❌ DON'T demand they "stop competing" or "not work for competitors"
❌ DON'T cite or attempt to enforce void noncompete clauses
❌ DON'T demand they stop soliciting clients without trade secret evidencia
❌ DON'T threaten new empleador without proof of misappropriation
⚠️ SB 699 Risk: Attempting to enforce void noncompetes violates Bus. & Prof. Code § 16600.5 — exposing you to civil multas and counterclaims.
Federal Trade Secret Protection: Defend Trade Secrets Act (DTSA)
The DTSA (18 U.S.C. § 1836) provides a private federal cause of action for trade secret misappropriation. Key requirements:
Trade secret must be related to a product or service used in interstate or foreign commerce
Allows for ex parte seizure orders in extraordinary circumstances (rare but powerful)
Remedies include injunctive relief, daños (actual loss or unjust enrichment), and exemplary daños up to 2× for willful/malicious misappropriation
Abogados' fees available for willful/malicious conduct or mala fe assertions
California Uniform Trade Secrets Act (CUTSA)
California código civil § 3426 et seq. defines and protects trade secrets under state law:
Element
Requirement
Definition of trade secret
Information (technical or business) that: (1) derives independent economic value from not being generally known, and (2) is subject to reasonable efforts to maintain secrecy
Misappropriation
Acquisition by improper means OR disclosure/use in breach of a duty to maintain secrecy
Injunction, daños (actual loss or unjust enrichment), exemplary daños (up to 2×), abogados' fees for willful/malicious conduct
💡 What Qualifies as a Trade Secret? Customer lists, pricing structures, margin data, supplier relationships, product roadmaps, source code, manufacturing processes, marketing strategies, and proprietary datasets—if they derive value from secrecy and you took reasonable steps to protect them.
Duty of Loyalty While Employed
Even in California (which strongly protects empleado mobility post-employment), empleados owe a duty of loyalty while still employed:
Cannot actively divert clients or opportunities to a competing business they're planning to start
Cannot use empleador's resources (time, equipment, contacts) to build a competing venture
Cannot download or copy confidencial information in anticipation of departure
Cannot recruit colleagues to leave while still employed (California allows post-departure recruitment, but not while on the payroll)
Violación of the duty of loyalty can support claims for breach of fiduciary duty, even without a written contract.
Client Poaching in California
California's strong anti-noncompete policy (Bus. & Prof. Code § 16600) means customer non-solicitation agreements are generally unenforceable for regular empleados. Sin embargo, client poaching is still actionable when it involves:
Scenario
Actionable?
Base Legal
Using trade secret customer lists or confidencial business info
✅ Sí
CUTSA/DTSA misappropriation
Soliciting clients while still employed
✅ Sí
Breach of duty of loyalty
Using empleador's confidencial pricing/margin data to undercut
✅ Sí
Trade secret misappropriation
Descargaring CRM data, proposal templates, client files before leaving
✅ Sí
Trade secret theft, incumplimiento de contrato
Competing for clients after departure using general knowledge
❌ No (generally)
Protected by § 16600—empleados can compete
Non-solicit in sale-of-business context (owner selling equity)
✅ Sí (narrow exception)
Bus. & Prof. Code §§ 16601, 16602
⚠️ California-Specific Caution: You cannot enforce a customer non-solicitation agreement against a regular empleado under § 16600, even if they signed it. Your carta de demanda must focus on trade secret misappropriation and duty of loyalty violacións, not simply "you can't compete for our clients."
Common Fact Patterns
The exodus: Empleado downloads entire CRM database, emails it to personal account, resigns, and starts competing business with former clients within weeks
The slow build: Empleado spends final 3–6 months using work time to build competing business, recruit colleagues, and line up clients to transition immediately upon departure
The poacher: Former empleado contacts clients using confidencial contact info, pricing, and project details they copied before leaving
The team defection: Multiple empleados coordinate departure, taking client lists, templates, source code, and proprietary processes to new competing venture
Step 1: Identify What Was Taken
Document exactly what confidencial information or trade secrets the former empleado or contratista accessed, copied, or used:
Confidenciality markings: Documents labeled "Confidencial," "Proprietary," or "Trade Secret"
Need-to-know policies: Restricted access to sensitive data on a business-need basis
Exit procedures: Return-of-property checklists, exit interviews, certification of data deletion
Empleado handbook/policies: Written policies prohibiting unauthorized copying or disclosure
If you had no protective measures, courts may find the information wasn't a protectable trade secret. Sin embargo, even minimal measures (NDAs + password protection) can suffice if the information derives real value from secrecy.
