This article originally appeared in the April 27, 2009 Connecticut Law Tribune. 

The Economic Espionage Act ("EEA"), 18 U.S.C. §§ 1831-39, gives companies another tool in the fight against misappropriation of trade secrets to "adopt a national scheme to protect U.S. proprietary economic information" and to combat the rising tide of espionage against and threats to corporate trade secrets. It criminalizes misappropriation of trade secrets.

The EEA creates a crime for the misappropriation of a trade secret to the economic benefit of anyone other than the trade secret owner generally, or specifically a foreign government. For example, in June 2008, a former Chinese national who admitted he tried to sell fighter pilot training software to the Chinese navy was sentenced to two years in prison. See United States v. Meng, No. 04-CR-20216, slip. op. (N.D. Cal. June 18, 2008). The EEA also prohibits "attempts" and "conspiracies" to commit economic espionage.

The standard definitions of trade secrets apply, as do the rules that the owner must have taken measures to keep the information secret, and the information must derive independent economic value from not being known and not being readily ascertainable through proper means.

The penalties that may be imposed under the EEA are severe. An individual convicted of theft of a trade secret under this statute for economic espionage with a foreign government, instrumentality or agent faces a maximum sentence of 15 years in prison and/or a fine up to $500,000. A corporation or other organization held in violation of foreign espionage is subject to a maximum fine of $10 million. In cases of trade secret conversion in interstate or foreign commerce for economic benefit, a person faces a fine and/or 10 years in prison, and a corporation can be fined up to $5 million.

Special Features

The EEA requires the court to enter orders to preserve the confidentiality of the trade secret in any proceeding under the act. Without that, the owner of a trade secret may be reluctant to cooperate in an EEA prosecution for fear of exposing the trade secret to public view.

Additionally, the EEA provides for criminal forfeiture of "any property constituting, or derived from, any proceeds the person obtained, directly or indirectly," from the theft of the trade secret. Additionally, "any of the person's [or organization's] property used . . . to commit or facilitate the commission [of the offense]" may also be forfeited. Although the property is forfeited to the United States, the victim should seek restitution from the proceeds of the forfeiture.

If a party resides in the United States, but commits the act of espionage in a foreign country, that act of espionage is subject to the EEA . Also, if a foreign corporation sells a product containing a trade secret in the United States, it may be prosecuted under the EEA as long as the misappropriation occurred in the United States.

The trade secret owner must weigh the benefits and risks of a prosecution before requesting the government to commence a case. For example, a prosecution shows competitors that the owner of the trade secret is serious about protecting its proprietary and confidential information. Conversely, in an EEA prosecution, the owner of the trade secret loses control of the case to the government, which may not have the same interests. Additionally, the criminal defendant may be entitled to production of the trade secret as part of discovery, subject to a court protective order preserving confidentiality.

Because the trade secret owner relies on the U.S. attorney's office's willingness to prosecute, it is important to consider the questions that the government may ask in deciding whether to commence a case under the EEA. First, what was the adequacy of the security measures? Second, what kind of information was misappropriated? It is likely that the government will be more interested in pursuing a case involving scientific or research information because it may have longer lasting value. (A marketing plan may have no value by the time a case proceeds to trial.)

Third, is there hard evidence of misappropriation, particularly physical evidence or admissions? Fourth, is the trade secret owner willing to cooperate fully with the government? Fifth, does the defendant have a strong defense to the action? Sixth, what is the timing of the referral? In some cases, it may be better to report the theft immediately, while in other instances it may be wise to conduct a full, private investigation before contacting the U.S. attorney's office. Seventh, does the trade secret have value and can it be documented? Finally, does the victim have the resources to pursue a civil remedy?


A defendant to an action brought under the EEA has the three traditional defenses used in trade secret actions: (1) independent parallel development of the trade secret; (2) reverse engineering; and (3) general knowledge, skills or experience. See United States v. Hsu, 155 F.3d 189, 196-97 (3d Cir. 1998).

Representative Cases

In United States v. Lange, 312 F.3d 263 (7th Cir. 2002), the defendant's conviction under the EEA was upheld over his denial that the computer data he stole from his former employer and attempted to sell to a competitor met the statutory definition of "trade secret." The court held that the former employer took reasonable measures to keep the computer data secret, including storing all of the data in a room protected by a special lock, alarm system, motion detector; keeping the number of copies and employees' access thereto limited; and dividing its work among several vendors to ensure that no vendor could replicate the product. See also United States v. Four Pillars Enterprise Co., No. 06-3297, 2007 WL 3244034 (6th Cir. Oct. 30, 2007) (The defendant was convicted of attempt and conspiracy to commit theft of trade secrets in violation of the EEA for scheme to obtain confidential and proprietary information from employer).

Back to Trade Secrets & Employee Mobility Blog

Search This Blog

Blog Editors

Related Services



Jump to Page


Sign up to receive an email notification when new Trade Secrets & Employee Mobility posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.