Buying a Business? How to Avoid Inheriting a Trade Secret Disaster

When you’re acquiring a company, the assets on the balance sheet tell only part of the story. The proprietary formulas, customer relationships, manufacturing processes, and operational know-how that make the target company valuable often aren’t reflected on any financial statement. These trade secrets may represent the most significant—and most fragile—assets in the deal.

Here’s the business reality: you can’t value what you can’t identify, and you can’t protect what you don’t understand. Trade secret due diligence in M&A transactions determines whether you’re buying a company with defensible competitive advantages or one with information that could walk out the door the day after closing.

Why Trade Secret Due Diligence Matters

Trade secrets differ from other intellectual property in ways that create unique risks in M&A transactions:

  • No registration. Unlike patents and trademarks, trade secrets have no government registration. There’s no certificate confirming they exist, no public record defining their scope. If the seller says they have trade secrets, you need to verify independently.
  • Protection depends on conduct. A trade secret loses its legal protection the moment the owner fails to take reasonable measures to keep it secret. If the target company has been careless—no NDAs, no access controls, open-door policies with proprietary information—you may be acquiring information that no longer qualifies for protection under Minnesota’s Uniform Trade Secrets Act (MUTSA, Minn. Stat. § 325C).
  • People carry the value. Trade secrets often reside in the minds of key employees. If those employees leave after the acquisition, the trade secrets may leave with them—especially if there are no restrictive covenants in place.
  • Existing claims destroy value. Undisclosed misappropriation claims—either by or against the target—can dramatically affect the value and risk profile of the deal.

Minnesota M&A transactions should account for MUTSA protection status throughout the process. A target company’s trade secrets may lose protection if reasonable measures lapse during the transition—the period between signing and closing, or the months of integration that follow, when organizational attention is divided and security protocols may be inconsistent.

The Due Diligence Process for Trade Secrets

Effective trade secret due diligence moves through three phases: identification, valuation, and risk assessment.

Phase 1: Identification

The first task is determining what trade secrets the target company actually has. This is more difficult than it sounds. Many companies have never formally catalogued their trade secrets, and the people who understand the proprietary information may not think of it in legal terms.

What to request from the target:

  • A complete inventory of information the company considers proprietary or confidential
  • All confidentiality and non-disclosure agreements with employees, contractors, vendors, and partners
  • All employment agreements, particularly those containing non-compete, non-solicitation, and invention assignment provisions
  • Written trade secret policies, information security policies, and employee handbooks addressing confidentiality
  • Documentation of access controls—who has access to what information, and how access is managed
  • Any trade secret audits or assessments previously conducted
  • Records of information shared with third parties, including under NDAs

What to investigate independently:

  • Interview key employees and management about proprietary processes, customer information, formulas, algorithms, and know-how that give the company its competitive advantage
  • Review IT systems for access controls, encryption, data loss prevention tools, and logging
  • Examine physical security for sensitive areas—locked offices, restricted manufacturing areas, visitor protocols
  • Assess whether the company’s practices actually match its written policies

The gap between what a company says it does and what it actually does regarding trade secret protection is often the most significant finding in due diligence.

Phase 2: Valuation

Trade secret valuation in M&A is inherently imprecise, but it’s essential for determining the purchase price and allocating value among assets. Common approaches include:

Cost approach: What would it cost to recreate the trade secret from scratch? This includes R&D costs, development time, failed experiments, and the opportunity cost of the development period. The cost approach often understates value because it doesn’t account for the competitive advantage the information provides.

Market approach: What have comparable trade secrets sold for in similar transactions? This approach is limited by the fact that trade secret transactions are, by nature, confidential—there’s little public data on comparable sales.

Income approach: What economic benefit does the trade secret generate? This typically involves projecting the incremental revenue or cost savings attributable to the trade secret over its expected useful life, discounted to present value. The income approach is generally considered the most reliable, but it requires assumptions about the trade secret’s longevity, the likelihood of independent discovery by competitors, and the company’s ability to continue exploiting the information.

Relief from royalty: What would the company have to pay to license the trade secret from a third party? This method estimates the royalty rate for comparable information and applies it to projected revenues.

No single method is definitive. Sophisticated buyers use multiple approaches and triangulate the results.

Phase 3: Risk Assessment

Identifying and valuing trade secrets is only useful if you also understand the risks that could erode or destroy that value. Key risk areas include:

Protection adequacy. Do the target’s protective measures meet the “reasonable measures” standard required by MUTSA (Minn. Stat. § 325C.01, subd. 5)? If not, some or all of the identified trade secrets may not qualify for legal protection—meaning you’re paying for assets that can’t be defended in court.

Employee retention risk. Which employees hold critical trade secret knowledge? Are they under employment agreements with restrictive covenants? What is the likelihood they’ll stay post-acquisition? If key employees leave and take proprietary knowledge with them, the trade secrets’ value may evaporate.

Prior disclosure. Has the target disclosed trade secrets to third parties without adequate NDA protection? Has information leaked through patent applications (which require public disclosure), publications, conference presentations, or former employees?

