Fact-checked by Grok 2 weeks ago

Misappropriation

In law, misappropriation is the unauthorized, improper, or unlawful use of funds or other for purposes other than that for which it was intended, often involving a breach of trust where assets have been entrusted to the actor. This concept spans civil and , encompassing scenarios from mismanagement to the exploitation of confidential , and is distinguished from outright by the prior legitimate or over the resource. In practice, misappropriation of funds typically occurs when individuals in positions of —such as agents, trustees, or officials—divert entrusted for , leading to penalties including fines, restitution, and . For instance, under U.S. , misappropriation of funds violates statutes prohibiting or misuse of government , with severe consequences for officials who appropriate taxpayer resources unlawfully. Beyond financial assets, misappropriation extends to , such as trade secrets or , where improper disclosure or use undermines competitive advantages or . In contexts, it addresses unauthorized exploitation of innovations or likenesses, providing remedies like injunctions or damages when standard or protections fall short. Legal systems worldwide criminalize such acts to deter economic harm, as seen in international agreements like the , which mandates penalties for misappropriation by public officials. Defining characteristics include intent and deviation from authorized purpose, with courts emphasizing empirical evidence of unauthorized benefit over mere negligence.

Definitions and Historical Context

Misappropriation constitutes the unauthorized, improper, or unlawful use of another's —whether funds, assets, , or personal attributes—for purposes other than those intended, typically involving or of wrongdoing. In civil contexts, core generally require: (1) a protectable interest held by the , such as or lawful ; (2) the defendant's acquisition, , or use of that interest without consent or through improper means like , breach of confidence, or ; and (3) demonstrable harm to the , including economic loss or unjust benefit to the defendant. These emphasize causal linkage between the defendant's actions and the 's injury, rooted in principles of and . In financial and asset misappropriation, akin to , the elements intensify around fiduciary duty: the defendant must have been entrusted with the property in a , followed by intentional fraudulent to personal use, absent any legal justification. For instance, under U.S. , this includes scenarios where funds lawfully come into the defendant's hands but are then fraudulently appropriated, distinguishing it from mere by requiring prior lawful possession. Courts assess through of concealment or personal gain, with no requirement for permanent deprivation if temporary use suffices for harm. Trade secret misappropriation, governed by statutes like the (2016) and state Uniform Trade Secrets Acts, demands: (1) the information's secrecy (not readily ascertainable, with reasonable efforts to maintain confidentiality); (2) misappropriation via acquisition by improper means (e.g., , ) or knowing use/disclosure violating a duty of trust. Improper means exclude or independent derivation, preserving incentives for while penalizing disloyalty. Plaintiffs must specify the secret's contours pre-litigation to avoid fishing expeditions, as vague claims fail. Personal misappropriation, such as in the right of tort, involves: (1) the defendant's of the plaintiff's name, , or ; (2) lack of permission; (3) commercial purpose benefiting the defendant; and (4) linkage to plaintiff's economic or reputational injury. This protects against "" for profit, distinct from invasions by focusing on proprietary value in , with remedies including injunctions and damages measured by lost licensing fees. Across domains, defenses like status or may negate elements, but plaintiffs bear the burden of proving secrecy or exclusivity where applicable.

Historical Development and Etymology

The noun misappropriation, denoting the wrongful application or use of property or resources, first emerged in English in 1746, formed by combining the prefix mis- (indicating error or wrongness) with appropriation, derived ultimately from the Latin appropriare ("to make one's own"). The corresponding verb misappropriate, meaning to apply something to an improper or unauthorized purpose, appeared in 1803, reflecting growing commercial complexities that necessitated precise terminology for fiduciary breaches and unauthorized diversions. Legally, the concept underlying misappropriation traces to English common law's limitations on , which required proof of in the initial taking of , leaving gaps for non-trespassory conversions by agents or servants lawfully in possession. To remedy this, enacted targeted statutes starting in the mid-18th century, including measures from 1742 to 1767 against clerical frauds, culminating in the broader 1799 Embezzlement Act, which criminalized the fraudulent conversion of entrusted goods or funds by employees or bailees, with penalties up to seven years' transportation. These laws formalized misappropriation as a distinct offense, emphasizing intent to defraud over mere possession, and influenced 19th-century reforms like the 1861 Act, which codified as a punishable by up to seven years' imprisonment. In the United States, inherited principles shaped early misappropriation doctrines, with state legislatures adopting statutes by the early 19th century to prosecute public officials and fiduciaries for diverting funds, as seen in cases under statutes like New York's 1799 mirroring British precedents. By the , the term expanded beyond financial contexts into and unfair competition, notably via the U.S. Court's 1918 decision in International News Service v. , which applied a misappropriation theory to enjoin copying of factual news compilations, protecting the commercial value of invested labor absent eligibility. This evolution underscored misappropriation's role in bridging gaps in statutory protections, prioritizing deterrence of through empirical assessments of effort and market harm over abstract property rights.

Primary Forms of Misappropriation

Financial and Asset Misappropriation

Asset misappropriation constitutes a primary category of occupational , encompassing schemes in which individuals exploit their position within an to steal or misuse its resources, such as , , or other tangible assets. This form of typically involves insiders like employees or contractors who have authorized access to assets, enabling subtle diversions that evade immediate detection. Unlike outright theft from external parties, it hinges on the perpetrator's relationship with the victim , often manifesting through falsified records or unauthorized transactions. In the Association of Certified Fraud Examiners' (ACFE) 2024 Occupational Fraud Report, analyzing over 1,900 cases worldwide, asset misappropriation accounted for 89% of detected occupational fraud incidents, making it the most prevalent scheme despite yielding the lowest median loss per case at $120,000. Organizations suffer an estimated 5% of annual revenue to fraud globally, with asset misappropriation contributing significantly due to its frequency across sectors like , , and . Small businesses face heightened vulnerability, as perpetrators often exploit weak internal controls, such as absent segregation of duties or inadequate reconciliations. Common sub-schemes include cash theft via skimming (diverting funds before recording) or (post-recording theft), billing fraud through shell companies or inflated invoices, payroll manipulation, and expense reimbursement abuse. Inventory and fixed-asset theft, such as unauthorized or personal use of , also prevail, particularly in asset-heavy industries. Detection often lags, with median durations of 12 months before , underscoring the role of (42% of detections) over audits. Notable cases illustrate the scope: In , a healthcare administrator pleaded guilty to misappropriating over $1 million in relief funds intended for patient care, redirecting them for personal use. Nonprofit examples include a 2024 embezzlement from an arts center totaling $1.48 million via fraudulent checks and a labor losing $42 million to unauthorized transfers. These incidents highlight how misappropriation erodes trust and incurs ancillary costs like forensic investigations, often exceeding direct losses. Legally, financial asset misappropriation is prosecuted under , , or statutes, with penalties scaling by amount and jurisdiction; in , misappropriating public funds over $1,000 can yield 2-4 years and $10,000 fines under Penal Code Section 424. Civilly, it triggers breach of fiduciary duty claims, mandating restitution and potential asset forfeiture. Perpetrators face enhanced sentences for aggravating factors like abuse of public office, reflecting courts' emphasis on deterrence in trust-based relationships.

Trade Secret and Intellectual Property Misappropriation

Trade secret misappropriation involves the unauthorized acquisition, disclosure, or use of confidential business information that derives economic value from not being generally known and is subject to reasonable efforts to maintain secrecy. Under U.S. federal law, this includes acquisition by improper means—such as theft, bribery, misrepresentation, or breach of a duty to maintain secrecy—where the acquirer knows or has reason to know of the impropriety. Disclosure or use of such secrets without consent by someone who acquired them improperly also constitutes misappropriation. The criminalizes , distinguishing between economic espionage benefiting a foreign instrumentality (punishable by up to 15 years and $5 million fine for individuals) and for commercial advantage (up to 10 years and $250,000 fine). Enacted to address gaps in federal protection, the Act targets both domestic and international threats, with forfeiture provisions for property derived from violations. The of 2016 amended the Act to provide a federal civil , allowing victims to sue in U.S. district courts for injunctions, damages, and attorney fees, without preempting state laws like the adopted in 48 states. Intellectual property misappropriation extends beyond trade secrets to include theft of patented inventions, copyrighted works, or data through , often overlapping with trade secret violations when information is not publicly registered. Corporate espionage methods include insider theft by departing employees, cyber intrusions, or hiring competitors' personnel to extract proprietary designs, , or processes. Notable cases illustrate the scope: in 2006, former employees stole Kevlar production secrets for , resulting in a $919 million civil judgment against Kolon. Waymo's 2017 suit against alleged a former employee downloaded 14,000 files before joining Uber, leading to a $245 million settlement. The FBI estimates annual U.S. economic losses from and broader theft at $225 billion to $600 billion, with state-sponsored actors, particularly from , implicated in many investigations. Prosecutions under the Economic Espionage Act have increased, with over 20 convictions annually in recent years, often involving foreign nationals or entities. Civil remedies emphasize actual losses, , or reasonable royalties, with exemplary up to double for willful misappropriation under the DTSA. Prevention relies on non-disclosure agreements, access controls, and employee training, though courts reject "inevitable disclosure" doctrines in some jurisdictions to avoid restricting labor mobility.

