Employee Trade Secret Misappropriation CA

Departing Employees, Competitor Moves & Coworker Recruiting

🔒 Former Employee Took Your Trade Secrets?
I draft demand letters and pursue emergency TROs for trade secret theft.
Contact: owner@terms.law
📂 Related Employer → Former Employee Templates
🔒 Trade Secret Theft & Client Poaching ⚖️ Enforcing NDA/Nonsolicit (CA Compliant) 💻 Return Company Property Demands 🔐 Confidentiality & IP Breach
🚫 CALIFORNIA WARNING: What NOT to Demand
❌ DON'T demand they "stop competing" or "not work for competitors"
❌ DON'T cite or attempt to enforce void noncompete clauses
❌ DON'T demand they stop soliciting clients without trade secret evidence
❌ DON'T threaten new employer without proof of misappropriation
⚠️ SB 699 Risk: Attempting to enforce void noncompetes violates Bus. & Prof. Code § 16600.5 — exposing you to civil penalties and counterclaims.
Employee Departure Scenarios
Common Misappropriation Patterns
Scenario Red Flags Response
Competitor Move
Employee leaves for direct competitor
Accessing unusual files before departure; downloading customer lists; copying technical documents Exit interview; forensic review; demand letter to employee and potentially new employer
Startup Launch
Employee(s) leave to start competing business
Multiple departures at once; incorporating while still employed; soliciting clients before leaving Investigate timeline; demand letters; consider injunction if imminent launch using your secrets
Coworker Recruiting
Departed employee solicits current employees
Employees suddenly resigning; communications between departed and current employees Remind current employees of obligations; send cease-solicitation demand if using confidential employee information
Customer Raid
Former employee solicits your customers
Customers mention contact from former employee; business lost to competitor Demand if using confidential customer lists; may not be actionable if using general knowledge of industry contacts
Technical Theft
Engineer takes source code or designs
Large downloads; USB/cloud uploads; code appearing in competitor products Forensic analysis; demand with technical specificity; likely need injunction
The Departure Timeline
Before Resignation
Warning Signs:
  • Unusual access to files outside normal job duties
  • Large downloads or USB/cloud transfers
  • Printing unusual volume of documents
  • Accessing after-hours or from unusual locations
  • Suddenly interested in documents they don't normally use
Resignation Notice
Immediate Actions:
  • Preserve all access logs from past 90+ days
  • Consider limiting access to sensitive systems
  • Schedule exit interview
  • Review their NDA and employment agreements
  • Identify what confidential information they had access to
Exit Interview
Cover These Points:
  • Remind of ongoing confidentiality obligations
  • Collect all company property (laptop, phone, badges, keys)
  • Obtain signed certification of return of materials
  • Ask about future employment (tactfully—don't pry aggressively)
  • Provide written summary of post-employment obligations
Departure Day
Final Steps:
  • Terminate all system access immediately
  • Revoke badge/building access
  • Forward or disable email
  • Review returned devices before wiping
  • Forensically image devices if suspicious activity detected
Post-Departure
Monitoring & Follow-Up:
  • Complete forensic analysis of access logs
  • Monitor for competitor activity using your information
  • Watch for solicitation of customers or employees
  • Send reminder letter if concerns arise
  • Escalate to demand letter or litigation if misappropriation confirmed
Don't Delay: The longer you wait after discovering misappropriation, the weaker your injunction case becomes. Courts expect urgency if the harm is truly "irreparable."
Investigating Employee Misappropriation
Digital Forensics
Evidence Source What to Look For
File Access Logs Files accessed, dates, frequency; unusual patterns before departure
