The Cofounder Departure Problem

Startup cofounders share everything during the company-building phase: ideas, code, customer relationships, and proprietary methods. When a cofounder leaves and the relationship turns adversarial, that shared knowledge becomes a legal battlefield. The departing cofounder knows your secrets; the question is whether they can use them.

This guide focuses on California and U.S. federal remedies (CUTSA, DTSA, CFAA), but also addresses cross-border scenarios where code was developed in the EU or by EU-based developers before a U.S. company existed. Many cofounder disputes involve exactly this pattern: foreign development, then U.S. misappropriation.

The Most Common Scenario

A technical cofounder leaves (voluntarily or involuntarily), joins or starts a competitor, and the remaining founders discover that:

  • Source code was copied to personal devices before departure
  • Customer lists and contacts were exported
  • Proprietary algorithms appear in the competitor's product
  • Key employees are being recruited away

What Makes This Different From Employee Theft

Cofounder IP disputes are legally more complex than typical employee trade secret cases because:

Ownership Ambiguity
Cofounders often contributed to IP before formal agreements existed. Questions arise about who owns what, especially for code written before incorporation or IP assignment agreements.
Fiduciary Duties
Unlike employees, cofounders may owe fiduciary duties to the company and each other, creating additional legal claims beyond trade secret misappropriation.
Equity Complications
The departing cofounder may still own equity, creating awkward incentive structures and potential counterclaims around vesting, valuation, or breach of cofounder agreements.
California's Unique Position

California law prohibits non-compete agreements (Business & Professions Code 16600), so you cannot prevent a departing cofounder from working in the same industry. However, California strongly protects trade secrets through CUTSA, and federal law (DTSA, CFAA) provides additional remedies. The challenge is proving that the cofounder is using protected information rather than general skills and knowledge.

Cross-Border & EU Development Scenarios

In many startups, significant code and IP are created outside the U.S.—often in the EU—before a U.S. company exists. When disputes arise, foreign law typically governs initial ownership and co-authorship, while U.S. law governs later misappropriation and infringement occurring here. This is critical: a U.S. court will apply EU copyright principles to determine who owns what, then apply U.S. copyright/trade secret law for infringement claims and remedies.

Under EU law (including the Software Directive 2009/24/EC and national implementations), copyright in software vests in the individual authors who created it—not automatically in any company. Without written IP assignments, two cofounders who built code together are typically joint authors and co-owners under EU law, each with rights in the work. This fundamentally shapes enforcement strategy.

Key Questions to Answer Early

Initial Assessment Checklist
1
IP Assignment: Did the cofounder sign an IP assignment agreement? When? Does it cover pre-incorporation work?
2
Access Records: What systems did the cofounder have access to? Do you have logs of their final access activities?
3
Device Control: Did the cofounder use personal devices? Were company devices returned? What about cloud accounts?
4
Competitive Activity: What is the cofounder doing now? Is there evidence they're using your trade secrets?
5
Timeline: How long ago did they leave? California CUTSA claims have a 3-year limitations period.
6
Foreign Development: Was the code developed in the EU or another jurisdiction before a U.S. company existed? If so, foreign law likely governs initial ownership—you may need foreign-law expertise.

