Understanding Trade Secret Demand Letters
Trade secret demand letters allege that you or your company improperly acquired, disclosed, or used confidential business information belonging to another party. In California, these claims arise under the California Uniform Trade Secrets Act (CUTSA, Civil Code § 3426) and the federal Defend Trade Secrets Act (DTSA, 18 U.S.C. § 1836).
California CUTSA
Civil Code § 3426 provides the primary framework. California's strong employee mobility policy (Business & Professions Code § 16600) limits non-compete enforcement but doesn't protect actual trade secret theft.
Federal DTSA
18 U.S.C. § 1836 provides federal jurisdiction and ex parte seizure remedies. Requires interstate commerce nexus. Includes whistleblower immunity provisions.
Common Scenarios
Former employee takes files to new job; competitor hires away key personnel; business partner misuses shared information; vendor or contractor accesses client data improperly.
⚠️ Emergency Injunction Risk
Trade secret plaintiffs frequently seek temporary restraining orders (TROs) and preliminary injunctions within days of sending demand letters. If you receive a demand letter, assume a TRO motion may follow quickly. Preserve all evidence and be prepared to respond to emergency court proceedings.
Evaluate the Claim
A valid trade secret misappropriation claim requires proving several elements. Carefully analyze each.
- Trade secret identification: Does the demand letter identify specific, concrete trade secrets (not just vague "confidential information")?
- Trade secret status: Does the information actually qualify as a trade secret (derives value from secrecy, reasonable efforts to maintain secrecy)?
- Reasonable secrecy measures: Did the plaintiff actually protect the information (NDAs, access controls, marking, training)?
- Improper acquisition: Did you acquire the information through improper means (theft, breach of duty, inducing breach)?
- Actual use or disclosure: Did you actually use or disclose the trade secret, or is this speculative?
- Independent development: Did you develop similar information independently without access to theirs?
- Public availability: Is the allegedly secret information actually publicly available (published, reverse engineered, commonly known)?
- Statute of limitations: Has more than 3 years passed since discovery (or when it should have been discovered)?
| Factor | Higher Risk | Lower Risk |
|---|---|---|
| Your conduct | Copied files before leaving | Only used general knowledge/skills |
| Evidence | USB drive, emails with attachments | No documents taken or retained |
| Similarity | New product mirrors their methods | Different approach, independent work |
| Secrecy measures | Strong NDAs, access controls in place | Information widely shared, no protection |
| Public availability | Truly proprietary methods | Standard industry practices, published info |
Potential Defenses
Trade secret defendants have several powerful defenses available, particularly in California.
Not a Trade Secret
Primary DefenseThe information doesn't qualify as a trade secret because it was publicly known, readily ascertainable, generally known in the industry, or lacks independent economic value from its secrecy.
Evidence to Gather
- Prior publications, patents, or industry articles
- Evidence information was shared without NDAs
- Testimony that methods are standard practice
- Reverse engineering showing public derivation
Failure to Maintain Secrecy
Strong DefenseThe plaintiff failed to take "reasonable measures" to protect secrecy as required by CUTSA. Without reasonable protection efforts, there's no trade secret.
Weak Protection Examples
- No NDAs with employees or contractors
- No password protection or access controls
- Information shared freely with third parties
- No confidential markings on documents
Independent Development
Complete DefenseYou developed the allegedly misappropriated information independently, without reference to the plaintiff's trade secrets. This is a complete defense under CUTSA.
Supporting Evidence
- Development records predating access
- Different methodologies or approaches
- Testimony about independent R&D process
- Technical differences in implementation
General Skills & Knowledge
California StrongCalifornia strongly protects employee mobility under B&P Code § 16600. Employees can use general skills, knowledge, and experience gained during employment—only truly proprietary secrets are protected.
Protected Knowledge
- General industry skills and techniques
- Knowledge from training and experience
- Customer relationships developed personally
- Publicly known industry practices
Reverse Engineering
Lawful MeansInformation discovered through reverse engineering of a publicly available product is not misappropriation. Reverse engineering is expressly permitted under CUTSA.
Requirements
- Product was lawfully acquired
- No contractual prohibition on reverse engineering
- Documentation of reverse engineering process
- No use of plaintiff's actual trade secrets
Statute of Limitations
3-Year LimitCUTSA claims must be brought within 3 years of when the misappropriation was discovered or should have been discovered through reasonable diligence.
Key Dates to Analyze
- When did alleged misappropriation occur?
- When did/should plaintiff discover it?
- Continuing misappropriation may extend deadline
- Discovery rule applies in California
California's "Inevitable Disclosure" Doctrine
California courts have rejected the "inevitable disclosure" doctrine. Unlike some states, California will not enjoin an employee from working in their field simply because they might inevitably disclose trade secrets. The plaintiff must prove actual or threatened misappropriation, not just the possibility. See Whyte v. Schlage Lock Co.
Calculate Your Exposure
Understanding potential damages and injunctive relief helps evaluate your risk and settlement posture.
| Remedy Type | Measure | Notes |
|---|---|---|
| Actual Damages | Plaintiff's losses OR defendant's profits | Not double recovery - one or other |
| Reasonable Royalty | What willing parties would negotiate | Alternative to actual damages |
| Exemplary Damages | Up to 2x compensatory (willful/malicious) | Discretionary; requires bad faith |
| Attorney Fees | Willful misappropriation or bad faith claim | Cuts both ways - can recover if you prevail |
| Injunctive Relief | Stop use, return documents, restrict employment | Most immediate threat; can destroy business |
⚠️ Criminal Exposure
The Economic Espionage Act (18 U.S.C. § 1831-1832) makes trade secret theft a federal crime with penalties up to 10 years imprisonment and $5 million in fines. DTSA also has criminal provisions. If you receive a civil demand letter, consider whether criminal referral is possible and consult with a criminal defense attorney if warranted.
