Professional Documents
Culture Documents
A Q&A guide to state law on trade secrets and confidentiality for private employers in
Pennsylvania. This Q&A addresses the state-specific definitions of trade secrets and the
legal requirements relating to protecting them. Federal, local, or municipal law may impose
additional or different requirements. Answers to questions can be compared across a
number of jurisdictions (see Trade Secret Laws: State Q&A Tool).
1. List the laws (statutes and regulations) by name and code number, both
criminal and civil, that your state has adopted governing trade secrets.
Pennsylvania adopted the Pennsylvania Uniform Trade Secrets Act (PUTSA) on April 19,
2004 (12 Pa. C.S.A. §§ 5301 to 5308). It is often referred to as the PUTSA to distinguish
it from the model Uniform Trade Secrets Act.
Pennsylvania also has a criminal trade secret theft statute (18 Pa. C.S.A. § 3930).
Pennsylvania also criminalizes improper use or receipt of trade secrets (3 Pa. C.S.A. §§
5111(d) and 6723(b); 18 Pa. C.S.A. § 3930).
2. Has your state adopted the model Uniform Trade Secrets Act (UTSA)? If so,
please:
Pennsylvania has adopted the model Uniform Trade Secrets Act (UTSA), with slight
modification. It is referred to as the Pennsylvania Uniform Trade Secrets Act (PUTSA) (12
Pa. C.S.A. §§ 5301 to 5308). For an overview of the UTSA, see Practice Note, Protection
of Employers' Trade Secrets and Confidential Information: Trade Secrets.
The PUTSA largely tracks the UTSA's language, though it does expand the UTSA's trade
secret definition to specifically include customer lists and items of "potential value". Unlike
the UTSA, which does not define “willful and malicious", the PUTSA defines “willful and
malicious” to mean “such intentional acts or gross neglect of duty as to evince a reckless
indifference of the rights of others on the part of the wrongdoer, and an entire want of care
so as to raise the presumption that the person at fault is conscious of the consequences
of his carelessness.” (12 Pa. C.S.A. § 5302.)
The PUTSA treats continuing misappropriations as separate violations of law for statutes
of limitations purposes (12 Pa. C.S.A. § 5307; see Heraeus Medical GmbH v. Esschem,
Inc., 927 F.3d 727, 736-37 (3d Cir. 2019)). In comparison, the UTSA treats a continuing
misappropriation as a single claim for purposes of the statute of limitations (12 Pa. C.S.A.
§ 5307).
3. List any common law protections afforded to trade secrets. If common law
protections are afforded to trade secrets, are they preempted by available state
statutes?
• Tort claims.
• Restitutionary claims.
• Criminal remedies, whether or not they are based on trade secret misappropriation.
4. How does your state define a trade secret under each law identified in Question
1 (statute or regulation) and Question 3 (common law)?
The Pennsylvania Uniform Trade Secrets Act (PUTSA) defines a trade secret as
information:
• Including:
• a formula;
• a drawing;
• a pattern;
• a program;
• a device;
• a method;
• a technique; or
• a process.
• not generally known by others who can gain economic value from its
disclosure or use; and
• not readily ascertainable by proper means by others who can gain economic
value from its disclosure or use.
• That is the subject of reasonable efforts under the circumstances to maintain its
secrecy.
Pennsylvania's criminal trade secrets theft statute defines a trade secret as all or any
portion of any:
• Scientific information.
• Technical information.
• Design.
• Process.
• Procedure.
• Formula.
• Improvement.
Further, under the criminal trade secret statute, information must be:
• Valuable.
Pennsylvania's criminal trade secret statute creates a rebuttable presumption that scientific
or technical information is not public knowledge and has not been published if the owner
has taken measures to prevent it from becoming available to unauthorized persons (18
Pa. C.S.A. § 3930(e)).
In Pennsylvania, the two crucial factors for determining whether particular information
constitutes a trade secret are:
• Substantial secrecy.
(Petco, Inc. v. Associated Products, Inc., 880 A.2d 700, 706 (Pa. Super. 2005); Brubaker
Kitchens, Inc. v. Brown, 2006 WL 1193223, at *1 (E.D. Pa. May 04, 2006) (analyzing
Pennsylvania law); Amerex Envntl. Techs., Inc. v. Foster, 2012 WL 6552828, at *5 (W.D.
