← Notes

Protecting Trade Secrets Across Africa

Your most valuable IP has no registration

Patents receive the attention, but trade secrets constitute the majority of commercially valuable intellectual property for most African technology companies. Proprietary algorithms, customer datasets, pricing models, supplier relationships, operational playbooks, and market intelligence — these unregistered assets frequently represent 60–80% of a startup's defensible competitive advantage. Yet fewer than 25% of the African startups we advise have implemented formal trade secret protection programmes, and fewer than 10% have contractual frameworks that would survive scrutiny in the jurisdictions where they operate.


The consequences of this gap are severe and increasingly visible. In our experience advising across 18 African markets, trade secret misappropriation — whether through departing employees, former contractors, or compromised business partners — ranks among the top three causes of competitive erosion for scaling startups. The challenge is compounded by a fragmented legal landscape: trade secret protection varies dramatically across African jurisdictions, enforcement mechanisms remain underdeveloped, and the speed of talent mobility in concentrated tech ecosystems means that confidential information can migrate to a competitor within weeks of a key departure. This guide provides a practical framework for protecting what may be your most strategically important assets.


The legal landscape across key jurisdictions

Unlike patents and trademarks, trade secrets have no unified continental framework in Africa. Protection derives from a patchwork of common law principles, statutory provisions, and contractual mechanisms that vary significantly by jurisdiction. Understanding these differences is essential for any multi-market startup.


South Africa offers the most developed trade secret regime on the continent, rooted in common law principles of breach of confidence supplemented by the Promotion of Access to Information Act and the Competition Act. South African courts have consistently recognised trade secrets as protectable interests, and the requirements are well established: the information must be confidential, have commercial value derived from its secrecy, and the holder must have taken reasonable steps to maintain confidentiality. Critically, South African law permits applications for interim interdicts — emergency injunctive relief — that can be obtained within 48–72 hours in urgent cases, providing meaningful enforcement capability. The unlawful competition doctrine under South African common law also provides a cause of action even absent a contractual relationship, which is significant when information leaks through third parties or business partners rather than employees.


Nigeria's trade secret protection operates primarily through common law and the tort of breach of confidence, with limited statutory codification. The principal challenge is enforcement speed: obtaining injunctive relief through Nigerian courts typically requires 3–6 months, during which time misappropriated information may have already been commercially exploited. The Nigerian Copyright Act provides some supplementary protection for trade secrets embodied in written or coded form, but this is narrow and uncertain. In practice, Nigerian courts have upheld trade secret claims where the claimant can demonstrate a clear obligation of confidence — whether arising from employment, contract, or the circumstances of disclosure — but the evidentiary burden is substantial. Founders operating in Nigeria should rely heavily on contractual protections rather than common law claims, as the contractual route provides clearer legal grounds and more predictable outcomes.


Kenya occupies a middle position, with the Industrial Property Act 2001 providing explicit statutory recognition of trade secrets and undisclosed information. Section 32 of the Act defines protectable trade secrets and establishes that any person who discloses, acquires, or uses trade secrets without consent commits an actionable wrong. Kenya's courts have proven relatively efficient in handling IP matters, with the High Court's specialised IP division capable of issuing interim orders within 2–4 weeks. However, enforcement against parties who have already left Kenya — common in a mobile pan-African workforce — remains challenging. Egypt's trade secret protection derives from the Intellectual Property Rights Protection Law of 2002, which includes specific provisions on undisclosed information, while Ghana relies primarily on common law breach of confidence principles similar to those in Nigeria.


Building the contractual protection framework

Given the inconsistency of statutory protections, contracts are the primary line of defence for trade secrets across African markets. In our experience, an effective contractual framework requires four interlocking agreements, each serving a distinct purpose and each requiring jurisdiction-specific drafting.


The first is a comprehensive confidentiality and non-disclosure agreement that goes well beyond the standard templates most startups use. Effective NDAs in the African context must explicitly define what constitutes confidential information — generic catch-all definitions are routinely struck down by courts across the region. The agreement should enumerate categories of protected information including source code, algorithms, business methodologies, customer lists, pricing structures, supplier terms, and strategic plans, while specifying the duration of obligations. In our experience, perpetual confidentiality obligations for true trade secrets are enforceable in South Africa and Kenya but face resistance in Nigerian courts, where 3–5 year time-limited obligations are more reliably upheld. The NDA should also address return and destruction of materials upon termination, with certification requirements that create an evidentiary record.


