Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you run a small business, your most valuable assets aren’t always the ones you can touch.
It’s often the behind-the-scenes work: your customer lists, pricing model, supplier terms, software code, marketing strategy, product formulas, designs, brand assets and “know-how”.
When someone takes or uses those assets without permission, you may be dealing with misappropriation.
Misappropriation can be messy because it doesn’t always look like an obvious “theft”. It might be a contractor copying your code into their next project. A departing team member emailing themselves your client list. A competitor using your photos. Or a supplier leaking your designs ahead of a product launch.
The good news? With the right legal foundations and practical controls, you can reduce the risk of misappropriation and put yourself in a much stronger position to act fast if it happens.
What Is Misappropriation (And Why Does It Matter For Small Businesses)?
In a UK business context, “misappropriation” is often used as a catch-all for situations where someone:
- takes your assets (information, data, money, materials, IP) without authority; and/or
- uses your assets in a way you didn’t consent to (including outside the scope of their role or agreement); and/or
- benefits from your assets unfairly, at your expense.
It matters to note that “misappropriation” itself isn’t usually a single standalone legal claim in the UK. Instead, you typically rely on specific rights and causes of action (like breach of confidence, breach of contract, and IP infringement), depending on what’s happened.
For small businesses, misappropriation matters because your advantage is often built on:
- speed (you move faster than bigger competitors);
- relationships (clients, suppliers, partners); and
- unique knowledge (how you deliver your service, how you price, how you market).
If that knowledge gets misused, the damage can be immediate: lost customers, diluted brand identity, copycat products, and reduced investor confidence.
It’s also worth noting that these issues don’t always come from “bad actors”. Sometimes they’re caused by poor boundaries: no written contracts, unclear IP ownership, weak offboarding, or casual sharing of sensitive documents.
Common Examples Of Misappropriation In Real Businesses
Here are a few scenarios we regularly see come up in growing UK businesses:
- Confidential information misuse: a team member downloads a customer list and contacts clients after leaving.
- Trade secrets leakage: a supplier shares your product specifications with another buyer.
- IP misappropriation: a freelancer reuses your design assets (or code) for another client.
- Brand misuse: someone sets up social accounts using a similar name and your content, causing confusion.
- Financial misappropriation: an internal user diverts payments, refunds, or invoices.
Different laws may apply depending on what was taken and how it was used - which is why it helps to understand the main “buckets” of protection.
What UK Legal Protections Apply To Misappropriation?
In the UK, “misappropriation” is not usually dealt with as one single legal claim. Your options depend on the asset and relationship involved (employee, contractor, director, supplier, competitor, etc.).
Below are the common legal angles businesses use when responding to misappropriation.
1) Breach Of Confidence (Confidential Information)
If someone misuses confidential information, a common route is a claim for breach of confidence. This can apply even where there isn’t a written NDA - but in practice, having one makes enforcement much easier and reduces arguments about what was “confidential”.
Confidential information might include:
- customer and supplier lists (where they’re not publicly available and you treat them as confidential);
- pricing structures and margin data;
- marketing strategies and ad performance data;
- product roadmaps;
- technical processes and internal documentation.
If you routinely share sensitive information externally (for example with contractors, agencies, manufacturers or potential investors), having a clear Non-Disclosure Agreement in place can be one of the simplest ways to reduce misappropriation risk from day one.
2) Intellectual Property Rights (Copyright, Trade Marks, Designs, Patents)
If what’s been misappropriated is “IP”, the relevant rights might include:
- Copyright (e.g. website copy, photos, videos, software code, illustrations, documents);
- Trade marks (e.g. business name/brand used in relation to specific goods/services);
- Registered designs (e.g. the appearance of a product);
- Patents (e.g. inventions and technical solutions).
IP can be powerful because it’s often easier to point to a defined right (“that’s our copyrighted work” or “that’s our registered trade mark”) than to argue about whether information was confidential.
