a

発見

AIを活用して企業秘密を明らかにし、強化し、保護する。

管理

企業秘密プログラムを実行するために必要なすべてのもの。

プロフェッショナル・サービス

営業秘密プログラムを構築し、重要な知的財産資産を保護するための専門家の指導。

よくあるご質問

よくあるご質問にお答えします

ブログ

業界動向に関する洞察と最新情報

プレス

Tangiblyが取り上げられたメディア

ポッドキャスト

妥当な措置」ポッドキャスト

ウェビナー

戦略的洞察を探るプレゼンテーション

判例評釈

重要な営業秘密事件

ナレッジ・ベース

リリースノートとその他のTangiblyガイド

Case Study

Industry-specific applications

TS25

International Standards for Trade Secret Management

There’s No Trade Secret Troll Hiding Under The Bridge

Last updated on: 6月 10, 2025

By Chris Buntel

On this page

When most people think of intellectual property enforcement, patent trolls often come to mind: non-practicing entities (NPEs) that exploit the patent system to generate revenue through litigation or settlements. But in the world of trade secrets, the same type of behavior is practically nonexistent. That raises an important question: Why aren’t there “trade secret trolls”? And what does that mean for your company’s approach to IP strategy and confidential data protection?

There’s no trade secret troll hiding under the bridge

The idea of a “trade secret troll” is rarely discussed, but it is an interesting concept. We are all familiar with “non-practicing entities” (NPEs), “patent assertion entities” (PAEs), or “patent trolls” – companies that acquire large collections of patents, and license or litigate in search of equally large royalty or settlement amounts.

With trade secret damages reaching staggering heights in the last few years, one would expect NPEs to take interest and look out from beneath their bridge. This isn’t happening. Why?

First, patents can be asserted against anyone infringing the patent’s claims in the patent’s geography. There’s no need for any kind of relationship between the patent owner and the alleged infringer. There can be large numbers of infringers to pursue. For trade secrets, there are usually only a single person or a small team of people who steal the trade secret.
Second, trade secret misappropriation is closer to a “theft” or “embezzlement” model than patent infringement. Trade secrets are typically taken by someone who once had legitimate access (such as an employee, collaboration partner, vendor, and so on), but something changed. Maybe the employee left the company, taking valuable information with them to a competitor, or maybe a partner or vendor used the company’s confidential information to help other clients in violation of their contract with the trade secret owner. This requirement for a trusted relationship limits the number of targets for an NPE to pursue. Patent infringement functions more like a land mine – patents go after anyone who steps on their claims.

Third, while technically possible to license or sell a trade secret, it doesn’t happen very often. Trade secrets are sometimes licensed along with patents, but there really isn’t a real marketplace for the exchange or sale of trade secrets.
It is relatively easy to build your own collection of trade secrets if you are an operating company (you have way more than you think!), but it is difficult to acquire a collection of trade secrets for an assertion model.

Taking care of your trade secrets is serious, but don’t spend much time worrying about trade secret trolls.

Disclosure: Tim Londergan and Chris Buntel both previously worked for Intellectual Ventures.

What You Should Worry About: Internal IP Risk

While “trade secret trolls” aren’t a threat, the real danger lies in the people you trust most: employees, partners, and vendors. This is where trade secret misappropriation tends to occur—and why proactive trade secret management is critical.

Businesses today are handling an unprecedented volume of proprietary data. R&D files, customer lists, pricing models, algorithms, internal tools—these are all trade secrets when kept confidential and treated appropriately. But without the right policies, systems, and oversight, they’re at risk of being lost or stolen.

How to Strengthen Your Trade Secret Protection Program

Here are three immediate actions your company can take to reduce IP exposure and protect your competitive edge:

  1. Identify your trade secrets
    Create a clear inventory of what qualifies as confidential and commercially valuable across departments.

     

  2. Limit and track access
    Ensure only the right people can access sensitive information, and document that access over time—especially for offboarding and vendor relationships.

3. Establish formal protections
Develop a company-wide trade secret policy, implement NDAs, and train staff on confidentiality protocols.

Final Takeaway: No Trolls, but Real Threats

The absence of trade secret trolls shouldn’t lull companies into complacency. If anything, it highlights how essential it is for operating companies to take trade secret protection into their own hands. There’s no third party waiting to assert your rights for you. You are the front line of defense.

Related Articles

ブログ

Is AI the ultimate defensive publication author?

Defensive publication is a patent strategy that makes it difficult or impossible for competitors to patent on or near what a company is commercializing.  The basic idea...
ブログ

Takeaways: AI is Eating Your Intellectual Property (IP)

Overview In the latest IAM Saturday Opinion, Tangibly’s Chris Buntel and Tim Londergan explore how artificial intelligence is transforming the foundation of...
Blog, Guest Author Series

The New Face of IP in the AI Age: Why Trade Secrets Matter More Than Ever for Tech [Part 1 of 2]

Imagine this: A consultant starts a competing company after taking your proprietary information while under a confidentiality agreement. You promptly file a trade...
Stealing Confidential Information is Not Necessarily Trade Secret Misappropriation
Blog, Guest Author Series

Stealing Confidential Information is Not Necessarily Trade Secret Misappropriation

Imagine this: A consultant starts a competing company after taking your proprietary information while under a confidentiality agreement. You promptly file a trade...
ブログ

Caffeinated or Not, Intent Matters: The Real Cost of Trade Secret Theft

Federal DTSA and Massachusetts UTSA do not clearly define what “willful and malicious” means. Recent litigation in Massachusetts took great steps towards clarifying...
ブログ

KPM Analytics Wins $10M Trade Secret Case: What It Means for Foodtech and IP Protection

A recent federal court ruling awarded over $10 million in damages to KPM Analytics, a scientific instrumentation company serving the food and agriculture sectors, in a...
TS25.org
ブログ

Introducing Trade Secret 2025 (TS25): The Future of Trade Secret Management

Tangibly, the leading trade secret management platform, proudly announces the launch of Trade Secret 2025 (TS25)—a cutting-edge digital resource designed to...
KPM Analytics v. Blue Sun Scientific
ブログ

Palantir is Suing a Y Combinator Startup Over Trade Secrets

Palantir has filed a trade secret lawsuit against Guardian AI, a healthcare-focused AI startup launched by two of its former employees, in what is shaping up to be one...
ブログ

Rippling v. Deel: Outsource your HR, but not your trade secrets.

Rippling sued their arch-competitor Deel in the Northern District Court of California on March 17, 2025. Rippling claims that Deel used a “mole” within Rippling to...
How To Keep AI From Stealing Intellectual Property
ブログ

How To Keep AI From Stealing Intellectual Property

Artificial intelligence presents both opportunities and risks for businesses. While it drives innovation and efficiency, it also creates vulnerabilities for...