The second element is the invention assignment and IP ownership agreement, which ensures that all intellectual property created during employment belongs to the company. This is particularly critical in African markets where the default position on employee-created IP varies by jurisdiction. In South Africa, the Patents Act provides that inventions made in the course of employment belong to the employer, but this presumption can be rebutted, and it does not clearly extend to non-patentable trade secrets. In Nigeria and Kenya, the position is less certain, making explicit contractual assignment essential. The agreement should cover inventions, discoveries, improvements, software, methodologies, and any other intellectual output, with provisions requiring employees to disclose and formally assign all such creations. We recommend including a schedule of prior inventions that the employee retains, which both protects the employee's pre-existing rights and creates a clear boundary for company ownership.


The third component is non-compete and non-solicitation agreements, which are the most jurisdiction-sensitive element of the framework. South African courts will enforce reasonable restraints of trade, applying a test of reasonableness that considers duration, geographic scope, and the nature of restricted activities — restraints of 12–24 months with clearly defined competitive boundaries are regularly upheld. Nigerian courts are considerably more sceptical of non-competes, and recent judicial trends suggest that only narrowly drawn restrictions of 6–12 months with specific geographic and activity limitations will survive challenge. Kenya falls between these positions. Across all jurisdictions, non-solicitation clauses — preventing departing employees from soliciting former colleagues or clients for a defined period — face lower enforcement thresholds and are more reliably upheld than non-competes. We advise structuring these as separate, severable provisions so that if a court strikes down the non-compete, the non-solicitation clause survives.


The fourth element, often overlooked, is the third-party confidentiality framework governing relationships with contractors, vendors, partners, and API integrators. In our portfolio analysis, approximately 40% of trade secret breaches originate not from employees but from third parties who gain access to sensitive information through business relationships. Contractor NDAs should include audit rights, data handling specifications, breach notification obligations with 24–48 hour timelines, and liquidated damages provisions. For technology partners and API integrators, the agreement should specify permitted use cases, data segregation requirements, and provisions addressing what happens to shared information upon termination of the business relationship.


Operational security measures that courts actually care about

Contracts alone are insufficient. Across every major African jurisdiction, courts require evidence that the trade secret holder took reasonable steps to maintain secrecy as a precondition for legal protection. A company that treats its proprietary algorithms as confidential in its agreements but allows unrestricted access across the organisation will find its legal claims fatally undermined. The reasonable steps requirement is both a legal necessity and a practical imperative.


Information classification is the foundation. Every startup handling trade secrets should implement a three-tier classification system: general business information with no special restrictions, confidential information accessible only to employees and authorised contractors on a need-to-know basis, and highly confidential or restricted information accessible only to specifically named individuals with documented authorisation. In practice, fewer than 15% of the startups we advise have any formal classification system when they first engage with us. Implementing one typically requires 2–4 weeks and $5,000–$15,000 in legal and consulting costs, but it transforms the company's ability to enforce trade secret claims.


Technical access controls must mirror the classification system. Role-based access control for code repositories, databases, and internal documentation is essential — yet we routinely encounter startups where every engineer has root access to every system and every employee can access the full customer database. Specific measures that courts have cited favourably in African trade secret cases include encrypted storage for classified information, access logging and audit trails, multi-factor authentication for sensitive systems, code repository access limited by project and seniority, physical security for servers and hardware in jurisdictions where cloud infrastructure is limited, and documented access revocation procedures when employees change roles or depart. The cost of implementing these controls is modest — typically $10,000–$30,000 for a company of 50–150 employees — but the absence of such measures has been cited as grounds for denying trade secret protection in cases across South Africa, Kenya, and Nigeria.


The employee departure playbook

The highest-risk moment for trade secret misappropriation is the period surrounding an employee's departure, particularly when the departing individual joins a competitor or launches a competing venture. African tech ecosystems are small and concentrated — Lagos, Nairobi, Cape Town, and Cairo each have tech communities where senior professionals know one another, and the pool of experienced talent in any given vertical is limited. This concentration means that when a senior engineer or product leader departs, they almost certainly move to a company operating in the same or adjacent space.