Common Cofounder Departure Scenarios

Scenario 1: The Competitor Startup
Cofounder Starts Competing Company
The departing cofounder launches a directly competitive product within months of leaving. The product appears to incorporate features and architecture suspiciously similar to yours.
  • Legal Claims: Trade secret, CFAA if systems accessed post-departure, breach of fiduciary duty if they were planning while employed
  • Key Evidence: Timeline of product development, code comparison analysis, access logs from departure period
  • Challenge: Proving they used trade secrets vs. general knowledge
Scenario 2: The Code Theft
Source Code Copied to Personal Devices
Post-departure forensics reveal the cofounder cloned repositories to personal devices, exported databases, or emailed code to personal accounts in the weeks before leaving.
  • Legal Claims: Trade secret, CFAA, copyright if code is copied verbatim
  • Key Evidence: Git logs, email records, device forensics, cloud storage access
  • Challenge: Proving the code was actually used, not just taken
Scenario 3: The Employee Poaching
Key Team Members Follow Cofounder
Multiple key employees resign shortly after the cofounder's departure, joining the same competitor. Evidence suggests coordinated recruitment while still employed.
  • Legal Claims: Tortious interference, breach of fiduciary duty (for the cofounder), potential trade secret if employees took information
  • Key Evidence: Communications during employment, timing patterns, employees' access to confidential information
  • Challenge: In California, employees have the right to change jobs; must show improper solicitation or trade secret use
Scenario 4: The IP Ownership Dispute
Cofounder Claims They Own the IP
The departing cofounder claims they personally own key IP because it was developed before incorporation, without a written assignment, or on their personal time.
  • Legal Claims: Declaratory judgment on ownership, breach of cofounder agreement, potentially fraudulent transfer if IP was assigned to competitor
  • Key Evidence: IP assignment agreements, founding documents, employment agreements, contribution timeline
  • Challenge: California work-for-hire doctrine is narrow; without written assignment, ownership can be disputed
Scenario 5: The Investor Introduction
Cofounder Takes Your Investors/Customers
The departing cofounder approaches your investors or major customers, leveraging relationships developed at your company to secure funding or deals for their new venture.
  • Legal Claims: Trade secret (if customer lists are protected), breach of fiduciary duty, tortious interference
  • Key Evidence: Customer list protection measures, communications with customers/investors, timing of approach
  • Challenge: Personal relationships aren't trade secrets; must show use of protected confidential information
Scenario 6: The Quiet Exit
No Immediate Problem, Then Surprise Launch
The cofounder leaves amicably, maybe even helps transition. A year later, they launch a competitor that's clearly based on your technology and approach.
  • Legal Claims: Trade secret (if still secret), breach of confidentiality obligations (if surviving provisions)
  • Key Evidence: What agreements survive termination, whether trade secrets are still secret, proof of actual use
  • Challenge: Statute of limitations (3 years CUTSA), proving they didn't independently develop
Scenario 7: Foreign Development
EU/Foreign Code, No Agreements, U.S. Competitor
Two cofounders build code for months in the EU or another jurisdiction. No company, no founder agreement, no IP assignments. One cofounder then joins a U.S. competitor and is suspected of integrating the joint code.
  • Legal Issues: Foreign law governs initial ownership/co-authorship. U.S. trade secret and copyright claims apply to misappropriation occurring here. Choice-of-law analysis required.
  • Key Evidence: Foreign development timeline, repo history, recruitment communications, git commits at competitor (obtained in discovery)
  • Challenge: Proving foreign-created code is being re-used (not clean-room rebuilt). Dealing with joint authorship defenses. Coordinating foreign-law expert opinions.
The "General Knowledge" Defense

In almost every case, the departing cofounder will argue they're simply using general skills, industry knowledge, and ideas they naturally learned on the job - not trade secrets. California courts protect a person's right to use their training and experience in subsequent employment. Your case depends on showing they took and used specific, identifiable trade secrets, not just carried their experience to a new job.

Evidence Preservation & Proof

Trade secret cases are won or lost on evidence. The moment you suspect misappropriation, your priority is preserving what you have and gathering what you can legally obtain.

Act Immediately on Evidence

Digital evidence disappears quickly. Cloud logs expire, devices get wiped, and memories fade. If you suspect trade secret theft, engage forensics and legal counsel within days, not weeks.