🔍 Discovery Red Flags: Unusual data access patterns in final weeks (late-night logins, bulk downloads, forwarding emails to personal accounts, printing hundreds of pages, copying files to USB drives, syncing to personal cloud storage).
Step 3: Document How You Know Misappropriation Occurred
Gather forensic evidencia showing the former empleado/contratista took or used your trade secrets:
Evidencia Type
What to Collect
System logs
IT audit logs showing file downloads, email forwards, cloud uploads, USB connections, printing activity
Email forensics
Emails to personal accounts, attachments with confidencial files, messages coordinating client transitions
Device imaging
Forensic snapshots of company laptops/phones before return (if you can legally access them)
Third-party reports
Clients reporting contact from former empleado using your confidencial info, LinkedIn messages, competitor intelligence
Comparative analysis
Side-by-side comparison of your materials vs. competitor's (e.g., identical proposal language, pricing structures, code snippets)
Testigo statements
Co-workers who observed suspicious behavior, heard plans to take clients, or saw data being copied
Step 4: Assess Daños and Leverage
Calculate your actual losses and unjust enrichment to determine the stakes:
Lost revenue: Clients who defected to the former empleado's new venture, using your confidencial information
Unjust enrichment: Value the former empleado gained by using your trade secrets (e.g., faster time-to-market, lower customer acquisition costs)
Development costs avoided: What it would have cost them to develop the information independently (e.g., years of R&D, customer relationship building)
Competitive advantage lost: Diminished market position, eroded pricing power, loss of first-mover advantage
Leverage factors:
Strength of forensic evidencia (smoking-gun emails, clear download logs)
Egregious conduct (mass data theft, coordinated team departure, lying during exit interview)
Availability of injunctive relief (can you stop ongoing use and prevent further damage?)
Former empleado's financial resources and reputational sensitivity
✅ Quick-Strike Advantage: If you act within days or weeks of discovery, puede buscar a Temporary Restraining Order (TRO) or preliminary injunction to immediately stop the misuse. Delay weakens su caso and signals that the harm isn't "irreparable."
Objectives of the Carta de Demanda
Your cease-and-desist letter should accomplish multiple goals simultaneously:
Immediate cessation: Stop all use and disclosure of specific categories of confidencial information
Return and destruction: Require return of all misappropriated materials and certification of deletion from all devices
Disclosure of recipients: Identify everyone to whom the information was disclosed (new empleador, clients, partners)
Preservation of evidencia: Prohibit deletion of emails, wiping devices, or altering cloud data
Customer de-solicitation: Demand they cease contact with specific clients (when supported by trade secret theory, not just noncompete)
Create acuerdo leverage: Signal serious intent and exposure to injunctive relief and daños
Tone: High-Threat vs. Cooperative
Choose your tone strategically based on the relationship and desired outcome:
Approach
When to Use
Language Style
High-threat
Egregious theft, ongoing harm, former empleado unresponsive or combative
"We will seek emergency injunctive relief, exemplary daños, and abogados' fees if you do not comply within 48 hours."
Cooperative
Valued former empleado, potential for negotiated resolution, relationship preservation desired
"We believe this situation can be resolved amicably. We're prepared to work with you to unwind the use of confidencial information without litigio."
Hybrid
Most common—firm on legal rights but open to acuerdo
"While we are prepared to pursue all available legal remedies, we would prefer to resolve this matter promptly and without the cost of litigio."
Essential Elements of the Carta de Demanda
Identification of trade secrets: Be specific—"client contact information, pricing data, and proposal templates," not just "confidencial information"
Evidencia of misappropriation: Reference specific acts (e.g., "On [date], you downloaded 15,000 customer records to a USB drive")
Contractual and statutory violacións: Cite the NDA, employment agreement, and CUTSA/DTSA
Immediate demands:
Cease all use and disclosure
Return all materials (physical and electronic)
Certify deletion from personal devices and cloud storage
Identify all recipients of the information
Preserve all evidencia (no deletion or destruction)
Deadline: Typically 48 hours to 7 días depending on urgency
Acuerdo opening (optional): "We are willing to discuss a resolution that avoids litigio if you take immediate corrective action."
Texto Modelo de Carta de Demanda (Opening)
Dear [Former Empleado/Contratista]:
I represent [Company Name] in connection with your misappropriation of trade secrets and confidencial business information in violación of your Confidenciality Agreement dated [date], the California Uniform Trade Secrets Act (código civil § 3426 et seq.), and the federal Defend Trade Secrets Act (18 U.S.C. § 1836 et seq.).
