What’s happening in the Epic Games trade secret lawsuit over Fortnite leaks?

Understanding Whistleblower Immunity Under the Defend Trade Secrets Act (DTSA)
Last Updated: March 9, 2026
Updated by: Chris Buntel

Table Of Content

Another Epic lawsuit!

This case is another great, Epic even, example of how 70% of trade secret problems come from insider leaks like employee or contractor misconduct.

From insider leaks to trade secret litigation

In this Epic Games trade secret lawsuit, Epic is suing a former contractor in the Eastern District of North Carolina for trade secret misappropriation, breach of NDA, and unfair competition under state law. The Epic Games lawsuit also includes claims under the federal DTSA and the North Carolina Trade Secrets Protection Act.

Epic is the creator and owner of Fortnite, a top tier global game with over 650 million registered players. They closely guard confidential information relating to upcoming content, timelines, and partnerships.  Epic uses restricted access and non-disclosure agreements (NDA) to safeguard this information.

According to the complaint, a now-former contractor signed an NDA when starting his role as an Associate Producer but repeatedly disclosed confidential information through anonymous social media accounts on X and Discord. The allegations tie this dispute directly to Fortnite leaks and the risks that come with insider access. The contractor also completed company training on information security, data protection, and privacy.

Epic Games moved fast

Starting in January 2026, the contractor repeatedly posted leaks about upcoming collaborations and timelines.  Epic sent a cease & desist letter on February 20, 2026, and filed the lawsuit on March 5, 2026.  The speed of the response is one of the more striking aspects of the Epic Games trade secret lawsuit.

Epic is seeking a permanent injunction as well as damages, attorney’s fees, and return or destruction of any Epic trade secrets or confidential information, which is typical in trade secret litigation involving insider leaks.

It will be interesting to see the contractor’s response (if any).  Defendants in federal court normally have 21 days to file their answer from the date of service.  It is impressive how quickly Epic moved to contain this situation.

What companies should take from this case

Trade secret risk often starts with the people who already have access. If your company is thinking about how to better protect confidential information before a leak happens, now is the time to take a closer look at your policies, access controls, and response plan.
Meet with our experts
.

 

Why are programs and data considered trade secrets?

Because they contain algorithms, models, processes, and customer insights that provide competitive advantage. When exposed, the loss is immediate and irreversible.

What is the first step to protecting programs and data?

Create an inventory and identify which assets qualify as trade secrets, including code, models, datasets, prompts, and internal tools.

Why is classification important for trade secret protection?

Classification clarifies sensitivity, risk, and required controls. It strengthens governance and ensures teams understand how assets should be handled.

How does access control prevent trade secret loss?

Limiting access by role, tracking interactions, removing outdated permissions, and restricting repositories prevents internal misuse and accidental exposure.

How does AI increase the risk of trade secret leakage?

Employees often paste confidential information into public AI tools, causing it to become training data. Governance and private AI tools prevent this.

What legal agreements support trade secret protection?

NDAs, invention assignment agreements, contractor agreements, and offboarding processes ensure confidentiality obligations are clear and enforceable.

Why is employee training essential for protecting trade secrets?

Most exposure occurs through human behaviour. Training builds awareness and creates a culture of confidentiality across the organisation.

How do audits improve trade secret protection?

Audits identify weak points like outdated access, unsecured repositories, shadow AI use, and untracked datasets — key for legal defensibility.

How does Tangibly help protect programs and data?

Tangibly provides automated trade secret identification, classification, access tracking, governance workflows, and AI-driven risk detection.

from our blog

Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

What is litigation funding?

With the recent press release from SIM IP and Tangibly, a client recently asked me a simple but important question: how does litigation funding actually work? The...
Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

SIM IP and Tangibly Launch Trade Secret Litigation Financing Partnership

Miami – Jan 15, 2026 – Sauvegarder Investment Management, Inc. (“SIM IP”), a global leader in intellectual property-based investment and monetization, and Tangibly, an...
Blog, Trade Secret Strategy

How do litigation funding companies evaluate trade secret claims?

Trade secret misappropriation cases can produce substantial recoveries, but they are complex, expensive, and inherently risky. For companies confronting stolen trade...
Blog, Trade Secret Strategy

The financial impact of trade secret misappropriation

Trade secret misappropriation is not merely a legal dispute. It is a direct assault on enterprise value. When confidential business information is taken, misused, or...
Blog, Trade Secret Strategy

What to do after discovering trade secret misappropriation or IP theft

Discovering that trade secrets or other confidential information have been stolen, whether by an employee, competitor, or third party, poses a serious threat to your...
Blog, Trade Secret Strategy

When to use litigation funding in a trade secret lawsuit?

Trade secret lawsuits arise from intellectual property theft or the misappropriation of confidential business information. These disputes can deliver substantial...
Blog, AI & IP, Featured Blogs, Intellectual Property & Patent Insights, Trade Secret Strategy

When AI patent tools become the most valuable trade secrets

A newly filed lawsuit in the Northern District of California centers on alleged trade secret misappropriation involving an AI powered patent analysis and management...
Blog, Trade Secret Strategy

What are litigation loans and how do they work in high value disputes?

The term “litigation loans” is commonly used by companies searching for capital to pursue a lawsuit. In practice, most sophisticated commercial funding structures are...
Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

To patent or not to patent?

To patent or not to patent, that is the right question. Don’t get us at Tangibly started on “patent vs. trade secret” or “patent or trade secret”.  There’s no reason...
Blog, AI & IP, Featured Blogs, Guest Author Series

The AI IP Gold Rush Meets the § 101 Minefield

We are living in an artificial intelligence (AI) gold rush. From large language models that write code to machine learning systems that optimize logistics or predict...