{"id":849,"date":"2026-04-26T18:10:09","date_gmt":"2026-04-26T12:40:09","guid":{"rendered":"https:\/\/tmzon.com\/blog\/?p=849"},"modified":"2026-04-26T18:10:10","modified_gmt":"2026-04-26T12:40:10","slug":"trade-secret-india","status":"publish","type":"post","link":"https:\/\/tmzon.com\/blog\/trade-secret-india\/","title":{"rendered":"Trade Secret in India \u2014 Protection, Law and How to Secure It"},"content":{"rendered":"\n<p>A trade secret in India is commercially valuable confidential information \u2014 a formula, algorithm, process, customer list, business strategy, or know-how \u2014 that derives its value from being kept secret, and which the owner takes reasonable steps to protect. Unlike patents, trademarks, or copyrights, <strong>India has no dedicated statute for trade secrets<\/strong>. Protection exists through a patchwork of contract law, common law principles of breach of confidence, equity, and related statutes \u2014 and has been built largely through court judgments.<\/p>\n\n\n\n<p>The <strong>22nd Law Commission of India<\/strong> recommended dedicated legislation in its <strong>289th Report (March 2024)<\/strong>, along with a draft <strong>Protection of Trade Secrets Bill, 2024<\/strong> \u2014 but as of April 2026, this Bill has not been enacted into law. India remains one of the few major economies without a standalone trade secrets statute.<\/p>\n\n\n<style>.kb-table-of-content-nav.kb-table-of-content-id849_318c69-31 .kb-table-of-content-wrap{padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-sm, 1.5rem);}.kb-table-of-content-nav.kb-table-of-content-id849_318c69-31 .kb-table-of-contents-title-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id849_318c69-31 .kb-table-of-contents-title{font-weight:regular;font-style:normal;}.kb-table-of-content-nav.kb-table-of-content-id849_318c69-31 .kb-table-of-content-wrap .kb-table-of-content-list{font-weight:regular;font-style:normal;margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-right:0px;margin-bottom:0px;margin-left:0px;}<\/style>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why Trade Secrets Matter More Than Ever in India<\/h2>\n\n\n\n<p>India became the world&#8217;s fourth-largest economy in 2025. Its fastest-growing sectors \u2014 technology, pharmaceuticals, fintech, manufacturing, AI \u2014 all run on information assets that are either impossible or commercially unwise to patent.<\/p>\n\n\n\n<p>Consider why a business might choose trade secret protection over a patent:<\/p>\n\n\n\n<p><strong>Coca-Cola&#8217;s recipe has never been patented.<\/strong> Had it been patented, it would have expired after 20 years and become public. As a trade secret, it has been commercially protected for over 130 years.<\/p>\n\n\n\n<p><strong>Software algorithms, AI training datasets, customer pricing models, supply chain logistics<\/strong> \u2014 many of these cannot be patented (particularly under India&#8217;s Section 3(k) exclusion for algorithms and computer programmes per se) and are far more valuably protected as trade secrets, provided proper confidentiality measures are maintained.<\/p>\n\n\n\n<p><strong>Manufacturing processes<\/strong> that are not patented remain indefinitely protected as trade secrets, so long as secrecy is maintained \u2014 unlike a patent that expires in 20 years and then enters the public domain, available to every competitor.<\/p>\n\n\n\n<p>The problem is that India&#8217;s legal framework for enforcing trade secret protection, while improving, remains fragmented and uncertain. Understanding what currently protects your confidential information \u2014 and what does not \u2014 is the starting point for every business.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The Three Requirements Under TRIPS Article 39<\/h2>\n\n\n\n<p>India is a signatory to the TRIPS Agreement (Trade-Related Aspects of Intellectual Property Rights). <strong>Article 39.2 of TRIPS<\/strong> sets the minimum standard for trade secret protection that all WTO member states \u2014 including India \u2014 must provide.<\/p>\n\n\n\n<p>For information to qualify as a trade secret and receive legal protection, it must satisfy three cumulative criteria:<\/p>\n\n\n\n<p><strong>1. Secrecy<\/strong> \u2014 the information must not be generally known or readily accessible to persons within the relevant industry. Information that is publicly available cannot be a trade secret. Secrecy is destroyed the moment information enters the public domain \u2014 whether through a leak, a publication, a filing, or a public disclosure.<\/p>\n\n\n\n<p><strong>2. Commercial value<\/strong> \u2014 the information must have commercial value <em>because<\/em> of its secrecy. The value arises from the competitive advantage the secret provides. A formula that gives a manufacturer a cost edge, a customer database that enables targeted sales, an algorithm that drives a pricing advantage \u2014 all derive commercial value from the fact that competitors do not have access to them.