Download/Copy Logs Downloads to local storage; copies to USB; cloud uploads (Dropbox, Google Drive, personal email)
Email Forwarding to personal accounts; attachments sent outside; communications with competitors
Print Logs Unusual printing volume; sensitive documents printed
VPN/Remote Access After-hours access; access from unusual locations
Device Forensics Files on returned devices; deleted files (recoverable); browser history; USB connection history
Cloud Storage Company data in personal cloud accounts accessed from work network
Preserve Before You Investigate: Before conducting any analysis, issue a litigation hold to preserve all relevant evidence. If you modify or delete data during investigation, you may face spoliation sanctions.
Common Misappropriation Evidence
  • Pre-departure download spike: Employee who normally accesses 10 files/day suddenly downloads 500 files in final week
  • USB connection: Device logs show USB drive connected and large transfers made
  • Email to personal account: Attachments sent to personal Gmail/Yahoo address
  • Cloud sync: Personal Dropbox installed on work computer with company files synced
  • After-hours access: Accessing sensitive files at 2 AM on final weekend
  • Breadth of access: Accessing files from multiple departments beyond job scope
Witness Interviews
  • Coworkers who may have observed suspicious behavior
  • IT staff who may have been asked for unusual access
  • Supervisors who can confirm what information employee had legitimate access to
  • HR regarding any prior issues or complaints
  • Customers or vendors who may have been contacted
Competitive Intelligence (Legitimate)
  • LinkedIn: New employer, new role, who they're connected to
  • Press releases: Announcements about new hires, new products
  • Patent/trademark filings: Applications listing former employee as inventor
  • Trade shows: Products or presentations that appear to use your technology
  • Customer feedback: Reports of competitor offering similar solutions
Don't Cross Lines: Don't access employee's personal accounts, intercept communications, or conduct surveillance beyond legitimate business review of company systems. Improper investigation can expose you to liability and taint your case.
California Employee Mobility Rights
Business & Professions Code § 16600: "Except as provided in this chapter, every contract by which anyone is restrained from engaging in a lawful profession, trade, or business of any kind is to that extent void." California courts interpret this BROADLY to protect employee mobility. You cannot stop employees from working for competitors—only from misappropriating your actual trade secrets.
What You CAN'T Do
Prohibited Why It's Prohibited
Non-compete agreements Void under § 16600 (with very narrow exceptions)
Prevent employee from working for competitor Violates § 16600 employee mobility rights
Prevent employee from using general skills/knowledge General knowledge belongs to employee, not trade secret
"Inevitable disclosure" injunctions California courts hostile to this doctrine—seen as backdoor non-compete
Broad non-solicitation of customers May be unenforceable if too broad—depends on specifics
Require employee to disclose new job before starting Generally unenforceable
What You CAN Do
Permitted Requirements
NDAs / Confidentiality agreements Enforceable if reasonable in scope; can't be disguised non-compete
Prevent use of actual trade secrets Must be specific confidential information, not general knowledge
Demand return of company materials Physical and electronic copies of confidential documents
Injunction for specific trade secret use Must show actual or threatened misappropriation of identified trade secrets
Non-solicitation of employees Generally enforceable if reasonable, but can't prevent former employee from hiring people who independently seek them out
Invention assignment agreements Enforceable within limits of Labor Code § 2870
The "General Knowledge" Line