However, IP protection only helps if ownership is clear. If you use freelancers or contractors, you can’t assume your business automatically owns what they create. That’s where a proper IP Assignment clause (or agreement) can be critical.
3) Contract Claims (Breach Of Contract)
Misappropriation frequently becomes a contract problem, especially where you have written terms covering:
- confidentiality;
- IP ownership and moral rights;
- return/deletion of business data;
- restrictions on use of materials; and
- post-termination restrictions (where appropriate and enforceable).
This is why it’s worth taking contracts seriously even when you’re a small team. For example, a well-drafted Employment Contract can set clear boundaries on confidentiality, device use, IP ownership, and what happens when someone leaves.
4) Data Protection Law (If Personal Data Is Involved)
Sometimes misappropriation involves personal data (for example, identifiable customer contact details or HR data). In those cases, you also need to think about UK GDPR and the Data Protection Act 2018.
Not every customer list is necessarily “personal data” (for example, a list of generic business emails may not identify individuals). But where personal data is involved, regulators may ask what security measures you had in place and whether the incident triggers notification requirements.
Practical governance matters here - policies, access controls, and incident response planning. For many businesses, having a structured GDPR Package helps ensure you’re not trying to figure out your obligations mid-crisis.
How Does Misappropriation Usually Happen (And Where Are Your Biggest Risks)?
Most misappropriation cases aren’t movie-style break-ins. They’re usually caused by routine access combined with weak controls.
In other words: the person didn’t “hack” you - they already had access.
The Most Common Misappropriation Risk Areas
- Hiring and onboarding: new starters and contractors get access before boundaries are documented.
- Shared drives and cloud folders: “everyone has access to everything” because it feels efficient.
- Personal devices: documents and chats are stored on private phones and laptops with no visibility.
- Third-party agencies and freelancers: deliverables are provided, but IP ownership and reuse aren’t addressed.
- Exits and offboarding: accounts aren’t disabled quickly; files aren’t returned; devices aren’t checked.
- Partner collaborations: commercial discussions begin before confidentiality and ownership are agreed.
A Quick “Reality Check” Scenario
Imagine you’re a service-based business and your client list is stored in a spreadsheet on a shared drive. Your sales contractor has access. They leave, and two months later several of your best clients move to a competitor that contractor now works for.
Even if you strongly suspect misappropriation, your ability to do anything about it depends on what you can show:
- Was the information clearly confidential?
- Did they have permission to use it only for your business?
- Do you have a written agreement covering confidentiality and data return?
- Can you evidence access, copying, emailing, downloads, or unusual activity?
That’s why protection is not just about “having rights” - it’s about being able to prove them.
How Can You Protect Your Business From Misappropriation From Day One?
To protect your business from misappropriation, you want a combined approach:
- Legal: clear contracts, ownership clauses, confidentiality obligations.
- Operational: sensible access controls, policies, and offboarding processes.
- Cultural: expectations that confidential information is treated carefully.
Here’s a practical checklist you can start using straight away.
1) Identify What You Actually Need To Protect
Start with a simple internal audit. List out what would genuinely hurt your business if a competitor got it.
- customer lists and pipelines;
- pricing and profit margins;
- product specifications and suppliers;
- code repositories and documentation;
- marketing strategy, ad accounts, creative assets;
- internal processes and training manuals.
Once you’ve identified these assets, you can label them, restrict access, and contract around them more effectively.
2) Put Confidentiality And IP Terms In The Right Agreements
The best time to prevent misappropriation is before you share information or accept deliverables.
Depending on your relationships, that might mean:
- a Non-Disclosure Agreement for external parties you’re sharing sensitive information with;
- employment agreements with clear IP and confidentiality clauses;
- contractor agreements with clear IP ownership, confidentiality, and restrictions on reuse;
- customer or supplier terms that address ownership, permitted use, and data handling.
One common mistake is assuming “we paid for it, so we own it”. Payment doesn’t automatically transfer IP ownership in all cases - you usually need it in writing.
