Skip to main content
Business LibreTexts

Chapter 5: Assessment Questions

  • Page ID
    86799
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    1. 

    Unlike patents and trademarks, the law requires that intellectual property consisting of trade secrets not be publicly disclosed. True or False?

    1. True.
    2. False.
    Answer

    A. True

    2. 

    Which of the following best describes a trade secret?

    1. Information that many people do not know about how a product like a smartphone is made.
    2. Virtually any information that is of value as a result of not being generally known.
    3. Any information relating to the finances of a publicly held company.
    Answer

    B. Virtually any information that is of value as a result of not being generally known.

    3. 

    Trade secret theft or misappropriation costs the world’s richest 40 nations approximately how much of their gross domestic product, or GDP, each year?

    1. 1 to 3 percent.
    2. 4 to 6 percent.
    3. 7 to 10 percent.
    Answer

    A. 1 to 3 percent.

    4. 

    What are the two main requirements for information to be protectable as a trade secret?

    1. It must be novel and non-obvious.
    2. It must be original and expressed in a tangible form that can be seen or copied.
    3. It must be not generally known by others, and it must have been subject to reasonable efforts to avoid public disclosure.
    Answer

    C. It must be not generally known by others, and it must have been subject to reasonable efforts to avoid public disclosure.

    5. 

    What is one key advantage of trade secret protection versus patent protection?

    1. It protects the information to be kept secret indefinitely.
    2. It prevents others from ever independently deriving the same information.
    3. Both of the above are correct.
    Answer

    A. It protects the information to be kept secret indefinitely.

    6. 

    If you invent faster-than-light travel but believe someone will be able to reverse engineer it by examining your starship, should you patent it or keep it as a trade secret?

    1. Keep it as a trade secret.
    2. Patent it.
    Answer

    B. Patent it.

    7. 

    What did the Supreme Court note in the case of Bonito Boats v. Thunder Craft Boats?

    1. One cannot legally misappropriate trade secrets.
    2. Nobody is above the law, not even a trade secret owner.
    3. The holder of a trade secret does not have protection against reverse engineering.
    Answer

    C. The holder of a trade secret does not have protection against reverse engineering.

    8. 

    If information is protected as a valid trade secret, a competitor can be stopped from using it no matter who he obtained it from. True or False?

    1. True.
    2. False.
    Answer

    B. False

    9. 

    Trade secret protection is guaranteed by the federal government. True or False?

    1. True.
    2. False.
    Answer

    B. False

    10. 

    In which country did trade secret law first originate in the early 1800s?

    1. France.
    2. The United States.
    3. England.
    Answer

    C. England

    11. 

    What impact did the Uniform Trade Secrets Act (UTSA) of 1979 have on trade secret protection in the United States?

    1. It was the first trade secret law binding on every state.
    2. It served as a model that was adopted by 48 of the 50 U.S. states.
    3. It served as a model that was adopted by every state.
    Answer

    B. It served as a model that was adopted by 48 of the 50 U.S. states.

    12. 

    Which of the following best describes the problem with the current lack of uniform federal protection of trade secrets?

    1. There is no real protection against misappropriation of trade secrets.
    2. The protections against trade secret theft are very uneven.
    3. A federal trade secret law would merely replicate state protections.
    Answer

    B. The protections against trade secret theft are very uneven.

    13. 

    Which of the following could be considered a trade secret so long as reasonable steps had been taken to prevent its disclosure?

    1. Sales information.
    2. Customer lists.
    3. Manufacturing techniques.
    4. All of the above.
    Answer

    D. All of the above.

    14. 

    Is information not known to the public considered to be a trade secret?

    1. Yes.
    2. No.
    3. It depends.
    Answer

    C. It depends.

    15. 

    Would a customer list always be considered a trade secret?

    1. It depends on whether the customers want to be identified or not.
    2. To be considered a trade secret, the names of customers must not be available or discernable through public sources.
    Answer

    B. To be considered a trade secret, the names of customers must not be available or discernable through public sources.

    16. 

