About
AI Trade Secret Employee

AI Trade Secret Employee

Tracking Ai Trade Secret Employee legal and regulatory developments.

2 entries in Corporate Counsel Tracker

DOJ export indictment triggers new probe of Super Micro’s controls

The Department of Justice unsealed an indictment in March 2026 charging three individuals tied to Super Micro Computer—two former employees and one contractor—with conspiring to violate U.S. export controls. The defendants allegedly diverted approximately $2.5 billion worth of servers containing advanced AI technology, including Nvidia chips, to China between 2024 and 2025. The indictment names co-founder and former senior vice president Yih‑Shyan "Wally" Liaw and a general manager from Super Micro's Taiwan office, who prosecutors say coordinated shipments through a third-party intermediary to circumvent export restrictions. Super Micro itself is not charged and has stated it was not accused of wrongdoing.

Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.

Unauthorized AI tools have become endemic in corporate environments, with nearly half of all workers admitting to using unapproved platforms like ChatGPT and Claude at work. A 2025 Gartner survey found that 69% of organizations either suspect or have confirmed that employees are using prohibited generative AI tools, while research indicates the figure reaches 98% when accounting for all unsanctioned applications. The problem spans organizational hierarchies: 93% of executives report using unauthorized AI, with 69% of C-suite members and 66% of senior vice presidents unconcerned about the practice. Gen Z employees lead adoption at 85%, and notably, 68% of workers using ChatGPT at work deliberately conceal it from employers.

LawSnap Briefing Updated May 6, 2026

State of play.

  • Taiwan's courts are imposing criminal sentences under national security law for semiconductor trade secret theft. Taiwan's Intellectual Property and Commercial Court sentenced a former Tokyo Electron and TSMC employee to 10 years under the National Security Act, with three co-defendants receiving 2-to-6-year terms and Tokyo Electron's Taiwan subsidiary fined T$150 million and ordered to pay T$100 million in damages to TSMC (→ Taiwan Court Sentences Ex-Tokyo Electron Engineer to 10 Years for Stealing TSMC Trade Secrets).
  • Tokyo Electron simultaneously terminated an executive for undisclosed financial ties to Chinese semiconductor equipment competitors, surfacing the conflict-of-interest and loyalty-disclosure dimension of the same IP-protection problem (→ Tokyo Electron severs ties with executive Jay Chen over Chinese rival links[1][2][3]).
  • Shadow AI adoption inside enterprises has created a structural trade secret exposure that most companies cannot yet see. A 2025 Gartner survey found 69% of organizations suspect or have confirmed employees using prohibited generative AI tools, and one-third of employees admit to sharing enterprise research or datasets through unsanctioned platforms (→ Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.).
  • AI training platforms are soliciting employees' prior work product, which may be employer-owned. Mercor's model of paying individuals for work they contributed in prior roles creates a direct pipeline for inadvertent — or deliberate — trade secret exfiltration .
  • For counsel advising technology companies, semiconductor firms, or any employer with a proprietary-information program, the practical baseline is that trade secret risk now runs on three simultaneous vectors: deliberate theft by departing employees, executive conflicts with undisclosed competitor ties, and passive leakage through shadow AI tools and AI training solicitations.

Where things stand.

