by Traverse Legal, reviewed by Brian Hall - February 27, 2026 - Business Law, Complex Litigation, Trade Secret Law
Tech companies lose value when internal know-how leaks. A rival does not need your whole product roadmap. A rival only needs one process, one list, one model, one playbook. Trade secret law gives you a tool to protect that value when you treat the information like an asset.
This article walks through examples of trade secrets in plain language. You will learn what counts, what fails, and what you need in place before a dispute starts.
The federal trade secret statute is the Defend Trade Secrets Act. It can cover financial, business, scientific, technical, economic, or engineering information, including formulas, designs, prototypes, methods, processes, programs, or code. The definition matters less than the requirements you must prove. (18 U.S.C. § 1839)
Three requirements drive most disputes. The information must stay secret in a meaningful way. The secrecy must create independent economic value. The company must use reasonable measures to maintain secrecy. If any one of those pieces fails, the trade secret claim weakens.
A simple way to screen candidates is to ask four questions.
Trade secrets show up everywhere in B2B and tech. The best examples share a common trait. They combine inside knowledge with repeatable execution.
Here are examples of trade secrets you will see in real companies.
Trade secret protection does not require fancy technology. It requires real value and real secrecy controls.
Source code can qualify as a trade secret, but it does not qualify automatically. Courts look for proof that you treated the code as confidential and proof the code produced value because it stayed confidential. (18 U.S.C. § 1839)
In practice, the strongest candidates leverage logic that drives outcomes in ways competitors cannot easily replicate. Recommendation and ranking logic fits. Fraud detection rules and model training workflows fit. Routing logic for logistics or inventory placement can fit. Internal AI workflows can fit when they reveal how the company achieves performance or reliability, such as evaluation harnesses, guardrails, or system-level prompts used to control output.
Protection depends on handling. A company can share code with employees and contractors and still preserve trade secret status, but it must control repository access, bind people with confidentiality terms, and limit distribution. If a company hands the core repo to outside vendors with no controls, it creates a predictable failure point.
Business intelligence turns into a trade secret when it gives you an edge competitors cannot replicate without time, money, or access.
Clear examples of trade secrets in this category include:
Teams lose protection when they treat this material like a slide deck meant for broad sharing. A board deck can still contain trade secrets, but you need to control who receives it and how it circulates.
If you want this to hold up in a real misappropriation dispute, you need two things.
First, you need a clear boundary. Mark sensitive analysis as confidential and limit access to people who need it for their role.
Second, you need evidence. Keep version history, access logs where available, and a record of when you shared the material under confidentiality terms. That record can matter later when you need to prove the information stayed non-public and valuable because of secrecy.
Pricing data turns into a trade secret when it reveals how you win deals and protect margin. A public price list will not qualify. A pricing engine, discount matrix, or approval workflow can qualify when it stays confidential and drives revenue.
Strong examples of trade secrets in this bucket include:
Companies lose protection when they hand pricing files to too many people or store them in shared folders with no permissions. You do not need a perfect system. You do need a consistent one.
Simple safeguards most teams can implement:
If an employee walks out with pricing and vendor lists, your dispute will focus on two questions. Did the information stay non-public? Did you treat it as confidential? Those facts decide whether the information qualifies as a trade secret and whether misappropriation claims have traction.
Trade secrets and patents protect different kinds of value. Trade secret law protects secrecy. Patent law protects inventions through public disclosure and a government-issued right to exclude others for a limited time. Each path has a cost profile and a risk profile.
Use trade secret protection when the advantage depends on staying hidden. Many software and business process assets fit here. Examples include internal models, data pipelines, pricing logic, vendor terms, and operational playbooks. You can protect those assets without publishing them, but you must invest in confidentiality controls.
Use patents when the asset will become visible in the market or can be reverse-engineered. If a competitor can inspect the product and replicate the core invention, secrecy will not last. Patent protection can make sense in those cases, but the process takes time and requires disclosure.