    Can a mere idea be considered a trade secret?

    1. No. Just as you cannot patent or copyright a mere idea, you cannot protect a mere idea with a trade secret.
    2. Yes. Under the Uniform Trade Secrets Act, even an idea can sometimes be considered a trade secret.
    Answer

    A. No. Just as you cannot patent or copyright a mere idea, you cannot protect a mere idea with a trade secret.

    17. 

    To gain trade secret protection, what must the owner do with confidential information?

    1. Publicize it as widely as possible.
    2. Not disclose it.
    3. Take active steps to keep the information secret.
    Answer

    C. Take active steps to keep the information secret.

    18. 

    What are the benefits of developing a written trade secret plan?

    1. It serves as a policy manual that prevents situations in which unwritten rules are followed and security procedures are ignored.
    2. In the event of litigation, it can serve as proof that you took active steps to keep the information secret.
    3. Both of these.
    Answer

    C. Both of these.

    19. 

    How should companies handle written trade secrets?

    1. Shred them.
    2. Mark them “secret” or “confidential,” among other measures taken.
    3. Never store them on a computer.
    Answer

    B. Mark them “secret” or “confidential,” among other measures taken.

    20. 

    Which of these is an example of “passive disclosure” of a trade secret?

    1. Leaving confidential documents lying around for anyone to see.
    2. Inadvertently disseminating information at trade shows or conferences.
    3. Disclosing confidential information in press releases, newspaper articles, or marketing collateral.
    Answer

    A. Leaving confidential documents lying around for anyone to see.

    21. 

    What is one way to guard against the active disclosure of trade secret information?

    1. Prevent employee attendance at trade shows and seminars.
    2. Appoint a trade secret committee to approve publications, speeches, and marketing collateral prior to disclosure.
    3. Avoid meeting with prospective buyers, customers, or licensees.
    Answer

    B. Appoint a trade secret committee to approve publications, speeches, and marketing collateral prior to disclosure.

    22. 

    Which of the following is NOT an example of misappropriation of a trade secret?

    1. Acquisition of a trade secret through improper means.
    2. Deliberate disclosure of a trade secret by the trade secret owner.
    3. Disclosure of a trade secret without consent.
    Answer

    B. Deliberate disclosure of a trade secret by the trade secret owner.

    23. 

    The UTSA not only prohibits the actual disclosure or use of a trade secret, it also protects against the “threatened” disclosure of trade secrets. When might a court intervene to stop a “threatened” disclosure before the actual disclosure takes place?

    1. An employee goes to work for another company in a different industry.
    2. An employee caught embezzling is fired and the employer believes the same lack of morals will lead to the fired employee disclosing trade secrets.
    3. An employee goes to work for an arch competitor in a comparable job position.
    Answer

    C. An employee goes to work for an arch competitor in a comparable job position.

    24. 

    The burden of proof in a threatened trade secret misappropriation case lies with whom?

    1. The trade secret owner.
    2. The former employee who leaves to go work for a competitor.
    3. The competitor, who must prove he did no wrong by hiring the ex-employee.
    Answer

    A. The trade secret owner.

    25. 

    What remedies does the UTSA provide for the misappropriation of trade secrets? (Choose all that apply.)

    1. Criminal penalties of up to five years for a first offense.
    2. Statutory damages.
    3. Injunctive relief.
    4. Exemplary damages.
    5. Attorneys’ fees.
    Answer

    B. Statutory damages.

    26. 

    What remedies were imposed in the case of Mattel, Inc. v. MGA Entm’t, Inc. in 2013?

    1. An injunction barring a new employer from hiring the former employee of the trade secret owner.
    2. $85 million in exemplary (punitive) damages awarded to the trade secret owner.
    Answer

    B. $85 million in exemplary (punitive) damages awarded to the trade secret owner.

     


    Chapter 5: Assessment Questions is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?