When you’re acquiring a company, the assets on the balance sheet tell only part of the story. The proprietary formulas, customer relationships, manufacturing processes, and operational know-how that make the target company valuable often aren’t reflected on any financial statement. These trade secrets may represent the most significant—and most fragile—assets in the deal.
Here’s the business reality: you can’t value what you can’t identify, and you can’t protect what you don’t understand. Trade secret due diligence in M&A transactions determines whether you’re buying a company with defensible competitive advantages or one with information that could walk out the door the day after closing.
Why Does Trade Secret Due Diligence Matter in M&A?
Trade secrets have no government registration, depend entirely on the owner’s conduct for legal protection, and often reside in the minds of key employees. These characteristics create risks that standard IP due diligence does not address.
Trade secrets differ from other intellectual property in ways that create unique risks in M&A transactions:
- No registration. Unlike patents and trademarks, trade secrets have no government registration. There’s no certificate confirming they exist, no public record defining their scope. If the seller says they have trade secrets, you need to verify independently.
- Protection depends on conduct. A trade secret loses its legal protection the moment the owner fails to take reasonable measures to keep it secret. If the target company has been careless—no NDAs, no access controls, open-door policies with proprietary information—you may be acquiring information that no longer qualifies for protection under Minnesota’s Uniform Trade Secrets Act (MUTSA, Minn. Stat. § 325C).
- People carry the value. Trade secrets often reside in the minds of key employees. If those employees leave after the acquisition, the trade secrets may leave with them—especially if there are no restrictive covenants in place.
- Existing claims destroy value. Undisclosed misappropriation claims—either by or against the target—can dramatically affect the value and risk profile of the deal.
Minnesota M&A transactions should account for MUTSA protection status throughout the process. A target company’s trade secrets may lose protection if reasonable measures lapse during the transition—the period between signing and closing, or the months of integration that follow, when organizational attention is divided and security protocols may be inconsistent.
What Does the Trade Secret Due Diligence Process Look Like?
Effective trade secret due diligence moves through three phases: identification (cataloguing what the target actually has), valuation (determining what it is worth), and risk assessment (understanding what could erode or destroy that value).
The process moves through these phases:
Phase 1: Identification
The first task is determining what trade secrets the target company actually has. This is more difficult than it sounds. Many companies have never formally catalogued their trade secrets, and the people who understand the proprietary information may not think of it in legal terms.
What to request from the target:
- A complete inventory of information the company considers proprietary or confidential
- All confidentiality and non-disclosure agreements with employees, contractors, vendors, and partners
- All employment agreements, particularly those containing non-compete, non-solicitation, and invention assignment provisions
- Written trade secret policies, information security policies, and employee handbooks addressing confidentiality
- Documentation of access controls—who has access to what information, and how access is managed
- Any trade secret audits or assessments previously conducted
- Records of information shared with third parties, including under NDAs
What to investigate independently:
- Interview key employees and management about proprietary processes, customer information, formulas, algorithms, and know-how that give the company its competitive advantage
- Review IT systems for access controls, encryption, data loss prevention tools, and logging
- Examine physical security for sensitive areas—locked offices, restricted manufacturing areas, visitor protocols
- Assess whether the company’s practices actually match its written policies
The gap between what a company says it does and what it actually does regarding trade secret protection is often the most significant finding in due diligence.
Phase 2: Valuation
Trade secret valuation in M&A is inherently imprecise, but it’s essential for determining the purchase price and allocating value among assets. Common approaches include:
Cost approach: What would it cost to recreate the trade secret from scratch? This includes R&D costs, development time, failed experiments, and the opportunity cost of the development period. The cost approach often understates value because it doesn’t account for the competitive advantage the information provides.
Market approach: What have comparable trade secrets sold for in similar transactions? This approach is limited by the fact that trade secret transactions are, by nature, confidential—there’s little public data on comparable sales.
Income approach: What economic benefit does the trade secret generate? This typically involves projecting the incremental revenue or cost savings attributable to the trade secret over its expected useful life, discounted to present value. The income approach is generally considered the most reliable, but it requires assumptions about the trade secret’s longevity, the likelihood of independent discovery by competitors, and the company’s ability to continue exploiting the information.
Relief from royalty: What would the company have to pay to license the trade secret from a third party? This method estimates the royalty rate for comparable information and applies it to projected revenues.
No single method is definitive. Sophisticated buyers use multiple approaches and triangulate the results.
Phase 3: Risk Assessment
Identifying and valuing trade secrets is only useful if you also understand the risks that could erode or destroy that value. Key risk areas include:
Protection adequacy. Do the target’s protective measures meet the “efforts that are reasonable under the circumstances” standard required by MUTSA (Minn. Stat. § 325C.01, subd. 5)? If not, some or all of the identified trade secrets may not qualify for legal protection—meaning you’re paying for assets that can’t be defended in court.
Employee retention risk. Which employees hold critical trade secret knowledge? Are they under employment agreements with restrictive covenants? What is the likelihood they’ll stay post-acquisition? If key employees leave and take proprietary knowledge with them, the trade secrets’ value may evaporate.