<\/p>\n\n\n\n<p><strong>3. Reasonable steps to maintain secrecy<\/strong> \u2014 the owner must have taken reasonable steps under the circumstances to keep the information secret. This is the criterion most often failed in litigation. Courts routinely deny protection to businesses that claim trade secret rights over information that they themselves treated casually \u2014 sharing with employees without NDAs, leaving on shared servers without access controls, not classifying documents as confidential.<\/p>\n\n\n\n<p>What constitutes &#8220;reasonable steps&#8221; is assessed relative to the size of the business, the nature of the information, and the commercial context. A startup&#8217;s reasonable steps are different from a pharmaceutical multinational&#8217;s \u2014 but some active, documented effort to maintain secrecy is required from everyone.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">India&#8217;s Current Legal Framework \u2014 The Patchwork<\/h2>\n\n\n\n<p>In the absence of a dedicated statute, trade secret protection in India is assembled from the following sources:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Indian Contract Act, 1872 \u2014 NDAs and Confidentiality Clauses<\/h3>\n\n\n\n<p><strong>Section 27 of the Indian Contract Act<\/strong> provides that agreements in restraint of trade are void \u2014 but courts have consistently held that confidentiality obligations protecting genuine trade secrets are not agreements in restraint of trade and are enforceable.<\/p>\n\n\n\n<p>An NDA (Non-Disclosure Agreement) or confidentiality clause in an employment contract, vendor agreement, or investor term sheet is the primary contractual mechanism for trade secret protection in India.<\/p>\n\n\n\n<p><strong>What a valid NDA should cover:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A clear definition of what constitutes &#8220;Confidential Information&#8221; \u2014 specific and not so broadly drafted that courts dismiss it<\/li>\n\n\n\n<li>The purpose for which information is disclosed<\/li>\n\n\n\n<li>Obligations of the recipient \u2014 not to use for any purpose other than the disclosed purpose, not to disclose to third parties<\/li>\n\n\n\n<li>Carve-outs for information that is already in the public domain, independently developed, or received from a third party without restriction<\/li>\n\n\n\n<li>Term of confidentiality \u2014 whether obligations survive termination of the underlying relationship<\/li>\n\n\n\n<li>Remedies for breach \u2014 express right to seek injunction, damages, and account of profits<\/li>\n<\/ul>\n\n\n\n<p><strong>Section 10<\/strong> of the Contract Act confirms that all agreements made with free consent, between competent parties, for lawful consideration and object, are contracts \u2014 providing the general enforceability framework for NDAs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Common Law \u2014 Breach of Confidence<\/h3>\n\n\n\n<p>Indian courts have recognised the equitable doctrine of <strong>breach of confidence<\/strong> \u2014 imported from English common law \u2014 as an independent cause of action for protection of confidential information, even in the absence of an express contract.<\/p>\n\n\n\n<p>The foundational principle is simple: where information is shared in circumstances that import an obligation of confidence, the recipient cannot use it to the detriment of the person who shared it.<\/p>\n\n\n\n<p><strong>Key judgment \u2014 Zee Telefilms Ltd. v Sundial Communications Pvt. Ltd. (Bombay High Court, 2003):<\/strong> The Court held that the obligation of confidence applies not only to the original recipient of confidential information but also to <strong>third parties who knowingly receive it<\/strong>. This extended the reach of breach of confidence protection significantly \u2014 a company that receives confidential information from a departing employee (with knowledge that it is confidential) is liable alongside that employee.<\/p>\n\n\n\n<p><strong>Key judgment \u2014 Burlington Home Shopping Pvt. Ltd. v Rajnish Chibber (Delhi High Court, 1995):<\/strong> A former employee who had access to the company&#8217;s customer contact database started a competing business and used the database. The Delhi High Court held that the database was a trade secret developed through the company&#8217;s skill and labour, and restrained the defendant from using it. This is the leading authority on customer lists and databases as protectable trade secrets in India.<\/p>\n\n\n\n<p><strong>Key judgment \u2014 Bombay Dyeing and Manufacturing Co. Ltd. v Mehar Karan Singh (Bombay High Court, 2010):<\/strong> The court articulated the key elements of a protectable trade secret \u2014 the information must not be generally known, it must have commercial value, and it must have been subject to reasonable efforts by the owner to keep it secret. The court also clarified the limits \u2014 a defendant who had attended board meetings could not be restrained from disclosing information that was in his general knowledge or not specifically confidential.