As a special feature of our blog—guest postings by experts, clients, and other professionals—please enjoy this blog entry from Donal O’Connell, Managing Director of Chawton Innovation Services Ltd.

An audit is the examination of a specific aspect of an organization, ideally by someone independent of that organization.

The purpose of an audit is to provide independent assurance that an organization’s management, governance, and processes are operating effectively and that any associated assets are being properly and professionally managed.

The rationale for conducting a trade secret audit

Although trade secrets have been the neglected step-child of IP, this is slowly but surely changing for a variety of reasons:

  • Law changes (DTSA in USA; EU Directive on Trade Secret in Europe; Anti Unfair Competition Law in China).
  • Increased trade secret litigation particularly involving US companies but not exclusively so.
  • Growing interest in trade secrets by the tax authorities (e.g. OECD BEPS Guidelines, Patent Box Tax Regimes including trade secrets as qualifying IP).
  • Cyber criminals trying to steal trade secrets.
  • Companies embracing Open Innovation and sharing trade secrets with one another.
  • Pending trade wars which some link to trade secret theft.

Trade secrets are a very important part of any IP portfolio. It is no exaggeration to say that virtually every business possesses trade secrets, regardless of whether the business is small, medium or large.

The starting point:

For smaller organizations, the audit may be conducted across the entire organization in one go.

However, for larger organizations, it makes sense to divide the trade secret audit into smaller parts rather than trying to audit the entire organization in one go. A smart approach for conducting a trade secret audit is to begin in one area of the organization, conduct the audit there and learn from that exercise before expanding outward to other functions.

The typical approach when conducting an IP audit exercise

A trade secret audit should ideally be divided into the following phases:

  • Planning phase: A comprehensive plan is discussed and agreed with the client
  • Communication phase: Details of the project are communicated to those impacted
  • Interviews of key individuals phase: A series of interviews of key individuals are conducted
  • Data gathering phase: Various trade secret related documents are gathered from the client – including those specific to trade secrets (e.g. trade secret policy, process description, protection mechanisms, etc.) and those whose connection may not be immediately obvious but is in fact fundamental (e.g., key employment agreements, HR policies, IT policies, etc.)
  • Data analysis phase: All of the data gathered from the interviews conducted as well as the documents gathered is analyzed
  • Reporting phase: A report on the findings as well as recommendations is prepared and presented to the client
  • Wrap-up phase: Any outstanding issues on the project are addressed

The components of a trade secret audit

I suggest that there are three component parts to a proper and professional trade secret audit, namely:

  • Audit of the trade secret policies & procedures
  • Audit of the trade secret portfolio
  • Audit of the associated costs & valuations

The purpose of the first part of the audit is to sanity check if the corporate trade secret policy, procedures, processes and systems, education and governance are robust and fit for purpose and if not what enhancements need to be made.

The purpose of the second part of the audit is to examine each trade secret and the associated metadata, and determine if the trade secret warrants still being maintained as a trade secret, and if so, does it still meet the criteria to be defined as a trade secret. In order to conduct this part of the audit, having trade secret metadata is key. Trade secret metadata summarizes basic information about the trade secret, which can make finding and working with this unique form of IP much easier.

In the third part of the audit, the focus is on the costs and valuation of the trade secrets. However, it goes beyond this and should for example address any tax related issues.

Technology to support the audit

A trade secret asset management solution enables a trade secret audit to be conducted much more efficiently and effectively as a result. Such a solution is like an online library catalogue system, a register of all bibliographic items (including author’s name, book title, and even approximate location) found in a library. The catalogue is organized and indexed so that you can search by a variety of fields/indexes. Putting it simply we rely on library catalogues and its associated metadata to know what is available, and where.

Trade secret metadata summarizes information about the trade secret, which can make finding and working with this unique form of IP much easier.

Having such a trade secret asset management solution supports the trade secret audit process in numerous ways, such as:

  • It gives tremendous structure to the audit process
  • It allows data gathered during the audit exercise to be logged efficiently and effectively
  • It assists greatly in the data analysis phase of the audit
  • It enables much insightful reports to be generated
  • As the emphasis is on trade secret metadata rather than the trade secrets themselves, it allows the secrecy of such information to be maintained


You typically get what you measure. It is therefore crucial that a trade secret audit is conducted from time to time.

Companies generally gain tremendous value by taking a proactive, systematic approach to assessing their trade secrets in a comprehensive manner as described above.

A proper trade secret audit should involve the right people with business, technical and legal skills and competencies, knowledge and experience, given the unique nature of this form IP.

The findings of any trade secret IP audit should be reported to and discussed with senior management in the organization, given that trade secrets may be the most valuable assets the organization possesses.