
A debate is growing within the trade secret community about the scope of information that should be protected–specifically, confidential information that does not rise to the level of a trade secret. This debate is largely between employers and their counsel who want to have every available tool to protect all of their information, and those who believe existing trade secret law provides adequate protection and therefore, information that doesn’t meet that standard isn’t worthy of protection (hence, the derogatory moniker “mere confidential information”). On October 12, 2023, in Hanneman Family Funeral Home & Crematorium v. Orians, the Ohio Supreme Court addressed this issue as well as another noteworthy issue–whether customer information shared with the government can qualify as a trade secret. But as a concurring opinion by Justice Patrick Fischer persuasively argues, the Supreme Court passed up on an opportunity to squarely decide the issue of whether “mere confidential information” should be preempted (and therefore not protectable), a ruling that would be in line with the majority of other states holding the UTSA prohibits claims seeking protection for information that doesn’t rise to the level of a trade secret. Continue Reading Ohio’s Supreme Court Ducks the Question of Whether “Mere Confidential Information” Is Protectable

“It’s all in your head but I own it anyway.” It’s a tough argument to make, let alone swallow, and, fortunately, it has been recently rejected by two federal courts in cases that follow an increasingly common fact pattern: an employee abides by their restrictive covenant but goes on to compete against their former employer after the covenant expires. Fearing the competition, the employer pursues a trade secrets claim, arguing that the employee will inevitably disclose its trade secrets or that the employee has memorized and is therefore misappropriating the trade secrets. Or it involves a similarly-attenuated fact pattern: the employer has no restrictive covenant at all and there is no evidence of tangible misappropriation (i.e., no evidence of thumbdrives or downloading, no Dropbox or GoogleDoc dumps, nor emailed documents to personal email accounts), but it relies on a trade secret claim that an employee must still be using those trade secrets because they are successfully competing.
