3.1. Harmonising Trade Secret Protection in AI: Advantages and Necessity
The international harmonisation of intellectual property rules, and of trade secret protection, is often presented as an indispensable step toward global economic integration. In the field of artificial intelligence, this harmonisation becomes even more urgent given the transnational nature of chained development, training, and distribution of AI systems.
AI systems are, by definition, transnational: a model may be designed in one country, trained on data collected in several others, hosted on cloud infrastructures distributed globally, and offered as software as a service (SaaS) in multiple jurisdictions at the same time (
Russell and Norvig 2020;
Brynjolfsson et al. 2014). In these global value chains, the economic “core” of AI is precisely what is typically protected as a trade secret: the model’s source code and architecture, the trained weights, proprietary datasets, and the very pipelines of training, fine-tuning, and deployment. In other words, the technical know-how that underpins AI companies’ competitive advantage circulates across very different legal environments, which immediately raises the problem of regulatory fragmentation. Note that, if each country adopts its own conception of “confidential information,” distinct requirements for its protection, and highly asymmetrical remedies in cases of misuse or unlawful disclosure, the legal cost of operating globally becomes high and unpredictable, discouraging technological cooperation and long-term investment (
Dinwoodie and Dreyfuss 2012;
De Rassenfosse et al. 2022).
In this context, the existence of common minimum standards for the protection of know-how is seen as a condition for legal certainty, contractual predictability, and the protection of investments in research and development (
European Commission 2013). From the perspective of developing companies, a harmonised trade secret regime reduces transaction costs: it lowers uncertainty about the scope of protection granted in each jurisdiction, facilitates the conclusion of technological partnerships, licensing agreements, and cross-border operations, and provides a relatively stable framework for long-term planning. In principle, this institutional stability stimulates innovation by ensuring that investments made in the development of AI models and infrastructures will not be easily appropriated by competitors.
It is in this context that the international harmonisation of trade secret rules gains relevance, especially regarding the protection of undisclosed information. The TRIPS Agreement, within the framework of the World Trade Organization, established a global minimum floor of protection for trade secrets by requiring member states to grant legal protection to information that (i) is not generally known or easily accessible; (ii) has commercial value precisely because it is secret; and (iii) is subject to reasonable efforts to be kept secret (TRIPS, Art. 39). By consolidating this common core, TRIPS functions as a kind of minimum denominator for the protection of know-how in global AI value chains, reducing regulatory uncertainty, and providing a reference framework for the drafting of national legislation and trade agreements dealing with trade secrets in digital and algorithmic environments.
From the perspective of companies that develop and commercialize AI systems, international harmonisation is a central factor for ensuring legal certainty in high-risk investments. A minimally convergent regime, as we have already stated and emphasised once again, reduces costs and uncertainties, and provides predictability for research and development contracts and technology licensing. Reports and guidelines from the World Intellectual Property Organization (WIPO)
1 have repeatedly emphasized this point: in knowledge-intensive markets, clarity about the scope and limits of protection for undisclosed information is a precondition for firms to share technology, enter cross-border partnerships, and factor in the legal protection of code, models, and databases into the economic calculus of expected returns on research and development investments.
Moreover, the harmonisation of minimum standards facilitates the international circulation of AI solutions by aligning with the broader digital trade agenda. Agreements such as the United States-Mexico-Canada Agreement (USMCA), the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and other recent treaties move toward converging protection standards, going so far as to prohibit, generally, states from requiring the disclosure of source code or algorithms as a condition for market entry or operation. These commitments reduce the risk of “regulatory expropriation”, preventing developers from seeing their intangible assets compelled to broad disclosure without adequate safeguards, and they articulate with the global minimum floor established by the TRIPS Agreement in relation to the protection of “undisclosed information” (Art. 39). The result is a legal environment in which companies feel more inclined to invest heavily in research, to scale AI solutions globally, and to establish cross-border technological cooperation, relying on the stability of an intellectual property framework that recognizes the central role of trade secrets in the algorithmic economy (
Cozman and Kaufman 2022).