Evidence Preservation Timeline

Days 1-3: Immediate Lockdown
Critical Window
Disable all access for the departed cofounder. Preserve access logs, email archives, and system backups. Issue litigation hold notices to prevent routine data deletion. Contact your IT team and outside forensics consultant. If you've already revoked access but haven't preserved logs: act now—many cloud providers only retain detailed access logs for 30-90 days. Request in writing that your providers preserve and export logs for the departure period immediately.
Days 4-14: Forensic Collection
Evidence Gathering
Forensically image any returned company devices. Collect cloud service access logs (GitHub, AWS, Google Workspace, Slack). Identify all repositories, databases, and systems the cofounder accessed. Document the chain of custody.
Weeks 2-4: Analysis & Intelligence
Building the Case
Analyze access patterns for anomalies (large downloads, unusual hours, bulk exports). Compare access timing to resignation timeline. Review communications for evidence of planning. Begin monitoring competitor's public activities.
Ongoing: Competitive Intelligence
Monitoring
Monitor the competitor's product, job postings, patents, and public statements. Preserve evidence of similarity. Watch for recruiting of your employees. Document any customer reports of competitor solicitation.

What Courts Want to See

Evidence Type What It Proves How to Obtain
Access Logs What the cofounder accessed before leaving, unusual patterns, bulk downloads IT systems, cloud provider logs (request before they expire), email server logs
Device Forensics Files copied to external drives, personal cloud uploads, deletion attempts Forensic imaging of returned devices, MDM logs if deployed
Code Comparison Actual copying vs. independent development, structural similarity Expert analysis comparing your code to competitor's (may require discovery). In cofounder-to-competitor cases, the strongest evidence often comes from comparing your repo history to the competitor's git history—typically requires formal discovery or negotiated forensic protocol.
Communications Planning before departure, coordination with future employer/investors Company email archives, Slack history, discovery of personal communications
Timeline Evidence Impossibly fast competitor development, planning while employed Public records, product announcements, hiring patterns
Trade Secret Identification That specific information qualifies as protectable trade secrets Internal documentation, declarations from technical experts, security measures
Don't Investigate Illegally

Never access the cofounder's personal devices or accounts without authorization. Don't have employees infiltrate the competitor. Don't misrepresent yourself to obtain information. Illegally obtained evidence can sink your case and expose you to counterclaims.

Proving "Reasonable Measures" for Trade Secrets

You must show you took reasonable steps to protect the secrecy of your trade secrets. Courts examine:

Security Measures Checklist
A
Access Controls: Role-based permissions, principle of least privilege, access logging
B
Confidentiality Agreements: NDAs, IP assignments, employment agreement confidentiality provisions
C
Technical Security: Encryption, secure authentication, DLP tools, code repository controls
D
Physical Security: Locked facilities, visitor logs, secure disposal of documents
E
Employee Training: Confidentiality reminders, exit interview protocols, offboarding procedures
F
Marking/Labeling: "Confidential" designations on sensitive documents and code repositories

Remedies & Litigation Strategy

Depending on the strength of your evidence and the urgency of the threat, different remedies may be appropriate. Many cases settle quickly once serious legal action is initiated.

Available Remedies

Remedy What It Does When to Pursue
Temporary Restraining Order (TRO) Immediate injunction (hours/days) without notice to defendant in emergency situations Imminent irreparable harm, evidence of ongoing theft, competitor about to launch
Preliminary Injunction Injunction lasting through litigation, stops use of trade secrets during case Strong evidence, likelihood of success on merits, irreparable harm
Permanent Injunction Final order preventing use of trade secrets, may include time limit or be permanent Victory at trial or summary judgment
Actual Damages Compensation for losses caused by misappropriation (lost profits, development costs) Can prove specific financial harm
Unjust Enrichment Disgorgement of defendant's profits from using trade secrets Defendant profited, may be easier to prove than your losses
Reasonable Royalty What defendant would have paid to license the trade secrets legitimately Hard to prove actual damages or profits
Exemplary Damages (2x) Double damages for willful and malicious misappropriation Clear evidence of bad faith, intentional theft
Attorney Fees Recovery of legal costs from defendant Willful misappropriation (CUTSA) or bad faith claim/defense
Ex Parte Seizure (DTSA) Federal court orders immediate seizure of trade secret materials without notice Extraordinary cases, defendant likely to destroy evidence or flee

