Don't Let Your Employees Trade Your Trade Secrets

30 September 2019 Labor & Employment Law Perspectives Blog
Authors: Jonathan Michael Thomas

Earlier this week, the U.S. Department of Justice (DOJ) warned that there has been a dramatic rise in trade secret theft. The DOJ points to China as the primary sponsor of such trade secret theft. Speaking with CNBC, U.S. Deputy Assistant Attorney General Adam Hickey stated that supply chain and telecommunication companies are prime targets of foreign governments seeking to improve their own industrial knowledge. China in particular has launched a “Made in China 2025” campaign in which it is seeking to become a dominant global high-tech manufacturer, and has, therefore, created an environment that rewards theft of intellectual property. 

While the Chinese threat garners news headlines, employers face a less existential, but nonetheless critical, threat to their trade secrets and other intellectual property: their own employees. And the concern is not just employees who wish to steal their employer’s trade secrets for their own purposes, such as creating a competing business venture. Employees can jeopardize their employer’s trade secrets merely by being lackadaisical in protecting such secrets. 

Courts place the burden on employers to use “reasonable measures” to protect their trade secrets. There is no bright-line rule on whether a particular measure is reasonable. Generally speaking, however, employers should use a heightened standard of protection for their trade secrets, rather than the normal business practices companies use to protect data that is merely confidential. 

The following are eight tips employers can use to better protect their trade secrets:

  1. Update nondisclosure agreements – make sure your agreements sufficiently identify the trade secrets that employees are required to maintain.

  2. Limit access to trade secrets – true trade secrets should be on a need-to-know basis

  3. Monitor access to trade secret repositories – employers must monitor electronic databases and other storage repositories containing trade secrets so that only designated individuals have access to trade secrets. 

  4. Cybersecurity – make sure that you have up-to-date cybersecurity for electronic resources. Cyber threats are ever-evolving, so your security should be routinely updated.

  5. Limit remote access to trade secrets – your cybersecurity is likely stronger at your office. It is often easier to hack an employee’s phone or computer when he or she is logged into a public network. Therefore, limiting remote access to your trade secrets provides an added level of security.

  6. Train and retrain employees – the best cybersecurity in the world will not protect a trade secret from a careless employee. Train employees not only on what is confidential, but also on how to maintain the confidentiality of trade secrets.

  7. Limit access to vendors – vendors should have very limited access to trade secrets. There should also be confidentiality agreements in place to maintain the secrecy of any trade secrets that must be disclosed to vendors. 

  8. Review employee termination procedures – once an employee resigns or is terminated, his or her access to any company information, especially trade secret information, must be immediately terminated. 

Employers must be vigilant in the protection of their trade secrets. Once a trade secret has been disclosed, it is difficult, if not impossible, to resurrect the secret. Therefore, it is important to make sure trade secrets are adequately protected on the front end. As Hickey stated, “If you are looking for a smoking gun and you wait for it, you might end up with a gunshot [wound].” 


This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Related Services

Insights