Trade Secret Law Reform: Could an Amended Economic Espionage Act Overcome Inconsistencies in the Current State Law System?

Bloomberg Law®, an integrated legal research and business intelligence solution, combines trusted news and analysis with cutting-edge technology to provide legal professionals tools to be...


Contributed by Ha Kung Wong, Robert W. Pierson and Sally Wang, Fitzpatrick Cell Harper & Scinto


Trade secret protection is, by and large, governed by state law. Presently, there is no comprehensive federal civil trade secret misappropriation statute.1 This is in contrast to other forms of intellectual property, including patents, copyrights, and trademarks, which are protected by federal civil statutes.2 As a result, the scope of recognition and protection of trade secrets varies from state to state. This can potentially lead to inconsistent enforcement and can create confusion as to how one would define and/or protect a trade secret.

To overcome potential inconsistencies and confusion with the current system, some have suggested “federalizing” trade secret law by making it the exclusive jurisdiction of the federal courts.3 Others have suggested a middle road, enacting a federal civil statute that would not preempt state laws.4 This latter approach was recently attempted in October 2011, when a proposed amendment to the Economic Espionage Act (“EEA”), a federal criminal statute penalizing certain types of trade secret misappropriation, would have created a private federal cause of action. The proposed amendment, however, did not pass the Senate on procedural grounds. This article will discuss the current legal landscape for trade secret protection and its potential inconsistencies, the EEA and the proposed amendment, compare the proposed EEA amendment to the current state-defined trade secret laws, and discuss the proposed EEA amendment as a vehicle to overcome the inconsistencies in the current state law system.


Trade secret protection is a matter of state law and, until the 1980s, was primarily governed by common law.5The Restatement of Torts chronicled the common law, which numerous courts have turned to as a source of authority when deciding trade secret cases. However, the Restatement of Torts is not binding and states remained split on several issues. In an attempt to unify state common law, the Uniform Law Commission promulgated the Uniform Trade Secrets Act (“UTSA”) in 1979.6 However, since states were not required to adopt the UTSA in its entirety, several states adopted significant variations of the UTSA, thus continuing inconsistencies among the states.7 Currently, 46 states have adopted the UTSA in some form or have similar statutes (“UTSA jurisdictions”).8 The remaining states still follow the common law (“common law jurisdictions”).9Although some groups have argued that the differences between the states are not sufficient to require a private federal cause of action,10 differences nonetheless exist, and it is incumbent upon the practitioner to appreciate the operative laws in the state at issue.

Generally, trade secret misappropriation has two elements: existence of a trade secret and misappropriation. At common law, a trade secret must (1) be a secret; (2) confer a competitive advantage to the owner; and (3) be continuously used in the owner’s business.11 Misappropriation requires the unauthorized use or disclosure of the trade secret (1) discovered by improper means; (2) in breach of confidence; or (3) by a third party with (i) knowledge that the trade secret was obtained by improper means or breach of confidence, or (ii) an understanding that the information was a trade secret and discovery was by mistake or accident.12

The UTSA follows the common law with a few exceptions. One difference is that the UTSA does not require the continuous use of the trade secret in the owner’s business.13 It also expands the notion of “competitive advantage” with “economic advantage,” which some commentators have suggested specifically includes one-off business information (e.g., bids) and negative know-how14 (e.g., failed test results) because “economic advantage” can be derived from information that is not incorporated into a commercial product that “competes” in the marketplace.15 The UTSA also recognizes the acquisition of a trade secret by improper means alone as a sufficient basis for finding misappropriation without use or disclosure of the trade secret.16

Despite the Restatement of Torts and the UTSA, state-to-state differences remain. First, the Restatement is merely a recitation of the common law, which still differs from state to state. Second, several states have not adopted the UTSA. Third, several states have adopted variations of the UTSA. For example, Illinois’s trade secret act is a broader version of the UTSA (which explicitly creates a duty to maintain secrecy when there is a confidential relationship),17 while Alabama has a narrower version (which maintains certain common law requirements rejected by the UTSA).18 Below are examples of differences between the states, which are not necessarily dictated by the common law-UTSA divide:

Subject matter. As stated earlier, the common law generally requires continuous use of a trade secret, but the UTSA does not. Alabama, however, has adopted a modified version of the UTSA and requires the trade secret to be “used or intended for use in a trade or business.”19

Secrecy. Most states agree that, at a minimum, a trade secret must not be “generally known” or “readily ascertainable.”20 California, however, does not have a proscription against “readily ascertainable” information.21 It should be noted that California is one of the most popular jurisdictions to bring a trade secret misappropriation suit,22 and its laws are frequently applied in other jurisdictions.23 Therefore, California’s departure from the traditional evaluation of this element should not be overlooked.