<\/p>\n\n\n\n<p><strong>Key judgment \u2014 Niranjan Shankar Golikari v Century Spinning &amp; Manufacturing (Supreme Court, 1967):<\/strong> The Supreme Court upheld post-employment confidentiality obligations restraining former employees from disclosing trade secrets \u2014 while drawing a clear line between protecting specific confidential information (permissible) and preventing a person from using their general skill and knowledge in a competing role (not permissible). This remains the foundational authority on employee trade secret obligations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Information Technology Act, 2000<\/h3>\n\n\n\n<p><strong>Section 43<\/strong> of the IT Act provides civil liability for unauthorised access to computer systems and downloading or copying data. Where trade secrets are stored in electronic form \u2014 which is almost universal today \u2014 the IT Act provides an additional cause of action for data theft.<\/p>\n\n\n\n<p><strong>Section 66<\/strong> makes unauthorised access to a computer resource with intent to cause damage a criminal offence. Where an employee copies proprietary data, algorithms, source code, or customer databases to a USB drive or cloud storage before leaving, this provision may apply.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Bharatiya Nyaya Sanhita (BNS), 2023<\/h3>\n\n\n\n<p>The Bharatiya Nyaya Sanhita \u2014 which replaced the Indian Penal Code in 2024 \u2014 includes provisions on <strong>criminal breach of trust<\/strong> (Section 316) and <strong>cheating<\/strong> (Section 318) which have been applied in trade secret cases involving deliberate misappropriation of confidential information entrusted to an employee or business partner.<\/p>\n\n\n\n<p>Criminal breach of trust requires showing that the defendant was entrusted with property (including information) and dishonestly misappropriated it. Courts have applied this to cases where employees deliberately extracted and used employer data for competing purposes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Securities and Exchange Board of India (SEBI) Act<\/h3>\n\n\n\n<p>For listed companies, the SEBI (Prohibition of Insider Trading) Regulations impose specific obligations to protect price-sensitive unpublished information. While primarily a securities law mechanism, these regulations effectively protect certain categories of business secrets \u2014 financial projections, M&amp;A plans, new product launches \u2014 as a matter of regulatory compliance.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The Protection of Trade Secrets Bill, 2024 \u2014 What It Proposes<\/h2>\n\n\n\n<p>The 22nd Law Commission of India issued its <strong>289th Report: Trade Secrets and Economic Espionage<\/strong> on 5 March 2024, along with a draft <strong>Protection of Trade Secrets Bill, 2024<\/strong>.<\/p>\n\n\n\n<p>As of April 2026, the Bill has not been enacted. It remains under consideration and its future legislative path is uncertain. However, it represents the most current statement of where Indian trade secrets law is headed \u2014 and businesses should understand its key proposals.<\/p>\n\n\n\n<p><strong>Proposed definition:<\/strong> A trade secret is defined broadly, in line with TRIPS Article 39 \u2014 information that is secret, has commercial value because of its secrecy, and has been subject to reasonable steps to maintain its secrecy. The definition is deliberately open-ended to accommodate emerging industries including AI, biotechnology, and data-driven businesses.<\/p>\n\n\n\n<p><strong>Not a property right:<\/strong> The Bill expressly clarifies that trade secrets are not a property right \u2014 they cannot be registered, are not monopoly rights, and do not confer exclusivity in the way a patent does. They are protected through principles of unfair competition, misappropriation, and breach of confidence.<\/p>\n\n\n\n<p><strong>Civil remedies proposed:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Injunctive relief \u2014 interim and permanent<\/li>\n\n\n\n<li>Damages \u2014 including exemplary damages for deliberate misappropriation<\/li>\n\n\n\n<li>Disgorgement of profits<\/li>\n\n\n\n<li>Destruction or delivery up of materials embodying the trade secret<\/li>\n<\/ul>\n\n\n\n<p><strong>Criminal liability:<\/strong> The Bill is clear that criminal sanctions are not being introduced specifically for trade secret misappropriation \u2014 existing criminal law (BNS provisions on criminal breach of trust) is considered adequate. This is a deliberate design choice distinguishing India from the US (which has criminal provisions under the Economic Espionage Act) and the EU.