Prior disclosure. Has the target disclosed trade secrets to third parties without adequate NDA protection? Has information leaked through patent applications (which require public disclosure), publications, conference presentations, or former employees?
Pending or threatened litigation. Is the target involved in any trade secret disputes—as plaintiff or defendant? Are there former employees at competitors who might have taken proprietary information?
Third-party claims. Does the target use information that might belong to others? Did key employees bring proprietary information from previous employers? This is a particularly dangerous risk—acquiring a company that is unknowingly using another company’s trade secrets can expose the buyer to misappropriation liability.
What Questions Should You Ask the Target Company About Trade Secrets?
A structured questionnaire ensures you do not miss critical issues. Questions should cover identification and ownership, protection measures, and risk exposure. Essential questions include:
Identification and ownership:
- What information does the company consider its trade secrets?
- How was this information developed—internally, through acquisition, through joint development?
- Are there any disputes about ownership of proprietary information?
- Has the company acquired trade secrets from other entities, and are those acquisition agreements properly documented?
Protection measures:
- Who has access to each category of trade secret information?
- What physical, electronic, and contractual measures protect the information?
- When were confidentiality agreements last updated?
- What happens when an employee with trade secret access leaves the company?
- Has the company ever pursued a misappropriation claim? What was the outcome?
Risk exposure:
- Have any employees joined from competitors in the past five years? Did they bring information from their former employers?
- Has any trade secret information been published, presented, or disclosed outside of NDA-protected relationships?
- Are any key employees currently in disputes about restrictive covenants from prior employers?
- Has the company received any cease-and-desist letters or threats related to proprietary information?
What Red Flags Signal Trade Secret Problems During Due Diligence?
Missing written policies, key-person flight risk, active litigation, informal information sharing, and recent departures to competitors are the warning signs that demand closer scrutiny. Any one of these can indicate the target’s trade secrets are worth less than represented.
No Written Policies
If the target has no written trade secret policy, no confidentiality agreements, or no documented information security practices, the legal status of its “trade secrets” is questionable. MUTSA requires “reasonable efforts” to maintain secrecy. A complete absence of documentation suggests those efforts haven’t been made.
Key Employee Flight Risk
When the target’s most valuable proprietary knowledge resides in the minds of a small number of employees who have no contractual restrictions, the trade secret value is only as stable as those employees’ willingness to stay. Due diligence should include an honest assessment of retention risk—not just whether restrictive covenants exist, but whether key people are likely to remain through the integration.
Pending or Recent Litigation
Active trade secret litigation against the target could mean the company has been misappropriating another entity’s secrets—creating liability the buyer would inherit. Litigation by the target against former employees might indicate systemic retention and protection problems.
Informal Information Sharing
Companies that routinely share proprietary information with vendors, customers, or partners without NDAs may have inadvertently destroyed trade secret protection. The information may still be valuable, but it may not be legally defensible.
Recent Employee Departures
A pattern of key employees leaving for competitors shortly before the acquisition is a significant red flag. It may indicate that valuable trade secrets have already been compromised, and the buyer may be acquiring assets that are worth less than they appear.
How Do Asset Purchases and Stock Purchases Differ for Trade Secrets?
The deal structure determines how trade secrets transfer, whether existing agreements remain in effect, and what liabilities the buyer inherits. Each approach has distinct advantages and risks for trade secret protection.
Asset Purchase
In an asset purchase, the buyer selects which assets to acquire. Trade secrets must be specifically identified and included in the purchased assets. Key considerations:
- Assignment provisions. The purchase agreement must explicitly assign trade secret rights to the buyer. Unlike patents, there’s no registration to transfer—assignment happens by contract.
- Employee transitions. In an asset purchase, employees don’t automatically transfer. The buyer must offer employment to key trade secret holders. If they decline, the trade secrets in their heads may not transfer effectively.
- Third-party consents. If trade secrets are subject to license agreements or joint development arrangements, assignment may require third-party consent.
- Selective liability. One advantage of an asset purchase is that the buyer generally doesn’t inherit the seller’s liabilities—including any misappropriation claims against the seller (though this isn’t absolute).
Stock Purchase
In a stock purchase, the buyer acquires the entire entity, including all its assets and liabilities. Trade secrets transfer automatically as company assets. Key considerations:
- No assignment gap. Because the company continues to exist under new ownership, there’s no need to separately assign trade secrets. Existing NDAs, employment agreements, and protective measures remain in effect.
- Inherited liabilities. The buyer inherits all liabilities, including any misappropriation claims—whether the company is the plaintiff or the defendant. Due diligence on litigation exposure is critical.
- Employee continuity. Employees remain employed by the same entity, reducing the risk of key-person departures triggered by the transition.
What Representations and Warranties Should Cover Trade Secrets?
The purchase agreement should include representations covering ownership, protection measures, non-infringement, and litigation status. These provisions force the seller to disclose problems and give the buyer contractual remedies if problems surface after closing.