Response Strategy
Your response depends on your actual conduct, the strength of their claims, and your exposure level.
1. Preserve All Evidence (Immediately)
Do NOT delete anything. Implement a litigation hold covering all potentially relevant documents, emails, and files. Spoliation of evidence can result in adverse inference and sanctions.
2. Assess Your Conduct (Days 1-3)
Honestly evaluate what you did. Did you take any documents or files? Did you sign an NDA? What information did you actually have access to and use? Self-assess before developing your position.
3. Identify Alleged Trade Secrets (Days 1-7)
Force them to identify specifically what trade secrets they claim you took. Vague allegations of "confidential information" are insufficient. You cannot defend against unspecified claims.
4. Prepare for TRO (Parallel Track)
Assume emergency court proceedings may be filed. Prepare declarations and evidence supporting your defenses. Identify witnesses who can testify on short notice.
5. Engage Counsel and Respond (Before Deadline)
Trade secret litigation is complex and high-stakes. Engage experienced counsel to help craft your response and prepare for potential litigation.
Response Options
Deny and Defend
If you have strong defenses (no trade secret, independent development, public information), respond firmly denying misappropriation and asserting your defenses.
Return and Release
If you inadvertently retained documents, offer to return them, delete copies, and provide certification. Many disputes resolve through voluntary return without litigation.
Negotiate Restrictions
Agree to specific work restrictions or information barriers (ethical wall) at new employer while maintaining employment. Less disruptive than full injunction.
Declaratory Judgment
In some cases, filing first for declaratory judgment of non-misappropriation can provide tactical advantages in forum selection and framing the dispute.
Sample Response Language
📄 Requesting Trade Secret Identification
Dear [Counsel]:
I am in receipt of your letter dated [date] alleging trade secret misappropriation by [me/my client] in connection with [employment at/engagement with] [Company].
Your letter makes general allegations of misappropriation of "confidential information" and "trade secrets" but fails to identify any specific trade secret with reasonable particularity as required under California law. See Advanced Modular Sputtering, Inc. v. Superior Court.
Before I can meaningfully respond to your allegations, please provide:
1. A specific identification of each alleged trade secret, described with sufficient particularity to distinguish it from matters of general knowledge;
2. The basis for claiming each item qualifies as a trade secret (derives economic value from secrecy, reasonable protection measures);
3. The specific conduct you allege constitutes misappropriation;
4. Any evidence supporting your allegations.
Without this information, your letter amounts to a fishing expedition that I am unable to properly address. I reserve all rights and defenses.
📄 Asserting General Knowledge/Skills Defense
Dear [Counsel]:
I respond to your letter dated [date] alleging trade secret misappropriation.
Your client's claims are without merit. California strongly protects employee mobility and the right to pursue one's livelihood. Business & Professions Code § 16600 reflects California's fundamental policy that every person should be free to use the skills and knowledge acquired through their work experience.
The "trade secrets" your letter describes—[describe, e.g., "knowledge of customer preferences," "understanding of sales techniques," "familiarity with industry practices"]—are not protectable trade secrets but rather general skills, knowledge, and experience that any employee develops over the course of employment. California courts consistently hold that such knowledge belongs to the employee.
I did not take any proprietary documents, source code, or technical specifications from [Former Employer]. I am simply applying the general knowledge and skills I developed over [X years] in this industry to my new position. This is precisely what California law protects.
I consider this matter closed. Any lawsuit based on these allegations would expose your client to an award of my attorney fees under Civil Code § 3426.4.
📄 Offering Document Return and Certification
Dear [Counsel]:
I am responding to your letter dated [date] regarding my departure from [Former Employer].
While I dispute that I engaged in any trade secret misappropriation, I am committed to resolving this matter professionally and without litigation.
Upon my departure, I [inadvertently retained / received in normal course] certain [documents/files] from my time at [Former Employer]. To address your client's concerns:
1. I have identified all [Former Employer] materials in my possession;
2. I have not used or disclosed any such materials to my current employer or any third party;
3. I am prepared to return all such materials and provide a sworn declaration certifying their return and deletion from all devices.
I propose that upon completion of this return and certification, your client provide a release of claims. This would resolve the matter efficiently for all parties.
Please confirm whether this approach is acceptable so we can proceed with the return process.
Next Steps
Immediate Actions
- Do NOT delete any files, emails, or documents
- Review what you actually took or retained (if anything)
- Locate any NDAs or employment agreements you signed
- Identify potential witnesses who know your independent work
- Gather evidence of your independent development
- Prepare for possible emergency TRO proceedings
⚠️ When to Engage Counsel
Trade secret litigation is high-stakes and moves fast. Engage experienced IP litigation counsel immediately if: you actually took documents or files; your new employer is also threatened; the plaintiff has a history of aggressive litigation; the demand involves your core job function; or criminal referral is mentioned or implied. TRO hearings can occur within days.
Related Resources
Trade Secret Demand Letters
Send trade secret misappropriation demands under CUTSA.
Browse Templates