There’s No Trade Secret Troll Hiding Under The Bridge

了解《捍卫商业秘密法》(DTSA)规定的举报人豁免权
Last Updated: 11 月 9, 2025
Updated by: Chris Buntel

Table Of Content

When most people think of intellectual property enforcement, patent trolls often come to mind: non-practicing entities (NPEs) that exploit the patent system to generate revenue through litigation or settlements. But in the world of trade secrets, the same type of behavior is practically nonexistent. That raises an important question: Why aren’t there “trade secret trolls”? And what does that mean for your company’s approach to IP strategy and confidential data protection?

There’s no trade secret troll hiding under the bridge

The idea of a “trade secret troll” is rarely discussed, but it is an interesting concept. We are all familiar with “non-practicing entities” (NPEs), “patent assertion entities” (PAEs), or “patent trolls” – companies that acquire large collections of patents, and license or litigate in search of equally large royalty or settlement amounts.

With trade secret damages reaching staggering heights in the last few years, one would expect NPEs to take interest and look out from beneath their bridge. This isn’t happening. Why?

First, patents can be asserted against anyone infringing the patent’s claims in the patent’s geography. There’s no need for any kind of relationship between the patent owner and the alleged infringer. There can be large numbers of infringers to pursue. For trade secrets, there are usually only a single person or a small team of people who steal the trade secret.
Second, trade secret misappropriation is closer to a “theft” or “embezzlement” model than patent infringement. Trade secrets are typically taken by someone who once had legitimate access (such as an employee, collaboration partner, vendor, and so on), but something changed. Maybe the employee left the company, taking valuable information with them to a competitor, or maybe a partner or vendor used the company’s confidential information to help other clients in violation of their contract with the trade secret owner. This requirement for a trusted relationship limits the number of targets for an NPE to pursue. Patent infringement functions more like a land mine – patents go after anyone who steps on their claims.

Third, while technically possible to license or sell a trade secret, it doesn’t happen very often. Trade secrets are sometimes licensed along with patents, but there really isn’t a real marketplace for the exchange or sale of trade secrets.
It is relatively easy to build your own collection of trade secrets if you are an operating company (you have way more than you think!), but it is difficult to acquire a collection of trade secrets for an assertion model.

Taking care of your trade secrets is serious, but don’t spend much time worrying about trade secret trolls.

Disclosure: Tim Londergan and Chris Buntel both previously worked for Intellectual Ventures.

What You Should Worry About: Internal IP Risk

While “trade secret trolls” aren’t a threat, the real danger lies in the people you trust most: employees, partners, and vendors. This is where trade secret misappropriation tends to occur—and why proactive trade secret management is critical.

Businesses today are handling an unprecedented volume of proprietary data. R&D files, customer lists, pricing models, algorithms, internal tools—these are all trade secrets when kept confidential and treated appropriately. But without the right policies, systems, and oversight, they’re at risk of being lost or stolen.

How to Strengthen Your Trade Secret Protection Program

Here are three immediate actions your company can take to reduce IP exposure and protect your competitive edge:

  1. Identify your trade secrets
    Create a clear inventory of what qualifies as confidential and commercially valuable across departments.

     

  2. Limit and track access
    Ensure only the right people can access sensitive information, and document that access over time—especially for offboarding and vendor relationships.

3. Establish formal protections
Develop a company-wide trade secret policy, implement NDAs, and train staff on confidentiality protocols.

Final Takeaway: No Trolls, but Real Threats

The absence of trade secret trolls shouldn’t lull companies into complacency. If anything, it highlights how essential it is for operating companies to take trade secret protection into their own hands. There’s no third party waiting to assert your rights for you. You are the front line of defense.

from our blog

Blog, Featured Blogs, Guest Author Series, Intro to Trade Secrets, Trade Secret Strategy

The Promise and Perils of Enterprise Data as Trade Secrets

The Value and Vulnerability of Enterprise Data  In the era of digitalization, data has become omnipresent, ready for collection and utilization by relevant actors....
Blog, Case Law & Industry Trends, Featured Blogs

Amazon Faces Trade Secret Lawsuit from Regional Air Freight Startup TuffAir

In July 2025, Ohio-based air freight startup TuffAir filed a trade lawsuit against Amazon for misappropriation of trade secrets under the Defend Trade Secrets Act...
Blog, Featured Blogs, Guest Author Series, Intro to Trade Secrets, Trade Secret Strategy

Trade Secret Harvesting: A Practical Guide to Uncovering Your Crown Jewels

Trade secrets are the secret sauce of your business. They're the confidential information that gives you a competitive edge, from proprietary algorithms to unique...
Reasonable Measures Podcast, AI & IP

Episode 19: From Copyright to Trade Secrets: Anthropic’s Impact on AI & IP

In this episode Tim and Chris unpack the Inevitable Disclosure Doctrine, a century old trade secret rule that began in 1902 when a sugar refinery worker was blocked...
网络研讨会

The trade secret myths holding companies back

千万不要错过这个独一无二的机会,聆听真实的法庭故事和可行的策略。由 Tangibly 的首席执行官兼联合创始人 Tim Londergan 主持。

SIM IP and Tangibly
Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

A New Era for Trade Secret Enforcement: Tangibly Announces Strategic Investment from SIM IP

Tangibly Announces Strategic Investment from SIM IP At Tangibly, our mission has always been clear: to empower companies to protect their most valuable innovations. We...
Blog, Featured Blogs, Trade Secret Strategy

Takeaways: Leveraging Trade Secrets for New Revenue Streams

A summary and key takeaways from the IAM Q3 2025 Special Report – Unlocking Trade Secret Strategies IAM’s Q3 2025 Special Report Unlocking Trade Secret Strategies...
Blog, AI & IP, Featured Blogs, Guest Author Series

When to patent and when to keep AI innovations secret

When to patent and when to keep AI innovations secret Artificial intelligence is reshaping industries at breakneck speed, from healthcare diagnostics to creative...
Blog, Trade Secret Strategy

The Silent Heist: Why Trade Secret Theft Often Goes Unpunished

Trade secrets are the lifeblood of innovation, the hidden recipes, proprietary processes, and confidential customer lists that give a business its competitive edge....
Blog, AI & IP, Featured Blogs, Guest Author Series

AI-Powered Protein Engineering Is Forcing Next-Gen IP Strategy and Competitive Analysis

AI-Powered Protein Engineering Is Forcing Next-Gen IP Strategy and Competitive Analysis Authors: Celeste Alvarez, Makda Gebre and Alex Harwig AI isn’t just predicting...