Scientific Research and Data Misappropriation

Scientific research and data misappropriation refers to the unauthorized use or appropriation of another researcher's ideas, data, methods, results, or without proper attribution, often encompassed within the broader category of as defined in research misconduct policies. In the United States, the Office of Research Integrity (ORI) classifies as "the theft or misappropriation of and the substantial unattributed textual copying of another's work," extending to ideas or data obtained through privileged communications such as collaborations, grant reviews, or unpublished manuscripts. This form of misappropriation differs from fabrication or falsification by involving the repurposing of existing work rather than , but it similarly erodes the of scientific inquiry by attributing credit incorrectly and potentially skewing subsequent research built on falsified origins. Common manifestations include textual , where substantial portions of published or unpublished text are copied without citation; plagiarism, involving the unattributed reuse of datasets, experimental results, or figures; and idea misappropriation, such as presenting another’s , experimental design, or preliminary findings as original in , papers, or s. International definitions align closely, with misappropriation described as the "unlawful of another person's result, idea, , , or as one's own " in policies from bodies like the . Authorship impropriety, where contributors are excluded or ghost authors added, often overlaps, as does the misuse of confidential information to preempt or parallel others' work. These acts are facilitated by factors like high publication pressure and inadequate detection tools, though software such as has increased identification rates since the early 2000s. Notable cases illustrate the scope and consequences. In the 1970s, Elias Alsabti, an Iraqi medical researcher, published at least nine plagiarized papers in journals like , copying content from prior works without attribution; this led to his resignation from the in 1977 after investigations confirmed the misappropriation. More recently, , a University of , faced over 30 paper retractions between 2012 and 2022 for and image duplication in studies on curcumin's anti-cancer effects, resulting in ORI findings of misconduct and a five-year funding ban in 2020. In , French physicist was accused in 2017 of plagiarizing text in a book on time perception, drawing from uncredited sources, which threatened his position at the Alternative Energies and Atomic Energy Commission despite his defense of oversight. The ORI has adjudicated 19 cases since 1992, often involving biomedical fields, with sanctions including debarment from federal funding for periods up to ten years. Prevalence estimates from surveys indicate that approximately 1-2% of researchers admit to or related misappropriation, though underreporting is likely due to institutional incentives to resolve issues internally rather than publicly. A meta-analysis of self-reported data found about 2% of acknowledging falsification, fabrication, or modification, with comprising a significant subset. In proprietary research settings, such as pharmaceutical labs, misappropriation may invoke laws, as in cases where employees disclose confidential datasets, leading to civil suits under statutes like the U.S. of 2016. Enforcement typically relies on institutional investigations, journal retractions via bodies like COPE, and administrative actions, but criminal prosecution is rare absent financial gain or . These incidents highlight systemic vulnerabilities, including weak data-sharing protocols and cultural tolerance for "salami slicing" publications, which can mask incremental reuse of others' contributions. Prevention emphasizes robust authorship agreements, data versioning tools like for tracking contributions, and mandatory disclosure of prior uses in submissions. Despite advancements, challenges persist in detecting subtle idea theft, as ideas lack tangible markers compared to text or images, underscoring the need for ethical training and transparent to safeguard causal chains in scientific knowledge accumulation.

Criminal Law Aspects

In criminal law, misappropriation constitutes the fraudulent or unauthorized use of or funds that have come into the defendant's lawful , distinguishing it from where initial taking is unlawful. This offense requires proof of intent to deprive the owner permanently or temporarily for personal benefit, often encompassing entrusted assets like fiduciary-held funds or leased . Common law roots trace to , which penalizes servants or agents who appropriate masters' goods, evolving in modern codes to cover broader scenarios such as bailee . At the federal level, 18 U.S.C. § 641 criminalizes the , stealing, purloining, or knowing of public money, , or records belonging to the , with penalties scaling by value: up to one year imprisonment for items under $1,000, and up to ten years for higher values, plus fines. This statute applies to government employees or contractors misusing federal assets, as seen in prosecutions for diverting funds or equipment. Additional provisions under 18 U.S.C. Chapter 31 target specific embezzlements, such as public funds misuse (e.g., §§ 643, 648), emphasizing breach over mere possession. State jurisdictions typically integrate misappropriation into consolidated theft statutes, requiring elements like wrongful withholding with intent to appropriate, as in Penal Law § 155.05, which includes obtaining property by or failing to return leased items. In California, Penal Code § 424 specifically prohibits public officials from misappropriating funds through unauthorized appropriation or neglect, punishable as a with up to four years . Prosecutions often hinge on evidence, such as falsified records or personal gain traces, with defenses challenging lawful possession or lack of intent. For intangible assets like trade secrets, federal law under the Economic Espionage Act (18 U.S.C. § 1831) treats knowing —defined as acquisition, disclosure, or use without consent—as a , with penalties up to 15 years imprisonment and $5 million fines for benefiting foreign entities, reflecting concerns over economic harm. prioritizes cases with quantifiable loss, such as stolen proprietary data leading to competitive disadvantage, though civil remedies under § 1836 often parallel criminal actions. Overall, criminal misappropriation statutes aim to deter betrayal, with sentencing guided by factors like victim impact and offender position, as outlined in U.S. Sentencing Guidelines §2B1.1 for offenses.

Civil Remedies and Litigation

Civil remedies for misappropriation enable aggrieved parties to seek judicial intervention to halt unauthorized use, recover losses, and obtain compensation through private lawsuits, distinct from criminal prosecutions. These actions typically arise under doctrines such as , , or breach of fiduciary duty for financial or asset misappropriation, and statutory frameworks like the (DTSA) of 2016 for trade secrets and . Courts assess claims based on of wrongful acquisition, , or use, requiring plaintiffs to demonstrate ownership, secrecy (for trade secrets), and harm. Injunctive relief is a primary remedy, allowing courts to issue preliminary or permanent orders prohibiting further misappropriation, such as of secrets or diversion of funds. Under the DTSA, injunctions may prevent defendants from using or disclosing misappropriated information, with provisions for seizures of property to secure or halt , provided there is a risk of irreparable harm. State analogs, like the (UTSA) adopted in 48 states as of 2023, similarly authorize injunctions tailored to preserve secrecy, often extending up to the duration the would have remained valuable absent misappropriation. For financial misappropriation, injunctions can freeze assets or remove actors, as seen in cases involving where courts order account restrictions to prevent dissipation. Monetary damages compensate for proven losses and deter misconduct. Compensatory awards cover actual , such as lost profits or the defendant's from the misappropriation, calculated as the greater of the two where provable. If neither is quantifiable, courts may impose a reasonable for the misappropriated asset's use. For willful and malicious acts, exemplary up to double the compensatory amount are available under the DTSA, alongside potential recovery of attorneys' fees and investigative costs. In financial contexts, restitution restores victims to their pre-misappropriation position, often including like audit expenses, pursued via claims of or . Scientific data misappropriation, treated akin to secrets or , yields similar remedies, with courts awarding for lost value or . Litigation burdens plaintiffs with proving elements like and by a preponderance of , often necessitating on valuation. Defendants may counter with challenges to status or inevitable defenses, though success rates favor plaintiffs in well-documented cases, with DTSA filings rising over 20% annually since 2016 per data. Settlements predominate due to high stakes, but trials can yield substantial awards, such as multimillion-dollar judgments for IP-related claims. Jurisdictional choice influences outcomes, with DTSA actions offering nationwide service and uniformity over varied state laws.

