Maintaining Trade Secret Protection in an Open-Source Environment: A Guide for In-House Counsel

Understanding Whistleblower Immunity Under the Defend Trade Secrets Act (DTSA)
Last Updated: August 16, 2024
Updated by: Tangibly

Table Of Content

Maintaining Trade Secret Protection in an Open-Source Environment: A Guide for In-House Counsel

In today’s rapidly evolving technological landscape, in-house counsel must navigate the intricate balance between protecting trade secrets and leveraging the benefits of open-source software.

Tune in to the archive of this IHC Trade Secrets Series, as Jon Parker and Bachir Chakra of Gowling WLG, and Chris Buntel, Co-Founder and CIPO of Tangibly, discuss how to maintain that delicate balance between maintaining trade secrets and utilizing open-source software.

Discussion topics include:

  • Protection of trade secrets, including technical, digital, cyber security, encryption, and legal and operational;
  • Open-Source risks and rewards;
  • How to strike a balance between using open-source and protecting trade secrets; and
  • IP Strategy and policy recommendations
  • Who should watch:
    In-house counsel and legal operations professionals who manage or are involved in the protection or management of Trade Secrets.

from our blog

Blog, Case Law & Industry Trends, Trade Secret Strategy

HouseCanary Wins Big, Loses Bigger, and Still Walks Away With a Massive Trade Secret Verdict

This Texas trade secret verdict is a good reminder that even when a plaintiff wins big, trade secret litigation can still turn on procedural issues at the very end....
Blog, Featured Blogs

Tangibly Achieves SOC 2 Compliance, Reinforcing Our Commitment to Security and Trade Secret Protection

We are proud to share that Tangibly has successfully completed its SOC 2 audit again this year, marking an important milestone in our continued commitment to enterprise...
Blog, Case Law & Industry Trends, Trade Secret Strategy

What’s happening in the Epic Games trade secret lawsuit over Fortnite leaks?

Another Epic lawsuit! This case is another great, Epic even, example of how 70% of trade secret problems come from insider leaks like employee or contractor misconduct....
Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

What is litigation funding?

With the recent press release from SIM IP and Tangibly, a client recently asked me a simple but important question: how does litigation funding actually work? The...
Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

SIM IP and Tangibly Launch Trade Secret Litigation Financing Partnership

Miami – Jan 15, 2026 – Sauvegarder Investment Management, Inc. (“SIM IP”), a global leader in intellectual property-based investment and monetization, and Tangibly, an...
Blog, Trade Secret Strategy

How do litigation funding companies evaluate trade secret claims?

Trade secret misappropriation cases can produce substantial recoveries, but they are complex, expensive, and inherently risky. For companies confronting stolen trade...
Blog, Trade Secret Strategy

The financial impact of trade secret misappropriation

Trade secret misappropriation is not merely a legal dispute. It is a direct assault on enterprise value. When confidential business information is taken, misused, or...
Blog, Trade Secret Strategy

What to do after discovering trade secret misappropriation or IP theft

Discovering that trade secrets or other confidential information have been stolen, whether by an employee, competitor, or third party, poses a serious threat to your...
Blog, Trade Secret Strategy

When to use litigation funding in a trade secret lawsuit?

Trade secret lawsuits arise from intellectual property theft or the misappropriation of confidential business information. These disputes can deliver substantial...
Blog, AI & IP, Featured Blogs, Intellectual Property & Patent Insights, Trade Secret Strategy

When AI patent tools become the most valuable trade secrets

A newly filed lawsuit in the Northern District of California centers on alleged trade secret misappropriation involving an AI powered patent analysis and management...