Statute of limitations. At common law, a trade secret misappropriation claim could be based in tort, contracts, or property law, which has led to variations in determining the applicable statute of limitations.24 For example, in New York, the statute of limitations for the tort of theft is three years,25 and for breach of contract it is six years.26 The UTSA provides a three-year statute of limitations,27 but not all UTSA jurisdictions follow this rule. For example, although both states adopted the UTSA, the statute of limitations in Georgia is five years28 but four years in Ohio.29 Furthermore, the states are split on whether trade secret misappropriation can constitute a continuing tort,30 under which a new statute of limitations starts every time the trade secret is used. The UTSA does not recognize a continuing tort theory.31

A practitioner must consider these differences at every stage of protecting a trade secret, from planning IP protection through litigation. During litigation, these differences could lead to accusations of “forum shopping”32and disagreements over the applicable law, resulting in a fact-intensive choice-of-law analysis by the court.33 For example, if a party does not “continuously” use its trade secret, it may seek a jurisdiction that does not require that element even though the party may have little connection to such jurisdiction. This scenario could result in the lengthy adjudication of procedural issues before reaching the merits of a trade secret case.


The EEA is a federal statute enabling the Attorney General (“AG”) to criminally prosecute accused trade secret misappropriators and also to bring civil proceedings to enjoin violations. The EEA was intended by Congress to “provide a comprehensive ‘national scheme’ to protect trade secrets in the face of ‘haphazard’ protection under state laws.”34 It, however, does not preempt state laws for trade secret misappropriation.35 Nor does it contain a private right of action.36

The EEA provides two causes of action: economic espionage, 18 U.S.C. Section 1831, and theft of trade secrets,18 U.S.C. Section 1832.37 The main difference is that economic espionage, designed to target foreign, government-sponsored intelligence activity, requires a foreign beneficiary, while theft of trade secrets is a broad general provision that “applies to anyone who knowingly engages in the theft of trade secrets,” including those who attempt or conspire to do so.38 Section 1832 has additional limitations not included in section 1831.39 First, it requires that the defendant demonstrate an “intent to convert” the trade secret to “the economic benefit” of someone besides the owner. Second, the defendant must intend to or knowingly injure the owner of the trade secret. Third, the trade secret must relate to interstate or foreign commerce.40 Both causes of action have the standard five-year statute of limitations for federal criminal offenses,41 require proof beyond a reasonable doubt, and share the same definition of trade secret.42

Section 1839(3) of the EEA broadly defines a “trade secret” to include: “all forms and types of . . . information . . . whether tangible or intangible,” as long as it also meets the two-prong test of (1) taking “reasonable measures” to ensure secrecy; and (2) deriving “independent economic value . . . from not being generally known to, and not being readily ascertainable . . . by, the public.” The “reasonable measures” prong is a factual determination of the “secrecy” of the information: the level of care and control the trade secret owner has taken to protect the trade secret.43 Because the determination of “reasonableness” is left to the subjectivity of the trier of fact, defendants often challenge the EEA as vague, leading to arbitrary and discriminatory enforcement of the law. 44 Courts have consistently dismissed this argument.45 The “independent economic value” prong is also subject to controversy regarding the meaning of “public” to which the trade secret is not generally known. Courts are split on whether the term refers to “the general public”46 or the “economically relevant public,” a definition that is closer to traditional trade secret law.47 Most of the discussion has been rhetorical and not outcome-determinant.48

Overall, almost all EEA cases have been found to have met the EEA definition of “trade secret,” which may be a reflection of the AG’s choice in which cases to prosecute rather than an indication of the breadth of the definition. Indeed, while there have been more than a hundred prosecutions under the EEA, all of them have involved “aggravated conduct,” which is only a small subset of applicable trade secret violations.49


To expand the EEA and address the shortcomings in the current state-based system of trade secret protection, in October 2011, Senator Christopher Coons (D-DE) and Senator Herb Kohl (D-WI), who authored the EEA, introduced an amendment to the EEA, attached to the Currency Exchange Rate Oversight Reform Act. It would have amended section 1836 of the EEA, which currently authorizes only the AG to bring civil actions, by creating a federal civil private cause of action for section 1832 violations (i.e., theft of trade secrets).50 This private cause of action would essentially be grafted onto the EEA: it would use the same broad definition of trade secrets, require intent,51 and be subject to the same two-prong test of “reasonable measures” and “independent economic value.” While the language of the amendment is silent on the burden of proof for the private cause of action, the court would likely apply a lower burden of proof, most likely the “preponderance of the evidence” burden typical of civil cases and the UTSA in state courts.52

