DeepSeek Data Security: Safeguarding Your Confidential Information

Understanding Whistleblower Immunity Under the Defend Trade Secrets Act (DTSA)
Last Updated: March 22, 2026
Updated by: Chris Buntel

Table Of Content

The Chinese DeepSeek R1 and Janus open-source models are certainly all the AI rage this week.  The R1 model was built for a cost of about 5% of what its competitors normally spend and promises lower price for AI adoption. Let’s take a look at DeepSeek from a few different perspectives.

What happens to your data?

Like with any large language model, you have to be careful and mindful about what information you input.  Valuable confidential information and trade secrets should not be input into DeepSeek’s model.  The same goes for ChatGPT, Gemini, Claude, and all the rest of the LLMs.  DeepSeek has the added risk that your data lands squarely in China.

Terms of use

The DeepSeek terms of use has a lot of interesting content! If you have any disputes with DeepSeek, their terms of use state that you have to first try to negotiate, and then you can file a lawsuit against them with a court having jurisdiction over the registered office of DeepSeek (currently in Hangzhou China).  Any disputes will be governed by China law. Not many people talk (or even think!) about export control restrictions around AI usage, but the DeepSeek terms of use also address this.  The user is solely responsible for complying with all relevant export control and sanctions laws.  The DeepSeek services should not be used for any use prohibited by export control and sanctions laws, and the inputs should not contain anything requiring a license to release or export.  This is especially sensitive given that input data is being sent to DeepSeek servers in China.

Protecting an open-source model

Patenting an open-source model doesn’t make a lot of sense.  The technology is advancing at breakneck speed, and any model that you try to patent will likely be long since obsolete by the time the patent grants in 2-4 years. Protecting the model’s technology as a trade secret is the only approach that makes sense.  The protection is created immediately, does not require any public disclosure, and has low marginal cost assuming that you have a trade secret management program in place already. Protecting the model’s output is also well suited to trade secret protection.  Evolving case law suggests that for both patents and trademarks, a real human being is needed as the inventor / creator.  An AI cannot be either.  It is also unclear if the human entering the input can be considered the inventor, or are they merely presenting a problem for the AI to solve (just posing a problem like “find a cure for cancer” does not make someone an inventor for the cure found later).

from our blog

Blog, Featured Blogs

Tangibly Achieves SOC 2 Compliance, Reinforcing Our Commitment to Security and Trade Secret Protection

We are proud to share that Tangibly has successfully completed its SOC 2 audit again this year, marking an important milestone in our continued commitment to enterprise...
Blog, Case Law & Industry Trends, Trade Secret Strategy

What’s happening in the Epic Games trade secret lawsuit over Fortnite leaks?

Another Epic lawsuit! This case is another great, Epic even, example of how 70% of trade secret problems come from insider leaks like employee or contractor misconduct....
Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

What is litigation funding?

With the recent press release from SIM IP and Tangibly, a client recently asked me a simple but important question: how does litigation funding actually work? The...
Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

SIM IP and Tangibly Launch Trade Secret Litigation Financing Partnership

Miami – Jan 15, 2026 – Sauvegarder Investment Management, Inc. (“SIM IP”), a global leader in intellectual property-based investment and monetization, and Tangibly, an...
Blog, Trade Secret Strategy

How do litigation funding companies evaluate trade secret claims?

Trade secret misappropriation cases can produce substantial recoveries, but they are complex, expensive, and inherently risky. For companies confronting stolen trade...
Blog, Trade Secret Strategy

The financial impact of trade secret misappropriation

Trade secret misappropriation is not merely a legal dispute. It is a direct assault on enterprise value. When confidential business information is taken, misused, or...
Blog, Trade Secret Strategy

What to do after discovering trade secret misappropriation or IP theft

Discovering that trade secrets or other confidential information have been stolen, whether by an employee, competitor, or third party, poses a serious threat to your...
Blog, Trade Secret Strategy

When to use litigation funding in a trade secret lawsuit?

Trade secret lawsuits arise from intellectual property theft or the misappropriation of confidential business information. These disputes can deliver substantial...
Blog, AI & IP, Featured Blogs, Intellectual Property & Patent Insights, Trade Secret Strategy

When AI patent tools become the most valuable trade secrets

A newly filed lawsuit in the Northern District of California centers on alleged trade secret misappropriation involving an AI powered patent analysis and management...
Blog, Trade Secret Strategy

What are litigation loans and how do they work in high value disputes?

The term “litigation loans” is commonly used by companies searching for capital to pursue a lawsuit. In practice, most sophisticated commercial funding structures are...