📄 Understanding Trade Secret Demand Letters

Trade secret demand letters allege that you or your company improperly acquired, disclosed, or used confidential business information belonging to another party. In California, these claims arise under the California Uniform Trade Secrets Act (CUTSA, Civil Code § 3426) and the federal Defend Trade Secrets Act (DTSA, 18 U.S.C. § 1836).

California CUTSA

Civil Code § 3426 provides the primary framework. California's strong employee mobility policy (Business & Professions Code § 16600) limits non-compete enforcement but doesn't protect actual trade secret theft.

Federal DTSA

18 U.S.C. § 1836 provides federal jurisdiction and ex parte seizure remedies. Requires interstate commerce nexus. Includes whistleblower immunity provisions.

Common Scenarios

Former employee takes files to new job; competitor hires away key personnel; business partner misuses shared information; vendor or contractor accesses client data improperly.

⚠️ Emergency Injunction Risk

Trade secret plaintiffs frequently seek temporary restraining orders (TROs) and preliminary injunctions within days of sending demand letters. If you receive a demand letter, assume a TRO motion may follow quickly. Preserve all evidence and be prepared to respond to emergency court proceedings.

🔍 Evaluate the Claim

A valid trade secret misappropriation claim requires proving several elements. Carefully analyze each.

  • Trade secret identification: Does the demand letter identify specific, concrete trade secrets (not just vague "confidential information")?
  • Trade secret status: Does the information actually qualify as a trade secret (derives value from secrecy, reasonable efforts to maintain secrecy)?
  • Reasonable secrecy measures: Did the plaintiff actually protect the information (NDAs, access controls, marking, training)?
  • Improper acquisition: Did you acquire the information through improper means (theft, breach of duty, inducing breach)?
  • Actual use or disclosure: Did you actually use or disclose the trade secret, or is this speculative?
  • Independent development: Did you develop similar information independently without access to theirs?
  • Public availability: Is the allegedly secret information actually publicly available (published, reverse engineered, commonly known)?
  • Statute of limitations: Has more than 3 years passed since discovery (or when it should have been discovered)?
Factor Higher Risk Lower Risk
Your conduct Copied files before leaving Only used general knowledge/skills
Evidence USB drive, emails with attachments No documents taken or retained
Similarity New product mirrors their methods Different approach, independent work
Secrecy measures Strong NDAs, access controls in place Information widely shared, no protection
Public availability Truly proprietary methods Standard industry practices, published info

🛡️ Potential Defenses

Trade secret defendants have several powerful defenses available, particularly in California.

Not a Trade Secret

Primary Defense

The information doesn't qualify as a trade secret because it was publicly known, readily ascertainable, generally known in the industry, or lacks independent economic value from its secrecy.

Evidence to Gather
  • Prior publications, patents, or industry articles
  • Evidence information was shared without NDAs
  • Testimony that methods are standard practice
  • Reverse engineering showing public derivation

Failure to Maintain Secrecy

Strong Defense

The plaintiff failed to take "reasonable measures" to protect secrecy as required by CUTSA. Without reasonable protection efforts, there's no trade secret.

Weak Protection Examples
  • No NDAs with employees or contractors
  • No password protection or access controls
  • Information shared freely with third parties
  • No confidential markings on documents

Independent Development

Complete Defense

You developed the allegedly misappropriated information independently, without reference to the plaintiff's trade secrets. This is a complete defense under CUTSA.

Supporting Evidence
  • Development records predating access
  • Different methodologies or approaches
  • Testimony about independent R&D process
  • Technical differences in implementation

General Skills & Knowledge

California Strong

California strongly protects employee mobility under B&P Code § 16600. Employees can use general skills, knowledge, and experience gained during employment—only truly proprietary secrets are protected.

Protected Knowledge
  • General industry skills and techniques
  • Knowledge from training and experience
  • Customer relationships developed personally
  • Publicly known industry practices

Reverse Engineering

Lawful Means

Information discovered through reverse engineering of a publicly available product is not misappropriation. Reverse engineering is expressly permitted under CUTSA.

Requirements
  • Product was lawfully acquired
  • No contractual prohibition on reverse engineering
  • Documentation of reverse engineering process
  • No use of plaintiff's actual trade secrets

Statute of Limitations

3-Year Limit

CUTSA claims must be brought within 3 years of when the misappropriation was discovered or should have been discovered through reasonable diligence.

Key Dates to Analyze
  • When did alleged misappropriation occur?
  • When did/should plaintiff discover it?
  • Continuing misappropriation may extend deadline
  • Discovery rule applies in California

California's "Inevitable Disclosure" Doctrine

California courts have rejected the "inevitable disclosure" doctrine. Unlike some states, California will not enjoin an employee from working in their field simply because they might inevitably disclose trade secrets. The plaintiff must prove actual or threatened misappropriation, not just the possibility. See Whyte v. Schlage Lock Co.

💰 Calculate Your Exposure

Understanding potential damages and injunctive relief helps evaluate your risk and settlement posture.

Remedy Type Measure Notes
Actual Damages Plaintiff's losses OR defendant's profits Not double recovery - one or other
Reasonable Royalty What willing parties would negotiate Alternative to actual damages
Exemplary Damages Up to 2x compensatory (willful/malicious) Discretionary; requires bad faith
Attorney Fees Willful misappropriation or bad faith claim Cuts both ways - can recover if you prevail
Injunctive Relief Stop use, return documents, restrict employment Most immediate threat; can destroy business

⚠️ Criminal Exposure

The Economic Espionage Act (18 U.S.C. § 1831-1832) makes trade secret theft a federal crime with penalties up to 10 years imprisonment and $5 million in fines. DTSA also has criminal provisions. If you receive a civil demand letter, consider whether criminal referral is possible and consult with a criminal defense attorney if warranted.

