What is litigation funding?

Understanding Whistleblower Immunity Under the Defend Trade Secrets Act (DTSA)
Last Updated: February 6, 2026
Updated by: Chris Buntel

Table Of Content

With the recent press release from SIM IP and Tangibly, a client recently asked me a simple but important question: how does litigation funding actually work?

The missing piece in trade secret enforcement

Litigation is expensive, and intellectual property litigation is among the most costly.  Trade secret and patent disputes often take years and millions of dollars in legal fees, especially if the case goes to trial or appeal.  Most small and medium-sized enterprises simply can’t afford the expense and time distraction of prolonged IP  litigation making enforcement feel out of reach. This leaves it to the “big boys” to battle it out.

The rise of trade secret litigation and the funding gap

Trade secret litigation, however, is rising steadily year over year. While the total number of trade secret misappropriation cases remains smaller than patent litigation, the growth trend is significant..  For US federal district courts in 2023, about 3,700 patent infringement suits were filed, while only about 1,200 trade secret misappropriation cases were filed.  Patent litigation has gradually declined over the past decade, while trade secret litigation continues to expand as companies place greater value on confidential information, data, algorithms, and know how.

While there are multiple patent litigation funding organizations, there are not funders specializing in trade secret disputes (until now!).

So how does litigation funding work?

In a typical litigation finance arrangement, a third-party provides capital to the plaintiff in exchange for a fraction of the award (if any).  If the defendant wins, the third party does not receive anything (it is typically a non-recourse arrangement). This structure allows companies to pursue meritorious trade secret claims without bearing the full financial risk.

Is litigation funding a good option for trade secret plaintiffs to consider?  

Absolutely!  Plaintiffs who have a great fact pattern but insufficient funding to enforce can seek justice with the help of a litigation funder.  Even large well-funded companies may want to distribute some of the risk even though they could fund the litigation entirely themselves.

Learn More

To learn more about trade secret litigation funding, trade secret enforcement strategies, and how AI driven trade secret validation supports these cases, contact Tangibly and SIM IP.

 

Why are programs and data considered trade secrets?

Because they contain algorithms, models, processes, and customer insights that provide competitive advantage. When exposed, the loss is immediate and irreversible.

What is the first step to protecting programs and data?

Create an inventory and identify which assets qualify as trade secrets, including code, models, datasets, prompts, and internal tools.

Why is classification important for trade secret protection?

Classification clarifies sensitivity, risk, and required controls. It strengthens governance and ensures teams understand how assets should be handled.

How does access control prevent trade secret loss?

Limiting access by role, tracking interactions, removing outdated permissions, and restricting repositories prevents internal misuse and accidental exposure.

How does AI increase the risk of trade secret leakage?

Employees often paste confidential information into public AI tools, causing it to become training data. Governance and private AI tools prevent this.

What legal agreements support trade secret protection?

NDAs, invention assignment agreements, contractor agreements, and offboarding processes ensure confidentiality obligations are clear and enforceable.

Why is employee training essential for protecting trade secrets?

Most exposure occurs through human behaviour. Training builds awareness and creates a culture of confidentiality across the organisation.

How do audits improve trade secret protection?

Audits identify weak points like outdated access, unsecured repositories, shadow AI use, and untracked datasets — key for legal defensibility.

How does Tangibly help protect programs and data?

Tangibly provides automated trade secret identification, classification, access tracking, governance workflows, and AI-driven risk detection.

from our blog

Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

SIM IP and Tangibly Launch Trade Secret Litigation Financing Partnership

Miami – Jan 15, 2026 – Sauvegarder Investment Management, Inc. (“SIM IP”), a global leader in intellectual property-based investment and monetization, and Tangibly, an...
Blog, AI & IP, Featured Blogs, Intellectual Property & Patent Insights, Trade Secret Strategy

When AI patent tools become the most valuable trade secrets

A newly filed lawsuit in the Northern District of California centers on alleged trade secret misappropriation involving an AI powered patent analysis and management...
Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

To patent or not to patent?

To patent or not to patent, that is the right question. Don’t get us at Tangibly started on “patent vs. trade secret” or “patent or trade secret”.  There’s no reason...
Blog, AI & IP, Featured Blogs, Guest Author Series

The AI IP Gold Rush Meets the § 101 Minefield

We are living in an artificial intelligence (AI) gold rush. From large language models that write code to machine learning systems that optimize logistics or predict...
Blog, AI & IP

Can AI be an inventor? USPTO clarifies the role of human inventors

The USPTO issued new inventorship guidance for AI assisted inventions on November 28, 2025, relating to the hot topic of AI-assisted inventions.  Please note that this...
Blog

Does writing an AI prompt make you an inventor?

Your AI prompt is not enough! In the patent world, it is well settled that merely posing a problem or a challenge is not enough to make you an inventor of the...
Blog

Protecting Programs, Data and Trade Secrets

Programs and data are no longer just technical assets. They are trade secrets. They encompass the algorithms, processes, customer insights, models, and confidential...
Blog, Intellectual Property & Patent Insights, Intro to Trade Secrets

Patent Attorney vs. Trade Secret Strategist: Which Expert Do You Need First?

If you think about it, everything starts out as a trade secret, even patents. It is more important to first consider your trade secret strategy before deploying your...
Blog, Intro to Trade Secrets

A Guide to Building a Robust Trade Secret Program

In the relentless chess match of modern business, your most valuable assets aren't always the ones on your balance sheet. They are the secret formulas, the proprietary...
Blog, Featured Blogs, Guest Author Series, Trade Secret Strategy

The Invisible Epidemic: Unprosecuted Trade Secret Theft and the Path to Protection

The Invisible Epidemic: Unprosecuted Trade Secret Theft and the Path to Protection In a recent LinkedIn post that sparked discussion among IP experts and entrepreneurs,...