Pending or threatened litigation. Is the target involved in any trade secret disputes—as plaintiff or defendant? Are there former employees at competitors who might have taken proprietary information?

Third-party claims. Does the target use information that might belong to others? Did key employees bring proprietary information from previous employers? This is a particularly dangerous risk—acquiring a company that is unknowingly using another company’s trade secrets can expose the buyer to misappropriation liability.

Key Questions to Ask the Target Company

A structured questionnaire ensures comprehensive coverage. Essential questions include:

Identification and ownership:
– What information does the company consider its trade secrets?
– How was this information developed—internally, through acquisition, through joint development?
– Are there any disputes about ownership of proprietary information?
– Has the company acquired trade secrets from other entities, and are those acquisition agreements properly documented?

Protection measures:
– Who has access to each category of trade secret information?
– What physical, electronic, and contractual measures protect the information?
– When were confidentiality agreements last updated?
– What happens when an employee with trade secret access leaves the company?
– Has the company ever pursued a misappropriation claim? What was the outcome?

Risk exposure:
– Have any employees joined from competitors in the past five years? Did they bring information from their former employers?
– Has any trade secret information been published, presented, or disclosed outside of NDA-protected relationships?
– Are any key employees currently in disputes about restrictive covenants from prior employers?
– Has the company received any cease-and-desist letters or threats related to proprietary information?

Common Red Flags

Certain findings during due diligence should raise immediate concerns:

No Written Policies

If the target has no written trade secret policy, no confidentiality agreements, or no documented information security practices, the legal status of its “trade secrets” is questionable. MUTSA requires “reasonable efforts” to maintain secrecy. A complete absence of documentation suggests those efforts haven’t been made.

Key Employee Flight Risk

When the target’s most valuable proprietary knowledge resides in the minds of a small number of employees who have no contractual restrictions, the trade secret value is only as stable as those employees’ willingness to stay. Due diligence should include an honest assessment of retention risk—not just whether restrictive covenants exist, but whether key people are likely to remain through the integration.

Pending or Recent Litigation

Active trade secret litigation against the target could mean the company has been misappropriating another entity’s secrets—creating liability the buyer would inherit. Litigation by the target against former employees might indicate systemic retention and protection problems.

Informal Information Sharing

Companies that routinely share proprietary information with vendors, customers, or partners without NDAs may have inadvertently destroyed trade secret protection. The information may still be valuable, but it may not be legally defensible.

Recent Employee Departures

A pattern of key employees leaving for competitors shortly before the acquisition is a significant red flag. It may indicate that valuable trade secrets have already been compromised, and the buyer may be acquiring assets that are worth less than they appear.

Asset Purchase vs. Stock Purchase: Trade Secret Considerations

The deal structure has significant implications for trade secret protection.

Asset Purchase

In an asset purchase, the buyer selects which assets to acquire. Trade secrets must be specifically identified and included in the purchased assets. Key considerations:

  • Assignment provisions. The purchase agreement must explicitly assign trade secret rights to the buyer. Unlike patents, there’s no registration to transfer—assignment happens by contract.
  • Employee transitions. In an asset purchase, employees don’t automatically transfer. The buyer must offer employment to key trade secret holders. If they decline, the trade secrets in their heads may not transfer effectively.
  • Third-party consents. If trade secrets are subject to license agreements or joint development arrangements, assignment may require third-party consent.
  • Selective liability. One advantage of an asset purchase is that the buyer generally doesn’t inherit the seller’s liabilities—including any misappropriation claims against the seller (though this isn’t absolute).

Stock Purchase

In a stock purchase, the buyer acquires the entire entity, including all its assets and liabilities. Trade secrets transfer automatically as company assets. Key considerations:

  • No assignment gap. Because the company continues to exist under new ownership, there’s no need to separately assign trade secrets. Existing NDAs, employment agreements, and protective measures remain in effect.
  • Inherited liabilities. The buyer inherits all liabilities, including any misappropriation claims—whether the company is the plaintiff or the defendant. Due diligence on litigation exposure is critical.
  • Employee continuity. Employees remain employed by the same entity, reducing the risk of key-person departures triggered by the transition.

Representations and Warranties

The purchase agreement should include robust representations and warranties related to trade secrets. Standard provisions address:

Ownership and validity:
– The target owns or has the right to use all trade secrets necessary for its business operations
– No third party has a claim of ownership to the target’s trade secrets
– The target has not granted any licenses to its trade secrets except as disclosed

Protection measures:
– The target has taken reasonable measures to protect the confidentiality of its trade secrets
– All employees and contractors with access to trade secrets have signed appropriate confidentiality agreements
– The target is not aware of any unauthorized disclosure of its trade secrets

No infringement:
– The target’s business operations do not misappropriate any third party’s trade secrets
– The target has not received any claims or threats alleging misappropriation
– No current or former employee is subject to restrictive covenants from prior employers that would affect the target’s business

Litigation:
– There are no pending or threatened lawsuits involving the target’s trade secrets
– The target is not aware of any facts that could give rise to such a lawsuit

These representations serve two purposes: they force the seller to disclose problems during due diligence, and they provide the buyer with contractual remedies (indemnification) if problems surface after closing.