The international harmonisation of intellectual property rules, particularly those on the protection of trade secrets, now constitutes the invisible legal backbone that sustains the global value chains for the development of AI systems. The TRIPS Agreement, which establishes a minimum floor of protection for “undisclosed information”, requires WTO members to protect secret information that has commercial value. Because it is secret and is subject to reasonable efforts to keep it confidential, there has been a consistent movement toward conceptual convergence around the notion of trade secrets applicable to source code, databases, and technical know-how in general (WTO, Art. 39).
WIPO itself, when addressing the protection of trade secrets in high-technology sectors, emphasizes that Article 39 of TRIPS operates as a global reference point for states to incorporate relatively homogeneous criteria for the protection of confidential information into their domestic legal systems, which are increasingly including intangible assets related to AI (such as model architectures, trained weights, and training pipelines) (
WIPO 2024). WIPO guides and reports stress that clear and predictable regimes for the protection of trade secrets provide a more stable framework for research contracts, licensing, joint ventures, and technology transfer (
WIPO 2024).
If a model’s weights, the curation of a dataset, or the configuration of a training pipeline can be easily appropriated in certain markets, the propensity to invest, share technology, or establish partnerships decreases. Harmonisation, in this sense, functions as a form of legal insurance against the “regulatory expropriation” of know-how, since the protection of trade secrets becomes part of the long-term return calculus on AI investments.
This minimum core of harmonisation in IP is reinforced by a second normative layer: the digital trade chapters in new-generation regional agreements such as the United States-Mexico-Canada Agreement (USMCA) and the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP). It is a free trade agreement among countries in the Pacific region that sets broad rules on trade in goods and services, investment, government procurement, digital trade, and intellectual property. The founding members/parties include Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, and Vietnam, and the United Kingdom has since joined.
The USMCA, for example, provides in Article 19.16 that no party may require the transfer of, or access to, software source code or to “algorithms expressed in that source code” as a condition for the import, distribution, sale, or use of software products in its territory, allowing only limited exceptions for specific regulatory or judicial purposes. Key examples include:
a. USMCA, Art. 19.16—Source Code, Art. 19.16(1): No Party shall require the transfer of, or access to, source code or to “an algorithm expressed in that source code” as a condition for the import, sale, or use of software (or products containing such software).
b. United States–Mexico–Canada Agreement (USMCA), Article 19.16(2): an exception permits regulatory and judicial authorities to require access in the context of specific investigations, subject to appropriate confidentiality safeguards. While preserving limited avenues for oversight, this provision reflects a broader tendency toward strengthening and partially harmonising the protection of trade secrets in source code and algorithms, with potential implications for AI systems.
Similar provisions are set out in Article 14.17 of the CPTPP, which likewise prohibits, as a rule, requirements to disclose source code in cross-border trade in software. The specialized literature highlights that these clauses, although formally technology-neutral, in practice, operate as a robust mechanism for strengthening trade secret protection in digital environments by significantly limiting the possibilities for regulatory access to code and algorithms by national authorities (
Mitchell and Mishra 2019;
Kelsey 2018;
Burri and Polanco 2020).
In the European context, harmonisation takes place through an articulated relationship between trade secret law and the specific regulation of AI.
European Commission (
2013) harmonises, within the Union, the definition of a trade secret (“undisclosed know-how and business information”) and the remedies against its unlawful acquisition, use, and disclosure, recognizing that companies of all sizes value trade secrets as much as patents and use confidentiality as a central tool of competitiveness and innovation management (
European Commission 2013—Trade Secrets Directive).
Building on this foundation, the AI Act (
European Union 2024b) establishes a detailed regime of transparency and documentation obligations, particularly for high-risk AI systems. Providers are required to ensure that such systems are accompanied by clear instructions for use and are sufficiently transparent to enable users to interpret and appropriately use their outputs (Article 13). In addition, providers must draw up and maintain extensive technical documentation (Article 11) and ensure logging capabilities that allow traceability of system operations (Article 12). These obligations are complemented by conformity assessment procedures and oversight mechanisms designed to facilitate regulatory scrutiny and ex post accountability. Together, these provisions aim to mitigate the opacity of AI systems by creating structured pathways for interpretability, monitoring, and control (
European Union 2024a).