  • Taiwan's National Security Act is the operative enforcement vehicle for semiconductor IP theft. The TSMC/Tokyo Electron prosecution was brought under that statute's "core national technologies" provisions — not a conventional trade secret statute — which carries heavier criminal exposure and signals that Taiwan treats chip IP as a national security asset, not merely a commercial one (→ Taiwan Court Sentences Ex-Tokyo Electron Engineer to 10 Years for Stealing TSMC Trade Secrets).
  • Corporate liability follows individual criminal liability in Taiwan. Tokyo Electron's Taiwan subsidiary faced both a criminal fine and a civil damages award even though the company reported no material earnings impact and the stolen information did not leak externally — a significant data point for in-house counsel assessing containment arguments (→ Taiwan Court Sentences Ex-Tokyo Electron Engineer to 10 Years for Stealing TSMC Trade Secrets).
  • Undisclosed executive financial ties to competitors are an active termination and liability trigger. The Jay Chen termination at Tokyo Electron — involving financial relationships with investment vehicles funding Chinese chip equipment rivals — illustrates that conflict-of-interest policies need to reach beyond employment relationships to investment and advisory arrangements, particularly for executives with access to strategic or technical information (→ Tokyo Electron severs ties with executive Jay Chen over Chinese rival links[1][2][3]).
  • Shadow AI usage is pervasive at every organizational level, including the C-suite. The 2025 Gartner survey documented that 93% of executives report using unauthorized AI, with a majority of C-suite members unconcerned about the practice — a posture that undermines any top-down governance effort and complicates enforcement of acceptable-use policies (→ Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.).
  • The visibility gap is the core governance problem. Most organizations lack reliable insight into which AI tools employees are using or what data is being input; 68% of workers using ChatGPT at work deliberately conceal it from employers, per the same research (→ Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.).
  • AI training solicitations are creating a novel work-product ownership dispute. Mercor's practice of recruiting former industry employees to contribute prior work product for AI training purposes puts employees in the position of monetizing materials that may be subject to assignment-of-inventions clauses, confidentiality agreements, or work-made-for-hire doctrine .

Latest developments.

Active questions and open splits.

  • Whether Taiwan's national-security-law framework will influence how other jurisdictions charge semiconductor IP theft. The TSMC/Tokyo Electron prosecution under the National Security Act rather than a trade secret statute produced heavier criminal exposure and corporate liability even without demonstrated external leakage — a template other jurisdictions may adopt or resist (→ Taiwan Court Sentences Ex-Tokyo Electron Engineer to 10 Years for Stealing TSMC Trade Secrets).
  • What conflict-of-interest disclosure frameworks are adequate for executives with international exposure. The Jay Chen termination leaves open what due diligence and ongoing disclosure obligations semiconductor equipment companies should impose on executives whose roles give them access to strategic or technical information, particularly where China-revenue dependence creates structural tension (→ Tokyo Electron severs ties with executive Jay Chen over Chinese rival links[1][2][3]).
  • Whether shadow AI usage constitutes a trade secret disclosure under existing confidentiality agreements. Most confidentiality and acceptable-use agreements were not drafted with generative AI platforms in mind; whether inputting proprietary data into ChatGPT or Claude triggers a breach — and whether the employer can demonstrate it — is unsettled (→ Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.).
  • Who owns work product contributed to AI training platforms. Mercor's solicitation of former employees' prior work raises unresolved questions about whether assignment-of-inventions clauses, work-made-for-hire doctrine, or confidentiality obligations survive employment and attach to AI training contributions — and what remedies employers have when they discover the transfer .
  • Whether corporate liability for employee trade secret theft survives a "no external leakage" defense. Tokyo Electron's Taiwan subsidiary was fined and ordered to pay damages even though the company reported the stolen information did not leak beyond internal channels — a significant challenge to containment arguments in future corporate-liability disputes (→ Taiwan Court Sentences Ex-Tokyo Electron Engineer to 10 Years for Stealing TSMC Trade Secrets).

What to watch.

  • Appeals by Chen Li-ming and co-defendants in the TSMC/Tokyo Electron case — whether the 10-year sentence and corporate damages award survive appellate review will determine the precedential weight of Taiwan's national-security-law approach to chip IP theft.
  • Whether Tokyo Electron or other semiconductor equipment firms publish revised conflict-of-interest and disclosure policies following the Jay Chen termination, and whether those policies become an industry template.
  • Litigation or regulatory action arising from Mercor's AI training solicitations — any employer suit against a former employee or Mercor itself for misappropriation of work product would be the first significant test of the ownership question.
  • Whether U.S. or EU regulators move to require enterprise AI governance frameworks that address shadow adoption, which would convert the current voluntary compliance posture into a mandatory one.
  • Additional TSMC-related IP investigations — the summary notes a parallel investigation into a former TSMC executive who joined Intel, suggesting the enforcement pattern is broader than the Tokyo Electron case alone.

mail Subscribe to AI Trade Secret Employee email updates

Primary sources. No fluff. Straight to your inbox.

Also on LawSnap