Pa. Dec. 14, 2012) (analyzing Pennsylvania law).)
The Pennsylvania Uniform Trade Secrets Act (PUTSA) did not substantially alter the
definition of a trade secret, and Pennsylvania courts still refer to the six-factor common
law analysis in determining whether information constitutes a trade secret. The six factors
include:
• The extent to which the information is known by employees and others in the
business.
• How easy or difficult it would be for others to properly acquire or duplicate the
information.
Therefore, while the PUTSA has displaced Pennsylvania's common law for trade secret
misappropriation, the statute has not caused a substantive change in the definition of a
trade secret. (Iron Age Corp. v. Dvorak, 880 A.2d 657, 663 (Pa. Super. 2005); Youtie v.
Macy's Retail Holding, Inc., 626 F. Supp. 2d 511, 522 n.10 (E.D. Pa. 2009) (analyzing
Pennsylvania law).)
• Aptitude.
• Skill.
• Dexterity.
Further, trade secret protection is not available for information that merely summarizes the
industry connections of a principal and business founder because Pennsylvania law does
not extend trade secret status to a person's:
• Industry experience.
Trade Secrets
Courts applying Pennsylvania law have found the following types of information to be trade
secrets under the circumstances present:
• Manufacturing processes and recipes (Bimbo Bakeries USA, Inc. v. Botticella, 613
F.3d 102, 110 (3d Cir. 2010)).
• A chemical product's formula (Harry Miller Corp. v. Mancuso Chems. Ltd., 469 F.
Supp. 2d 303, 311-12 (E.D. Pa. 2007)).
• The substance of unique incentive and rebate programs (EXL Labs., LLC v. Egolf,
2010 WL 5000835, at *5-6 (E.D. Pa., Dec. 7, 2010)).
• Pricing information for products and services (EXL Labs., 2010 WL 5000835, at
*5-6).
• An internet-based marketing tool (Home Line Furniture Indus., Inc. v. Banner Retail
Mktg., 630 F. Supp. 2d 527, 540-41 (E.D. Pa. 2009)).
Courts applying Pennsylvania law found the following types of information were not trade
secrets under the circumstances present:
• Client list information, including client names and telephone numbers, services
performed for the client, and prices charged, because the information was not
proprietary and was available from other sources (Brett Senior & Assocs. v.
Fitzgerald, 2007 WL 2043377, at *6 (E.D. Pa. Jul. 13, 2007)).
• Future business plans and expansion plans that were public knowledge (Select
Med. Corp. v. Hardaway, 2006 WL 859741, at *8 (E.D. Pa. Mar. 24, 2006)).
• A personal contacts list and a calendar that were maintained during employment
but lacked economic value (Fisher Bioservices, Inc. v. Bilcare, Inc., 2006 WL
1517382, at *16-17 (E.D. Pa. May 31, 2006)).
• A list with customer names and contact information that could be easily obtained
through other sources including industry-wide mailing lists or a phone book (Pestco,
Inc. v. Associated Prods., Inc., 880 A.2d 700, 707 (Pa. Super. 2005)).
• A pricing method that uses information a competitor could obtain using legitimate
means by someone with the appropriate skills (WMI Group, Inc. v. Fox, 109 A.3d
740, 753 (Pa. Super. 2015)).
In Project Development Group v. O.H. Materials Corp., the court denied summary
judgment, refusing to hold that, under Pennsylvania law, particular information was not a
trade secret as a matter of law even though the information was readily available in the
industry (766 F. Supp. 1348, 1355 (W.D. Pa. 1991)). The court explained that whether
particular information constitutes a trade secret is an issue of fact, which the fact finder
should resolve after a full presentation of the evidence (766 F. Supp. at 1355; see Bro-Tech
Corp. v. Thermax, Inc., 651 F. Supp. 2d 378, 410 (E.D. Pa. 2009) (analyzing Pennsylvania
law)).
In Pennsylvania, courts determine whether confidential customer lists are a trade secret
on a case-by-case basis (O.D. Anderson, Inc., v. Cricks, 815 A.2d 1063, 1071 (Pa. Super.
