Trade Secret Governance

Manage

Everything you need to run a trade secret program.

Discover

Leverage AI to reveal, enhance, and protect trade secrets.

Patent Intelligence Reports

Continuation Analysis

Proposed continuation claims and parent comparisons with trade secret analysis.

Provisional Analysis

Strategies for editing provisional claims, paired with trade secret analysis.

Trade Secret Governance

Professional Services

Expert guidance to build a trade secret program and secure key IP assets.

Patent X-Ray™

Identify trade secrets in your patent. Learn more.


FAQs

Answers to your common questions

Blog

Insights and updates on industry trends

Press

Media coverage featuring Tangibly

Podcast

The Reasonable Measures Podcast

Webinars

Presentations exploring strategic insights

Case Law Reviews

Significant trade secret cases

Knowledge Base

Release notes and other Tangibly guides

Case Study

Industry-specific applications

TS25

International Standards for Trade Secret Management

What is Trade Secret Law

Last updated on: February 18, 2025
By: Tangibly

On this page

What is trade secret law?

Trade secret law protects confidential business information that provides a competitive advantage. This can include formulas, processes, algorithms, designs, customer lists, data models, or any other valuable information that is not publicly known and is subject to reasonable steps to keep it secret.

Unlike patents, trademarks, or copyrights, trade secrets are not registered with a government office. Their protection depends on a company’s ability to prove that the information is both valuable and kept confidential. If the secrecy is lost—whether through a leak, theft, or careless disclosure—the legal protection is lost as well.

The foundations of trade secret law

In the United States, trade secret law is primarily governed by two sources:
State law – Most states have adopted the Uniform Trade Secrets Act (UTSA), which standardizes definitions and remedies for misappropriation.

Federal law – The Defend Trade Secrets Act (DTSA) of 2016 allows trade secret owners to bring cases in federal court, providing a nationwide framework for enforcement.

Both frameworks define a trade secret in similar terms: information that derives economic value from not being generally known, and that is subject to reasonable measures to maintain its secrecy.

What counts as “reasonable measures”?

Courts expect companies to take active steps to protect trade secrets. Common measures include:
Limiting access to those who need to know

  • Using confidentiality and nondisclosure agreements
  • Implementing access controls for digital files and systems
  • Training employees on trade secret handling
  • Documenting all policies and enforcement actions

Without evidence of reasonable protection, courts are unlikely to enforce trade secret claims.

Misappropriation and enforcement

Misappropriation occurs when someone acquires, uses, or discloses a trade secret without permission. This could involve:

  • An employee taking proprietary files to a competitor
  • A partner using confidential information beyond the agreed purpose

Industrial espionage or hacking to obtain protected data

If misappropriation occurs, trade secret owners can seek remedies such as injunctions to stop use, monetary damages for losses, and in some cases, punitive damages. Under the DTSA, companies can also seek seizure orders to prevent dissemination of stolen secrets.

Why trade secret law matters

Trade secrets can be among a company’s most valuable assets. They often protect know-how that cannot be reverse engineered and that evolves over time, making patents less practical. Strong trade secret law gives companies a way to enforce their rights when confidentiality is breached, but it only works if the company has already put the right protections in place.

How Tangibly can help

Trade secret law is only as strong as the measures you take to protect your information. Tangibly was purpose built to help companies identify, protect, and leverage their trade secrets with confidence.

Our platform makes it simple to catalog sensitive information, control access, track agreements, and maintain the documentation you need to prove reasonable protection. We work alongside your legal team to ensure your trade secret program is both practical and defensible.

If your competitive advantage depends on what competitors cannot see, let’s talk about how to keep it protected. Book time with our team to explore a tailored trade secret strategy for your business.

Related Articles

Blog, Featured Blogs, Guest Author Series, Trade Secret Strategy

The Hidden Half: How Shadow IT and Lean Function Complete Your Trade Secret Protection Strategy

When cybersecurity professionals discuss trade secret protection, the conversation typically centers on zero trust architecture, access controls, and the principle of...
Esplin Legal logo featuring a minimalist black and white design with clean typography and a modern, professional aesthetic.
Press, AI & IP, Trade Secret Strategy

Tangibly and Esplin Legal Announce Strategic Partnership to Strengthen Trade Secret Protection for Innovative Companies

Mintz has partnered with Tangibly, Inc. to bring cutting edge trade secret identification, management, and protection strategies to clients. As part of the...
Intro to Trade Secrets, AI & IP

Why Are Trade Secrets Becoming More Important in the AI Era?

Why are trade secrets becoming more important in the AI era? The rapid rise of artificial intelligence is changing how companies create, use, and protect intellectual...
Blog, Featured Blogs, Trade Secret Strategy

There’s No Trade Secret Troll Hiding Under The Bridge

Imagine this: A consultant starts a competing company after taking your proprietary information while under a confidentiality agreement. You promptly file a trade...
Intro to Trade Secrets, AI & IP

What is a holisitic IP Portfolio

What is a holistic IP portfolio? A holistic IP portfolio is a coordinated strategy for protecting all forms of a company’s intellectual property, from patents and...
Stealing Confidential Information is Not Necessarily Trade Secret Misappropriation
Blog, Featured Blogs, Guest Author Series, Trade Secret Strategy

Stealing Confidential Information is Not Necessarily Trade Secret Misappropriation

Imagine this: A consultant starts a competing company after taking your proprietary information while under a confidentiality agreement. You promptly file a trade...
Blog, Case Law & Industry Trends, Trade Secret Strategy

Caffeinated or Not, Intent Matters: The Real Cost of Trade Secret Theft

Federal DTSA and Massachusetts UTSA do not clearly define what “willful and malicious” means. Recent litigation in Massachusetts took great steps towards clarifying...
How To Keep AI From Stealing Intellectual Property
Blog, AI & IP, Trade Secret Strategy

How To Keep AI From Stealing Intellectual Property

Artificial intelligence presents both opportunities and risks for businesses. While it drives innovation and efficiency, it also creates vulnerabilities for...
SOC 2 Type II Security Certification
Blog, Featured Blogs, Press, Trade Secret Strategy

Tangibly Successfully Completes SOC 2 Type II Security Certification

“Tangibly’s SOC 2 achievement is a reflection of our ongoing commitment to our clients,” said Liat Belinson, CTO and Co-Founder of Tangibly. “We take...
Intro to Trade Secrets

What is a Patent

An Introduction to what is a patent A patent is a government-granted right that gives an inventor exclusive control over a new and useful invention for a limited period...