The Law and Theory of Trade Secrecy
Show Less

The Law and Theory of Trade Secrecy

A Handbook of Contemporary Research

  • Research Handbooks in Intellectual Property series

Edited by Rochelle C. Dreyfuss and Katherine J. Strandburg

This timely Handbook marks a major shift in innovation studies, moving the focus of attention from the standard intellectual property regimes of copyright, patent, and trademark, to an exploration of trade secrecy and the laws governing know-how, tacit knowledge, and confidential relationships.
Buy Book in Print
Show Summary Details

Chapter 3: Trade Secrecy, Innovation and the Requirement of Reasonable Secrecy Precautions

Robert G. Bone

Extract

3 Trade secrecy, innovation and the requirement of reasonable secrecy precautions Robert G. Bone* Trade secret law is the ugly duckling of intellectual property. It relies on secrecy to promote innovation even though secrecy impedes sequential creativity. It allows reverse engineering to facilitate dissemination even though the risk of reverse engineering prods trade secret owners to conceal information more aggressively and to shift their research from products to processes that can be kept from public view. This chapter focuses on one of these puzzling features, the requirement that a trade secret owner implement reasonable secrecy precautions to protect its secret (the RSP requirement). By making it more costly for a trade secret owner to sue, the RSP requirement limits trade secret rights and bolsters access. But it also creates incentives to strengthen secrecy safeguards, which makes access more difficult. The RSP requirement is codified in the Uniform Trade Secrets Act (UTSA), which most states have adopted in one form or another.1 The UTSA recognizes two requirements for information to qualify as a protectable trade secret: (1) the information must be secret in fact and have economic value as a result; and (2) the information must be ‘the subject of efforts that are reasonable under the circumstances to maintain its secrecy’.2 The puzzle lies with the second requirement. Why should the law force a trade secret owner to invest in access restrictions, fences, signs, * G. Rollie White Excellence in Teaching Professor, University of Texas School of Law. I would like to...

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.