2003); Shepherd v. Pittsburgh Glass Works, LLC, 25 A.3d 1233, 1245 (Pa. Super. 2011)).
Not all customer data qualifies for trade secret protection. Pennsylvania courts focus on the
value of the customer list, asking whether the list represents a permanent and exclusive
relationship between customers and the company (MCQ's Enters., Inc. v. Philadelphia
Parking Auth., 2007 WL 127728, at *6 (E.D. Pa. Jan. 11, 2007) (analyzing Pennsylvania
law)). In Pennsylvania, a customer list may constitute a trade secret where:
• The list represents a material investment of the time and money of the business.
(Alturnamats, Inc. v. Harry, 2008 WL 4279814, at *9-10 (W.D. Pa. Sep. 16, 2008) (analyzing
Pennsylvania law).)
Generally, customer lists are denied protection if they are easily generated from:
• Trade journals.
• The customer list was developed over many years through significant efforts.
• The employer viewed the list as highly proprietary and took great pains to protect it.
• The employee handbook indicated that all customer information belonged to the
employer.
• The list could not be removed from the premises without permission.
By contrast, the Alturnamats court discussed a case from before the adoption of the
Pennsylvania Uniform Trade Secrets Act where the Pennsylvania Supreme Court refused
to protect a customer list where the customer's identities were easily ascertainable with
minimal effort and at nominal expense (Alturnamats, 2008 WL 4279814, at *11 (citing Carl
A. Colteryahn Dairy, Inc. v. Schneider Dairy, 203 A.2d 469 (Pa. 1964)).
Courts
Pennsylvania case law before the adoption of the Pennsylvania Uniform Trade Secrets
Act (PUTSA) remains relevant in determining what efforts to maintain secrecy have
been deemed reasonable. Before the PUTSA's adoption in 2004, Pennsylvania courts
traditionally used six factors to determine whether information constitutes a trade secret
(see Question 5). Since adoption of the PUTSA, Pennsylvania courts continue to refer to
these factors (Iron Age, 880 A.2d at 663). One of the common law factors evaluates the
extent of the employer's measures to guard the secrecy of the trade secret information,
which is mirrored by the PUTSA's requirement of making reasonable efforts to keep
information secret (12 Pa. C.S.A. § 5302).
Construing the PUTSA, a federal court analyzing Pennsylvania law found that an employer
made reasonable efforts to protect the secrecy of specialized computer software where:
• The employer purchased hardware against software piracy (HASP) keys which,
when properly installed, prevent reverse engineering.
• The employer arranged to have the HASP keys sent to the defendant employee for
installation.
• The employer reasonably believed that the HASP keys had been installed.
• There was evidence that the employee knew that their employer owned the
software and it should be treated as a trade secret.
A federal court also found that a manufacturer made reasonable efforts under
Pennsylvania law to protect the secrecy of its unique web-based marketing strategy
information where:
A tour company's customer list, containing valuable information about each customer's
travel frequency and destinations, was adequately secured when:
• The company immediately demanded return of their lists from departing employees.
(A.M. Skier Agency, Inc. v. Gold, 747 A.2d 936, 940-41 (Pa. Super. 2000).)
• It maintained only one written copy of the recipe which it stored off the premises.
• The employees only learned the part of recipe relevant to their manufacturing
duties.
• The manufacturer only revealed the entire recipe to a few key employees.
(Christopher M's Hand Poured Fudge, Inc. v. Hennon, 699 A.2d 1272, 1275 (Pa. Super.
1999).)
Statutes or Regulations
There are no statutes or regulations addressing what are considered reasonable steps to
maintain secrecy of a trade secret.
Analyzing the Pennsylvania Uniform Trade Secrets Act (PUTSA), the US Court of Appeals
for the Third Circuit summarized the requirements to prove trade secret misappropriation
(Bimbo, 613 F.3d at 109). Trade secret misappropriation occurs when a person:
• Acquires the trade secret under circumstances giving rise to a duty to maintain its
confidentiality.
• Acquisition.
• Disclosure.
• Use.