Employees can use general skills, knowledge, and experience gained during employment—even if learned on your dime. This includes:

  • Industry knowledge and market understanding
  • Technical skills and methodologies
  • Management and business skills
  • Professional relationships (knowing people exists—using confidential contact details is different)
  • General understanding of how your business operates

This does NOT include:

  • Specific customer lists with pricing and purchase history
  • Proprietary source code or technical specifications
  • Detailed business strategies and financial projections
  • Secret formulas or manufacturing processes
  • Confidential vendor terms and pricing
Drafting Demands: Your demand letters must be carefully drafted to target trade secret misappropriation, not employee mobility. Demands that effectively seek to prevent someone from working in their field—even if framed as trade secret claims—may be challenged as violating § 16600 and could result in fee-shifting against you.
Sample Employee Misappropriation Letters
Sample 1: Employee Moving to Competitor
[Company Name] [Address] [Date] CONFIDENTIAL [Former Employee Name] [Home Address or via Email] Re: Post-Employment Confidentiality Obligations Dear [Employee]: We understand you have accepted a position with [Competitor], effective [Date]. While we respect your right to pursue new opportunities, we write to remind you of your ongoing legal obligations regarding [Company]'s confidential information. YOUR OBLIGATIONS During your employment, you had access to confidential and proprietary information including [general categories without full disclosure]: • Customer information, pricing, and contract terms • Technical specifications and product roadmaps • Business strategies and financial data • Proprietary methodologies and processes You signed a Confidentiality Agreement dated [Date] that requires you to: 1. Maintain the confidentiality of all proprietary information 2. Not use or disclose such information after your employment 3. Return all company materials upon termination 4. Not solicit [Company] customers using confidential information These obligations continue after your employment ends. WHAT WE EXPECT We are not asking you to refrain from working for [Competitor] or in your field—California law protects your right to do so. However, you may NOT: • Use [Company]'s trade secrets in your new role • Disclose confidential information to [Competitor] • Rely on confidential customer lists or contacts • Share proprietary technical information CONFIRMATION REQUESTED Please confirm in writing by [Date] that: 1. You have returned all [Company] materials 2. You have deleted any [Company] information from personal devices 3. You understand your ongoing confidentiality obligations 4. You will not use or disclose [Company] trade secrets We reserve the right to take legal action if we discover misappropriation of [Company]'s confidential information. Sincerely, [Name] [Title] [Company]
Sample 2: Evidence of Misappropriation – Stronger Demand
[Company / Law Firm] [Address] [Date] VIA CERTIFIED MAIL AND EMAIL [Former Employee Name] [Address] Re: DEMAND – Trade Secret Misappropriation in Violation of CUTSA Dear [Employee]: This firm represents [Company] regarding your misappropriation of trade secrets in violation of the California Uniform Trade Secrets Act (Civil Code § 3426) and your Confidentiality Agreement. EVIDENCE OF MISAPPROPRIATION Our forensic investigation has revealed the following: • Between [Date] and [Departure Date], you accessed and downloaded [X] files from [Company]'s confidential [system/database] • On [Date], you connected a personal USB drive to your work computer and transferred approximately [X GB] of data • Your email records show you forwarded [X] confidential documents to your personal email account at [personal email] • You accessed [specific confidential system] [X] times in your final week—significantly more than your average of [X] times over the preceding months This information includes [categories of trade secrets] that you had no legitimate business reason to download or transfer. LEGAL CONSEQUENCES Under CUTSA, your conduct constitutes misappropriation subjecting you to: • Injunctive relief prohibiting use or disclosure • Actual damages for [Company]'s losses • Disgorgement of profits you or [New Employer] derive from this information • EXEMPLARY DAMAGES up to 2× actual damages for willful misappropriation • [Company]'s attorney fees Additionally, trade secret theft may constitute a criminal offense under California Penal Code § 499c. DEMANDS You must immediately: 1. CEASE all use and disclosure of [Company] trade secrets 2. RETURN OR DESTROY all [Company] confidential information in your possession, including electronic copies on any personal devices, cloud storage, or email accounts 3. PROVIDE sworn certification within seven (7) days that you have: (a) Returned or destroyed all [Company] materials (b) Not disclosed [Company] trade secrets to [New Employer] or any third party (c) Preserved all evidence pending potential litigation 4. IDENTIFY any third parties to whom you have disclosed [Company] information Failure to comply will result in [Company] seeking emergency injunctive relief and pursuing maximum damages without further notice. Contact undersigned immediately to discuss resolution. [Attorney Name] Counsel for [Company]