Post-Closing Integration and Protection

The acquisition closes, and the real work begins. The transition period is when trade secrets are most vulnerable.

Immediate Steps

  • Audit access controls. Determine who has access to trade secret information and whether that access is still appropriate under the new ownership structure.
  • Update agreements. Ensure all employees—both retained from the target and brought in by the buyer—have current confidentiality and invention assignment agreements reflecting the new ownership.
  • Communicate expectations. Key employees need to understand that trade secret protection obligations continue after the acquisition. Ambiguity during transitions leads to carelessness.
  • Secure departing employees. If any target employees don’t make the transition, conduct exit interviews, collect company property and devices, and remind them of their ongoing confidentiality obligations.

Integration Challenges

Merging two companies’ information systems, teams, and processes creates trade secret risks:

  • Commingling information. When the buyer’s employees gain access to the target’s trade secrets (and vice versa), the pool of people with access expands. This may be necessary for integration, but it should be managed deliberately.
  • System migrations. Moving data between systems creates copies, temporary files, and access windows. Plan migrations with security in mind.
  • Cultural differences. The target may have had a casual approach to information security. Imposing the buyer’s stricter standards takes time and training.
  • Vendor and partner transitions. If the target’s vendors or partners need to be transitioned to the buyer’s systems or replaced, ensure that proprietary information is properly handled during the transition.

Maintaining Protection Status

MUTSA protection requires ongoing reasonable measures. An acquisition doesn’t create a grace period. If protective measures lapse during integration—even temporarily—a court could later find that the information lost its trade secret status during that gap. The buyer should designate someone responsible for trade secret protection during the integration period and ensure that security measures are maintained or improved, not relaxed.

Checklist: Trade Secret Due Diligence in M&A

Use this checklist to ensure comprehensive coverage:

  • [ ] Request and review the target’s trade secret inventory
  • [ ] Obtain all NDAs, employment agreements, and contractor agreements
  • [ ] Review written trade secret and information security policies
  • [ ] Assess physical and electronic access controls
  • [ ] Interview key employees about proprietary knowledge
  • [ ] Identify key-person dependencies and retention risks
  • [ ] Search for pending or threatened litigation involving trade secrets
  • [ ] Investigate whether target employees brought information from prior employers
  • [ ] Evaluate prior disclosures to third parties and adequacy of NDA coverage
  • [ ] Determine whether trade secrets will transfer effectively under the deal structure
  • [ ] Draft representations and warranties covering ownership, protection, and non-infringement
  • [ ] Plan post-closing integration with trade secret security in mind
  • [ ] Assign responsibility for maintaining protective measures during the transition

Frequently Asked Questions

What happens to trade secret protection when a company is acquired?

Trade secret protection continues as long as the information meets the legal requirements—it derives economic value from not being generally known, and the owner takes reasonable measures to maintain secrecy. An acquisition doesn’t automatically destroy trade secret status. However, if protective measures lapse during the transition—access controls are relaxed, NDAs aren’t updated, or information is shared more broadly during integration—protection can be lost. The acquiring company inherits both the trade secrets and the obligation to protect them.

Should I do an asset purchase or stock purchase if trade secrets are a major asset?

Both structures can work, but each has trade-offs. A stock purchase provides continuity—trade secrets stay with the entity, existing agreements remain in effect, and employees aren’t disrupted. An asset purchase gives the buyer more control over which assets and liabilities to take on, but requires explicit assignment of trade secrets and re-hiring of key employees, creating transition risks. When trade secrets are a significant part of the deal value, the integration risks of each structure should factor heavily into the decision.

How do I value trade secrets that aren’t on the balance sheet?

Trade secrets typically don’t appear as balance sheet items unless they were acquired in a prior transaction. Valuation methods include the cost approach (what would it cost to recreate the information), the income approach (what economic benefit does the information generate), and the relief-from-royalty approach (what would you pay to license it). Most practitioners use multiple methods and triangulate. Engage a qualified valuation professional for significant transactions—trade secret valuation is both an art and a science.

What if key employees leave right after the acquisition?

This is one of the most significant risks in trade-secret-heavy acquisitions. Mitigations include retention bonuses or earnout structures tied to continued employment, updated restrictive covenants as a condition of the transaction, and—most importantly—creating an environment where key employees want to stay. From a legal standpoint, departing employees remain bound by their confidentiality obligations even after leaving. If they take trade secrets to a competitor, the acquiring company can pursue misappropriation claims under MUTSA.

Can due diligence itself expose trade secrets?

Yes. Sharing proprietary information during due diligence creates its own risks. The standard practice is to execute a mutual NDA before any confidential information is exchanged, use a secure virtual data room with access logging, limit access to information on a need-to-know basis, and stage disclosure—sharing the most sensitive information only after the deal reaches a certain level of commitment. If the deal falls through, the NDA governs the potential buyer’s obligations regarding information received during due diligence.

Related Articles


For guidance specific to your situation, contact Aaron Hall, attorney for business owners, at aaronhall.com or 612-466-0040.