<\/p>\n\n\n\n<p><strong>Key exceptions proposed:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reverse engineering<\/strong> \u2014 obtaining the same information through legitimate analysis of a publicly available product is not misappropriation<\/li>\n\n\n\n<li><strong>Independent development<\/strong> \u2014 independently arriving at the same information without access to the secret is not misappropriation<\/li>\n\n\n\n<li><strong>Whistleblower protection<\/strong> \u2014 disclosures made in good faith to report wrongdoing are protected<\/li>\n\n\n\n<li><strong>General skill and knowledge<\/strong> \u2014 employees cannot be prevented from using the skills, knowledge, and experience they acquired in normal professional practice \u2014 only specific confidential information beyond general expertise is protectable<\/li>\n<\/ul>\n\n\n\n<p><strong>Interface with restraint of trade:<\/strong> The Bill is explicit that it does not validate non-compete clauses. Post-employment non-compete agreements remain unenforceable in India under Section 27 of the Contract Act. The Bill protects specific trade secrets \u2014 not the employee&#8217;s general freedom to work.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Trade Secret vs Patent \u2014 When to Choose Which<\/h2>\n\n\n\n<p>This is one of the most strategically important decisions in IP law and one that most guides treat superficially.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Factor<\/th><th>Trade Secret<\/th><th>Patent<\/th><\/tr><\/thead><tbody><tr><td><strong>Duration<\/strong><\/td><td>Indefinite \u2014 as long as secrecy is maintained<\/td><td>20 years from filing date<\/td><\/tr><tr><td><strong>Protection starts<\/strong><\/td><td>Immediately \u2014 no registration required<\/td><td>Only after grant (2\u20136 years)<\/td><\/tr><tr><td><strong>Public disclosure<\/strong><\/td><td>No disclosure required or permitted<\/td><td>Full disclosure mandatory<\/td><\/tr><tr><td><strong>Scope of protection<\/strong><\/td><td>Only against misappropriation \u2014 independent development by a third party is not infringement<\/td><td>Absolute monopoly \u2014 even independent development infringes<\/td><\/tr><tr><td><strong>Reverse engineering<\/strong><\/td><td>Not prevented \u2014 if someone reverse-engineers the product, secrecy is lost<\/td><td>Fully protected \u2014 reverse engineering of a patented product is infringement<\/td><\/tr><tr><td><strong>Registration<\/strong><\/td><td>No registration \u2014 no official record<\/td><td>Formal registration required<\/td><\/tr><tr><td><strong>Cost<\/strong><\/td><td>Low ongoing cost (NDAs, access controls, training)<\/td><td>Significant \u2014 filing, prosecution, renewal, and enforcement fees<\/td><\/tr><tr><td><strong>Section 3(k) exclusion<\/strong><\/td><td>Not applicable \u2014 algorithms can be trade secrets<\/td><td>Algorithms are excluded from patent protection in India<\/td><\/tr><tr><td><strong>Risk of leakage<\/strong><\/td><td>One leak can destroy protection permanently<\/td><td>Disclosure does not reduce protection<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>When to choose a patent over a trade secret:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The invention can be reverse-engineered from the product (a competitor could figure out the process from the product itself)<\/li>\n\n\n\n<li>You need a publicly defensible exclusive right that covers independent development<\/li>\n\n\n\n<li>The commercial life of the invention is within the 20-year patent term<\/li>\n\n\n\n<li>The disclosure required for a patent will not materially harm your competitive position<\/li>\n<\/ul>\n\n\n\n<p><strong>When to choose a trade secret over a patent:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The invention cannot realistically be reverse-engineered (most processes and formulations)<\/li>\n\n\n\n<li>You need protection beyond 20 years<\/li>\n\n\n\n<li>The invention falls under a Section 3 exclusion (software, algorithms, business methods)<\/li>\n\n\n\n<li>You want to avoid public disclosure of the innovation<\/li>\n\n\n\n<li>The cost of patent prosecution is disproportionate to the commercial value<\/li>\n<\/ul>\n\n\n\n<p>Many innovations warrant both: patent the product; protect the manufacturing process as a trade secret. This dual-layer approach is standard practice in the pharmaceutical and specialty chemical industries.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Trade Secrets in India \u2014 Practical Steps<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Step 1 \u2014 Identify and Classify Your Trade Secrets<\/h3>\n\n\n\n<p>The most common reason businesses fail to protect trade secrets is that they have never systematically identified what their trade secrets are. Conduct an <strong>information audit<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What proprietary formulas, processes, or methods does the business use?