Safeguarding Trade Secrets

By Budden, Michael Craig | Security Management, March 1997 | Go to article overview

Safeguarding Trade Secrets

Budden, Michael Craig, Security Management

Gordon Employment, Inc., a temporary employment agency in Minnesota, had always considered its client list a valuable asset. When a former manager started her own employment agency by using the company's customer lists, Gordon did not hesitate to sue for theft of this information, which it considered to be trade secrets. But to the company's surprise, the courts did not agree.

In that case (Gordon Employment, Inc., v. Jewell et al, 1984), the Minnesota Appeals Court found that the disputed customer lists could not be considered trade secrets because Gordon had not taken reasonable efforts to protect them. Specifically, the court noted that the lists were kept in unlocked file cabinets in public reception areas and that Gordon had no written policy regarding the information's confidentiality or its continued security. The lists were not even marked confidential.

Misappropriation of trade secrets appears to be on the rise as evidenced by the increasing number of firms seeking legal protection of secrets under trade secret law. IBM, Borland International, General Motors, Procter & Gamble, General Electric, and Kendall-Jackson Winery are among the businesses that have pursued their proprietary trade secret rights in recent years.

The value of the secrets in contention varies, but General Electric's formula for making synthetic diamonds, which had been misappropriated, was said to be worth millions of dollars - one indication of the serious nature of trade secret theft. Business owners and the security professionals on whom they rely to protect their assets need to be aware of trade secret law and respond accordingly.

The law. Information such as customer lists, marketing research results, secret formulas, recipes, and other types of valuable information sometimes qualify as trade secrets and, as such, can be protected by law. In the United States, each state governs how information can be protected through trade secrets laws and laws governing contracts.

In the past, such state acts varied considerably, but since 1980, most states have adopted the Uniform Trade Secrets Act (UTSA), which offers consistent protection for intellectual properties classified as trade secrets. To date, forty states and the District of Columbia have adopted the UTSA.

The UTSA defines trade secrets as information of value that is not generally known or legally knowable by others and that has been reasonably protected to maintain the secrecy of the information. If a company's legally protectable trade secrets have been misappropriated, the UTSA allows the firm to obtain an injunction prohibiting further use of the secret by the misappropriator. The act also allows for the recovery of damages in the amount of actual losses related to the misuse, plus any unjust profit made by unauthorized users. Additionally, in situations where the willful and malicious misappropriation of trade secrets has occurred, the act allows the victim to recover punitive damages and attorney fees.

Another tool in the arsenal against information thieves is The Economic Espionage Act of 1996. The act, passed by Congress in the last session, imposes heavy fines on individuals and companies and can result in imprisonment for those found guilty of stealing proprietary information.

Like the UTSA, the new federal law requires that companies take reasonable measures to protect vital information. In addition to being protected, information must have a demonstrable value to be considered a protectable trade secret.

Reasonable measures. A company must take reasonable measures to maintain the secrecy of proprietary information. For example, in one Iowa case, the 205 Corporation, doing business as the Tavern Restaurant, sued a former manager and his new employer alleging, among other charges, that the former employee had stolen its trade secrets (205 Corporation v. Brandow et al., Supreme Court of Iowa, 1994). The secrets in dispute were recipes for the restaurant's pizza and specialty sandwiches. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)


1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Cited article

Safeguarding Trade Secrets


Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.