Our investigation has revealed that, antes de your resignation on [date], you engaged in a systematic effort to misappropriate [Company]'s proprietary information, including:
Customer contact information, purchasing history, and account details for over [X] clients;
Confidencial pricing structures, margin data, and discount schedules;
Proprietary proposal templates, marketing materials, and business development strategies; and
[Other specific trade secrets].
Específicamente, our IT audit logs show that on [dates], you:
Descargared [X] files containing customer data to a USB drive;
Forwarded [Y] emails containing confidencial pricing information to your personal email account ([email]);
Copied [Z] proprietary documents to your personal Dropbox account; and
Accessed and exported the entire CRM database on [date], three days before your resignation.
You have since used this misappropriated information to solicit [Company]'s clients and compete directly against us in violación of your legal obligations.
Specific Demandas Section
IMMEDIATE DEMANDAS:
To avoid immediate legal action, you must comply with the following within 48 hours of receipt of this letter:
Cease and desist from all use, disclosure, or dissemination of [Company]'s trade secrets and confidencial information.
Return all confidencial materials, documents, files, and data in any form (physical, electronic, cloud-based) to [Company] at [address].
Certify in writing that you have:
Deleted all copies of confidencial information from your personal devices (computers, phones, tablets, USB drives, external hard drives);
Deleted all copies from personal cloud storage accounts (Dropbox, Google Drive, iCloud, etc.);
Deleted all emails containing confidencial information from personal email accounts; and
Not disclosed any confidencial information to third parties.
Identify all individuals and entities to whom you disclosed [Company]'s confidencial information, including your new empleador, clients, business partners, and investors.
Preserve all evidencia related to your access, use, and disclosure of [Company]'s information. Do not delete, alter, or destroy any documents, emails, text messages, or electronic files.
Cease all contact with the following [Company] clients: [list specific clients if appropriate and legally supportable].
Consequences and Closing
LEGAL CONSEQUENCES:
If you fail to comply fully with these demands, [Company] will immediately seek:
A Temporary Restraining Order and preliminary injunction prohibiting your use of trade secrets;
Monetary daños for actual losses and unjust enrichment;
Exemplary daños of up to twice the amount of actual daños under CUTSA and DTSA;
Abogados' fees and costs for willful and malicious misappropriation; and
All other relief available under state and federal law.
We expect your full written response and cumplimiento by [specific date and time]. Direct all communications to me at [abogado contact info].
[Optional acuerdo language:] While we are prepared to pursue all available remedies, we are willing to discuss a resolution that avoids protracted litigio if you take immediate corrective action and demonstrate buena fe.
Atentamente,
[Abogado Name] Counsel for [Company Name]
⚠️ California § 16600 Cumplimiento: Do NOT demand that the former empleado "stop competing" or "not work for competitors." Focus exclusively on trade secret misuse and return of confidencial materials. Demanding they cease competition can violate California law and undermine su caso.
Digital Forensic Evidencia
The strongest trade secret cases are built on clear digital evidencia of theft:
Evidencia Type
How to Obtain
What It Proves
IT audit logs
System administrator pulls logs showing file access, downloads, emails, cloud syncs, USB connections
Former empleado accessed and copied specific files on specific dates
Email server data
Review emails sent to personal accounts, especially with attachments or large file transfers
Forwarding of confidencial documents to non-company email
Cloud storage logs
Check Dropbox, Google Drive, OneDrive admin consoles for sharing/syncing activity
Syncing company folders to personal cloud accounts
Device imaging
Forensic image of company laptop/phone before return (requires legal right to access)
Network printer logs showing unusual printing activity (hundreds of pages in final week)
Physical removal of confidencial documents
🔐 Preservation Notice: As soon as you suspect misappropriation, send a preservation letter instructing IT to preserve all logs, emails, and system data related to the former empleado. Courts can impose sanctions for spoliation if you fail to preserve evidencia once litigio is reasonably anticipated.
Testigo Evidencia
Interview current empleados who may have knowledge of the former empleado's activities:
Co-workers who observed suspicious behavior: Staying late, working on personal devices, downloading files, taking photos of screens
Managers who had exit conversations: What did the empleado say about their plans? Did they lie about where they were going?
IT staff: Unusual help desk tickets (password resets, access requests, demandas about locked-out USB drives)
Clients who were contacted: Did they receive calls/emails from the former empleado using your confidencial information?
Comparative Analysis: "Smoking Gun" Similarities
Compare your materials to the former empleado's new work product to show copying:
What to Compare
Red Flags
Proposal templates
Identical formatting, section headings, boilerplate language, even your company's typos
Same color schemes, imagery, taglines, positioning language
Pricing structures
Identical tier names, suspiciously similar price points, same discount schedules
Client lists
Contacting exact same clients in same order as your CRM database
Create side-by-side exhibits showing the similarities. The more identical the materials, the stronger the inference of copying.