An effective departure protocol should begin before the resignation conversation ends. Within the first 24 hours, the company should preserve all electronic records associated with the departing employee — email archives, chat histories, file access logs, and code commit histories. This preservation serves dual purposes: it creates evidence for potential future claims and it enables the company to identify whether any unusual data access or transfer occurred in the period preceding the resignation. In our experience, approximately 30% of trade secret misappropriation cases involve data exfiltration that occurred in the 2–4 weeks before the employee formally resigned, making pre-departure activity analysis essential.


The exit interview should include a structured reminder of confidentiality obligations, delivered both verbally and in writing. We recommend a departure acknowledgment letter that the employee signs, confirming their understanding of ongoing obligations, listing the categories of information they accessed during their employment, certifying that they have returned or destroyed all company materials and data, and acknowledging the specific duration and scope of any non-compete or non-solicitation restrictions. This letter is not merely procedural — it creates a contemporaneous record that significantly strengthens enforcement actions if a breach occurs. Access revocation should be immediate and comprehensive: all system credentials, VPN access, cloud storage permissions, code repository access, and physical access credentials should be terminated within hours of the departure, not days. Garden leave provisions — where the employee remains on payroll but is excluded from the workplace during the notice period — are enforceable in South Africa, Kenya, and Nigeria, and we recommend them for any employee with access to tier-one trade secrets, despite the cost of typically 1–3 months of salary.


When prevention fails: enforcement and remedies

Despite best efforts at prevention, trade secret misappropriation does occur, and founders must understand the enforcement options available across African jurisdictions. Speed is the overriding concern — once trade secrets are disclosed or commercially exploited, the damage is often irreversible. The primary remedy is injunctive relief: a court order preventing the misappropriator from continuing to use or disclose the information.


In South Africa, the interim interdict process is relatively efficient. An applicant must demonstrate a prima facie right, a well-grounded apprehension of irreparable harm, that the balance of convenience favours granting the interdict, and the absence of an adequate alternative remedy. Urgent applications can be heard within days, and South African courts have developed a sophisticated jurisprudence around trade secret interdicts. Legal costs for an urgent interdict application typically range from $15,000–$40,000, with the successful party generally recovering 60–70% of costs from the losing party.


Kenya's position is improving, with the IP division of the High Court providing a more specialised forum for trade secret claims. Interim injunctions can be obtained within 2–4 weeks in standard cases and faster in genuinely urgent matters. Nigeria remains the most challenging enforcement environment, where court delays and procedural complexity mean that injunctive relief may take months. For Nigerian operations, we strongly recommend including arbitration clauses in all employment and contractor agreements, with the Lagos Court of Arbitration or similar recognised institution specified as the forum. Arbitration proceedings can deliver interim measures within 2–6 weeks and final awards within 6–12 months, significantly faster than the court system.


Beyond injunctive relief, damages are available in all major jurisdictions but present significant quantification challenges. African courts will award compensatory damages for provable losses, but the difficulty lies in establishing the monetary value of misappropriated trade secrets — particularly for early-stage companies where revenue attribution is complex. Liquidated damages clauses in employment and contractor agreements can address this challenge by pre-establishing the compensation payable for breach, though courts in all jurisdictions retain discretion to reduce amounts they consider punitive rather than compensatory. We advise setting liquidated damages at levels that reflect reasonable estimates of likely harm — typically 12–24 months of the individual's total compensation for senior employees, or a defined multiple of contract value for third-party arrangements.


The bottom line

Trade secrets are the invisible infrastructure of competitive advantage, and for most African technology companies, they represent far more value than any registered intellectual property. Yet protecting them requires deliberate, sustained effort across three dimensions: contractual frameworks tailored to each jurisdiction where the company operates, operational security measures that satisfy the reasonable steps threshold courts demand, and departure protocols that minimise the risk of information walking out the door with departing talent. The total investment in a comprehensive trade secret protection programme — including legal drafting, technical controls, and process implementation — typically runs $20,000–$60,000 for a multi-market startup, a fraction of the value at risk. In an environment where enforcement remains imperfect and talent mobility is high, prevention is not merely preferable to cure — it is, in many cases, the only reliable protection available. Founders who treat trade secret protection as a foundational operating discipline rather than a legal afterthought build companies that are demonstrably harder to compete against and materially more valuable at exit.