Defenses, Justifications, and Prevention

In misappropriation claims, defendants frequently assert that the alleged property lacked the requisite secrecy or proprietary status, thereby failing to qualify as protectable under statutes like the (UTSA) or the (DTSA), which require reasonable efforts to maintain and non-obviousness to trade. For instance, if derives from public sources, independent analysis, or without breaching any duty, courts often dismiss claims, as these methods negate improper acquisition. Independent development serves as a complete in trade secret and misappropriation cases, requiring defendants to provide evidence such as dated prototypes, internal records, or witness testimony demonstrating parallel creation without access to the claimant's materials. This defense undermines the causation element, as plaintiffs must prove the defendant's use stemmed directly from their secret rather than legitimate means. In fiduciary contexts, such as corporate opportunity misappropriation, defendants may invoke the , arguing decisions aligned with informed, good-faith corporate interests absent . Procedural defenses, including statutes of limitations, apply uniformly: under the DTSA, claims must commence within three years of of misappropriation, barring delayed filings regardless of ongoing harm. Equitable doctrines like laches, , , or unclean hands further bar recovery if plaintiffs unreasonably delayed pursuit or engaged in misconduct, such as failing to disclose known risks during . In financial asset cases involving alleged breaches, defendants often contest the existence of a fiduciary relationship or prove actions complied with explicit contractual authorizations, negating breach elements. For scientific data or research misappropriation, defenses emphasize status or fair disclosure under academic norms, where data shared in publications or collaborations loses protection absent nondisclosure agreements. Preemption arguments may also succeed if state claims overlap with federal laws, channeling disputes to exclusive remedies. These defenses, when substantiated, not only defeat but can shift burdens, as seen in cases awarding fees for bad-faith pursuits under the DTSA.

Practical Safeguards and Risk Mitigation

Implementing robust internal controls is essential for mitigating risks of financial and asset misappropriation, as these measures systematically reduce opportunities for unauthorized use or diversion of resources. Key practices include segregation of duties, which ensures no single individual controls all aspects of a , such as authorizing, recording, and custody of assets, thereby preventing or override. Regular reconciliations of bank accounts and inventories, conducted monthly by independent personnel, detect discrepancies early and limit losses if misappropriation occurs. Additionally, conducting periodic internal and external audits verifies compliance and identifies vulnerabilities, with organizations employing such controls experiencing significantly lower incidence rates. Establishing anti-fraud policies and codes of ethical conduct fosters a culture of , deterring employee through clear expectations and consequences. For trade secrets and , risk mitigation relies on proactive identification and protection protocols to meet legal standards like "reasonable measures" under the (DTSA) of 2016. Organizations should classify and limit access to sensitive information using physical and digital safeguards, such as secure vaults for master materials, password-protected files, and access logs to track usage. Non-disclosure agreements (NDAs) with employees, contractors, and partners explicitly prohibit unauthorized disclosure, while employee training on handling proprietary data reinforces compliance. Monitoring for cybersecurity gaps, including endpoint detection and restricted network access, counters digital theft, which accounts for a substantial portion of IP misappropriation incidents. Assigning dedicated teams to enforce these policies ensures ongoing vigilance, as passive protection alone fails against determined actors. In scientific research and data contexts, safeguards emphasize and to prevent unauthorized use or fabrication, particularly amid rising foreign risks. Primary practices involve maintaining detailed, contemporaneous of experiments and analyses in accessible formats, enabling verification and reducing misappropriation through poor documentation. Institutions should implement research training programs, as mandated by entities like the , to educate personnel on identifying theft or . Whistleblower protections encourage reporting of integrity breaches without retaliation, while secure protocols—such as encrypted and controlled —mitigate misuse in collaborative environments. Federal guidelines highlight screening collaborations for misappropriation risks, including background checks on foreign entities, to protect national interests without stifling legitimate exchange. Across domains, integrating technology like systems and software enhances detection, though human oversight remains critical, as over-reliance on can overlook insider threats. Comprehensive risk assessments, tailored to organizational scale, prioritize high-value assets and adapt to evolving threats, ensuring efforts align with of effective controls.

Comparisons with Analogous Offenses

Differences from

constitutes the fraudulent conversion of property by an individual to whom it has been lawfully entrusted, typically involving a of duty where the perpetrator initially possesses the assets through a , such as an employee or agent handling funds or goods. In contrast, misappropriation encompasses the unauthorized or improper use of another's property or funds for unintended purposes, which may occur without prior entrustment or relationship, though it often involves access gained through or other means. A primary distinction lies in the element of lawful possession: requires that the defendant first acquire the property legitimately before diverting it, distinguishing it from , which involves unlawful taking; misappropriation, however, can apply to scenarios lacking initial lawful control, such as the wrongful exploitation of confidential information obtained indirectly. For instance, under statutes like California's Penal Code Section 503, demands proof of entrustment and subsequent felonious intent, whereas misappropriation charges may hinge on broader unauthorized use without that prerequisite. Misappropriation extends beyond embezzlement's typical focus on tangible or monetary funds to include intangible assets, such as trade secrets or proprietary data, where no physical entrustment occurs; statutes rarely apply to such non-physical items, limiting their scope to convertible assets like or . This breadth allows misappropriation to address modern economic harms, like the illicit use of , which frameworks, rooted in 18th-century adaptations, do not adequately cover. In terms of prosecution, is codified as a specific in most U.S. jurisdictions, with penalties scaled by value (e.g., over $950 qualifying as grand in ), emphasizing intent to post-entrustment; misappropriation may invoke general or statutes but often carries civil dimensions, enabling remedies like restitution without proving breach. While overlap exists—many cases of fund misappropriation are charged as —the absence of entrustment in misappropriation can lead to alternative charges like or general , reflecting jurisdictional variances where "misappropriation" serves as an umbrella term rather than a standalone .

Distinctions from Theft and General Fraud

Misappropriation of trade secrets, as defined under the (UTSA) adopted in 48 U.S. states and the federal (DTSA) of 2016, involves the acquisition, disclosure, or use of confidential business information through improper means—such as breach of a duty, , or unauthorized access—without the owner's , where the information derives economic value from secrecy. Unlike traditional or , which requires the physical taking and carrying away (asportation) of tangible with intent to permanently deprive the owner, misappropriation targets intangible assets and permits the original possessor to retain the secret while the misappropriator duplicates or exploits it, causing harm through lost rather than loss of possession. For instance, an employee emailing proprietary formulas to a competitor constitutes misappropriation under UTSA Section 1(2), even if the employer retains the originals, whereas statutes demand tangible removal, as in stealing physical blueprints. This distinction underscores that misappropriation emphasizes secrecy's economic value and the wrongdoer's knowledge of impropriety, not physical dominion; federal criminalization under the Economic Espionage Act (18 U.S.C. § 1832) labels it "" for prosecutorial purposes but defines it as willful misappropriation for foreign or domestic benefit, with penalties up to 10 years and fines exceeding $5 million for organizations, reflecting intangible harm over corporeal . Courts have clarified that mere or viewing of trade secrets, without disclosure or use, may not trigger misappropriation liability, further diverging from theft's focus on deprivation. In contrast to general , which entails intentional or to induce reliance and obtain or pecuniary gain—often prosecuted under statutes like wire fraud (18 U.S.C. § 1343) requiring a scheme to defraud—misappropriation does not necessitate victim-facing deceit but centers on unauthorized handling of secrets acquired via "improper means," including non-deceptive breaches like employee disloyalty. While can qualify as an improper means under UTSA (e.g., lying to gain access), demands provable reliance and direct economic loss from the deceit, whereas misappropriation liability arises from use or disclosure alone, remedied through injunctions, damages, or royalties under DTSA, without proving fraudulent intent toward the secret's owner. Overlaps exist in cases involving computer access, potentially implicating both the and charges, but misappropriation's core is secrecy violation, not broad deceit.

