Can Trade Secrets Be Protected During Executive Transitions?

Can Trade Secrets Be Protected During Executive Transitions?

Simon Glairy is a preeminent figure in the insurance litigation landscape, known for his sharp analysis of how technology intersects with corporate risk. With years of experience navigating the complex world of Insurtech and executive transitions, he has become a go-to expert for companies looking to protect their most valuable intellectual property. Our conversation today explores the high-stakes world of trade secret theft, specifically looking at how the movement of a single executive can jeopardize decades of proprietary data and market strategy.

When an executive frames a departure as retirement but immediately joins a competitor, how does that shift the risk assessment for the former employer? What specific internal protocols should be triggered to monitor the movement of sensitive items like pricing playbooks or financial forecasts during those final weeks?

The moment a “retirement” transforms into a jump to a direct competitor, the risk profile shifts from a routine offboarding to a potential high-level security breach. In the insurance world, the final weeks of an executive’s tenure are the most dangerous because they still possess “system access credentials” and the trust of their peers. Companies must immediately trigger a “silent audit” of the departing employee’s digital footprint, looking for anomalies like the attachment of unauthorized USB devices or large-scale file transfers to personal accounts. We often see executives attempting to exfiltrate “pricing playbooks” and “financial forecasts” under the guise of finishing up projects, so it is vital to freeze their ability to download bulk data the moment notice is given. Proactive firms will also cross-reference their Go-To-Market strategies with any recent logins to ensure that future growth plans aren’t being quietly studied for the benefit of a rival.

Sales leaders often handle sensitive data like Go-To-Market strategies and system access credentials. If a company device is returned wiped or an unauthorized USB drive was used, what forensic steps are necessary to identify what was taken, and how do firms use this evidence to establish trade secret theft?

When a laptop comes back wiped, it’s a massive red flag that screams consciousness of guilt, and forensic investigators must work backward to reconstruct the “digital breadcrumbs.” We use deep-level forensic imaging to identify file metadata and registry entries that show exactly when a USB drive was plugged in and which specific files, such as “customer lists” for key territories like Houston or Kansas, were accessed. Even if the local files are deleted, we can often find traces in the cloud sync logs or temporary “link files” that prove the executive was viewing confidential training presentations just minutes before their departure. This forensic trail is the backbone of a trade secret claim, as it demonstrates not just that the data is gone, but that there was an intentional, unauthorized “grabbing” of assets meant to give the new employer an unfair head start.

New employers sometimes acknowledge non-compete covenants as valid before later declaring them unenforceable. How does this reversal impact the legal leverage of the original company, and what steps should a firm take to protect regional customer lists when an executive moves into a leadership role at a rival?

A new employer’s pivot from acknowledging a covenant to calling it “unenforceable” is a classic tactical maneuver, but it often backfires by creating a written record of their initial awareness of the legal boundaries. This flip-flopping provides the original company with significant leverage, as it suggests the new employer is acting in bad faith or actively encouraging a breach of contract. To protect regional customer lists, a firm must act aggressively by seeking an immediate injunction to prevent the executive from leveraging those specific dealer relationships. It’s not just about the names on the list; it’s about the “dealer-specific pricing” and historical performance data that allow a rival to underbid the original insurer with surgical precision.

In the competitive insurance and warranty market, why are reinsurance models and dealer-specific pricing spreadsheets considered such high-value assets? How can a company demonstrate that these documents provide a distinct competitive advantage, and what are the common hurdles in recovering damages under the Defend Trade Secrets Act?

In the auto warranty sector, the profit margins are razor-thin, and “reinsurance models” are the secret sauce that determines how much risk a company can actually afford to carry. A pricing spreadsheet isn’t just a list of numbers; it represents years of actuarial data and proprietary algorithms that tell a firm exactly how to price a vehicle service contract for a specific dealership. To win under the Defend Trade Secrets Act, a company must prove they took “reasonable measures” to keep this information secret, such as using encrypted servers and explicit confidentiality agreements. The biggest hurdle is often quantifying the damages—you have to show exactly how much revenue was lost or how much the defendant was “unjustly enriched” by using your stolen playbooks rather than building their own from scratch.

Seeking a court-ordered one-year ban on an executive’s new employment is an aggressive legal move. What specific criteria must be met to convince a judge this is necessary, and what are the logistical challenges of performing a forensic sweep of a competitor’s email accounts and storage media?

To secure a one-year ban, a company must convince a judge that the executive cannot perform their new role without “inevitably disclosing” the trade secrets they possess. Judges look for evidence of deceptive behavior, such as a “retirement” announcement that masks a move to a leadership role at a rival, to justify such a restrictive remedy. The logistical challenge of a “forensic sweep” of a competitor’s systems is immense, as it requires strict protocols to ensure that only the stolen files are identified without exposing the competitor’s own legitimate trade secrets. It usually involves a neutral third-party expert who acts as a “special master” to filter the data, ensuring the process doesn’t turn into a fishing expedition that violates the privacy of the rival firm’s other employees.

What is your forecast for trade secret litigation in the insurance and finance sectors?

I predict we will see a sharp increase in these cases as the “war for talent” intensifies and the mobility of data makes it easier than ever for an executive to carry an entire career’s worth of intellectual property in their pocket. As firms move toward more sophisticated AI-driven risk assessment, the value of the underlying training data and pricing models will only grow, making the theft of even a single spreadsheet a multi-million dollar liability. Companies will likely move away from broad non-competes, which are facing regulatory headwinds, and instead lean heavily on the Defend Trade Secrets Act to lock down their proprietary assets. We are entering an era where the “digital forensics” of an exit will be just as standard as the exit interview itself, with every departing leader being viewed through a lens of potential risk.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later