Trade Secret Law

Expert-defined terms from the Specialist Certification in Intellectual Property Law and Biotechnology course at London School of Business and Administration. Free to read, free to share, paired with a globally recognised certification pathway.

Trade Secret Law

**Trade Secret #

** A type of intellectual property (IP) that refers to confidential, proprietary information that provides a competitive advantage to its owner. Examples include business methods, customer lists, and product formulas.

**Concept #

** Trade secrets are protected under both common law and state-specific statutes, such as the Uniform Trade Secrets Act (UTSA). To qualify as a trade secret, the information must be secret, have value because of its secrecy, and be subject to reasonable efforts to maintain its secrecy.

**Challenges #

** Trade secret protection can be lost if the information is disclosed or becomes generally known. Additionally, it can be difficult to prove misappropriation, and legal remedies may be limited.

**Misappropriation #

** The unauthorized acquisition, disclosure, or use of a trade secret.

**Concept #

** Misappropriation can occur through theft, bribery, misrepresentation, breach of duty to maintain secrecy, or unauthorized observation or copying.

**Challenges #

** Proving misappropriation can be difficult, as it requires evidence of unauthorized acquisition, disclosure, or use. Additionally, defendants may argue that the information was acquired through independent discovery or reverse engineering.

**Independent Discovery #

** The acquisition of trade secret information through lawful means, without knowledge of its confidential nature.

**Concept #

** Independent discovery is a defense to misappropriation. It is not unlawful to use trade secret information that has been independently discovered through lawful means.

**Challenges #

** Proving independent discovery can be difficult, as it requires evidence that the information was discovered through lawful means and without knowledge of its confidential nature.

**Reverse Engineering #

** The process of disassembling or decompiling a product to understand its design, function, or components.

**Concept #

** Reverse engineering is a lawful means of acquiring trade secret information if it is done without breaching a duty to maintain secrecy or violating a contractual agreement.

**Challenges #

** Reverse engineering can be time-consuming and expensive. Additionally, it may not be possible to fully understand the trade secret information through reverse engineering alone.

**Decompilation #

** The process of converting machine code into a more human-readable form, such as source code.

**Concept #

** Decompilation is a form of reverse engineering that is often used to understand software code. It is generally considered lawful if done without breaching a duty to maintain secrecy or violating a contractual agreement.

**Challenges #

** Decompilation can be difficult and time-consuming. Additionally, the resulting source code may not be identical to the original code, making it difficult to prove infringement or misappropriation.

**Trade Secret Theft #

** The unauthorized acquisition, disclosure, or use of a trade secret with the intent to benefit a competing business.

**Concept #

** Trade secret theft is a criminal offense under both federal and state law. It can result in fines, imprisonment, and civil liability.

**Challenges #

** Proving trade secret theft can be difficult, as it requires evidence of unauthorized acquisition, disclosure, or use with the intent to benefit a competing business.

**Economic Espionage #

** The unauthorized acquisition, disclosure, or use of a trade secret for the benefit of a foreign government or business.

**Concept #

** Economic espionage is a federal crime under the Economic Espionage Act of 1996. It is punishable by up to 15 years in prison and fines of up to $5 million for individuals and $10 million for organizations.

**Challenges #

** Proving economic espionage can be difficult, as it requires evidence of unauthorized acquisition, disclosure, or use for the benefit of a foreign government or business.

**Uniform Trade Secrets Act (UTSA) #

** A model state law that provides a framework for trade secret protection.

**Concept #

** The UTSA defines a trade secret as information that derives independent economic value from not being generally known or readily ascertainable and is the subject of reasonable efforts to maintain its secrecy.

**Challenges #

** The UTSA does not preempt common law trade secret claims, which can result in inconsistent application of trade secret protection across states.

**Common Law #

** The body of law that is developed through judicial decisions and custom, rather than through legislation.

**Concept #

** Common law trade secret claims are based on the tort of misappropriation and require proof of a confidential relationship, breach of that relationship, and resulting damages.

**Challenges #

** Common law trade secret claims can be difficult to prove, as they require evidence of a confidential relationship and breach of that relationship.

**Burden of Proof #

** The obligation to produce evidence to support a claim or defense.

**Concept #

** The burden of proof in trade secret cases is on the plaintiff, who must prove the existence of a trade secret, misappropriation, and resulting damages.

**Challenges #

** Proving the existence of a trade secret and misappropriation can be difficult, as it requires evidence of confidentiality, secrecy, and unauthorized acquisition, disclosure, or use.

**Reasonable Efforts #

** The steps taken to maintain the secrecy of a trade secret, as required by law.

**Concept #

** Reasonable efforts to maintain secrecy can include physical security measures, access controls, and confidentiality agreements.

**Challenges #

** What constitutes reasonable efforts can vary depending on the nature of the trade secret and the circumstances surrounding its use and protection.

**Confidentiality Agreements #

** Legal agreements that prohibit the disclosure or use of confidential information.

**Concept #

** Confidentiality agreements are often used to protect trade secrets and other confidential information in employment, consulting, and business relationships.

**Challenges #

** Confidentiality agreements must be carefully drafted to ensure that they are enforceable and do not violate public policy or other legal requirements.

**Non #

Disclosure Agreement (NDA):** A legal agreement that prohibits the disclosure or use of confidential information.

**Concept #

** NDAs are often used in employment, consulting, and business relationships to protect trade secrets and other confidential information.

**Challenges #

** NDAs must be carefully drafted to ensure that they are enforceable and do not violate public policy or other legal requirements.

**Access Controls #

** Measures taken to restrict access to confidential information.

**Concept #

** Access controls can include physical security measures, such as locks and alarms, as well as technical measures, such as passwords and encryption.

**Ch #

**Ch

May 2026 intake · open enrolment
from £90 GBP
Enrol