Consequences and Broader Impacts

Penal and Remedial Outcomes

Misappropriation of funds or assets, often prosecuted as or by a , carries criminal penalties that escalate with the value involved and jurisdictional specifics. , under 18 U.S.C. § 641 punishes the or of public money, property, or records exceeding $1,000 with fines, up to 10 years, or both. State-level penalties similarly intensify based on amount; for example, in , of funds over certain thresholds can result in classifications with terms ranging from several years to 25 years for grand larceny equivalents. Breaches involving duties may trigger criminal charges if or intent to defraud is proven, leading to fines and incarceration, as seen in cases of willful misapplication of entrusted assets. Civil remedies focus on restitution and deterrence, allowing victims to recover losses through damages, of ill-gotten gains, and equitable relief. Courts may award compensatory damages equivalent to the misappropriated value, plus for egregious conduct, particularly in breaches where loyalty and care duties are violated. Injunctions can prevent further misuse, while seizes tainted property to satisfy judgments. For instance, under California's Penal Code § 496, civil actions for theft-like misappropriation permit and attorney fees to the prevailing party. Parallel proceedings are common, where criminal convictions bolster civil claims by establishing liability, often resulting in combined outcomes like repayment orders alongside penal sentences. In contexts, such as estate trusteeship, courts have mandated full repayment of misappropriated sums plus interest, as in rulings requiring siblings to reimburse family funds diverted unlawfully. These remedies prioritize victim restoration over mere punishment, though enforcement challenges arise with concealed or dissipated assets.

Economic Costs and Societal Effects

Misappropriation of trade secrets and other proprietary information imposes substantial economic burdens on affected entities and economies. Estimates indicate that intellectual property theft, including trade secret misappropriation, costs the U.S. economy between $225 billion and $600 billion annually, encompassing lost revenue, diminished market share, and foregone innovation opportunities. These figures derive from analyses by government and economic bodies, highlighting how misappropriation enables competitors to bypass research and development expenditures, thereby eroding the original holder's competitive edge and necessitating increased security investments. Beyond direct financial losses, misappropriation leads to reduced incentives for , as firms anticipate higher risks of idea expropriation, resulting in lower spending and slower technological advancement. This dynamic weakens national competitiveness and contributes to job displacements in innovation-dependent sectors, with broader ripple effects on . For instance, stolen proprietary knowledge can undermine entire industries, such as or , by flooding markets with inferior or unauthorized copies that displace legitimate products. Societally, misappropriation fosters distrust in business relationships and supply chains, complicating collaborations and while elevating enforcement costs for governments. It also poses risks when critical technologies are compromised, potentially shifting strategic advantages to adversarial entities. Overall, these effects perpetuate a of inefficiency, where resources are diverted from productive to defensive measures, ultimately hampering societal progress and equitable economic participation.

Debates and Criticisms

Overbroad Applications and Enforcement Challenges

Critics of the misappropriation theory in insider trading law argue that it expands liability beyond the statutory text of Section 10(b) of the and Rule 10b-5, which require deception in connection with the purchase or sale of securities, to encompass any breach of a duty of trust or confidence regarding nonpublic information, potentially criminalizing conduct lacking direct harm to market participants. This doctrinal shift, upheld in United States v. O'Hagan (521 U.S. 642, 1997), has been faulted for creating an "uneasy compromise" that prioritizes policy goals over textual fidelity, leading to unpredictable enforcement where outsiders trading on misappropriated information face liability even absent misrepresentation to investors. For instance, the theory's application to "shadow trading"—profiting from company-specific information in unrelated securities—risks overreach by imputing fiduciary-like duties to peripheral actors, as seen in SEC v. Panuwat (filed 2021, ongoing as of 2024), where the defendant faced charges for trades in a peer company's stock based on confidential merger news. In misappropriation under the (DTSA, enacted 2016) and state analogs like the , overbroad claims arise when plaintiffs assert protection over information lacking genuine secrecy or economic value, such as general industry knowledge or publicly derived data, straining courts with litigation over definitional boundaries. Enforcement bodies and courts have noted that vague thresholds for "improper means" of acquisition—encompassing , , or even in some interpretations—can deter legitimate , as evidenced by cases where employee mobility triggers suits without clear evidence of theft, inflating discovery costs and chilling talent flows. Enforcement of misappropriation claims faces evidentiary hurdles, particularly in trade secrets, where direct proof of acquisition or use is rare, compelling reliance on circumstantial indicators like parallel product development or employee departures to competitors, which demands robust forensic analysis but often yields inconclusive results. Proving willfulness for enhanced damages under DTSA requires demonstrating intent beyond negligence, complicating prosecutions amid defenses of independent derivation, yet federal indictments rose 20% from 2018 to 2022, highlighting resource-intensive investigations. In contexts, challenges include tracing information flows and establishing causation between breach and profit, with data showing only 40% of misappropriation-based actions resulting in sanctions from 2010-2020 due to evidentiary gaps. Cross-border enforcement amplifies difficulties, as varying definitions of protectable secrets—e.g., explicit criminalization in the U.S. via the Economic Act (1996) versus civil-only remedies in some EU states—hinder extraterritorial application, with U.S. courts limited to acts within territory despite global supply chains facilitating theft. International cases, such as those involving Chinese firms under Operation Cloud Hopper (disrupted 2018), underscore jurisdictional conflicts and low foreign conviction rates, estimated below 10% for repatriated evidence. These issues persist despite DTSA's seizure provisions, which courts apply cautiously to avoid overreach, as in Coe v. Microsoft (No. 4:17-cv-00070, E.D. Tex. 2018), where procedural safeguards curbed potential abuse.

Tensions with Property Rights and Market Dynamics

The misappropriation doctrine, originating in International News Service v. (248 U.S. 215, 1918), extends quasi- protections to investments of labor, skill, or capital in non-traditional like time-sensitive facts or methods, aiming to curb free-riding by competitors. This approach tensions with classical rights, which presume and ; , by contrast, is non-rivalrous, allowing use without depriving the originator, potentially justifying limited rather than proprietary safeguards. Critics, including Justice Brandeis in his dissent, argue such extensions risk fabricating monopolies over public-domain elements, diverging from first-in-time acquisition norms central to theory. In market dynamics, the doctrine's vagueness enables broad claims that restrain lawful imitation, a mechanism Joseph Schumpeter identified as driving innovation through . For instance, it can shield unpatented functional ideas or data compilations from replication, elevating incumbents' and distorting competitive signals, as evidenced by courts' rejection of perpetual protections absent statutory limits (e.g., Sears, Roebuck & Co. v. Stiffel Co., 376 U.S. 225, 1964). The Restatement (Third) of Unfair Competition (1995) repudiates a general misappropriation for overbreadth, noting it undermines public access to facts and ideas, thereby impeding cumulative knowledge-building essential to efficient markets. Empirical concerns amplify these tensions: analogous trade secret regimes under the correlate with reduced filings and heightened , suggesting misappropriation-like protections may favor secrecy over disclosure, slowing technology diffusion and raising rivals' compliance costs. While proponents claim it incentivizes investment without supplanting IP exhaustion, doctrinal drift—evident in state variations post-federal preemption rulings like Bonito Boats, Inc. v. Thunder Power Boats, Inc. (489 U.S. 141, 1989)—fosters uncertainty, potentially chilling in dynamic sectors like data analytics or news aggregation. Thus, unchecked application risks prioritizing relational equities over systemic market efficiency, where competition thrives on accessible, replicable inputs.

Notable Examples

Landmark Historical Cases

In International News Service v. Associated Press (1918), the U.S. Supreme Court articulated the misappropriation doctrine under unfair competition law, holding that the International News Service (INS) unlawfully copied factual news reports gathered by the Associated Press (AP). INS employees accessed AP's news bulletins posted in public locations and reproduced stories from AP member newspapers on the East Coast, then transmitted and sold this information via telegraph to INS papers in the western U.S. before AP could do so, thereby undercutting AP's competitive advantage in timely news dissemination. The Court, in an opinion by Justice Mahlon Pitney, ruled that AP's investment in collecting uncopyrightable facts created a quasi-property right in the news as a commercial product, and INS's practices constituted tortious misappropriation because they amounted to a "free ride" on AP's efforts, contrary to established principles of property and fair trade competition. This decision, while limited to temporary protection for "hot news" and later narrowed by federal preemption under copyright law, established a foundational precedent for recognizing misappropriation beyond traditional intellectual property protections, influencing subsequent unfair competition claims involving effort-based value. ![Intellectual property symbol][float-right] Another pivotal historical case, Guth v. Loft, Inc. (1939), applied the misappropriation doctrine in the context of fiduciary duties and corporate opportunities under Delaware corporate law. Charles Guth, president of Loft, Inc.—a candy and soda retailer—personally developed the Pepsi-Cola formula using Loft's facilities, employees, and resources while seeking a cola syrup supplier for Loft's fountains, then retained ownership of the formula and business for himself without offering it to the corporation. The Delaware Supreme Court held that Guth breached his duty of loyalty by usurping a corporate opportunity, as the transaction arose from his corporate role, involved use of corporate assets, and aligned with Loft's line of business, thereby misappropriating value that belonged to the company. The court imposed a constructive trust on Guth's Pepsi interests, awarding Loft equitable relief including stock transfer and profits accounting, reinforcing that officers and directors cannot appropriate business prospects discovered through their fiduciary positions without full disclosure and corporate consent. This ruling solidified the corporate opportunity doctrine as a safeguard against insider misappropriation, emphasizing causal links between fiduciary access and personal gain.