At the same time, however, the AI Act explicitly recognizes the need to protect trade secrets and intellectual property rights. In particular, it provides that the disclosure of information required under the Regulation, mainly in the context of access by competent authorities, must be carried out in a manner that safeguards confidential information, including source code, algorithms, and proprietary data (see, e.g., Recitals 60 and 84; Article 70). This introduces a structural tension within the regulatory framework: while transparency is framed as a condition for trust, safety, and accountability, access to meaningful information about AI systems may be limited by proprietary claims. As a result, the effectiveness of transparency obligations may depend on how this balance is operationalized in practice, especially in contexts where full access to system logic is necessary to assess risks or harms (
European Union 2024a).
A similar normative orientation can be found in UNESCO’s Recommendation on the (
UNESCO 2021), adopted unanimously by Member States. The Recommendation affirms that respect for human rights and human dignity must guide the entire lifecycle of AI systems and explicitly calls for transparency, explainability, and accountability as core governance principles (see paras. 14–18, 26–27). It further emphasizes that, where AI systems generate harm or risk to individuals, there must be mechanisms ensuring meaningful access to information about how decisions are made, as well as avenues for contestation and human oversight. Although the Recommendation does not create binding obligations in the field of trade secrets, it establishes a normative benchmark that legitimizes demands for auditability and access to information, particularly in cases involving fundamental rights. In this sense, it reinforces the view that opacity, whether technical or legally protected, cannot operate as an absolute barrier to accountability in AI governance (
UNESCO 2021).
These instruments do not create direct obligations in the field of trade secrets, but they do establish a normative framework that legitimizes demands for access, auditability, and contestation in AI systems that affect fundamental rights. Taken together, these normative elements outline a legally fraught field: on the one hand, a “hard core” of pro-secrecy harmonisation, structured by TRIPS, the Trade Secrets Directive, and digital trade chapters, restricts access to source code and algorithms; on the other hand, there is an emerging constellation of AI and digital rights norms (the AI Act, the OCDE Principles, the UNESCO Recommendation) that require increasing levels of transparency, documentation, and oversight in systems that are ever more central to social life (
Wachter et al. 2017).
However, this picture becomes more complex when we consider the role of harmonising these rules in producing digital vulnerabilities. When the harmonisation of trade secrets is designed primarily to maximize the protection of corporate interests, without adequately incorporating requirements of transparency, accountability, and the protection of fundamental rights, it can become a factor that aggravates vulnerabilities (
Herzog 2024;
Barbosa et al. 2025). By legally shielding the inner workings of systems, their operating logic, decision criteria, and training data, the trade secret regime tends to reinforce information asymmetries between corporations, states, and citizens.
In contexts where decisions about credit, employment, social benefits, health insurance, or criminal measures are mediated by algorithms, opacity acquires significant normative weight. Individuals and groups already marked by inequalities of class, race, gender, or geography find themselves confronted with systems that classify, rank, or exclude them based on criteria they do not control or even understand. Lacking access to meaningful explanations, concrete possibilities for independent auditing, and often adequate procedural channels to contest such decisions, these subjects experience a form of vulnerability that is not merely ontological, but clearly situational and pathogenic (
Mackenzie et al. 2014).
3.2. Artificial Intelligence and Digital Vulnerability: Threats to the Harmonisation of AI Rules?
Artificial intelligence (AI) now functions as a diffuse and often imperceptible infrastructure that permeates everyday life. It plays a structuring role in decision-making across multiple domains, including financial evaluation, labour market selection, healthcare analytics, judicial processing, public governance, and digital platform ecosystems (
Herzog 2024). Its diverse applications have introduced new ways of governing the world and have brought countless benefits, such as the optimization and automation of processes, increased productivity, reductions in human errors, lower operational costs, support for the evaluation of indicators and decision-making, enhanced marketing campaigns, and real-time environmental monitoring, among others. All this is made possible by systems that predict and generate outcomes (
Kaufman 2024). This is especially true of AI models that rely on deep learning techniques. According to Dignum:
The machine learning technique—a subfield of AI—that underpins most current implementations of AI models, known as deep learning neural networks (DLNNs, or simply deep learning) due to their inspiration in the biological brain, is a probabilistic statistical model that can be divided into two categories: predictive AI and generative AI.