The proposed private cause of action has two pleading requirements: the complaint must describe with “specificity” the “reasonable measures” taken to protect secrecy, and it must include a sworn representation that the dispute involves “substantial need for nationwide service of process or misappropriation . . . from United States to another country.”53 The “reasonable measures” requirement mirrors the secrecy prong in section 1832; but the requisite amount of “specificity” will be a question left to the courts. The second requirement concerning a “substantial need for nationwide service of process” limits the number of cases that are eligible.54 Legislators are looking to establish a limited federal private cause of action55 that is consistent with the anti-preemption clause of the EEA (section 1838) and retains the usefulness of state trade secrets laws, especially for cases involving only intra-state commercial disputes. This new private cause of action was designed to help companies that operate nationwide and that have been challenged by trade secret theft involving interstate or international commerce, by addressing the complexities of multi-jurisdictional litigation with out-of-state fact witnesses and critical evidence.56

As an additional tool for the private litigants, the amendment would have created a civil ex parte seizure order.57A claimant would have had to demonstrate by “clear and convincing evidence” the necessity to prevent irreparable harm. Upon such a showing, the ex parte seizure order would have provided for the seizure of any property intended for use in the commission of a trade secret theft and prevent the destruction of crucial evidence or purloined trade secrets, which can occur in seconds with computers.58

Furthermore, the amendment clarified the meaning of “appropriate injunctive relief” in section 1836 by describing two types of injunctive orders that the AG can request from the courts. The AG may request (1) an order requiring “affirmative actions to be taken to protect a trade secret,” or (2) an order for payment of reasonable royalties, when prohibiting use would be unreasonable.59

In the end, however, the Kohl-Coons amendment failed to become law for procedural reasons: the legislative vehicle through which the amendment was introduced, the Currency Exchange Rate Oversight Reform Act, was voted cloture, meaning all non-germane amendments were rejected without regard to their merits.60


There are several similarities and differences between what would have been the amended EEA and the existing state UTSA and common law approaches to trade secrets. These include the issues detailed below:


Subject matter. The scope of the trade secret definition under the amended EEA would have resembled the scope of the UTSA definition, which does not require continuous use. Certain states require continuous use or an intention to use the trade secret in a business.

Secrecy. The amended EEA would have been similar to both the UTSA and common law regarding “reasonable measures” to maintain secrecy,61 “not being generally known,”62 and not readily ascertainable.63 Certain states do not proscribe against readily ascertainable information achieving trade secret status.

Statute of limitations. The statute of limitations under the amended EEA would have been three years. The statutes of limitation vary from state to state, but the UTSA also provides for three years. The amended EEA also would have expressly rejected the “continuing tort theory.”64 The states are split on “continuing tort theory,” but the UTSA has rejected it.


Pleading. The amended EEA would have required a sworn affidavit asserting the “substantial need for nationwide service of process.” This is not required under the current system. The EEA would also have required pleadings to describe with “specificity” the reasonable measures taken to safeguard the trade secret. The current system only requires the pleadings to allege enough facts to describe the trade secret and misappropriation to put the defendant on notice.65

Intent required. The amended EEA would have required a showing of intent or knowledge to establish misappropriation, which the UTSA and common law do not.

Ex parte seizure. The amended EEA would have provided a statutory method for obtaining a civil ex parte seizure order upon showing by clear and convincing evidence a necessity to prevent irreparable harm. The current system does not provide for such an order. Claimants, however, can seek an ex parte seizure order under Rule 65(b), which requires a high level of proof that a party will destroy evidence or the trade secret (e.g., demonstrated pattern of behavior).66

Acts constituting violations. The EEA does not require the existence of a trade secret or actual misappropriation.67 The EEA punishes attempt and conspiracy to steal a trade secret.68 In contrast, the current state-based system requires the existence of a trade secret, and common law jurisdictions further require use or disclosure.


The proposed amended EEA would not have eliminated the shortcomings in the current legal system, primarily because it would not have preempted state law. But it could have provided litigants with a vehicle to bring trade secret misappropriation claims in federal court, which in turn may have allowed federal courts to develop a more uniform body of trade secret case law. At least one commentator likened that situation to the present trademark system.69 It is also important to note that the amended EEA would have presented additional requirements that are not present in the current state-based system, as detailed above.

The amended EEA would have provided more uniformity regarding (1) subject matter (i.e., continuous use not required); (2) secrecy (e.g., not readily ascertainable); (3) statute of limitations (three years); and (4) continuous tort theory (not recognized). It would have also provided access to the federal courts, which in certain cases would have alleviated inter-state discovery issues that can be difficult in state court litigation.