Contemporary Instances and Recent Developments

In 2024, was found liable for misappropriation in a case involving the acquisition of a biodiesel technology firm, where inadequate led to the unauthorized use of proprietary catalyst formulas developed by Propel Fuels. Following a in the U.S. District Court for the Northern District of , a jury awarded Propel $604.9 million in damages, which, combined with and attorney fees, escalated the total to over $1.2 billion, highlighting risks in merger integrations without thorough IP audits. The U.S. International in 2024 affirmed findings of misappropriation against Chinese pharmaceutical firm Ascletis in an initiated by Veloxis Pharmaceuticals, rejecting claims of independent development and imposing import bans on misappropriated technologies. This ruling underscored the ITC's aggressive stance on foreign misappropriation, emphasizing evidentiary burdens on defendants to prove non-reliance on stolen secrets. Federal courts have seen heightened scrutiny of misappropriation under the (DTSA), with the Seventh Circuit in 2024 upholding extraterritorial damages for sales outside the U.S. linked to domestic misappropriation, broadening recovery options for plaintiffs. Concurrently, multiple 2024 decisions addressed damages calculations, including and reasonable royalties, amid rising claims driven by employee mobility and AI-related IP disputes. In securities contexts, the misappropriation theory of insider trading faced refinement in 2024 federal property fraud cases, where courts dismissed charges due to insufficient evidence of wrongful use of non-public information, signaling stricter proof requirements beyond mere possession. These developments reflect ongoing tensions in applying misappropriation doctrines to and global supply chains, with plaintiffs bearing heavier evidentiary loads.

