AS
Bufete de abogados penalistas Alonso Sala
business_centerPractice Area

Business Secrets

Criminal defense against theft of intellectual property, client lists, and business know-how.

Trade Secrets: The Most Valuable Asset

In the knowledge economy, theft of Confidential Information is more damaging than theft of physical merchandise. The Penal Code (Arts. 278-280) protects 'Trade Secrets', punishing both the external spy and, especially, the disloyal employee who steals sensitive data to sell or start their own competition.

badgeThe Disloyal Employee (Art. 279 CP)

This is the most frequent case. A manager or employee with legitimate access to databases, prices, or strategic plans copies that information before leaving for the competition. They don't need to 'hack' anything; the crime lies in abusing their access for an illegitimate purpose. The penalty is 2 to 4 years in prison, plus disqualification.

Protection and Criminal Compliance

The best defense is prevention. We implement secret protection protocols, robust NDAs, and legal device monitoring systems so that, in case of theft, the evidence is strong and irrefutable at trial.

business_center

Why Alonso & Sala for Business Secrets?

Disloyal employee defense Arts. 278-280 CP: forensic expert access logs + demonstrate absence intent + preventive compliance NDAs.

  • verified_userDigital forensic expert access logs: DETAILED analysis company system access logs (Active Directory, VPN, file servers) + USB connected devices hours/days before dismissal resignation. Map legal vs irregular accesses (massive weekend downloads 2AM = suspicious). Emails sent personal accounts + Google Drive Dropbox downloads right before exit = theft proof.
  • verified_userDemonstrate absence intent acquired knowledge: differentiate legal memory knowledge acquired professional experience (business acumen NOT crime) vs systematic documentary theft impossible memorize. Supreme Court: using experience learned company NOT crime. But reproduce complex rates detailed client structures impossible obtain memory = presumes data theft needs documentary support. Defense: all knowledge public domain reverse engineering google.
  • verified_userPreventive compliance robust NDAs legal monitoring: PREVENTION best defense. Implement company secret protection protocols: robust NDAs specific post-contractual clauses (NO competition + NO client poaching) + legal monitoring systems work devices prior employee warning (Barbulescu Doctrine). Theft case: strong + irrefutable proof trial. Exit audits (exit interview) review devices before departure.
quiz

Business Secrets FAQs

Is it a crime to take the client list if I change companies?expand_more
Yes, it is the most common case (Art. 278 or 279 CP). The client list is not 'worker's memory', it is an intangible asset of the company. If you copy it, send it to your personal email, or use it to contact them from the new company, you commit a crime punishable by 2 to 4 years in prison.
What is considered a 'trade secret'?expand_more
Not just the Coca-Cola formula. It includes client lists, cost structures, commercial margins, strategic plans, or non-patented algorithms. Requirements: being secret, having business value, and the company having taken measures to protect it.
Does signing an NDA help?expand_more
It is vital. The NDA proves the company took measures to protect the information (requirement of the Trade Secrets Act). Violating the NDA is not just a civil breach, it is proof of intent in the crime of disclosure of secrets.
Can I hire a competitor's employee to bring me information?expand_more
Be careful. If you incite the employee to steal data, you are an inductor or necessary cooperator of the crime. Furthermore, your company can be criminally liable (legal entity) and face millionaire fines or closure.
Difference between industrial espionage and disclosure of secrets?expand_more
Espionage (Art. 278) is committed by someone who 'discovers' the secret (e.g., plants bugs, hacks). Disclosure (Art. 279) is committed by someone who already knew the secret lawfully due to their position (e.g., sales director) but disseminates or uses it illegally.
If I know prices by heart, can I use them?expand_more
The Supreme Court distinguishes between 'acquired knowledge' (business acumen) and reserved data. Using your experience is not a crime. But if you systematically reproduce complex rates that are impossible to memorize without documentary support, data theft is presumed.
Is it a crime if the information was public online?expand_more
No. What is public domain is not secret. The defense is usually based on proving that anyone could obtain that data by googling (Reverse Engineering).
What about Whistleblowing?expand_more
If you reveal secrets to report a crime (corruption, tax fraud), you are protected by the EU Directive if you use appropriate internal or external channels. But if you leak data to the press indiscriminately for revenge, there is no protection.
How is data theft proven?expand_more
Through computer forensic expertise. We analyze access logs, USB devices connected hours before dismissal, mass email sends to personal accounts, or unusual cloud downloads.
Can they search my work computer to prove it?expand_more
Yes, if the company warned it could do so. If there are well-founded suspicions, they can also request a court order to search personal devices if they are believed to contain the stolen data.
Can they fire me and also report me criminally?expand_more
Yes. Disciplinary dismissal (labor) and the complaint (criminal) are parallel paths. A criminal conviction makes it easier for the company to later claim civil compensation for damages (loss of profit).
I am a mental administrator, can I use my company's data for another of mine?expand_more
No. It is a crime of unfair administration concurrent with disclosure of secrets. The duty of loyalty prevents self-benefit at the expense of the managed company's assets.
When does the crime expire?expand_more
5 years after it was committed. But in continued secrets (permanent use of a stolen formula), the period may not start running while the secret is still being exploited.
What is the penalty for selling secrets to a foreign company?expand_more
These are crimes against intellectual or industrial property that may have aggravating factors. If it affects national interest or defense, we enter treason or espionage crimes, much more serious.
Is the receiving company liable?expand_more
Yes. Art. 280 CP punishes anyone who, knowing the illicit origin, 'uses' the secrets discovered by another. The company that hires the 'data thief' and takes advantage of them commits a crime.

Need Immediate and Expert Legal Assistance?

The judicial system is complex and can be relentless. Do not face it alone. We have the experience, technical knowledge, and human resources necessary to fight for you. Contact us today to schedule a confidential consultation and start building your defense.

Contact Alonso Sala

We use cookies to improve your experience. By continuing to browse, you accept our privacy policy.