<\/li>\n\n\n\n<li>What customer, supplier, or pricing data is commercially sensitive?<\/li>\n\n\n\n<li>What source code, algorithms, or models give the business a competitive advantage?<\/li>\n\n\n\n<li>What business strategies, financial projections, or plans are non-public?<\/li>\n<\/ul>\n\n\n\n<p>Once identified, classify information by sensitivity level and document the classification. This record is critical evidence in any future litigation that the information was treated as confidential.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 2 \u2014 Execute Robust NDAs and Confidentiality Agreements<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Employees:<\/strong> Include confidentiality clauses in every employment contract. Define &#8220;confidential information&#8221; specifically. Include obligations that survive termination of employment.<\/li>\n\n\n\n<li><strong>Vendors and suppliers:<\/strong> Execute NDAs before sharing any proprietary information in procurement or manufacturing relationships.<\/li>\n\n\n\n<li><strong>Investors and advisors:<\/strong> Mutual NDAs before any business discussion involving proprietary information.<\/li>\n\n\n\n<li><strong>Joint venture and licensing partners:<\/strong> Build confidentiality obligations into the core commercial agreement, not just a side letter.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 3 \u2014 Implement Access Controls<\/h3>\n\n\n\n<p>The &#8220;reasonable steps to maintain secrecy&#8221; requirement in courts is assessed by looking at actual access controls:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Limit access to trade secrets on a need-to-know basis \u2014 not all employees should have access to all confidential information<\/li>\n\n\n\n<li>Use technical access controls (passwords, encrypted storage, role-based access permissions)<\/li>\n\n\n\n<li>Maintain logs of who has accessed what<\/li>\n\n\n\n<li>Use physical security for any hardcopy confidential materials<\/li>\n\n\n\n<li>Watermark sensitive documents \u2014 this is evidence of efforts to maintain confidentiality and assists in tracing leaks<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 4 \u2014 Employee Offboarding Protocol<\/h3>\n\n\n\n<p>The highest-risk moment for trade secret leakage is when an employee leaves. Implement a structured exit protocol:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exit interview covering confidentiality obligations<\/li>\n\n\n\n<li>Return of all company devices, documents, and access credentials<\/li>\n\n\n\n<li>Revocation of all system access on or before the last day of employment<\/li>\n\n\n\n<li>Specific reminder of ongoing confidentiality obligations in the exit letter<\/li>\n\n\n\n<li>If warranted, forensic review of company devices used by senior employees with access to critical secrets<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 5 \u2014 Enforce Promptly When Breach Occurs<\/h3>\n\n\n\n<p>A trade secret that the owner knows is being misappropriated but fails to act on is a weakened trade secret. Courts assess whether the owner&#8217;s conduct was consistent with treating the information as confidential.<\/p>\n\n\n\n<p>When breach is suspected:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Preserve all evidence immediately \u2014 emails, device logs, access records<\/li>\n\n\n\n<li>Seek legal advice on interim injunction within days \u2014 not months<\/li>\n\n\n\n<li>Document all losses and consequences of the breach<\/li>\n\n\n\n<li>Consider applications under the IT Act for unauthorised access to electronic data<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Remedies for Trade Secret Misappropriation in India<\/h2>\n\n\n\n<p>In the current legal framework, remedies are available through civil courts:<\/p>\n\n\n\n<p><strong>Interim injunction<\/strong> \u2014 the most urgent and practically effective remedy. A court order restraining the defendant from using or further disclosing the trade secret, granted on an ex parte basis in urgent cases. This is often the decisive outcome \u2014 stopping the leakage before the trade secret enters further public use.<\/p>\n\n\n\n<p><strong>Permanent injunction<\/strong> \u2014 granted at the conclusion of the suit, preventing ongoing or future use of the misappropriated information.<\/p>\n\n\n\n<p><strong>Damages<\/strong> \u2014 compensation for losses caused by the misappropriation. Quantifying trade secret damages is complex \u2014 courts have awarded damages based on lost profits, reasonable royalty, and unjust enrichment, depending on the facts.<\/p>\n\n\n\n<p><strong>Account of profits<\/strong> \u2014 the defendant is required to disgorge the profits made through the misappropriation. Particularly useful where the plaintiff&#8217;s losses are difficult to quantify but the defendant&#8217;s gains are calculable.