3) Use Policies To Back Up Your Contracts
Policies won’t replace a contract, but they’re extremely useful for setting expectations and showing you take confidentiality seriously.
For example, an Acceptable Use Policy can define what your team can and can’t do with:
- work devices and accounts;
- internet and software tools;
- personal email and messaging apps;
- downloads, file-sharing, and USB storage.
This matters because in a dispute, misappropriation cases often turn on whether the business clearly communicated boundaries and used reasonable security practices.
4) Limit Access (Without Slowing Your Business Down)
You don’t need enterprise-level systems to take sensible steps. For many small businesses, improvements can be as simple as:
- giving access on a “need-to-know” basis (especially for pricing, supplier terms, and client lists);
- using role-based permissions in Google Workspace/Microsoft 365;
- separating “public marketing assets” from “internal strategy and performance data”; and
- using password managers and MFA for key accounts.
These steps don’t just prevent misappropriation - they also improve resilience if an account is compromised.
5) Strengthen Offboarding (This Is Where Many Businesses Slip Up)
When someone leaves, you want a predictable process every time. Consider:
- revoke access immediately (email, CRM, shared drives, code repos, ad accounts);
- collect and wipe company devices;
- confirm return/deletion of confidential information (especially if BYOD was used);
- change shared passwords;
- document the exit steps taken.
This is also where well-drafted agreements help, because you can point to clear obligations to return property and keep information confidential after the relationship ends.
What Should You Do If You Suspect Misappropriation?
If you suspect misappropriation, it’s normal to feel stuck between “we need to act now” and “we don’t want to make it worse”. The key is to stay calm and be methodical.
Step 1: Preserve Evidence (Without Breaking The Law)
Before you confront anyone, preserve what you can:
- audit logs (downloads, access history, forwarding rules);
- copies of relevant emails and messages;
- versions of files and timestamps;
- records of permissions and user access.
Be careful about monitoring and data handling - particularly where employees are involved - because privacy and employment law considerations may apply.
Step 2: Contain The Risk
Take immediate steps to limit further damage, such as:
- revoking access to systems;
- changing passwords;
- locking down sensitive folders;
- pausing integrations or API keys;
- contacting critical suppliers or platforms if an account is at risk.
Step 3: Check Your Contracts And Ownership Position
Pull together the key documents:
- employment or contractor agreements;
- NDAs;
- any IP Assignment documents;
- supplier/customer terms;
- internal policies the person agreed to.
This helps clarify what rights you can rely on immediately (and what gaps you may need to address for the future).
Step 4: Decide On The Right Response
Your next steps depend on severity and urgency. Options may include:
- a cease and desist letter demanding they stop using and return/delete information;
- notifying a third party (e.g. a platform) if your content or brand is being used;
- negotiation and settlement (sometimes the fastest commercial outcome);
- court action for an injunction (to stop use quickly) and/or damages.
Because these disputes can escalate quickly, it’s usually worth getting tailored advice early, especially if there’s a risk of ongoing loss, reputational harm, or a wider data breach.
If the core issue is unclear IP ownership or unclear restrictions in a contractor relationship, an Intellectual Property Lawyer can help you clarify your position and plan a practical strategy.
Key Takeaways
- In business, “misappropriation” usually involves unauthorised taking or use of confidential information, intellectual property, or other assets, often by someone who already had access.
- UK businesses typically address these situations through a mix of breach of confidence, IP rights (copyright, trade marks, designs, patents), and breach of contract claims.
- Your strongest protection comes from combining practical controls (access limits, offboarding, logging) with clear legal documents like a Non-Disclosure Agreement and proper IP ownership terms.
- If personal data is involved, you’ll also need to consider UK GDPR and the Data Protection Act 2018, including security expectations and potential reporting obligations.
- If you suspect misappropriation, act quickly but carefully: preserve evidence, contain access, review your contracts, and get legal advice before the dispute escalates.
If you’d like help protecting your business from misappropriation (or responding to a situation that’s already happened), you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