References

  1. [1]
    misappropriation | Wex | US Law | LII / Legal Information Institute
    In law, misappropriation may be defined as "[t]he unauthorized, improper, or unlawful use of funds or other property for purposes other than that for which ...
  2. [2]
    misappropriation Definition, Meaning & Usage
    misappropriation - Illegal and intentional use of another individual's property or funds for personal purposes or other unauthorized uses, especially when ...
  3. [3]
    MISAPPROPRIATION - The Law Dictionary
    The misdemeanor which Is committed by a banker, factor, agent, trustee, etc, who fraudulently deals with money, goods, securities, etc., intrusted to him.
  4. [4]
    1661. Protection Of Government Property -- Embezzlement Of Public ...
    Protection Of Government Property -- Embezzlement Of Public Funds. In addition, there are a series of sections prohibiting misuse or theft of public funds.
  5. [5]
    Misappropriation Legal Meaning & Law Definition - Quimbee
    The act of dishonestly taking something that belongs to someone else and using it for oneself. Misappropriation is also a type of unfair competition claim in ...
  6. [6]
    [PDF] Does misappropriation law still live? - JAMS
    May 22, 2024 · Is there really no legal remedy available? What about asserting a “common law misappropriation” claim? “MISAPPROPRIATION”. SURVIVES -- SORT OF.
  7. [7]
    Crime of misappropriation: legal consequences and defense
    Dec 17, 2024 · Misappropriation occurs when someone appropriates a movable thing that has been entrusted to him, but instead of using it for the agreed purpose ...Definition of misappropriation... · Legal consequences of being...
  8. [8]
    The Crime of 'Misappropriation of Funds' – What You Need to Know
    Rating 4.9 (511) Misappropriation of funds can be similar to embezzlement, another theft crime, in which a person who is entrusted with another person's money or property steals ...
  9. [9]
    Misappropriation Laws - LegalMatch
    May 19, 2023 · Misappropriation is the unauthorized or improper use of someone else's property or funds, usually for personal gain or advantage.
  10. [10]
    Suing for the Misappropriation of Trade Secrets | Binnall Law Group
    Jan 15, 2021 · Elements of a Misappropriation Claim · The defendant acquired the trade secret through improper means, or · The defendant disclosed the trade ...
  11. [11]
    embezzlement | Wex | US Law | LII / Legal Information Institute
    Embezzlement is the fraudulent taking of personal property by someone to whom it was entrusted. It is most often associated with the misappropriation of money.
  12. [12]
    1005. Embezzlement | United States Department of Justice
    Embezzlement is the fraudulent appropriation of property by a person to whom such property has been entrusted, or into whose hands it has lawfully come.
  13. [13]
    What Are The 4 Elements Common to Embezzlement?
    Element 1: The Property Did Not Belong To The Accused. First, basic ownership must be established. · Element 2: Legal Possession · Element 3: Duty and Trust.
  14. [14]
    trade secret | Wex | US Law | LII / Legal Information Institute
    Elements of a Trade Secret Claim​​ The holder of the subject matter must establish that reasonable precautions were taken to prevent disclosure of the subject ...
  15. [15]
    What do you have to Show to Prove that Someone Misappropriated ...
    Apr 2, 2024 · First, in order to make a claim for trade secret misappropriation, a party must make a showing on two elements: (1) the existence of a trade ...
  16. [16]
    CACI No. 4401. Misappropriation of Trade Secrets - Justia
    Apr 2, 2025 · In element 1, specifically describe all items that are alleged to be the trade secrets that were misappropriated.
  17. [17]
    Invasion of Privacy: Appropriation of Name and Likeness - FindLaw
    Aug 6, 2025 · Appropriation is using someone's name or likeness for personal gain without permission, a type of invasion of privacy tort.
  18. [18]
    publicity | Wex | US Law | LII / Legal Information Institute
    Actions for the tort of misappropriation or for a wrongful attempt to "pass off" the product as endorsed or produced by the individual help to protect the right ...
  19. [19]
    Misappropriation - Etymology, Origin & Meaning
    "application to a wrong use," 1746; from mis- (1) "bad, wrong" + appropriation. See origin and meaning of misappropriation.
  20. [20]
    Misappropriate - Etymology, Origin & Meaning
    Origin and history of misappropriate​​ "put to wrong use," 1803, from mis- (1) "badly, wrongly" + appropriate (v.). Related: Misappropriated; misappropriating. ...
  21. [21]
    White-collar crime and the law in nineteenth-century Britain
    Jun 20, 2017 · Rapid commercial development in Britain by 1800 inspired legislation rendering 'white-collar' crimes such as forgery, embezzlement, and obtaining money by ...
  22. [22]
    [PDF] White-collar crime and the law in nineteenth-century Britain - SciSpace
    11 Various acts against embezzlement were passed between 1742 and 1767, culminating in a statute of 1799 which applied more generally. Again, the maximum ...
  23. [23]
    Embezzlement Explained: Legal Definition, Types, & Penalties
    Sep 11, 2025 · 1861 (England): The Larceny Act formally distinguished embezzlement from larceny, defining it as a separate offense under British law. 1952 ...
  24. [24]
    [PDF] The Doctrine of Misappropriation in Unfair Competition
    The Court concluded that it had all the characteristics of property re- quired for holding that a misappropriation of it by a competitor is unconscionable and ...
  25. [25]
    Other People's Money: The Basics of Asset Misappropriation - ACFE
    Other People's Money examines common asset misappropriation schemes, identifying the red flags of each scheme and outlining steps for preventing and detecting ...
  26. [26]
    Occupation Fraud | FAU Business
    Asset Misappropriation is the most common form of occupational fraud but the least costly on average. It occurs when an employee improperly uses an employer's ...
  27. [27]
    [PDF] ACFE - Occupational Fraud 2024: A Report to the Nations - Anchin
    • Asset Misappropriation – “A scheme in which an employee steals or misuses the employing organization's resources (e.g., theft of company cash, false billing ...
  28. [28]
    11 Statistics Why No Organization Is Immune To Financial Fraud
    Organizations around the world lose approximately five percent of their annual revenues to financial fraud, according to a survey by The Association of ...
  29. [29]
    Preventing and Detecting Occupational Fraud - NJCPA
    Sep 20, 2024 · The most common form of occupational fraud is asset misappropriation, or the theft of an employing organization's assets, being present in 89% of fraud cases.
  30. [30]
    What Are the Most Common Asset Misappropriation Schemes and ...
    Asset misappropriation is a form of fraud that involves the theft or misuse of an organization's assets by an employee or other individuals who have access to ...The full story · The Most Common Types of... · Other Common Types of Asset...
  31. [31]
    Government Fraud: Understanding Occupational Misconduct ... - ACFE
    Nov 2, 2023 · While occupational fraud refers to using one's occupation for personal enrichment through the deliberate misuse or misappropriation of the ...
  32. [32]
    Woman Pleads Guilty to Misappropriating Funds for Care of COVID ...
    Feb 1, 2022 · A Michigan woman pleaded guilty today in the Eastern District of Michigan to stealing government funds that were designed to aid medical providers.
  33. [33]
    Nonprofit embezzlement cases: examples to learn from - BoardEffect
    Sep 5, 2024 · Examples include an arts center losing $1.48M, a CEO embezzling $1.2M, a CFO writing fraudulent checks, and a labor union losing $42M.
  34. [34]
    Misappropriation of Public Funds - California Penal Code Section 424
    It's commonly known as misuse of public funds. In Los Angeles County, misappropriation of public funds is typically charged against local or California state ...
  35. [35]
    Breach of Fiduciary Duty: Misappropriation of Funds
    Aug 8, 2025 · When misappropriation of funds is involved, the breach violates fiduciary principles and can also constitute theft or fraud under state laws.
  36. [36]
    The Consequences of Theft and Embezzlement Charges in ...
    May 13, 2025 · Restitution and fines: Courts may require the defendant to repay the misappropriated funds through restitution, in addition to other penalties.
  37. [37]
    18 U.S. Code § 1839 - Definitions - Law.Cornell.Edu
    (5) the term “misappropriation” means— (A) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was ...
  38. [38]
    18 U.S. Code § 1831 - Economic espionage - Law.Cornell.Edu
    Economic espionage includes stealing, obtaining, or possessing trade secrets, or copying, altering, or transmitting them, to benefit a foreign entity.
  39. [39]
    Justice Manual | 1122. Introduction to the Economic Espionage Act
    The Economic Espionage Act of 1996 addresses trade secret theft, criminalizing both foreign and commercial theft, and includes forfeiture and civil enforcement.
  40. [40]
    Explaining the Defend Trade Secrets Act - American Bar Association
    The DTSA gives American companies the opportunity to protect against and remedy misappropriation of important propriety information in federal court.
  41. [41]
    The Defend Trade Secrets Act: An Overview and Key Developments
    The DTSA provides a private civil cause of action for victims of trade secret espionage or theft where a trade secret has been misappropriated.
  42. [42]
    IP Theft: Definition and Examples | Fortra's Digital Guardian
    Dec 14, 2021 · Examples of IP Theft · 1. Electric vehicle manufacturers dispute over stolen trade secrets. · 2. Biotech company employee steals data on the third ...
  43. [43]
    Series: Types of Industrial Espionage
    May 10, 2022 · Intellectual Property Theft. IP theft includes the theft of technical documents and drawings, source code, pricing sheets, manufacturing ...
  44. [44]
    5 Famous Trade Secret Cases - Vondran Legal
    Jul 12, 2023 · Here are five notable examples of companies that almost lost their highly prized trade secrets. Coca-Cola: In one of the most iconic trade ...
  45. [45]
    2024: A Year of Trade Secret Cases in Review | Articles | Finnegan
    Jan 13, 2025 · 2024 was a busy year for US trade secret law. Many cases have had or are expected to have significant effects on present and future actions and parties in the ...
  46. [46]
    [PDF] executive summary china: the risk to corporate america - FBI
    The annual cost to the U.S. economy of counterfeit goods, pirated software, and theft of trade secrets is between $225 billion and $600 billion.<|control11|><|separator|>
