The Uniform Trade Secrets Act (UTSA) is a piece of legislation created by the Uniform Law Commission (ULC). The UTSA defines trade secrets and describes claims related to trade secrets. As of 2024, 48 states, the District of Columbia, the U.S. Virgin Islands, and Puerto Rico, have adopted the UTSA.
The UTSA defines a " trade secret" as:
Prior to the development of the UTSA, improper use or disclosure of a trade secret was traditionally a common law tort. Sections 757 and 758 of the Restatement of Torts (1939) set forth the basic principles of trade secret law that were widely adopted by U.S. courts. In particular, §757, comment b, listed six factors to be considered in determining whether information constitutes a trade secret:
There are typically three essential elements to a trade secret claim:
Use of a trade secret belonging to another does not always constitute misappropriation. There are two basic situations in which obtaining the use of a trade secret is illegal; where it is acquired through improper means, or where it involves a breach of confidence. Trade secrets may be obtained by lawful means such as independent discovery, reverse engineering, and inadvertent disclosure resulting from the trade secret holder's failure to take reasonable protective measures. The misappropriation of trade secrets is considered a form of unfair competition, and is discussed in the Restatement (Third) of Unfair Competition.
In some circumstances, misappropriation of trade secrets is not only a tort; it is a federal crime.
In 1996, Congress enacted the Economic Espionage Act ("EEA"), codified as 18 U.S.C. §§1831-1839. In United States v. Sazonov, a case currently pending in the United States District Court for the Southern District of New York, the defendant Sazonov has been charged with violating the EEA for "attempt[ing] to steal valuable proprietary computer code that took his employer years to develop . . . Sazonov was employed for thirteen years by Susquehanna International Group ("Susquehanna"), a financial services firm headquartered in Pennsylvania with offices in Manhattan."
Customer lists and other lists related to customer business qualify for trade secret protection if the lists' information cannot be ascertained from other generally available sources. In Morlife Inc. v. Perry, 56 Cal. App. 4th 1514 (1997), the California Court held that customer identities from an organization's list are protected as trade secrets if the identities are not generally known to the industry.
The Court also found three factors to be helpful when determining whether something is a trade secret:
In Morlife, the Court ruled that information about customers that was "stored on computer with restricted access" which had been subject to "a confidentiality provision expressly referring to its customer names and telephone numbers" fell under trade secret protection. According to Morlife, information that is difficult and time-consuming to obtain will likely be more protectable than information that was neither difficult nor time-consuming to obtain. Further, the court in Brocade Communication Systems Inc. v. A10 Networks Inc., 873 F. Supp.2d 1192 (N.D. Cal. 2012) found that information including "customer lists and contact information, pricing guidelines, historical purchasing information, and customers' business needs/preferences" typically receives trade secret protection.
Particular manufacturing details that are not publicly available may also qualify as protectable subject matter. For more on this, see Gates Rubber Co. v. Bando Chemical Industries Ltd., 9 F.3d 823 (10th Cir. 1993).
Remedies will vary depending upon the state, and whether the Economic Espionage Act is involved.
Under §1832(a) of the Economic Espionage Act, misappropriating a trade secret used in interstate commerce or foreign commerce may result in fines or imprisonment.
For an example of enforcement under the Uniform Trade Secrets Act, under Texas's adoption of the Act, a plaintiff who files for a preliminary injunction only needs to show that the defendant possesses the subject matter in question and has the opportunity to use it, as illustrated in Hughes v. AGE Industries Ltd.
[Last updated in June of 2024 by the Wex Definitions Team]