Litigation Strategy Considerations

Speed vs. Stealth
When to Move Fast
If the competitor is about to launch, or ongoing theft is occurring, seek emergency relief immediately. A TRO can be obtained within days. However, this tips your hand early.
  • Emergency TRO applications possible ex parte
  • Preliminary injunction hearing within weeks
  • But: exposes your evidence and strategy early
Settlement Leverage
Negotiation Before/During Litigation
Many cofounder disputes settle once the defendant understands the strength of your evidence. A well-crafted demand letter backed by solid evidence can achieve results without full litigation costs.
  • Return of all materials and data
  • Injunctive commitments
  • Monetary settlement
  • Non-hire/non-solicit agreements
Forum Selection
State vs. Federal Court
Federal court (DTSA + CUTSA) offers faster discovery, more sophisticated judges on tech issues, and ex parte seizure. State court may be preferable for purely state-law claims or jury pool considerations.
  • DTSA provides federal jurisdiction
  • Copyright claims require federal court
  • Consider local rules and judge experience
The Power of Early, Strong Action

In many cases, a prompt, well-supported cease and desist letter followed by immediate litigation filing creates enough pressure for quick resolution. Defendants who thought they could get away with theft often settle once they see serious legal action backed by forensic evidence. The key is acting quickly while evidence is fresh and before the competitor gains market traction.

Defense Considerations

Before initiating litigation, consider potential defenses and counterclaims:

Common Defenses to Anticipate
  • Independent Development: They claim they built it themselves without using your secrets
  • Not a Trade Secret: Information was publicly known or not adequately protected
  • No Improper Acquisition: They had legitimate access and no duty of confidentiality
  • General Knowledge: They're using skills and experience, not specific secrets
  • Ownership Dispute / Co-Ownership: In no-agreement scenarios, expect: "I wrote 70% of the code before any company existed—I'm a co-owner, not a thief, and I'm free to use my own work." This is the most common defense in cofounder disputes without IP assignments.
  • Foreign Law Shields: If code was developed abroad: "Under [EU/foreign] law, I'm a joint author with independent rights to exploit the work."
  • Unclean Hands: Your own misconduct bars equitable relief
Choice of Law in Cross-Border Cases

When code was developed in the EU and misappropriation occurs in the U.S., courts typically apply a split analysis. Following cases like Itar-Tass v. Russian Kurier, U.S. courts will look to foreign law to determine ownership and co-authorship (who owns what), then apply U.S. copyright and trade secret law for infringement/misappropriation claims and remedies. This means you can still bring DTSA, CUTSA, and copyright claims in federal court—but must be prepared to prove ownership under the foreign law that governed when the code was created.

Take Action: Next Steps

If you're facing a cofounder IP dispute, time is critical. Here's what you should do now:

Immediate Action Items
1
Lock Down Access: Immediately revoke all system access for the departed cofounder. This includes email, code repositories, cloud services, Slack, and any other company systems.
2
Preserve Evidence: Issue litigation hold notices. Do not let routine data deletion destroy potential evidence. Back up access logs before they expire.
3
Gather Documents: Collect all agreements signed by the cofounder: founders agreement, IP assignment, employment agreement, NDA, equity documents.
4
Document What You Know: Write down the timeline, what you've observed, and what you suspect. Note specific trade secrets you believe were taken.
5
Consult Legal Counsel: Trade secret litigation is complex and time-sensitive. Get experienced counsel involved early to guide evidence preservation and strategy.
6
Foreign Law (If Applicable): If code was developed in the EU or another jurisdiction before a U.S. entity existed, consider a targeted consult with foreign IP/IT counsel on ownership, joint authorship rules, and partnership duties under local law.

Schedule a Case Evaluation

I handle cofounder IP disputes for California startups. During a case evaluation, we'll discuss your situation, review the evidence you have, and map out your options.

What to Bring to the Consultation
  • All agreements with the departing cofounder
  • Timeline of events (founding, departure, competitor activity)
  • Evidence of misappropriation you've gathered
  • Description of your trade secrets and how they were protected
  • Information about the competitor and their product
Don't Wait

Trade secret cases have statute of limitations issues (3 years under CUTSA), but more importantly, evidence degrades quickly and competitors gain market position every day. If you suspect a cofounder has stolen your IP, the time to act is now.