The affidavit requirement of the proposed amendment would have excluded cases where there is no substantial need for “nationwide service of process” (e.g., fact witnesses located in the same state). But conversely, this requirement would have allowed litigants to bring a case in federal court if out-of-state service of process would have been required and difficult to obtain from another state. This would have opened another door to the federal courts when complete diversity among the parties was missing or when the court lacked supplemental jurisdiction.70

Despite these potential benefits from an amended EEA, certain plaintiffs nevertheless may have continued to favor the current state-based system because it does not require a showing of intent. Also, at least in the short term, the body of case law interpreting the EEA would have been relatively small compared to the significant amount of cases dealing with state law. Therefore, the predictability and certainty that many commentators hoped would follow the enactment of a federal trade secret statute may not have materialized immediately.

Lastly, a question remains regarding how many litigants would have been deterred from bringing a suit in federal court under the amended EEA, knowing that they had to swear to an affidavit asserting a substantial need for service of process, when many states already allow interstate discovery. It is quite possible that the current state-based system, despite its inconsistencies, remains more appealing to certain litigants.


The current state-based system for protecting trade secrets contains several inconsistencies. The recently proposed amendment to the EEA would have provided a vehicle for litigants to bring limited misappropriation actions in federal courts, but would not have preempted state law. Although uniform enforcement and consistent protection might have been aided by the proposed amendment to the EEA, parties would still be left with the fragmented state law system that has remained in place for many years. Although state law remains inconsistent, the real question is whether these inconsistencies can be solved through the enactment of federal laws that may create inconsistencies of their own.

Mr. Wong is a partner at Fitzpatrick, Cella, Harper & Scinto who practices general intellectual property law with an emphasis on complex patent and trade secret litigation in pharmaceuticals and chemistry. Cases Mr. Wong has litigated include those related to proton pump inhibitors, anti-epileptic drugs and other pharmaceuticals. Mr. Wong currently is the Chair of the Recruiting Committee and also serves as faculty for NITA (the National Institute of Trial Advocacy) and Lawline. Mr. Wong received his J.D. cum laude, from Notre Dame Law School and his B.S. in Chemistry, High Distinction, B.S. Biochemistry from the University of Illinois Urbana-Champaign.  

Robert W. Pierson is an associate at Fitzpatrick, Cella, Harper & Scinto who practices complex patent litigation in a variety of technologies, including pharmaceuticals, biotechnology, and mechanical arts. Mr. Pierson has represented plaintiffs and defendants, and has experience litigating cases under the Hatch-Waxman Act. Separate from his patent practice, Mr. Pierson has experience counseling clients on copyright, trademark, and licensing issues. While in law school, Mr. Pierson was Senior Notes and Comments Editor for the Fordham Intellectual Property, Media & Entertainment Law Journal. Mr. Pierson received his J.D., cum laude from Fordham University Law School and his B.S.E. in Bioengineering from the University of Pennsylvania.  

Sally Wang is an associate at Fitzpatrick, Cella, Harper & Scinto and practices patent litigation in the pharmaceutical and biotechnological arts. While in law school, Ms. Wang was Editor-in-Chief and Primary Editor for the Journal of Law, Medicine, and Ethics and an Editor for the Harvard Journal of Law and Technology. She was also a fellow at the Harvard Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics, and worked at the US Food and Drug Administration and the US Senate Health, Education, Labor, and Pension Committee. Ms. Wang received her J.D. from Harvard Law School, her M.P.H. from Harvard School of Public Health and her B.A., magna cum laude, Biology from Harvard University.  


This document and any discussions set forth herein are for informational purposes only, and should not be construed as legal advice, which has to be addressed to particular facts and circumstances involved in any given situation. Review or use of the document and any discussions does not create an attorney-client relationship with the author or publisher. To the extent that this document may contain suggested provisions, they will require modification to suit a particular transaction, jurisdiction or situation. Please consult with an attorney with the appropriate level of experience if you have any questions. Any tax information contained in the document or discussions is not intended to be used, and cannot be used, for purposes of avoiding penalties imposed under the United States Internal Revenue Code. Any opinions expressed are those of the author. The Bureau of National Affairs, Inc. and its affiliated entities do not take responsibility for the content in this document or discussions and do not make any representation or warranty as to their completeness or accuracy.  

©2014 The Bureau of National Affairs, Inc. All rights reserved. Bloomberg Law Reports ® is a registered trademark and service mark of The Bureau of National Affairs, Inc.  

Request Bloomberg Law®