Ownership and validity:
- The target owns or has the right to use all trade secrets necessary for its business operations
- No third party has a claim of ownership to the target’s trade secrets
- The target has not granted any licenses to its trade secrets except as disclosed
Protection measures:
- The target has taken reasonable measures to protect the confidentiality of its trade secrets
- All employees and contractors with access to trade secrets have signed appropriate confidentiality agreements
- The target is not aware of any unauthorized disclosure of its trade secrets
No infringement:
- The target’s business operations do not misappropriate any third party’s trade secrets
- The target has not received any claims or threats alleging misappropriation
- No current or former employee is subject to restrictive covenants from prior employers that would affect the target’s business
Litigation:
- There are no pending or threatened lawsuits involving the target’s trade secrets
- The target is not aware of any facts that could give rise to such a lawsuit
How Do You Protect Trade Secrets After the Acquisition Closes?
The transition period is when trade secrets are most vulnerable. Immediate steps include auditing access controls, updating agreements, communicating expectations to retained employees, and securing departing employees. MUTSA does not provide a grace period – if protective measures lapse during integration, a court could find the information lost trade secret status.
Immediate Steps
- Audit access controls. Determine who has access to trade secret information and whether that access is still appropriate under the new ownership structure.
- Update agreements. Ensure all employees—both retained from the target and brought in by the buyer—have current confidentiality and invention assignment agreements reflecting the new ownership.
- Communicate expectations. Key employees need to understand that trade secret protection obligations continue after the acquisition. Ambiguity during transitions leads to carelessness.
- Secure departing employees. If any target employees don’t make the transition, conduct exit interviews, collect company property and devices, and remind them of their ongoing confidentiality obligations.
Integration Challenges
Merging two companies’ information systems, teams, and processes creates trade secret risks:
- Commingling information. When the buyer’s employees gain access to the target’s trade secrets (and vice versa), the pool of people with access expands. This may be necessary for integration, but it should be managed deliberately.
- System migrations. Moving data between systems creates copies, temporary files, and access windows. Plan migrations with security in mind.
- Cultural differences. The target may have had a casual approach to information security. Imposing the buyer’s stricter standards takes time and training.
- Vendor and partner transitions. If the target’s vendors or partners need to be transitioned to the buyer’s systems or replaced, ensure that proprietary information is properly handled during the transition.
Maintaining Protection Status
MUTSA protection requires ongoing reasonable measures. An acquisition doesn’t create a grace period. If protective measures lapse during integration—even temporarily—a court could later find that the information lost its trade secret status during that gap. The buyer should designate someone responsible for trade secret protection during the integration period and ensure that security measures are maintained or improved, not relaxed.
What Should a Trade Secret Due Diligence Checklist Include?
The following checklist ensures comprehensive coverage across all three phases of trade secret due diligence:
- Request and review the target’s trade secret inventory
- Obtain all NDAs, employment agreements, and contractor agreements
- Review written trade secret and information security policies
- Assess physical and electronic access controls
- Interview key employees about proprietary knowledge
- Identify key-person dependencies and retention risks
- Search for pending or threatened litigation involving trade secrets
- Investigate whether target employees brought information from prior employers
- Evaluate prior disclosures to third parties and adequacy of NDA coverage
- Determine whether trade secrets will transfer effectively under the deal structure
- Draft representations and warranties covering ownership, protection, and non-infringement
- Plan post-closing integration with trade secret security in mind
- Assign responsibility for maintaining protective measures during the transition
For guidance specific to your situation, contact Aaron Hall, attorney for business owners, at aaronhall.com or 612-466-0040.
Learn more about trade secret protection for Minnesota businesses
What trade secret risks should I look for when buying a business?
Key risks include absent or outdated confidentiality agreements, no written trade secret policies, key employees without restrictive covenants, undisclosed misappropriation claims, and prior disclosures to third parties without NDA protection. Any of these can mean you are paying for assets that lack legal protection under MUTSA.
How are trade secrets valued in an M&A transaction?
Practitioners typically use multiple valuation methods and triangulate. The cost approach estimates recreation expense, the income approach projects economic benefit over the trade secret’s useful life, and the relief-from-royalty approach estimates licensing costs. No single method is definitive, and a qualified valuation professional is recommended for significant deals.
Should I use an asset purchase or stock purchase when trade secrets are a major deal asset?
A stock purchase provides continuity because trade secrets stay with the entity, existing agreements remain in effect, and employees are not disrupted. An asset purchase gives the buyer more control over which assets and liabilities to accept but requires explicit assignment of trade secrets and re-hiring key employees, which creates transition risks.
What happens to trade secret protection during a company acquisition?
Protection continues as long as the information meets MUTSA requirements – it derives economic value from secrecy, and the owner takes reasonable measures to maintain it. If protective measures lapse during the transition period, such as relaxed access controls or broader information sharing during integration, protection can be permanently lost.
How do I prevent key employees from leaving with trade secrets after an acquisition?
Mitigations include retention bonuses or earnout structures tied to continued employment, updated restrictive covenants as a condition of closing, and creating an environment where key employees want to stay. Departing employees remain bound by confidentiality obligations, and misappropriation claims under MUTSA remain available if they take trade secrets to a competitor.