Acquisition as Misuse
A trade secret can be misappropriated where the acquirer knew or had reason to know that
the trade secret was acquired by improper means (see Question 9: Definition of Improper
Means) (12 Pa. C.S.A. § 5302).
Disclosure or use of another's trade secret without express or implied consent can be
misappropriation where the person:
• At the time of disclosure or use, knew or had reason to know that the trade secret
was:
• derived from a person who owed a duty to maintain its secrecy or limit its use.
• Theft.
• Bribery.
• Misrepresentation.
Under the Pennsylvania Uniform Trade Secrets Act (PUTSA) any person may be held
liable for trade secret misappropriation. The PUTSA defines a person to include:
• A natural person.
• A corporation.
• A partnership.
• A joint venture.
• An association.
• A trust.
• A business trust.
• An estate.
The elements listed in Question 9 are necessary to prove misappropriation of the trade
secret against both individuals and commercial entities.
Defenses
11. For any law identified in Question 1 (statutes and regulations) or Question 3
(common law), what defenses are available to defend against claims under the
statute or common law?
• Failure to make reasonable efforts to protect the trade secret (see Question 8).
Pennsylvania's criminal trade secret theft statute provides a complete defense where the
defendant demonstrates that the trade secret information was either:
• Rightfully known.
Statute of Limitations
12. For any law identified in Question 1 (statutes and regulations) or Question
3 (common law), please identify the relevant statute of limitations for bringing a
claim.
• Is discovered.
Under Pennsylvania's criminal trade secret theft statute, the statute of limitations for
bringing a prosecution is five years (18 Pa. C.S.A. § 3930(a), (b); 42 Pa. C.S.A. § 5552(b)
(1)). The statute of limitations accrues for criminal prosecutions the day after the crime is
committed (42 Pa. C.S.A. § 5552(d)).
13. What other claims, statutory or common law, can a plaintiff bring in your state
against a defendant in the event of wrongful acquisition, misuse, or disclosure
of a trade secret?
In addition to a claim under the Pennsylvania Uniform Trade Secrets Act (PUTSA), a
plaintiff can also remedy wrongful acquisition, misuse, or disclosure of a trade secret with
claims for:
• Other civil remedies that are not based on trade secret misappropriation.
Remedies
14. For any law identified in Question 1 (statutes and regulations) and Question
3 (common law), please describe the potential relief available to plaintiffs.
Under the Pennsylvania Uniform Trade Secrets Act (PUTSA), potential relief may include:
• Exemplary damages. If willful and malicious misappropriation exists, the court may
award exemplary damages of no more than twice the monetary damages awarded
(12 Pa. C.S.A. § 5304(b)).
• Attorneys' fees. A court may award the prevailing party reasonable attorneys' fees
if:
A conviction for violating Pennsylvania's criminal trade secret theft statute may result in
incarceration (see Said v. Donate, 2008 WL 5246035, at *2 (E.D. Pa. Dec. 15, 2008)).
Contractual Protections
15. What factors do courts in your state consider when assessing the
enforceability of a nondisclosure or confidentiality agreement?
• The restrictions imposed by the covenant are reasonably necessary for the
employer's protection.
(Quaker Chem. Corp. v. Varga, 509 F. Supp. 2d 469, 476 (E.D. Pa. 2007).)
• Trade secrets.
• Confidential information.
• Good will.
For more information on non-compete agreements in Pennsylvania, see State Q&A, Non-
Compete Laws: Pennsylvania.
Miscellaneous
16. What common law duties are recognized in your state that prohibit employees
from disclosing employer information even absent an independent contractual
obligation?
In Pennsylvania, agents owe their principals a duty of loyalty. Pennsylvania has adopted
various sections of the Restatement (Second) of Agency. Under the Restatement, an
agent is subject to a duty not to use or communicate information confidentially given by
the principal or acquired during the agency, unless the information is general knowledge.
Agents are under a duty not to use or communicate this information to either compete with
or otherwise injure their principals. (Tan-Line Sun Studios, Inc. v. Bradley, 1986 WL 3764,
at *9-10 (E.D. Pa. Mar. 25, 1986).)
Employees in Pennsylvania also owe their employers a fiduciary duty of loyalty. To prevail
on a claim of breach of the duty of loyalty, an employer must prove that, in all matters
related to their employment, its employee negligently or intentionally failed to act both in:
• In good faith.