Sample 3: Notice to New Employer
[Company / Law Firm] [Address] [Date] VIA CERTIFIED MAIL [New Employer Company] [Address] Attn: General Counsel Re: [Employee Name] – Trade Secret Misappropriation Dear Counsel: We represent [Company] in connection with the misappropriation of trade secrets by [Employee], who we understand recently joined [New Employer]. PURPOSE This letter puts [New Employer] on notice that [Employee] may possess [Company]'s trade secrets and that [New Employer] will be liable under CUTSA if it uses or benefits from that information. BACKGROUND [Employee] was employed by [Company] as [Title] from [Dates]. In that role, [Employee] had access to [Company]'s most sensitive confidential information, including [general categories]. We have evidence that [Employee] improperly downloaded and retained this confidential information before departing. [NEW EMPLOYER]'S POTENTIAL LIABILITY Under Civil Code § 3426.1, liability for trade secret misappropriation extends to any party that uses a trade secret "knowing or having reason to know" it was acquired through misappropriation. This letter provides [New Employer] with actual knowledge. If [New Employer]: • Assigns [Employee] to projects involving [area of potential overlap] • Uses information [Employee] brought from [Company] • Benefits from [Company]'s trade secrets [New Employer] may be jointly liable for injunctive relief, damages, exemplary damages, and attorney fees. WHAT WE REQUEST We request that [New Employer]: 1. Implement appropriate screening procedures for [Employee] 2. Ensure [Employee] does not work on [specific projects/products] 3. Confirm [Employee] has not disclosed [Company] information 4. Return any [Company] materials in [Employee]'s possession WHAT WE ARE NOT REQUESTING We are NOT asking [New Employer] to terminate [Employee]. California law (B&P § 16600) protects employee mobility, and [Company] respects that right. We simply require that [Company]'s trade secrets not be misused. Please respond within ten (10) days. We are prepared to discuss reasonable protective measures that would allow [Employee]'s continued employment while protecting [Company]'s interests. Sincerely, [Attorney Name] Counsel for [Company]
Sample 4: Former Employee Recruiting Current Employees
[Company] [Address] [Date] [Former Employee Name] [Address] Re: Cease Solicitation of [Company] Employees Dear [Former Employee]: It has come to our attention that you have been contacting current [Company] employees to recruit them to [New Employer / Your Startup]. Specifically, we are aware that you have contacted [names or "multiple employees"] regarding employment opportunities since your departure. CONCERNS Your recruitment efforts raise several concerns: 1. If you are using [Company]'s confidential employee information (org charts, compensation data, performance reviews, personal contact information from company systems), this constitutes misappropriation of trade secrets. 2. If you are sharing [Company]'s confidential information with employees you're recruiting—or encouraging them to bring such information—you may be inducing breach of their confidentiality obligations. 3. Mass recruiting combined with trade secret theft suggests an effort to replicate [Company]'s operations using our confidential information. DEMAND We demand that you: 1. Cease contacting current [Company] employees using confidential company information 2. Confirm you are not using [Company]'s confidential employee or organizational information in your recruiting 3. Confirm you have not shared or encouraged current employees to share [Company] confidential information We are not claiming you cannot hire people who independently seek out opportunities with [your company]. However, systematic recruiting using our confidential information is actionable. Please respond by [Date]. [Name] [Title] [Company]
Enhanced Trade Secret Damages Calculator

Comprehensive damages estimator for employee trade secret misappropriation under California CUTSA and federal DTSA. Calculates lost business value, unjust enrichment, exemplary damages, and provides settlement range guidance.

📉 Section 1: Lost Business Value

Clients who defected to former employee
Net margin, not gross
Deals lost due to misappropriation

💰 Section 2: Defendant's Unjust Enrichment

Revenue they gained from misappropriation
How many months faster due to your secrets
What it would cost to acquire those customers legitimately
Cost to develop the trade secret independently

⚖️ Section 3: Case Strength Factors

⚠️ Disclaimer: This calculator provides rough estimates for educational purposes only. Actual recoveries depend on many factors including judge/jury decisions, evidence quality, defendant's resources, and litigation strategy. California Business & Professions Code § 16600 protects employee mobility—you cannot prevent competition, only protect actual trade secrets. Attorney fees are only recoverable for willful/malicious misappropriation. Consult a trade secret attorney for case-specific analysis.

📝 Create Your Demand Letter

Generate a professional demand letter, CA court complaint, or arbitration demand