Trade Secret Misappropriation Lawsuits in Minnesota: Process and Remedies

You built something valuable—a proprietary process, a customer database cultivated over decades, pricing algorithms that give you a competitive edge. Then a key employee leaves for a competitor, and within weeks, that competitor seems to know exactly how your operation works. Or a vendor you trusted with confidential information starts offering suspiciously similar services to your clients.

This is trade secret misappropriation, and Minnesota law provides powerful tools to stop it. But trade secret litigation is not something you file on a hunch. It requires strategic planning, solid evidence, and a clear understanding of what you’re trying to accomplish. Here’s what business owners need to know about bringing—or defending against—a trade secret misappropriation lawsuit in Minnesota.

What Constitutes Misappropriation Under Minnesota Law

Minnesota’s Uniform Trade Secrets Act (MUTSA), codified at Minn. Stat. § 325C.01, defines misappropriation as either:

  1. Acquisition of a trade secret by someone who knows or should know the secret was obtained by improper means
  2. Disclosure or use of a trade secret by someone who acquired it through improper means, or who knew or should have known the information was a trade secret obtained through improper means or under circumstances giving rise to a duty to maintain secrecy

“Improper means” includes theft, bribery, misrepresentation, breach of a duty to maintain secrecy, and espionage through electronic or other means.

The critical distinction: misappropriation is not simply using information that a former employee happens to remember. General skills, knowledge, and experience that an employee develops on the job belong to the employee. The line between protectable trade secrets and general knowledge is often where these cases are won or lost.

Common Fact Patterns

Trade secret misappropriation cases in Minnesota typically fall into a few recognizable patterns:

Departing Employees

The most common scenario. A salesperson leaves and takes the customer list. An engineer departs with product specifications. A manager downloads confidential files the week before giving notice. These cases often involve:

  • Bulk downloads of files to personal devices or cloud storage shortly before resignation
  • Emails forwarded to personal accounts
  • Access to systems after resignation but before the departure date
  • Immediate solicitation of clients using information that could only have come from the former employer

Competitor Hiring

Sometimes the misappropriation is more organized. A competitor hires several employees from the same team, gaining access to an entire body of proprietary knowledge. Or a competitor specifically recruits someone known to have access to particular trade secrets. The question becomes whether the competitor knew—or should have known—that the information being brought over was protected.

Vendor and Contractor Leaks

Companies routinely share confidential information with vendors, contractors, and consultants. When those relationships end, the information doesn’t always stay where it should. A manufacturing contractor might use your proprietary specifications for another client. A marketing consultant might apply your customer analytics methodology for a competitor. These situations often involve unclear or poorly drafted confidentiality agreements.

Business Partner Disputes

When partnerships or joint ventures dissolve, disputes over who owns what information are common. One partner may take customer relationships, proprietary processes, or business strategies developed during the venture and use them in a competing business.

Choosing Between State and Federal Claims

Business owners pursuing trade secret misappropriation have two primary legal frameworks:

MUTSA (Minnesota Uniform Trade Secrets Act — Minn. Stat. § 325C)

MUTSA applies to trade secrets used or disclosed in Minnesota. Cases are filed in Minnesota state court, typically Hennepin County District Court for Minneapolis-area businesses or the appropriate county district court. MUTSA provides injunctive relief, actual damages, exemplary damages for willful and malicious misappropriation (up to twice the award), and attorney fees in certain circumstances.

DTSA (Defend Trade Secrets Act — 18 U.S.C. § 1836 et seq.)

The federal DTSA, enacted in 2016, allows trade secret owners to file in federal court—the U.S. District Court for the District of Minnesota for cases with a Minnesota connection. The DTSA offers one remedy not available under MUTSA: an ex parte seizure order, which allows courts to order the seizure of property to prevent dissemination of trade secrets in extraordinary circumstances. The DTSA also requires that employers provide notice of whistleblower immunity in any contract governing trade secrets or confidential information.

