Academic journal article Marquette Intellectual Property Law Review

I. Trade Secrets and Their History

Academic journal article Marquette Intellectual Property Law Review

I. Trade Secrets and Their History

Article excerpt

The history of trade secret law is an interesting study in how certain intellectual property rights have developed. Whereas copyright and patent law in the United States find legal justification in the Constitution (14) and implementing federal statutes, trade secret law grew out of the common law and has now been codified separately in most states. Indeed, the very assumptions underlying patent and copyright laws--that government-granted rights can serve to incentivize the creation and sharing of new ideas and expression (15)--are diametrically opposed to the notion of keeping information secret to gain a competitive advantage.

A. Trade Secret Basics

1. Definition of a Trade Secret

In broad strokes, a trade secret is some sort of information that has value because it is not generally known. The notion of secrecy exempts trade secrets from preemption by patent law. (16) The UTSA defines a trade secret as follows: (17)

"Trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, or process, that:

(i) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable (18) by proper means by, other persons who can obtain economic value from its disclosure or use, and

(ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

For those states that have not implemented the UTSA, and for most judicial opinions that predate the UTSA, (19) the definition of a trade secret is set forth in the comment to section 757 of the Restatement (First) of Torts: (20)

Definition of trade secret. A trade secret may consist of any formula, pattern, device or compilation of information which is used in one's business, and which gives him an opportunity to obtain an advantage over competitors who do not know or use it. (21)

Secrecy. The subject matter of a trade secret must be secret. Matters of public knowledge or of general knowledge in an industry cannot be appropriated by one as his secret. (22)

The Restatement definition of a trade secret is different from that of the UTSA, but it is also similar. Key differences are: (a) the exception for "single use" information, which can be trade secret under the UTSA; (b) the requirement of continuous use in business, which is not required under the UTSA; and (c) less emphasis on efforts to maintain secrecy than under the UTSA.

2. Trade Secret Misappropriation

Misappropriation of a trade secret involves improper means used to acquire or use a trade secret. (23) Trade secret law outlaws three different acts: (a) acquisition of a trade secret--merely obtaining the information; (b) disclosure of the trade secret--merely telling the information to another; and (c) use of the trade secret--using the information to one's advantage.

The categories of defendants who may be liable for misappropriation are also threefold: (a) the knowing acquirer of information is liable--this person obtains the information by improper means; (b) the knowing discloser of information is liable--this person discloses the information that has been improperly acquired, or perhaps properly acquired but for which there is a duty of secrecy; and (c) the constructively improper acquirer/discloser of information is liable--this person obtains the information with reason to know that the information was improperly obtained. (24)

The discussion above uses the term "improper" extensively. Under the UTSA, "'improper means' includes theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means." (25) In large part, "improper means" includes acts that are actionable in and of themselves--trespass, breach of contract, conversion of physical property, and, under modern laws, the misuse of computer networks. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.