Under this duty, an employee may not use their employer's trade secrets while making
preparations to leave or otherwise engage in conduct that damages the employer.
(Latuszewski v. Valic Fin. Advisors, Inc., 2007 WL 4462739, at *18 (W.D. Pa. Dec. 19,
2007).)
The Pennsylvania Uniform Trade Secrets Act (PUTSA) explicitly states that actual or
threatened misappropriation may be enjoined (12 Pa. C.S.A. § 5303(a)). In cases
of threatened trade secret misappropriation, Pennsylvania courts apply the inevitable
disclosure doctrine (Bimbo, 613 F.3d at 110-11) (analyzing Pennsylvania law)).
Whether, and to what extent, to grant injunctive relief in a trade secrets case depends
on a highly fact-specific inquiry. A court may enjoin a defendant from beginning new
employment if the facts of the case demonstrate a substantial threat of trade secret
misappropriation. (Bimbo, 613 F.3d at 113.) Specifically, Pennsylvania courts affirmed a
preliminary injunction against a former high-level employee who had access to their
former employer's trade secrets, enjoining them from working for a competitor to the
extent that their proposed employment threatened to lead to trade secret misappropriation
(Bimbo, 613 F.3d at 113-14).
By contrast, in Colorcon Inc. v. Lewis, the court denied a former employer's request
for injunctive relief under the PUTSA because the employer was unlikely to succeed
in demonstrating that its former employee's new job was likely to result in trade secret
disclosure. Some of the factors the Colorcon court relied on were:
• The former employee credibly stated that they did not recall the trade secret
formulas.
• The former employee's new employer took steps to ensure that disclosure would
not occur.
• There was no evidence the former employee was privy to executive-level decision-
making.
• There was no credible evidence showing the former employee took copies of
confidential materials.
• There was no indication that the former employee intended to use their former
employer's trade secrets at their new job.
(Colorcon Inc. v. Lewis, 792 F. Supp. 2d 786, 803-04 (E.D. Pa. May 31, 2011) (analyzing
Pennsylvania law).)
For general information on the inevitable disclosure doctrine, see Practice Note, Non-
Compete Agreements with Employees: Protection in the Absence of Non-Competes:
Inevitable Disclosure.
18. What, if anything, have courts held regarding trade secret misappropriation
claims involving memorizing trade secrets rather than the taking of tangible
representations of information?
In a case applying the common law, the Pennsylvania Supreme Court stated that trade
secret information concerning customers was entitled to protection regardless of whether
the information was in a written list or committed to memory (Morgan's Home Equip. Corp.
v. Martucci, 136 A.2d 838, 843 (Pa. 1957)).
More recently, a federal court analyzing Pennsylvania law explained in dicta that an
employee's nondisclosure agreement with their employer prevented them from disclosing
confidential information or trade secrets to their employer's competitor, whether they had
copied the information to a storage device or memorized it (Quaker, 509 F. Supp. 2d at
483-84).
One federal court analyzing Pennsylvania law denied a motion to dismiss a conversion
claim, reasoning that to preempt the claim at that stage could potentially leave the plaintiff
with no remedy if the information at issue was later found to be stolen, but not a trade
secret (Cenveo Corp. v. Slater, 2007 WL 527720, at *3-5 (E.D. Pa. Feb. 12, 2007)). Another
court used similar reasoning to deny a motion to dismiss claims of breach of fiduciary duty,
breach of duty of loyalty, unjust enrichment, and unfair competition (Youtie, 626 F. Supp.
2d at 521-23) (analyzing Pennsylvania law)).
A party's claims based not on allegations of trade secret misappropriation but instead
based on allegations of separate wrongdoing survived a motion to dismiss based on
preemption (Weiss v. Fiber Optic Designs, Inc., 2007 WL 3342605, at *1 (E.D. Pa. Nov.
9, 2007) (analyzing Pennsylvania law)).
In essence, the Weiss court refused to dismiss the claims because it would require the
court to determine too early in the litigation that trade secrets existed and that they were
misappropriated. The claims surviving the motion to dismiss were:
• Unfair competition.