📋 Response Strategy

Your response depends on your actual conduct, the strength of their claims, and your exposure level.

1. Preserve All Evidence (Immediately)

Do NOT delete anything. Implement a litigation hold covering all potentially relevant documents, emails, and files. Spoliation of evidence can result in adverse inference and sanctions.

2. Assess Your Conduct (Days 1-3)

Honestly evaluate what you did. Did you take any documents or files? Did you sign an NDA? What information did you actually have access to and use? Self-assess before developing your position.

3. Identify Alleged Trade Secrets (Days 1-7)

Force them to identify specifically what trade secrets they claim you took. Vague allegations of "confidential information" are insufficient. You cannot defend against unspecified claims.

4. Prepare for TRO (Parallel Track)

Assume emergency court proceedings may be filed. Prepare declarations and evidence supporting your defenses. Identify witnesses who can testify on short notice.

5. Engage Counsel and Respond (Before Deadline)

Trade secret litigation is complex and high-stakes. Engage experienced counsel to help craft your response and prepare for potential litigation.

Response Options

Deny and Defend

If you have strong defenses (no trade secret, independent development, public information), respond firmly denying misappropriation and asserting your defenses.

Return and Release

If you inadvertently retained documents, offer to return them, delete copies, and provide certification. Many disputes resolve through voluntary return without litigation.

Negotiate Restrictions

Agree to specific work restrictions or information barriers (ethical wall) at new employer while maintaining employment. Less disruptive than full injunction.

Declaratory Judgment

In some cases, filing first for declaratory judgment of non-misappropriation can provide tactical advantages in forum selection and framing the dispute.

📝 Sample Response Language

📄 Requesting Trade Secret Identification

Dear [Counsel]:

I am in receipt of your letter dated [date] alleging trade secret misappropriation by [me/my client] in connection with [employment at/engagement with] [Company].

Your letter makes general allegations of misappropriation of "confidential information" and "trade secrets" but fails to identify any specific trade secret with reasonable particularity as required under California law. See Advanced Modular Sputtering, Inc. v. Superior Court.

Before I can meaningfully respond to your allegations, please provide:

1. A specific identification of each alleged trade secret, described with sufficient particularity to distinguish it from matters of general knowledge;
2. The basis for claiming each item qualifies as a trade secret (derives economic value from secrecy, reasonable protection measures);
3. The specific conduct you allege constitutes misappropriation;
4. Any evidence supporting your allegations.

Without this information, your letter amounts to a fishing expedition that I am unable to properly address. I reserve all rights and defenses.

📄 Asserting General Knowledge/Skills Defense

Dear [Counsel]:

I respond to your letter dated [date] alleging trade secret misappropriation.

Your client's claims are without merit. California strongly protects employee mobility and the right to pursue one's livelihood. Business & Professions Code § 16600 reflects California's fundamental policy that every person should be free to use the skills and knowledge acquired through their work experience.

The "trade secrets" your letter describes—[describe, e.g., "knowledge of customer preferences," "understanding of sales techniques," "familiarity with industry practices"]—are not protectable trade secrets but rather general skills, knowledge, and experience that any employee develops over the course of employment. California courts consistently hold that such knowledge belongs to the employee.

I did not take any proprietary documents, source code, or technical specifications from [Former Employer]. I am simply applying the general knowledge and skills I developed over [X years] in this industry to my new position. This is precisely what California law protects.

I consider this matter closed. Any lawsuit based on these allegations would expose your client to an award of my attorney fees under Civil Code § 3426.4.

📄 Offering Document Return and Certification

Dear [Counsel]:

I am responding to your letter dated [date] regarding my departure from [Former Employer].

While I dispute that I engaged in any trade secret misappropriation, I am committed to resolving this matter professionally and without litigation.

Upon my departure, I [inadvertently retained / received in normal course] certain [documents/files] from my time at [Former Employer]. To address your client's concerns:

1. I have identified all [Former Employer] materials in my possession;
2. I have not used or disclosed any such materials to my current employer or any third party;
3. I am prepared to return all such materials and provide a sworn declaration certifying their return and deletion from all devices.

I propose that upon completion of this return and certification, your client provide a release of claims. This would resolve the matter efficiently for all parties.

Please confirm whether this approach is acceptable so we can proceed with the return process.

➡️ Next Steps

Immediate Actions

  • Do NOT delete any files, emails, or documents
  • Review what you actually took or retained (if anything)
  • Locate any NDAs or employment agreements you signed
  • Identify potential witnesses who know your independent work
  • Gather evidence of your independent development
  • Prepare for possible emergency TRO proceedings

⚠️ When to Engage Counsel

Trade secret litigation is high-stakes and moves fast. Engage experienced IP litigation counsel immediately if: you actually took documents or files; your new employer is also threatened; the plaintiff has a history of aggressive litigation; the demand involves your core job function; or criminal referral is mentioned or implied. TRO hearings can occur within days.

Related Resources

Patent Response

Responding to patent infringement demand letters and licensing demands.

View Guide

Trade Secret Demand Letters

Send trade secret misappropriation demands under CUTSA.

Browse Templates

Employment Disputes

Non-compete, non-solicitation, and confidentiality disputes.

View Category