<\/p>\n\n\n\n<p><strong>Delivery up or destruction<\/strong> \u2014 court orders for the delivery up or destruction of all materials embodying the trade secret in the defendant&#8217;s possession.<\/p>\n\n\n\n<p><strong>Criminal complaint<\/strong> \u2014 under BNS provisions on criminal breach of trust, and under the IT Act for electronic data theft.<\/p>\n\n\n\n<p>The practical challenge in trade secret litigation is <strong>confidentiality during the proceedings<\/strong> \u2014 pursuing a court case inherently involves disclosing the very information being protected. Courts have developed mechanisms including confidentiality clubs, sealed filings, and in-camera hearings to manage this, as seen in the Delhi High Court&#8217;s formulation in <em>Pawan Kumar Goel v Dr Dhan Singh (2022)<\/em>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions<\/h2>\n\n\n\n<p><strong>Q: What is a trade secret in India?<\/strong><\/p>\n\n\n\n<p>A: A trade secret in India is commercially valuable confidential information \u2014 a formula, process, algorithm, customer list, or business strategy \u2014 that derives value from being kept secret, and which the owner takes reasonable steps to protect. India has no dedicated trade secrets statute; protection exists through NDAs, common law breach of confidence, and related statutes including the IT Act and Bharatiya Nyaya Sanhita.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Q: Is there a trade secret law in India?<\/strong><\/p>\n\n\n\n<p>A: No. As of April 2026, India has no dedicated statute for trade secret protection. The 22nd Law Commission of India issued the Protection of Trade Secrets Bill, 2024 as a draft recommendation in its 289th Report \u2014 but this has not been enacted. Trade secrets are currently protected through contracts (NDAs), the equitable doctrine of breach of confidence, the IT Act 2000, and criminal law provisions under the Bharatiya Nyaya Sanhita.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Q: What is the Protection of Trade Secrets Bill 2024?<\/strong><\/p>\n\n\n\n<p>A: The Protection of Trade Secrets Bill, 2024 is a draft legislation recommended by the 22nd Law Commission of India in its 289th Report (March 2024) to create a standalone framework for trade secret protection. It proposes a TRIPS-aligned definition, civil remedies including injunction and damages, and key exceptions for reverse engineering, independent development, and whistleblower disclosures. As of April 2026, it has not been passed by Parliament.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Q: What is the difference between a trade secret and a patent?<\/strong><\/p>\n\n\n\n<p>A: A patent gives a public exclusive right for 20 years in exchange for full disclosure of the invention. A trade secret gives indefinite protection through secrecy \u2014 no registration, no disclosure, no monopoly. Patents protect against independent development; trade secrets do not. Reverse engineering defeats trade secret protection but not patent protection. The choice depends on whether the innovation can be reverse-engineered, how long protection is needed, and whether disclosure is acceptable.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Q: Can an employee take trade secrets to a competitor in India?<\/strong><\/p>\n\n\n\n<p>A: No. An employee who takes confidential information belonging to their employer \u2014 customer databases, source code, formulas, business plans \u2014 to a competitor commits both a breach of their employment confidentiality obligations and potentially a criminal breach of trust under the Bharatiya Nyaya Sanhita and IT Act offences if electronic data is involved. Courts have granted injunctions and damages in such cases, including Burlington Home Shopping v Rajnish Chibber (Delhi High Court, 1995).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Q: Are non-compete clauses enforceable in India?<\/strong><\/p>\n\n\n\n<p>A: Generally no \u2014 post-employment non-compete clauses are void under Section 27 of the Indian Contract Act as agreements in restraint of trade. However, confidentiality clauses protecting specific trade secrets remain enforceable even after employment ends. The Supreme Court in Niranjan Shankar Golikari v Century Spinning (1967) drew this distinction clearly: employers can protect specific trade secrets through post-employment confidentiality obligations, but cannot prevent former employees from using their general skills and knowledge in a competing role.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Q: What are reasonable steps to protect a trade secret in India?<\/strong><\/p>\n\n\n\n<p>A: Courts assess whether an owner took reasonable steps based on the circumstances. Steps typically include: executing NDAs and confidentiality agreements with employees, vendors, and partners; restricting access to sensitive information on a need-to-know basis; using technical access controls (passwords, encryption); watermarking and classifying sensitive documents; implementing structured employee exit protocols; and acting promptly when a breach is suspected.