A practical founder lens:
Some companies use both approaches across a portfolio. They patent what customers can see and keep internal methods and data as trade secrets. The right mix depends on your product, your competitors, and your ability to run tight access controls.
The DTSA focuses on two requirements that show up in almost every case. The information must derive independent economic value from not being generally known or readily ascertainable through proper means. The company must take reasonable measures to keep it secret. (18 U.S.C. § 1839)
Economic value needs a real explanation. Tie it to outcomes such as margin, churn reduction, conversion rates, model accuracy, cycle time, or defect rates. Secrecy needs proof. The company should be able to show that it restricted access, used confidentiality obligations, and managed sharing.
Companies usually start with role-based access control, restricted folders, and private repositories. They use confidentiality terms in employment and contractor agreements, and also mark sensitive documents as confidential. They scope vendor access to what the work requires. They revoke access quickly when roles change or employees leave. They keep version history or logs for key systems when feasible. (18 U.S.C. § 1839)
A simple rule helps. If you would not hand the file to a competitor, do not store it where any employee can pull it without permission.
This test asks whether secrecy drives advantage. A customer list can qualify when it includes non-public contacts, buying history, and timing signals. A list built from public directories will face a harder fight. A pricing matrix can qualify when it reveals approval limits and negotiation rules. A published price sheet will not. A dataset can qualify when it powers product performance, and competitors cannot recreate it through proper means.
When you describe value, tie it to outcomes.
Courts require proof of two building blocks. A plaintiff must prove a protectable trade secret. A plaintiff must prove misappropriation. The trade secret litigation guide published through the Federal Judicial Center lays out this structure and the way courts approach improper acquisition, use, or disclosure.
Misappropriation usually shows up as improper acquisition, improper use, or improper disclosure. Improper acquisition covers conduct such as theft, misrepresentation, or a breach of a duty to maintain secrecy. Improper use or disclosure covers using or disclosing the trade secret without consent after learning it through improper means or under a confidentiality duty.
Courts also push for specificity. A company must describe the trade secret clearly enough for a judge to evaluate it, while protecting confidentiality through protective orders during discovery.
Companies lose trade secret protection through avoidable mistakes. These mistakes show up in disputes between founders, between competitors, and between employers and former employees.
Here are the most common pitfalls.
A trade secret program turns informal practices into enforceable proof. Start by inventorying trade secret categories, then assign an owner for each category. Code and models tend to sit with the CTO. Pricing and revenue rules tend to sit with finance or sales leadership. Operations and vendor terms tend to sit with the COO.
Then implement controls that your team will follow. Restrict access by role. Segment sensitive assets into private repos and restricted folders. Use confidentiality terms for employees, contractors, and vendors. Revoke access during offboarding and role changes. Train teams on what stays internal and how to handle it.
When a leak occurs, speed matters. Preserve evidence, cut off access, and send a targeted demand for return and deletion when facts support it. Escalate only when evidence supports misappropriation and the harm warrants the cost.
📚 Get AI-powered insights from this content:

Brian A. Hall is the Managing Partner of Traverse Legal and a trusted deal attorney to founders, investors, and high-growth companies. He guides clients through mergers, acquisitions, IP monetization, and mission-critical commercial disputes across the tech, consumer products, and services sectors. Drawing on in-house GC experience and his fixed-fee TraverseGC® model, Brian delivers practical, business-first legal strategies that protect assets and accelerate growth.
As a founding partner of Traverse Legal, PLC, he has more than thirty years of experience as an attorney for both established companies and emerging start-ups. His extensive experience includes navigating technology law matters and complex litigation throughout the United States.
We’re here to field your questions and concerns. If you are a company able to pay a reasonable legal fee each month, please contact us today.
This page has been written, edited, and reviewed by a team of legal writers following our comprehensive editorial guidelines. This page was approved by attorney Enrico Schaefer, who has more than 20 years of legal experience as a practicing Business, IP, and Technology Law litigation attorney.