  47. [47]
    What is Trade Secret Misappropriation? - MoloLamken
    Trade secret misappropriation occurs when a trade secret has been wrongfully taken or disclosed without consent.
  48. [48]
    The Defend Trade Secrets Act: Five Key Lessons | Pierce Atwood
    Apr 9, 2018 · Under the DTSA, an employer cannot stop an employee from taking a new job simply because the employee has been exposed to, and may retain memory ...
  49. [49]
    ORI Policy on Plagiarism - The Office of Research Integrity
    The theft or misappropriation of intellectual property includes the unauthorized use of ideas or unique methods obtained by a privileged communication, such as ...
  50. [50]
    Definition of Research Misconduct | ORI
    Research misconduct means fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results.
  51. [51]
    An International Study of Research Misconduct Policies - PMC - NIH
    Misappropriation refers to the unlawful presentation of another person's result, idea, plan, observation, or data as one's own research. Germany. Scientific ...
  52. [52]
    Ethical issues in research :10 Types of Scientific Misconduct - Enago
    Dec 8, 2024 · Common Types of Scientific Misconduct · Misappropriation of Ideas · Plagiarism · Self-plagiarism · Impropriety of Authorship · Failure to Comply with ...
  53. [53]
    Famous Plagiarism Cases in Science: Biggest History Scandals
    Aug 22, 2025 · What Constitutes Plagiarism in Scientific Research? · Case 1: Elias Alsabti – The Phantom Researcher · Case 2: Bharat Aggarwal – Curcumin ...
  54. [54]
    French physicist accused of plagiarism seems set to lose prestigious ...
    Apr 6, 2017 · French physicist accused of plagiarism seems set to lose prestigious job. Science popularizer Étienne Klein declines to step down, says his ...
  55. [55]
    Cases of Plagiarism Handled by the United States Office of ...
    This paper is a historical review of the 19 ORI plagiarism cases, describing the characteristics of those respondents, the PHS administrative actions taken ...
  56. [56]
    Research Misconduct Definitions Adopted by U.S. ... - PubMed Central
    Unethical authorship other than plagiarism, 26/183 (14.2%) ; Other deception involving data manipulation, 24/183 (13.1%) ; Misappropriation of property/theft, 19/ ...
  57. [57]
    Case Summaries | ORI - The Office of Research Integrity
    This page contains cases in which administrative actions were imposed due to findings of research misconduct.
  58. [58]
    Scientific misconduct: falsification, fabrication, and misappropriation ...
    Scientific misconduct: falsification, fabrication, and misappropriation of credit, a chapter by David Vaux published in Tracey Bretag, editor, Handbook of ...
  59. [59]
    Theft Crimes: A Survey Under the Common Law and Modern Codes
    A person who wrongfully keeps property temporarily, but intends to return it later, is not guilty of common-law embezzlement.
  60. [60]
    18 U.S. Code § 641 - Public money, property or records
    Whoever embezzles, steals, purloins, or knowingly converts to his use or the use of another, or without authority, sells, conveys or disposes of any record, ...
  61. [61]
    1638. Embezzlement Of Government Property -- 18 U.S.C. § 641
    Embezzlement is the fraudulent appropriation of property by a person to whom such property has been entrusted, or into whose hands it has lawfully come.
  62. [62]
    18 U.S. Code Chapter 31 Part I - EMBEZZLEMENT AND THEFT
    18 U.S. Code Chapter 31 Part I - EMBEZZLEMENT AND THEFT · § 641. Public money, property or records · § 642. Tools and materials for counterfeiting purposes · § 643 ...
  63. [63]
    SECTION 155.05 Larceny - NYS Open Legislation | NYSenate.gov
    Larceny includes a wrongful taking, obtaining or withholding of another's property, with the intent prescribed in subdivision one of this section.Missing: United | Show results with:United
  64. [64]
    18 U.S. Code § 1836 - Civil proceedings - Law.Cornell.Edu
    The court may appoint a special master to locate and isolate all misappropriated trade secret information and to facilitate the return of unrelated property and ...Missing: key | Show results with:key<|separator|>
  65. [65]
    617 - United States Sentencing Commission
    These sections address the most basic forms of property offenses: theft, embezzlement, transactions in stolen goods, and simple property damage or destruction.
  66. [66]
    What Civil Remedies are Available Under the Defend Trade Secrets ...
    Oct 30, 2024 · Injunctions: An injunction can be available to prevent the disclosure of trade secrets, although courts will be reluctant to enter an injunction ...
  67. [67]
    CIVIL PRACTICE AND REMEDIES CODE CHAPTER 134A. TRADE ...
    (a-1) On application to the court, an injunction shall be terminated when the trade secret has ceased to exist, but the injunction may be continued for an ...<|separator|>
  68. [68]
    HOA Misappropriation of Funds in Florida: Warning Signs & Legal ...
    Oct 13, 2025 · Courts can issue injunctions to stop ongoing misappropriation, freeze association accounts to prevent further theft, remove board members ...
  69. [69]
    CACI No. 4409. Remedies for Misappropriation of Trade Secret
    Apr 2, 2025 · If neither actual loss nor unjust enrichment is provable, Civil Code section 3426.3(b) provides for a third, alternate remedy: a reasonable royalty.
  70. [70]
    Civil Fraud Claims: A Guide to Legal Actions and Remedies
    Feb 27, 2025 · Remedies: The claimant may seek damages to be restored to their original financial position before the fraudulent misrepresentation occurred.
  71. [71]
    Remedies for trade secret misappropriation - Reuters
    "stop the bleeding" or "plug the dike" to prevent the continued ...
  72. [72]
    Powerful Remedies Against Trade Secret Misappropriation Abroad ...
    Feb 4, 2022 · These remedies include the imposition of an injunction, disgorgement of defendants' worldwide profits on the sale of goods and services ...
  73. [73]
    Defend Trade Secrets Act vs. Uniform Trade Secrets Act
    Aug 6, 2018 · The Uniform Trade Secrets Act (UTSA), a model law governing civil actions for trade secret misappropriation that was first published more ...
  74. [74]
    Defenses to California and Federal Trade Secret Claims - Bona Law
    Jan 21, 2021 · California and federal laws protect trade secrets and allow owners to bring legal claims for misappropriation.
  75. [75]
    Defending Trade-Secret Misappropriation Allegations - Finnegan
    Independent development is a complete defense to misappropriation because it destroys the plaintiff's third required showing.
  76. [76]
    Trade Secret defenses - independent creation - Vondran Legal
    Jul 29, 2024 · Defend Trade Secrets Act (DTSA): The DTSA provides a federal cause of action for trade secret misappropriation and allows defendants to argue ...
  77. [77]
    How Can I Defend Against Claims of Trade Secret Misappropriation?
    Another compelling defense against trade secret misappropriation is to prove that you independently developed or lawfully acquired the information at issue.<|control11|><|separator|>
  78. [78]
    Defenses Against Breach of Fiduciary Duty Claims
    Sep 26, 2024 · Good faith – The simplest defense offered to an accusation of breach is to argue that you acted in good faith. · Compliance with contractual ...
  79. [79]
    How Can I Defend Myself Against a Claim of Misappropriation of ...
    Apr 23, 2024 · In this blog post, we have outlined some of the defenses that we commonly see applied in trade secret claims. ... legal advice from a licensed ...
  80. [80]
    Common Defenses to Breach of Fiduciary Claims - HAN LLP
    Dec 31, 2021 · Overview of Fiduciary Duties · Defense 1. No Fiduciary Relationship Exists · Defense 2. Statute of Limitations Defense · Defense 3. The Business ...
  81. [81]
    Foundations of Law - Defenses to Trade Secret Actions - Lawshelf
    Although there may be a great variety of arguments available to an attorney defending a client against a trade secret action, there are three basic defenses ...
  82. [82]
    6-3 AFFIRMATIVE DEFENSES TO TRADE SECRET CLAIMS
    ... defenses in misappropriation cases include, among others, those based the following legal principles: • statute of limitations; • preemption; • independent ...
  83. [83]
    Relationship Between Internal Controls & Fraud - Inspector General
    The impact that strong internal controls has in deterring fraud and limiting exposure if fraud does occur is irrefutable.
  84. [84]
    Top Four Internal Controls to Prevent Fraud - Caseware
    Nov 1, 2023 · 1. Internal and external audits · 2. Segregation of duties · 3. Anti-fraud policies and ethical code of conduct · 4. Accurate and up-to-date ...
  85. [85]
    Top Ten Internal Controls to Prevent And Detect Fraud!
    Use a system of checks and balances to ensure no one person has control over all parts of a financial transaction. · Reconcile agency bank accounts every month.
  86. [86]
    'Reasonable Measures' For Protecting Trade Secrets: A Primer
    This article offers practical guidance regarding what the undefined “reasonable measures” requirement might mean under US trade secret laws.
  87. [87]
  88. [88]
    What Are the Best Practices for Protecting Confidential Information ...
    May 16, 2024 · Use password protection on files that include trade secrets or otherwise confidential information. Keep a log of who has accessed these ...
  89. [89]
    Trade Secret Protection Overview and Best Practices - Dentons
    Aug 7, 2023 · Trade secrets are protected under Federal law (DTSA) and individual state laws (usually under some form of the UTSA).
  90. [90]
    7 Best Practices to Prevent Intellectual Property Theft - Syteca
    Jul 7, 2023 · 7 best practices to prevent intellectual property theft · 1. Identify the most valuable data · 2. Find cybersecurity gaps and weak spots · 3.
  91. [91]
    How To Protect Your Company Trade Secrets
    One of the best practices for protecting a company's trade secrets is to assign an individual or a team to enforce the policies and procedures. When a company's ...
  92. [92]
    Research Security - DNI.gov
    Research security is defined as safeguarding the research enterprise against the misappropriation of research and development.
  93. [93]
    Best Practices For Promoting Research Integrity
    Primary and collateral research data should be recorded in a form that allows access for analysis and review. Research data should always be immediately ...
  94. [94]
    Research Security | NSF - National Science Foundation
    Research security: Safeguarding the research enterprise against the misappropriation of research and development to the detriment of national or economic ...The Research on Research... · Research Security Training · Guidelines
