📋 What is Trade Secret Misappropriation?
Trade secret misappropriation occurs when someone acquires, discloses, or uses another's trade secret through improper means or in breach of a duty to maintain its secrecy. California protects trade secrets under the California Uniform Trade Secrets Act (CUTSA), Civil Code Sections 3426-3426.11, which provides for injunctive relief, actual damages, unjust enrichment, and exemplary damages for willful misappropriation.
Common Types of Trade Secret Theft
👥 Departing Employee Theft
Employee takes customer lists, source code, formulas, or confidential data to competitor or new business
💻 Digital Theft
Downloading files, emailing documents, USB transfers, cloud uploads of proprietary information before departure
💼 Competitor Misuse
Competitor hires employees to obtain secrets, reverse engineers beyond permitted scope, or receives stolen information
🔐 Breach of Confidence
Business partner, vendor, or contractor discloses confidential information shared under NDA
⚠ Act Immediately to Preserve Evidence
Trade secret cases are time-sensitive. Once secrets are disclosed, the damage spreads rapidly. Send a preservation letter immediately, consider seeking emergency injunctive relief (TRO), and engage a forensic IT expert to preserve evidence of data exfiltration. Delay can destroy your case and your competitive advantage.
What Qualifies as a Trade Secret?
📚 Definition Under CUTSA
▼Under Civil Code 3426.1, a "trade secret" is information that: (1) derives independent economic value from not being generally known or readily ascertainable, and (2) is subject to reasonable efforts to maintain its secrecy. This includes formulas, patterns, compilations, programs, devices, methods, techniques, or processes.
⚖ Common Examples of Trade Secrets
▼Trade secrets can include: customer and prospect lists with contact details and preferences; pricing formulas and cost structures; software source code and algorithms; manufacturing processes and formulas; business strategies and financial projections; supplier relationships and terms; marketing plans and strategies; employee compensation data; R&D data and product development information.
👥 Reasonable Secrecy Measures
▼You must prove you took "reasonable efforts" to maintain secrecy. Evidence includes: confidentiality/NDA agreements with employees and third parties; password protection and access controls; marking documents as "Confidential"; limiting access on need-to-know basis; exit interviews and equipment return protocols; employee training on confidentiality. Weak protection undermines your claim.
🔒 Document Your Secrecy Measures
Before sending a demand letter, gather evidence of all measures you took to protect the trade secret: NDAs, confidentiality policies, access logs, "Confidential" markings, training records. If your protection measures were weak, the defendant will argue the information was not truly a trade secret.
⚖ Legal Basis
California provides robust trade secret protection under CUTSA, which preempts most other claims for misappropriation of confidential business information.
Key California Statutes
Civil Code Section 3426.1 (Definitions)
Defines "trade secret" as information with independent economic value from secrecy, subject to reasonable protection efforts. Defines "misappropriation" as acquisition by improper means or disclosure/use in breach of duty.
Civil Code Section 3426.2 (Injunctive Relief)
Courts may enjoin actual or threatened misappropriation. Injunction can continue for the time necessary to eliminate commercial advantage from misappropriation. May require affirmative acts to protect the secret.
Civil Code Section 3426.3 (Damages)
Provides for actual loss plus unjust enrichment not accounted for in actual loss. In lieu of damages, court may award reasonable royalty. For willful and malicious misappropriation, court may award exemplary damages up to twice actual damages.
Civil Code Section 3426.4 (Attorney's Fees)
Court may award reasonable attorney's fees to the prevailing party if: (a) claim of misappropriation was made in bad faith, (b) motion to terminate injunction was made in bad faith, or (c) willful and malicious misappropriation exists.
Elements You Must Prove
- Trade secret exists - Information qualifies as a trade secret (economic value + secrecy measures)
- Reasonable secrecy efforts - You took reasonable steps to protect the information
- Misappropriation occurred - Defendant acquired, disclosed, or used the secret improperly
- Improper means or breach - Acquisition was through improper means OR defendant breached a duty of confidence
- Damages - You suffered actual loss, or defendant received unjust enrichment
💡 CUTSA Preemption
CUTSA preempts other civil claims based on trade secret misappropriation, including common law claims for unfair competition, breach of confidence, and unjust enrichment (to the extent based on the same conduct). This means you must bring your claim under CUTSA. However, claims for breach of contract (NDA), breach of fiduciary duty, and conversion of tangible property remain available.