Timeline Evidencia: The "Plan to Steal"
Build a chronological timeline showing premeditation:
3–6 months before departure: Incorporation of new competing business, domain registration, marca registrada filings
Final weeks: Spike in data access and downloads, meetings with clients positioned as "farewell" but actually transition discussions
Final days: Mass email forwarding, CRM exports, printing of confidencial documents
Resignation: Short or no notice, vague about future plans or outright lies about new role
Post-departure: Immediate launch of competing business, client announcements, identical service offerings
This timeline shows the theft was intentional, planned, and willful—supporting claims for exemplary daños and abogados' fees.
✅ Third-Party Discovery: In litigio, you can subpoena the former empleado's new empleador, cloud storage providers, and email hosts to obtain additional evidencia of misappropriation. The threat of this discovery often prompts acuerdo.
Emergency Injunctive Relief: TRO and Preliminary Injunction
If ongoing misappropriation is causing irreparable harm, seek immediate tribunal intervention:
Remedy
Timing
Standard
Temporary Restraining Order (TRO)
Issued within days, sometimes same day (ex parte)
Immediate and irreparable injury; likelihood of success on the merits
Preliminary Injunction
Hearing within 2–3 weeks; can last duration of case
Likelihood of success + balance of hardships + public interest
Permanent Injunction
After trial or summary judgment
Actual success on the merits; ongoing need for relief
What the tribunal can order:
Immediate cessation of use of trade secrets
Return and destruction of all misappropriated materials
Prohibition on soliciting specific clients (if trade-secret-based, not just noncompete)
Forensic imaging of devices to verify deletion
In extreme cases under DTSA: ex parte seizure of devices and materials
⚠️ DTSA Ex Parte Seizure: 18 U.S.C. § 1836(b)(2) allows for extraordinary ex parte seizure of property to prevent propagation or dissemination of trade secrets. This is rarely granted and requires showing: (1) TRO inadequate, (2) immediate and irreparable injury, (3) person would destroy/move property if notified, (4) narrow seizure scope. Use cautiously—courts disfavor ex parte seizures.
Monetary Daños Under CUTSA and DTSA
Damage Type
Calculation
Notes
Actual loss
Lost profits, lost business opportunities, diminished value of trade secret
Requires proof of causation (losses directly caused by misappropriation)
Unjust enrichment
Profits demandado gained from using trade secrets
Alternative to actual loss if demandado profited but you can't prove your losses
Reasonable royalty
What demandado would have paid to license the information
Used when actual loss and unjust enrichment are hard to quantify
Exemplary daños
Up to 2× actual daños for willful/malicious misappropriation
Requires showing intentional, deliberate theft (easy to prove with download logs, emails)
Abogados' fees
Reasonable fees and costs
Available for willful/malicious misappropriation OR mala fe reclamación (cuts both ways)
Acuerdo Dynamics
Most trade secret cases settle before trial. Common acuerdo structures:
Standstill agreement: Demandado agrees to stop using trade secrets; demandante agrees not to sue for past conduct; mutual release
Negotiated license: Demandado pays royalty or lump sum to continue using information under defined constraints
Return and destroy: Demandado certifies return/destruction of all materials; demandante releases past claims
Client carve-out: Demandado agrees not to solicit specific clients for defined period (if legally supportable)
Monetary payment: Lump sum to cover daños, abogado fees, and avoid admission of responsabilidad
Non-disparagement and confidenciality: Both sides agree not to discuss the dispute publicly
💡 Negotiation Leverage: Emphasize the cost and disruption of litigio (discovery of devices, declaración juradas, expert testigo fees). Former empleados often have limited resources and high incentive to settle quickly. Empleadors have staying power but face reputational risk if the case becomes public.
Prescripción
Jurisdiction
Reclamación
Prescripción
Federal (DTSA)
Misappropriation
3 año(s) desde discovery or when should have discovered (18 U.S.C. § 1836(d))
California (CUTSA)
Misappropriation
3 año(s) desde discovery or when should have discovered (Civ. Code § 3426.6)
California
incumplimiento de contrato (NDA)
2 años (oral) or 4 años (written)
Continuing violación doctrine: If misappropriation is ongoing (e.g., demandado continues to use stolen client list), the prescripción may not begin to run until the use ceases.
🧮 California Cumplimiento Risk Scorer
Before sending your carta de demanda, use this tool to assess whether it risks violating California Business & Professions Code § 16600 or SB 699. A high risk score means you should revise your approach.