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Protect Your Business&#8217;s Most Valuable Information<\/h2>\n\n\n\n<p>A product can be copied. A process that is kept secret cannot be \u2014 as long as the secrecy is actively maintained and legally documented.<\/p>\n\n\n\n<p>The absence of a dedicated trade secrets statute in India makes contractual protection, access controls, and swift enforcement all the more critical. An NDA that is poorly drafted, a confidentiality obligation that was never communicated, or a breach that was not acted on promptly can each destroy protection that took years to build.<\/p>\n\n\n\n<p>At TMZON, IP consultation services cover trade secret protection strategy \u2014 NDA advisory, confidentiality structure for employment and commercial agreements, and enforcement options when a breach occurs.<\/p>\n\n\n\n<p><strong><a href=\"\/consultation\">Book an IP Consultation \u2192 TMZON<\/a><\/strong><\/p>\n\n\n\n<p>For trademark and registered IP protection alongside your trade secret strategy:<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/ipindia.gov.in\" target=\"_blank\" rel=\"noopener\">IP India Official Portal \u2192 IP India<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em>This article is written for general informational purposes and does not constitute legal advice. For advice specific to your trade secret protection, please consult a qualified IP attorney.<\/em><\/p>\n\n\n\n<p><em>Written by Arya Sharma, Advocate, Bombay High Court | Trademark Attorney<\/em><\/p>\n\n\n\n<p><em>\u00a9 2026 TMZON Corporate Services. All rights reserved.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A trade secret in India is commercially valuable confidential information \u2014 a formula, algorithm, process, customer list, business strategy, or know-how \u2014 that derives its value from being kept secret, and which the owner takes reasonable steps to protect. Unlike patents, trademarks, or copyrights, India has no dedicated statute for trade secrets. Protection exists through [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[11,10],"tags":[],"class_list":["post-849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-intellectual-property","category-startup-legal-basics","entry","has-media"],"rttpg_featured_image_url":{"full":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon.jpg",1280,720,false],"landscape":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon.jpg",1280,720,false],"portraits":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon.jpg",1280,720,false],"thumbnail":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon-150x150.jpg",150,150,true],"medium":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon-300x169.jpg",300,169,true],"large":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon.jpg",1280,720,false],"2048x2048":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon.jpg",1280,720,false],"ocean-thumb-m":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon-600x600.jpg",600,600,true],"ocean-thumb-ml":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon-800x450.jpg",800,450,true],"ocean-thumb-l":["https:\/\/tmzon.com\/blog\/wp-content\/uploads\/2026\/04\/trade-secret-india-2026-tmzon-1200x700.jpg",1200,700,true]},"rttpg_author":{"display_name":"TMZON","author_link":"https:\/\/tmzon.com\/blog\/author\/tmzon-19\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/tmzon.com\/blog\/category\/intellectual-property\/\" rel=\"category tag\">Intellectual Property<\/a> <a href=\"https:\/\/tmzon.com\/blog\/category\/startup-legal-basics\/\" rel=\"category tag\">Startup Legal Basics<\/a>","rttpg_excerpt":"A trade secret in India is commercially valuable confidential information \u2014 a formula, algorithm, process, customer list, business strategy, or know-how \u2014 that derives its value from being kept secret, and which the owner takes reasonable steps to protect. Unlike patents, trademarks, or copyrights, India has no dedicated statute for trade secrets. Protection exists through&hellip;","_links":{"self":[{"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/posts\/849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/comments?post=849"}],"version-history":[{"count":2,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/posts\/849\/revisions"}],"predecessor-version":[{"id":852,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/posts\/849\/revisions\/852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/media\/851"}],"wp:attachment":[{"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/media?parent=849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/categories?post=849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tmzon.com\/blog\/wp-json\/wp\/v2\/tags?post=849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}