1. Defining Trade Secrets and Establishing Ownership
New York recognizes trade secrets under the Uniform Trade Secrets Act (UTSA), codified in the New York General Business Law Section 5384. A trade secret is information, including a formula, pattern, compilation, program, device, method, technique, or process, that derives independent economic value from not being generally known and is subject to reasonable efforts to maintain its secrecy. The definition is broad by design, but courts require that you prove both prongs: the information must be genuinely secret, and you must have taken reasonable steps to protect it.
Reasonable Measures of Protection
Courts examine whether you implemented reasonable safeguards: password protection, confidentiality agreements, restricted access, and employee training. From a practitioner's perspective, many disputes arise because companies fail to document these measures. In one Southern District of New York case, a manufacturer lost its misappropriation claim because it could not prove that access to its manufacturing process was restricted, even though the information was genuinely valuable. Reasonable efforts do not require Fort Knox-level security; they must be proportionate to the nature and value of the secret. Written confidentiality policies, need-to-know access controls, and periodic audits establish the foundation for any successful claim.
Independent Economic Value
The information must provide a competitive advantage precisely because it is not publicly available. Publicly filed patents, published articles, or information readily obtainable through reverse engineering do not qualify. Courts focus on whether the owner would have invested resources to develop and protect the information if it were not valuable. This analysis is often contested in litigation, particularly when the defendant argues that the information was obvious or easily discoverable.
2. Elements of Misappropriation and Burden of Proof
Under UTSA Section 5384, misappropriation occurs when someone acquires a trade secret by improper means, such as theft, bribery, breach of confidence, or espionage, or when someone uses or discloses a trade secret knowing it was acquired improperly. You must establish a causal link: the defendant knew or should have known that the information was a trade secret and that its acquisition or use was improper. The burden rests with you; the defendant does not have to prove that the information was public or that they developed it independently.
Improper Means Vs. Independent Development
Improper means are narrowly defined. Reverse engineering, independent research, and lawful discovery are not improper, even if they yield the same result. The critical distinction is how the information was obtained. A former employee who memorizes a process and uses it at a competing firm may face liability if they signed a confidentiality agreement and accessed the information in confidence. However, if the employee developed similar methods through their own skill and effort, liability does not attach. Courts scrutinize the timing and circumstances: did the defendant immediately replicate the plaintiff's approach, or did they invest time in independent development?
Proving Improper Disclosure
Misappropriation also covers situations where someone discloses a trade secret to third parties without authorization. If a consultant or vendor shares your proprietary process with a competitor, you have a claim against both the discloser and, in many cases, the recipient if they knew or should have known the information was confidential. Emails, testimony from witnesses, and forensic evidence often establish the chain of disclosure.
3. Remedies and Strategic Litigation Considerations
New York courts award injunctive relief to prevent ongoing or threatened misuse, actual damages (including lost profits and unjust enrichment), and attorney fees if the misappropriation is willful and malicious. Trade secret misappropriation cases often move quickly because delay risks irreparable harm. Early intervention through cease-and-desist letters, preservation demands, and preliminary injunction motions can halt competitive damage before trial.
Preliminary Injunctive Relief in New York Courts
The Southern District of New York and New York state trial courts evaluate preliminary injunction requests using a four-factor test: likelihood of success on the merits, irreparable harm absent an injunction, balance of equities, and public interest. In trade secret cases, courts recognize that once confidential information is disclosed, the harm cannot be fully remedied by money damages alone. However, you must still demonstrate a strong likelihood of success. Courts often require that you show you took reasonable precautions to protect the secret and that the defendant's conduct was clearly improper. The timeline matters: seeking relief months after learning of the misappropriation weakens your argument that harm is imminent.
Damages and Recovery Models
Actual damages include lost profits directly caused by the misappropriation, diminished market value, and the cost of developing alternative approaches. Unjust enrichment awards the profits the defendant earned through use of your secret. Courts may also award a reasonable royalty if damages are difficult to calculate. Attorney fees are available only if the misappropriation was willful and malicious, a higher threshold than mere infringement. Willfulness typically requires that the defendant knew or should have known that the conduct was wrongful.
| Remedy Type | Available When | Key Limitation |
| Injunctive Relief | Irreparable harm threatened or occurring | Must show likelihood of success; preliminary injunctions require heightened showing |
| Actual Damages | Causal link between misappropriation and loss | Burden on plaintiff to prove amount; often difficult to isolate |
| Unjust Enrichment | Defendant profited from the secret | Alternative to actual damages; cannot recover both |
| Attorney Fees | Willful and malicious conduct proven | Requires heightened showing; rare in cases with ambiguous facts |
4. Practical Defense Strategies and Common Vulnerabilities
Defendants in trade secrets litigation often argue that the information was independently developed, publicly available, or not subject to reasonable protective measures. These defenses are strongest when the defendant can show a clear timeline of independent research or when your own documentation of secrecy measures is weak. In practice, these cases are rarely as clean as the statute suggests. Courts must weigh competing narratives about access, knowledge, and intent.
Common Weaknesses in Plaintiff Claims
Many misappropriation claims fail because the plaintiff cannot prove reasonable protective measures. If your employees discuss the secret freely in public settings, if customer lists are not restricted, or if the process is visible on your manufacturing floor without access controls, courts may find that you failed to maintain secrecy. Additionally, if the defendant can demonstrate that the information was available through public sources or that they developed similar methods independently, liability does not attach. Timing is critical: if you waited months or years to assert your rights after discovering the misappropriation, courts may find that you abandoned the claim or that the harm is not truly irreparable.
Strategic Early Decisions
Before filing suit, evaluate whether you have adequate documentation of the secret's value and your protective measures. Gather evidence of the defendant's access, use, and competitive advantage. Consider whether a non-litigation resolution, such as a settlement with confidentiality provisions, better serves your business interests than protracted litigation. Litigation is expensive and public; it may expose your own confidential information during discovery. Weigh the cost of establishing damages against the strategic benefit of an injunction and the reputational impact of a lawsuit against a former partner or employee.
27 Jan, 2026