Statute of Limitations
Civil Code 3426.6
3 years from when misappropriation was discovered or should have been discovered through reasonable diligence
Continuing Misappropriation
Each new act of misappropriation (disclosure or use) may restart the limitations period for that act
✅ Evidence Checklist
Gather these documents before sending your demand letter. Trade secret cases are document-intensive.
📄 Trade Secret Identification
- ✓Detailed description of each trade secret
- ✓Documentation of economic value
- ✓Evidence of development cost/time invested
- ✓Proof information is not public
🔐 Secrecy Measures
- ✓Signed NDAs and confidentiality agreements
- ✓Employee handbook confidentiality policies
- ✓Access control/password protection logs
- ✓Confidential markings on documents
🔍 Misappropriation Evidence
- ✓Forensic analysis of computer/devices
- ✓Email/file transfer logs
- ✓USB/cloud upload records
- ✓Evidence of use by competitor
💰 Damages Evidence
- ✓Lost sales/customer documentation
- ✓Competitor's revenue from misuse
- ✓R&D costs to develop the secret
- ✓Reasonable royalty analysis
💻 Engage Forensic IT Immediately
Digital evidence is critical in trade secret cases. Engage a forensic IT expert to image departed employees' computers, review email logs, analyze USB/cloud transfers, and preserve evidence before it is destroyed. Many cases are won or lost on forensic evidence showing exactly what files were taken and when.
💰 Calculate Your Damages
CUTSA provides multiple measures of damages, and you can combine actual loss with unjust enrichment.
| Category | Description |
|---|---|
| Actual Loss | Lost profits from sales diverted to competitor, lost business opportunities, price erosion |
| Unjust Enrichment | Defendant's profits attributable to misappropriation (not duplicating actual loss) |
| Reasonable Royalty | What a willing buyer would pay for a license (alternative to actual damages) |
| Exemplary Damages | Up to 2x actual damages for willful and malicious misappropriation |
| Attorney's Fees | Available if willful/malicious misappropriation is proven |
| R&D/Development Costs | Cost avoided by defendant through misappropriation |
📊 Sample Damages Calculation
Example: Customer List Theft by Departing Sales Manager
💡 Injunctive Relief May Be Most Valuable
Often the most valuable remedy is a preliminary injunction preventing continued use of your trade secrets. This can stop a competitor from exploiting your information while litigation proceeds. California courts can issue temporary restraining orders (TROs) within days of filing. Time is critical - seek injunctive relief immediately when misappropriation is discovered.
📝 Sample Language
Copy and customize these paragraphs for your demand letter. Trade secret demands should be detailed and specific.
🚀 Next Steps
Trade secret cases often require immediate court action. Know your escalation options.
Immediate Actions
Temporary Restraining Order (TRO)
File for emergency TRO to immediately stop use of trade secrets. Can be obtained within days, sometimes hours, with proper showing of irreparable harm.
Preliminary Injunction
Following TRO, seek preliminary injunction to continue protection during litigation. Requires showing likelihood of success on merits.
Expedited Discovery
Request expedited discovery to identify scope of misappropriation, identify all recipients of trade secrets, and preserve evidence.
Federal DTSA Claims
Consider federal Defend Trade Secrets Act claims (18 USC 1836) for additional remedies including ex parte seizure orders.
Need Immediate Legal Help?
Trade secret cases are time-sensitive. An experienced IP litigation attorney can help you obtain emergency injunctive relief to stop ongoing damage.
Book Consultation - $125Additional Resources
- California Civil Code 3426-3426.11: Full text of California Uniform Trade Secrets Act (CUTSA)
- 18 USC 1836 (Federal DTSA): Defend Trade Secrets Act for federal court claims
- California Courts Self-Help: Information on civil litigation procedures
- USPTO Trade Secret Policy: Federal resources on trade secret protection
⚠ Protect Secrecy During Litigation
Trade secret litigation requires careful handling to avoid further disclosure. Request protective orders, file documents under seal, and limit access to confidential information during discovery. Ironically, poorly managed litigation can destroy the very secrecy you're trying to protect. Work with experienced trade secret counsel.