🔴 Section 1: What Does Your Agreement Contain?
Check all restrictive covenants in your employment agreement, offer letter, or NDA.
🟡 Section 2: What Are You Demanding?
Check what your carta de demanda asks the former empleado to do.
🟢 Section 3: Evidencia & Protective Language
These factors REDUCE your risk.
California Cumplimiento Risk Score
📊 Risk Breakdown
📝 Recommendations
🚨 SB 699 Violación Risk
Your carta de demanda may violate Bus. & Prof. Code § 16600.5 (SB 699), which makes it unlawful to attempt to enforce void noncompete agreements. This could expose you to:
Civil multas
Empleado counterclaims for unfair competition
Requirement to notify all affected empleados
Abogado fee awards to the empleado
✅ California-Compliant Carta de Demanda Checklist
⚠️ Aviso Legal: This tool provides general guidance only and does not constitute legal advice. California employment law is complex and fact-specific. Consult a California employment abogado before sending any carta de demanda to a former empleado.
How I Can Help
I represent companies in trade secret misappropriation, unfair competition, and breach of fiduciary duty cases involving former empleados and contratistas. I handle matters from carta de demandas through emergency TROs and full litigio under CUTSA and DTSA.
Servicios Offered
Forensic investigation coordination: Work with IT and forensic experts to document data theft and preserve evidencia
Cease-and-desist carta de demandas: Aggressive, legally sound letters demanding immediate cessation, return of materials, and preservation of evidencia
Emergency injunctive relief: File for TROs and preliminary injunctions to stop ongoing misappropriation
Trade secret litigio: Prosecute claims under CUTSA and DTSA for daños, exemplary daños, and abogados' fees
Acuerdo negotiation: Secure favorable standstills, licenses, or monetary acuerdos without protracted litigio
California § 16600 cumplimiento: Ensure carta de demandas and litigio strategy comply with California's anti-noncompete laws
My Approach
Rapid response: Time is critical in trade secret cases. I move quickly to stop ongoing harm and preserve evidencia before it's destroyed.
Forensic-driven strategy: I work with IT and forensic experts to build airtight evidencia of theft—download logs, email trails, side-by-side comparisons.
Aggressive carta de demandas: My cease-and-desist letters are detailed, evidencia-based, and designed to create immediate acuerdo pressure while preserving your right to emergency relief.
California law expertise: I navigate the tension between protecting your trade secrets and complying with California's strict anti-noncompete laws (§ 16600, SB 699).
Emergency litigio readiness: If the former empleado doesn't comply, I'm prepared to file for a TRO within 24–48 hours, with declarations, exhibits, and proposed orders ready to go.
🔒 Former Empleado Stole Your Trade Secrets?
Contacto me immediately for a consultation. I'll assess your evidencia, draft a cease-and-desist letter, and if necessary, seek emergency tribunal intervention to stop the bleeding.
No—not simply because they're competing. California Bus. & Prof. Code § 16600 voids noncompete agreements. Sin embargo, you can stop them from using your trade secrets, soliciting clients using confidencial information, or competing using misappropriated data. Focus on what they're using, not where they're working.
You can still pursue trade secret misappropriation under CUTSA and DTSA even without a written NDA. The statutes protect trade secrets based on the information's secrecy and your protective measures (access controls, passwords, etc.), not just contractual obligations. Sin embargo, an NDA strengthens su caso significantly.
System logs (file downloads, emails to personal accounts, USB connections), forensic imaging of devices, side-by-side comparison of your materials vs. theirs, testigo statements, and client reports of being contacted with your confidencial information. Work with IT to pull audit logs immediately—they may be overwritten or deleted if you wait.
Sí. puede buscar a TRO or preliminary injunction requiring return and destruction of misappropriated materials, certification of deletion from all devices, and in some cases forensic imaging to verify cumplimiento. In extraordinary circumstances under DTSA, courts can even order ex parte seizure of devices.
Actual losses (lost profits, diminished trade secret value), unjust enrichment (profits demandado made), and up to 2× actual daños for willful/malicious misappropriation. You can also recover abogados' fees if the misappropriation was willful or malicious. Both CUTSA and DTSA provide these remedies.
3 año(s) desde when you discovered (or reasonably should have discovered) the misappropriation under both CUTSA and DTSA. Sin embargo, if the use is ongoing (continuing violación), the clock may not start until the use stops. Don't wait—early action is critical for emergency relief and evidencia preservation.
📝 Cree Su Carta de Demanda
Genere una carta de demanda profesional, demanda ante tribunal de CA o demanda de arbitraje