GeoCrypt LogoGeoCrypt

Right Person × Right Place = Access

Geofenced encryption and immutable audit trails for trade secret protection. Enforcement you can prove. Evidence ready for discovery.

Trade Secret Protection Environment

Trade secret theft costs American businesses $180 to $540 billion annually. Yet fewer than 1,400 federal cases get filed each year, and plaintiffs win 81% of cases that reach trial.

That gap, hundreds of billions in losses but barely a thousand cases with strong win rates, exists because proving trade secret status under the DTSA requires more than showing theft occurred. You must demonstrate that reasonable measures were in place and enforced.

The state of the art is trade secret protection programs: static policies, NDAs, and access logs. Even when supported with DLP and similar technology; a splintered log is made that needs to be cross referenced all the while courts increasingly require clear proof of reasonable measures.

Sources: IP Commission Report (2017), Lex Machina, Stout 2024 Trade Secrets Litigation Report

Introducing GeoCrypt

That's why we built GeoCrypt; endpoint encryption tied to verified locations. Files remain cryptographically locked until the user is in the right place, with the right credentials, on the right device. Every access event is logged to an immutable audit trail.

Integrates with your workflow. Protects your secrets. Proves your compliance.

The Three Requirements for Trade Secret Protection

Under the Defend Trade Secrets Act (DTSA) and state law, to be compliant the three conditions need to be satisfied.

Reasonable Steps to Protect Secrecy

Courts require reasonble measures. Not just policies, but enforcement. A policy that isn't enforced is not a reasonable step. GeoCrypt provides cryptographic enforcement that cannot be bypassed.

Geofenced Encryption

Files cannot decrypt outside authorized locations. Cryptographically enforced.

Biometric Authentication

Identity verified at every access attempt.

Device-Bound Encryption

Keys stored in hardware. Never exportable, even with physical access.

Immutable Audit Trail

Tamper-evident record of every access event.

"The extent to which the owner has taken measures to guard the secrecy of the information is strong evidence that the information has value."

Restatement of Torts, Trade Secrets Commentary

Value Derived from Secrecy

Courts evaluate whether you treated information as economically valuable. Deploying enforcement-grade protection establishes that the information warrants trade secret status. It holds value precisely because it remains secret.

Your investment in protection becomes evidence of value.

Secrecy Maintained

Courts examine whether information remained confidential in practice. GeoCrypt doesn't just track access. It makes unauthorized access cryptographically impossible.

Files could not be accessed outside authorized conditions. Not "weren't." "Couldn't."

Zero-Knowledge Encryption

Intermediates never sees your plaintext.

Local Decryption

Decrypted content never persists to disk.

Location Enforcement

Access is cryptographically bound to authorized geofences.

Proof of Geofence

U.S. Patent 12,470,927 B1

Enforcement

Files are cryptographically bound to authorized locations. Decryption requires verified identity and confirmed presence within the authorized geofence. Only when both conditions are met does access occur.

Files cannot decrypt outside authorized boundaries. Not "won't." "Cannot."

Immutable Audit Trail

Tamper-evident access records

Evidence

Every access event is recorded: who accessed the file, when, from what location, and on which device. Records cannot be edited or deleted after the fact.

Litigation-ready evidence generated at time of access, not reconstructed later.

Built for DTSA Compliance

The Defend Trade Secrets Act (2016) established federal civil liability for trade secret misappropriation. Since then, case law has defined what constitutes "reasonable measures" with increasing specificity.

GeoCrypt translates these legal standards into technical enforcement. Our Proof-of-Geofence protocol (U.S. Patent 12,470,927 B1) combines geofenced encryption with an immutable audit trail, providing both the enforcement courts require and the evidence discovery demands.

Built by Those Who Understand the Problem

GeoCrypt is a venture by Mick Kerr, a patent attorney of 30 years and developed by his team, who recognized a critical gap in modern tech and legal workflows.

Request a Demo

See how GeoCrypt provides trade secret protection.

US-based operations. All data is stored and processed within United States jurisdiction.