Strategic Considerations

Many plaintiffs file both MUTSA and DTSA claims simultaneously. The choice of forum—state versus federal—depends on several factors:

  • Speed: State court may move faster to a temporary restraining order hearing in some counties
  • Discovery tools: Federal discovery rules may be advantageous in certain situations
  • Jury pool: Federal and state juries can differ in composition and outlook
  • Judge expertise: Federal judges may have more experience with complex commercial litigation
  • Ex parte seizure: Only available under the DTSA
  • Interstate conduct: If the misappropriation crosses state lines, federal court may be more practical

The Litigation Process

Pre-Suit Investigation

Before filing anything, you need evidence. Premature filing without adequate evidence can result in sanctions, fee-shifting, and damage to your credibility. A thorough pre-suit investigation typically includes:

  • Digital forensics: Examining company systems for evidence of unauthorized downloads, file transfers, email forwarding, and data access patterns. This should be done by a qualified forensic examiner who can preserve chain of custody.
  • Document review: Identifying what confidential information the departing individual had access to and what agreements (NDAs, employment agreements, restrictive covenants) govern their obligations.
  • Competitive intelligence: Monitoring the competitor’s public activities for signs that your trade secrets are being used—new product launches, client solicitations, marketing that mirrors your approach.
  • Witness interviews: Speaking with remaining employees who may have observed suspicious behavior, received unusual requests, or have knowledge of the departing individual’s activities.

Filing the Complaint

The complaint must identify the trade secrets at issue with reasonable particularity. This doesn’t mean publishing the secrets in a public filing, but it does mean describing them with enough specificity that the defendant knows what they’re accused of misappropriating. Vague allegations about “confidential business information” are generally insufficient.

Emergency Relief: TROs and Preliminary Injunctions

In many trade secret cases, speed is everything. Once a trade secret is disclosed, the damage may be irreversible. Courts recognize this urgency through two mechanisms:

Temporary Restraining Orders (TROs) can be obtained quickly—sometimes within days of filing—and last for up to 14 days. To obtain a TRO, you must demonstrate:

  • A likelihood of success on the merits
  • That irreparable harm will occur without immediate relief
  • That the balance of harms favors the order
  • That the order serves the public interest

Preliminary Injunctions follow a similar analysis but involve a full hearing with both sides presenting evidence. They remain in effect throughout the litigation. Obtaining a preliminary injunction early in the case often determines the practical outcome—if a competitor is enjoined from using the trade secrets, they frequently lose interest in prolonging the fight.

Discovery

Trade secret discovery is uniquely challenging. The plaintiff must prove what the defendant took and how they used it, often when the evidence is in the defendant’s possession. Key discovery tools include:

  • Forensic imaging of the defendant’s computers, phones, and cloud accounts
  • Interrogatories requiring the defendant to identify what information they took from the plaintiff
  • Document requests for communications with the new employer about the plaintiff’s business
  • Depositions of the defendant, their new employer’s personnel, and witnesses
  • Protective orders to prevent further disclosure of trade secrets during litigation

Courts routinely enter protective orders in trade secret cases to ensure that the litigation itself doesn’t become a vehicle for further disclosure of confidential information.

Trial

Trade secret cases that reach trial are typically decided by a jury, though bench trials are available. The plaintiff bears the burden of proving:

  1. The information qualifies as a trade secret (it derives independent economic value from not being generally known, and reasonable efforts were made to maintain its secrecy)
  2. The defendant acquired, disclosed, or used the trade secret
  3. The acquisition, disclosure, or use was improper

The defendant may raise several defenses, including independent development, reverse engineering, that the information was publicly available, or that the plaintiff failed to take reasonable measures to protect the secret.

Statute of Limitations

Timing matters. Under MUTSA (Minn. Stat. § 325C.06), the statute of limitations is three years from the date the misappropriation is discovered or should have been discovered through reasonable diligence. The DTSA also imposes a three-year limitations period (18 U.S.C. § 1836(d)).

The “discovery rule” means the clock starts when you know—or should know—that misappropriation occurred, not necessarily when it actually happened. However, courts expect business owners to exercise reasonable diligence. If signs of misappropriation were apparent and you waited too long to investigate, you may lose your claims.

Continuing misappropriation can extend the limitations period. Each new act of use or disclosure may restart the clock for purposes of that particular act.