  95. [95]
    Ten Simple Rules for Protecting Research Integrity - PMC - NIH
    Oct 1, 2015 · All integrity policies should mandate whistleblowing on integrity issues. To facilitate this, all institutions should provide career protection ...
  96. [96]
    How to Protect Your Business Against Asset Misappropriation
    Jul 1, 2024 · Strategies to combat asset misappropriation include strong internal controls, employee education, surveillance technology, promoting an ethical ...
  97. [97]
    Strengthening internal controls to prevent fraud - Wolters Kluwer
    Jul 9, 2025 · Internal controls should be intentionally designed to address potential fraud schemes that are seamlessly integrated into day-to-day operations.
  98. [98]
    Embezzlement | Fraud, Misappropriation, Theft - Britannica
    Embezzlement, crime generally defined as the fraudulent misappropriation of goods of another by a servant, an agent, or another person.
  99. [99]
  100. [100]
  101. [101]
    Trade Secret Basics FAQ - Nolo
    Sep 11, 2023 · What is misappropriation? Every state has a law prohibiting the theft or disclosure of trade secrets. Most of these laws are derived from the ...
  102. [102]
    Understanding the Uniform Trade Secrets Act - Freiberger Haber LLP
    Apr 4, 2018 · Misappropriation is the use of a trade secret without permission. Under the UTSA, misappropriation occurs when a trade secret is acquired by “ ...
  103. [103]
    Criminal Theft of Trade Secrets - Fish & Richardson
    Mar 8, 2021 · Unlike patents, which can only be enforced by private parties in civil court, trade secret misappropriation can lead to criminal liability.
  104. [104]
    Trade Secret Infringement & Potential Legal Defenses - Justia
    Oct 15, 2025 · Misappropriation occurs when a trade secret is improperly acquired or disclosed. If a person or entity discloses or publishes a trade secret ...
  105. [105]
    Understanding Trade Secret Misappropriation: A Guide for In-House ...
    Apr 15, 2025 · Misappropriation occurs in three primary scenarios. First, when someone knowingly acquires a trade secret through improper means. Second, when they disclose or ...
  106. [106]
    Is Theft of Trade Secrets a Crime Under Federal Law?
    Trade secret theft can indeed be a crime under federal law, particularly under the Economic Espionage Act and the Computer Fraud and Abuse Act.
  107. [107]
    New York Embezzlement Penalties | NY Criminal Lawyers Saland Law
    The more money that is alleged to have been stolen in an embezzlement case increases the likelihood of a long-term prison sentence. Just like any other theft ...Missing: misappropriation United
  108. [108]
    Fiduciary Negligence: Meaning, Types, Penalties - Investopedia
    Dec 14, 2021 · Penalties for fiduciary negligence are usually monetary compensation but can also include criminal charges.
  109. [109]
    Potential Consequences of Breaching Fiduciary Duty
    Mar 6, 2025 · Penalties for breach of fiduciary duty include hefty fines, restitution payments and potential imprisonment.
  110. [110]
    Understanding Civil Remedies: How Restitution and Asset Forfeiture ...
    Aug 2, 2024 · “Criminal penalties hold the offender accountable, while civil remedies strive to make the victim whole and disrupt the profits from illegal ...
  111. [111]
    For certain civil actions, the California Supreme Court Affirms the ...
    Under Section 496, civil theft is punishable by treble damages and an award of attorney's fees to the prevailing plaintiff.<|separator|>
  112. [112]
    Embezzlement or Misappropriation is a Breach of Fiduciary Duty
    Aug 21, 2025 · A civil lawsuit for embezzlement or misappropriation pursues civil remedies (financial damages) associated with the failures, actions, and ...
  113. [113]
    BC Supreme Court orders repayment in family estate ...
    Jul 30, 2024 · The BC Supreme Court has ruled in favour of a plaintiff in her claim against her brother regarding misappropriating their late mother's funds.<|control11|><|separator|>
  114. [114]
    Penalties of Breach of Fiduciary Duty | Gearheart Law Blog
    May 3, 2024 · Fines: Fiduciaries may face substantial fines if their breach involves criminal acts such as fraud or theft. · Imprisonment: In severe cases, ...
  115. [115]
    Intellectual Property: What do the statistics indicate? - CRI Group
    Intellectual property theft costs the US $225 billion to $600 billion annually. The average cost of a data breach in the US is $8.64 million. The average ...
  116. [116]
    [PDF] IMPACT OF LOST TECHNOLOGY
    IP theft costs the U.S. economy hundreds of billions of dollars annually and reduces. U.S. companies' research and development (R&D) investment and innovation.”.
  117. [117]
    [PDF] The Impact of Intellectual Property Theft on the Economy
    Aug 1, 2012 · Decreased incentives to innovate resulting from IP infringement reduce economic growth, weaken the nation's competitiveness, and decrease job.
  118. [118]
    Intellectual Property Theft: A Threat to Working People and the ...
    Stolen or otherwise illegitimate content undermines the value of creative professionals' work and threatens their hard-won pay and benefits.
  119. [119]
    Intellectual Property Theft and Commercial Fraud - ICE
    Aug 20, 2025 · These crimes result in substantial economic losses for businesses. Criminals sells fake goods at low prices, creating unfair and illegal ...
  120. [120]
    [PDF] A Critique of the Misappropriation Theory of Insider Trading
    Mar 23, 2025 · The problem with the misappropriation theory is that it replaces the relatively specific statutory require- ment of deception in the course of a ...Missing: criticisms difficulties
  121. [121]
    [PDF] Uneasy Doctrinal Compromise of the Misappropriation Theory of ...
    After a long gestation in the circuit courts, the misappropriation theory was recently endorsed by the Supreme Court in United States v. O'Hagan.9 At first ...
  122. [122]
    Introduction to SEC v. Panuwat: Understanding “Shadow” Insider ...
    Apr 29, 2024 · Traditionally, the misappropriation theory posits that a violation occurs when an individual exploits confidential information, breaching a duty ...Missing: difficulties | Show results with:difficulties
  123. [123]
    [PDF] Are Improper Acquisition or Threatened Misappropriation of Trade ...
    Dec 3, 2023 · This Comment studies the intersection of Article III standing and federal trade secret law. It is the first piece to provide a taxonomy of trade ...
  124. [124]
    [PDF] Challenges In Proving Trade Secret Misappropriation - IJIRT
    The realm of trade secret law poses several hurdles in trade secret cases, which might intensify the difficulties related to the protection and enforcement of ...
  125. [125]
    Key Takeaways: Tips for Navigating Trade Secret Misappropriation
    Aug 18, 2025 · Civil Enforcement. Trade secret litigation often relies on circumstantial evidence, such as employee movements between competitors or failed ...
  126. [126]
    [PDF] Criminal Enforcement of Trade Secret Theft
    Thus, tensions over IP can arise that create unique challenges for innovative SMEs regarding theft of their trade secrets. Disputes over theft of trade secrets ...
  127. [127]
    [PDF] To Catch a Thief: The Misappropriation Theory and Securities Fraud
    In reaching its decision the court relied on several federal appeals courts' decisions in which other areas of the law have found "deceitful misappropriation.
  128. [128]
    International trade secret protection: challenges and strategies
    Challenges in Cross-border Trade Secret Protection · 1. Inconsistent Trade Secret Laws · 2. Challenges with Enforcement · 3. Cultural and Operational Differences.
  129. [129]
    Across the Border: Global Enforcement of Trade Secrets - Finnegan
    Moreover while many countries may provide for misappropriation actions, litigation involving cross-border parties and conduct often involves unique challenges ...Missing: overbroad | Show results with:overbroad<|separator|>
  130. [130]
    The Proliferation of Trade Secret Misappropriation and U.S. ...
    Dec 11, 2024 · US District Courts can award damages for misappropriated trade secrets provided that any act in furtherance of the misappropriation occurred within the US.
  131. [131]
    [PDF] The Restatement's Rejection of the Misappropriation Tort
    misappropriation tort has withered with the expansion of statutory intellectual property rights, particularly the Copyright Act of 19761 and the Lanham.
  132. [132]
    Trade secret protection and product market dynamics - ScienceDirect
    Economically, we find a 16% increase in trade secret disclosure and corresponding 6% decline in patenting activity post-UTSA. This ultimately weakens rivals' ...
  133. [133]
    International News Service v. Associated Press | 248 U.S. 215 (1918)
    It has all the attributes of property necessary for determining that a misappropriation of it by a competitor is unfair competition because contrary to good ...
  134. [134]
    INTERNATIONAL NEWS SERVICE v. ASSOCIATED PRESS. | US Law
    It has all the attributes of property necessary for determining that a misappropriation of it by a competitor is unfair competition because contrary to good ...
  135. [135]
  136. [136]
    Phillips 66 and the $1.2 Billion Mistake: A Cautionary Tale on Trade ...
    Aug 12, 2025 · After a lengthy trial in the fall of 2024, the jury found Phillips liable for trade secret misappropriation and awarded Propel $604.9 million ...
  137. [137]
    Talkin' Trade: Unpacking Recent ITC Trade Secret Misappropriation ...
    Aug 7, 2025 · This case truly highlights the ITC's powerful enforcement capabilities in trade secret matters, and it underscores the complex interplay of ...
  138. [138]
    Four Trade Secret Developments to Follow in 2025 - Faegre Drinker
    Jan 16, 2025 · The Seventh Circuit confirmed that the federal Defend Trade Secrets Act (DTSA) allows for damages on misappropriation-related sales outside the ...
  139. [139]
    5 Trends to Watch: 2025 Trade Secrets | GT L&E Blog
    Jan 22, 2025 · In 2024, courts issued several significant decisions concerning damages awards in trade secret misappropriation cases. Three recent federal ...
  140. [140]
    Recent Developments in the Law of Federal Property Fraud
    Sep 11, 2025 · In response to concerns that the fraudulent-inducement theory could lead to overbroad enforcement, the Kousisis Court emphasized the need ...
  141. [141]
    Trade Secrets 2025 - USA | Global Practice Guides
    Apr 24, 2025 · The firm expects that courts will continue to place high burdens of proof on plaintiffs asserting trade secret misappropriation claims, ...