complex, expensive, and inherently risky. For companies confronting stolen trade...
Blog, Trade Secret Strategy

The financial impact of trade secret misappropriation

Trade secret misappropriation is not merely a legal dispute. It is a direct assault on enterprise value. When confidential business information is taken, misused, or...
Blog, Trade Secret Strategy

What to do after discovering trade secret misappropriation or IP theft

Discovering that trade secrets or other confidential information have been stolen, whether by an employee, competitor, or third party, poses a serious threat to your...
Blog, Trade Secret Strategy

When to use litigation funding in a trade secret lawsuit?

Trade secret lawsuits arise from intellectual property theft or the misappropriation of confidential business information. These disputes can deliver substantial...
Blog, AI & IP, Featured Blogs, Intellectual Property & Patent Insights, Trade Secret Strategy

When AI patent tools become the most valuable trade secrets

A newly filed lawsuit in the Northern District of California centers on alleged trade secret misappropriation involving an AI powered patent analysis and management...
Blog, Trade Secret Strategy

What are litigation loans and how do they work in high value disputes?

The term “litigation loans” is commonly used by companies searching for capital to pursue a lawsuit. In practice, most sophisticated commercial funding structures are...