The Role of Forensic Investigation

Digital forensics has become central to modern trade secret litigation. A qualified forensic investigator can:

  • Recover deleted files and reconstruct activity on company devices
  • Trace data transfers to USB drives, cloud storage, personal email, and other destinations
  • Establish timelines showing when files were accessed, copied, or transmitted
  • Analyze metadata to prove that documents in the defendant’s possession originated from the plaintiff’s systems
  • Preserve evidence in a manner that withstands courtroom scrutiny

The cost of a forensic investigation typically ranges from $15,000 to $50,000 or more, depending on the volume of data and complexity of the analysis. This investment is often essential—without forensic evidence, many trade secret cases rely on circumstantial evidence that may not be sufficient to obtain injunctive relief or prove damages.

Practical Considerations Before Filing Suit

Is Litigation the Right Move?

Filing a trade secret lawsuit is a significant business decision, not just a legal one. Consider:

  • Cost: Trade secret litigation in Minnesota typically costs between $150,000 and $500,000 or more through trial, depending on complexity.
  • Duration: Cases typically take 18 to 36 months from filing to trial, though emergency relief can be obtained much sooner.
  • Distraction: Litigation demands management time and attention that could be spent on the business.
  • Publicity: Lawsuits are public. Even with protective orders, the existence of the dispute becomes known. Consider whether that publicity helps or hurts your business.
  • Relationship consequences: If the misappropriator is a former partner, key customer, or important industry contact, litigation will permanently alter those relationships.

Alternatives to Consider

Before filing suit, evaluate whether a cease-and-desist letter, a demand for return of materials, or a negotiated resolution might accomplish your objectives faster and at lower cost. Sometimes the threat of litigation—backed by solid evidence—is more effective than litigation itself.

Strengthening Your Position Before You Need It

The best time to prepare for a trade secret misappropriation case is before the misappropriation happens. Companies that consistently do the following are in a far stronger litigation position:

  • Maintain current, signed confidentiality and non-disclosure agreements with all employees, contractors, and vendors
  • Implement access controls that limit trade secret exposure to those who need it
  • Conduct exit interviews and collect company property when employees depart
  • Monitor for unusual data access patterns, especially during notice periods
  • Document what information is considered a trade secret and why

Frequently Asked Questions

Can I sue a competitor who hired my former employee?

Yes, if the competitor knew or had reason to know that the employee would bring trade secrets to the new position. Under both MUTSA and the DTSA, the party that receives and uses misappropriated trade secrets can be held liable, not just the person who took them. Evidence that the competitor specifically recruited the employee for their knowledge of your proprietary information strengthens this claim.

What if the employee didn’t sign a non-disclosure agreement?

An NDA strengthens your case, but it isn’t required for a trade secret misappropriation claim. MUTSA and the DTSA protect trade secrets regardless of whether a written agreement exists. However, the absence of an NDA may be cited as evidence that you didn’t take “reasonable measures” to protect the information—a required element of trade secret status. Other protective measures (access controls, confidentiality policies, marking documents as confidential) can compensate.

How do I prove the competitor is using my trade secrets?

Direct evidence—such as documents showing your proprietary information in the competitor’s possession—is most persuasive. But circumstantial evidence is also powerful: a competitor launching a suspiciously similar product shortly after hiring your employee, soliciting your specific customers, or undercutting your pricing in ways that suggest insider knowledge. Forensic evidence from the departing employee’s devices often provides the link.

Can I get an emergency court order to stop the misappropriation immediately?

Yes. Minnesota courts regularly issue temporary restraining orders and preliminary injunctions in trade secret cases. You’ll need to show a likelihood of success on your claims and that you’ll suffer irreparable harm without immediate relief. Courts can order the defendant to stop using or disclosing the trade secrets, return all materials, and submit to forensic examination of their devices.

What’s the difference between a trade secret claim and a non-compete claim?

A trade secret claim protects specific confidential information, regardless of whether a restrictive covenant exists. A non-compete claim enforces a contractual restriction on where or how a former employee can work. They often overlap—a departing employee who violates a non-compete may also be misappropriating trade secrets—but they are separate legal theories with different elements and remedies. You can pursue both simultaneously.

Related Articles


For guidance specific to your situation, contact Aaron Hall, attorney for business owners, at aaronhall.com or 612-466-0040.