Skip to main content
Business LibreTexts

10.4: Trade Secrets

  • Page ID
    49557
    • Anonymous
    • LibreTexts

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)
    Learning Objectives
    • Understand what a trade secret is.
    • Learn the differences between trade secret and patent protection.
    • Learn how trade secrets may be lawfully discovered.
    • Explore the concept of misappropriation and the legal consequences.

    Imagine that you are in an antique store and find a nineteenth-century ledger book for sale, originally from the W. B. Morrison & Co. Old Corner Drug Store in Waco, Texas. Among the recipes for hair restorers and cough syrups, something in particular catches your eye—a recipe entitled D Peppers Pepsin Bitters. What if you also knew that Dr. Pepper was first created and served in that very drugstore? What if you offered to pay two hundred dollars for the old ledger book, even though if it did contain the recipe for Dr. Pepper, it would be worth far more? After all, according to the company that manufactures Dr. Pepper, only three people know the recipe to that very closely guarded trade secret. Something very similar to this happened to Bill Waters. He found the ledger book in an antique store, and he paid two hundred dollars for it. However, at the time, he did not know that the book might date back to the exact time and place from which the popular soda was created. In fact, he did not even notice the recipe until later, and it took him several more days to recognize the possibility that it might be an early version of Dr. Pepper.

    Figure \(\PageIndex{1}\): Dr. Pepper Bottle. Source: http://en.Wikipedia.org/wiki/File:Dr_Pepper_bottle.JPG.

    Unlike patents, a trade secret can last forever. That is, it can last forever if the owner of the secret can, well, keep it a secret. If someone uses lawful means to uncover the secret, then the secret is no longer protected by the secret’s owners. Does this include reverse engineering? Yes. Reverse engineering is an absolutely legal means of discovering a trade secret. What about ferreting out secrets from an employer’s safekeeping, while employed and under a binding confidentiality agreement? No. That is an actionable claim for misappropriation, and the secret’s owners can pursue damages.

    Trade secrets are unlike patents in another important way. With a patent, the inventor must specifically disclose the details of the invention when applying for a patent. This means that the inventor has not protected the secret of the invention. However, in exchange for this disclosure, a patent owner has a legal monopoly over the property for a specified period of time. So even if others discover the secret of the invention (not a difficult task since patent applications are public record), they are prohibited from making, using, or selling it without the patentee’s permission. After the patent expires, then the patentee no longer has a property right to exclude others.

    So what is a trade secret? It is, in short, secret information. This information may include a process, formula, pattern, program, device, method, technique, or compilation. For many companies, lists of suppliers, costs, margins, and customers are all trade secrets. Soft drink recipes, KFC’s eleven spices, the donut mix sent to Krispy Kreme franchisees, the Big Mac’s special sauce, and even the combination of wood that is used in the burning process to make Budweiser beer are all trade secrets. Additionally, the information derives actual or potential economic value from being a secret that is not readily discoverable by others, and the information is the subject of efforts to keep it a secret. While most states have adopted the Uniform Trade Secrets Act (UTSA), not all have, so the definition of trade secret can vary by jurisdiction. Unlike patents, trademarks, and copyrights, there is no federal law protecting trade secrets.

    A claim for misappropriation may be brought when a trade secret has been wrongfully obtained, such as through corporate espionage or bribery. Generally, according to the UTSA, misappropriation occurs if the secret was acquired by improper means, or if the secret was disclosed or used without permission from the secret’s owner. Damages may include actual loss and unjust enrichment not captured by actual loss. Additionally, in cases of willful or malicious misappropriation, double damages may be awarded, as well as attorney’s fees.

    So what if you are never lucky enough to discover a multimillion-dollar secret recipe hidden away in an antique shop? As long as the recipe is not patented, you can try to reverse engineer it. If you succeed, you can use it immediately. However, if you are working for an employer in a creative capacity, working with others to develop the secret, and if you have agreed not to use trade secrets, then the right to the trade secret will belong to your employer, at least in most jurisdictions. Ask Peter Taborsky, an undergraduate student at South Florida University in 1988. According to Taborsky, while working in the university’s chemical engineering lab, he began conducting experiments on his own. He discovered a highly effective method for treating sewage. The university demanded that he hand over his notebooks that contained the secrets of this invention. Taborsky refused and filed for a patent for his invention, which he received. However, the university pressed criminal charges for stealing trade secrets. Taborsky lost his case and found himself in a maximum-security facility working on a chain gang.

    So does Bill Waters need to worry about Dr. Pepper’s owners suing him for misappropriation or pressing criminal charges for stealing trade secrets? No. He lawfully obtained the ledger book by purchasing it in the open market. Additionally, according to a company spokesman, the ingredient list under D Peppers Pepsin Bitters is most likely an old remedy for a stomachache rather than any version of the recipe for Dr. Pepper. Even if Mr. Waters had accidentally stumbled on the exact Dr. Pepper recipe, he would have a good argument that the company did not take steps to keep the secret a secret. If it had, he could argue, the company never would have allowed the recipe out of its sight.

    Key Takeaways

    Trade secrets last forever if the owner of the secret keeps the secret. However, if someone else discovers the secret through a lawful method, then the owner of the secret has no right to exclude others from using the secret. Unlawfully obtaining a trade secret is called misappropriation, which is an actionable claim. The Uniform Trade Secret Act has been adopted by most (but not all) states, so different jurisdictions have different rules of law concerning trade secrets.

    Exercise \(\PageIndex{1}\)
    1. If you owned a trade secret, what methods would you employ to protect it?
    2. If you invented something that was patentable or the subject of a trade secret, what types of issues would you consider when deciding whether or not to apply for a patent?

    This page titled 10.4: Trade Secrets is shared under a CC BY-NC-SA license and was authored, remixed, and/or curated by Anonymous.

    • Was this article helpful?