Given this dual function of predicting and generating something (information/data), we must bear in mind that the problems surrounding AI involve not only the advantages of its use but also its shortcomings and challenges, as we will see below. In many of these contexts, the use of AI systems is presented as a condition for efficiency, objectivity, and the rationalization of complex decision-making processes. However, this same infrastructure largely operates in an opaque manner for citizens, for the state itself, and, at times, even for the institutions that deploy it, given the technical and probabilistic nature of the models employed. It is at this point that an analysis of digital vulnerability becomes indispensable.
From both an economic and a legal perspective, many of these systems are protected under trade secret regimes. Technology companies often, especially in jurisdictions with less restrictive rules, choose not to patent their models and training methods, instead opting to protect them as trade secrets. This includes source code, model architectures, trained weights, data collection and processing strategies, and, in some cases, even the very composition of the datasets. Protection through trade secrecy promises two main advantages: avoiding the public disclosure of sensitive technical details and reducing costs associated with patenting procedures, while at the same time preserving a competitive edge in highly contested markets.
In addition, AI intensifies a specific form of vulnerability: digital vulnerability. To understand this more clearly, we must first take a step back and explain the concept of vulnerability. In a broader definition, to be vulnerable is to be fragile and susceptible to injury and suffering, as “a universal, inevitable and enduring aspect of the human condition” (
Fineman 2008, p. 8). In other words, vulnerability refers to a state of susceptibility to harm or injury, whether physical, emotional, or social. It can be tied to our sociability as human beings since we depend, to varying degrees throughout our lives, on the care and support of others. The traditional taxonomy of the term divides vulnerability into three types. First, ontological or inherent vulnerability refers to sources of vulnerability that are intrinsic to the human condition, emphasizing our shared susceptibility to suffering as embodied beings (
Lange et al. 2013). This type of vulnerability applies equally to all human beings, linking the term to the Latin word
vulnus, meaning “wound,” and to the capacity for suffering inherent in the human body.
The second type is situational vulnerability (
Dunn et al. 2008), which focuses on the contingent susceptibility of specific individuals or groups to various forms of harm or threats from others. This form of vulnerability is context-dependent and may be triggered or exacerbated by personal, social, political, economic, or environmental factors. It is closely tied to social risk, since individuals and groups in precarious circumstances are often exposed to heightened risks that undermine their agency (
Wiggins 2013). The third is the notion of pathogenic vulnerability (
Mullainathan and Shafir 2013), understood as a subset of situational vulnerabilities generated by morally dysfunctional or abusive interpersonal and social relationships. These types of vulnerability are especially relevant for identifying moral vulnerability, which is inherent in human moral practices.
Among the three types of vulnerability, the most relevant for the purposes of this research is situational vulnerability since we are dealing with the context of the digital age, namely, a situation capable of generating or intensifying people’s vulnerability. A key concern is that situational vulnerability can give rise to moral vulnerability, understood as “the exposure to harm through the rejection or denial of one’s moral status as a full participant in relations of mutual responsibility” (
Mackenzie et al. 2014, p. 175). This moral vulnerability directly affects individuals’ decision-making, helping to explain why their choices become more difficult than those not in situations of vulnerability (
Costa and Barbosa 2023).
In this sense, digital vulnerability should be conceived based on situational vulnerability, as a dynamic condition that can potentially affect any individual. It refers to individuals’ susceptibility to harm and manipulation arising from their interaction with digital environments in which, structural asymmetries of access to and knowledge of digital technologies are intensified (
Young 2011). Given the global use of AI models, vulnerability ceases to be a static characteristic attributed to specific groups and comes to represent a condition potentially present in all individuals (
Dubber et al. 2024).
Digital vulnerability thus exposes individuals to risks related to data protection and, more gravely, different segments of the population are affected by the phenomenon of so-called digital exclusion (
Cohen 2019). This marginalization brings to light digital vulnerability in multiple dimensions: physical access to technologies; digital literacy to understand and use these technologies; protection against violations of the right to privacy
2 and transparency and adequate information. According to Barbosa, Fontanela and Costa:
Digital vulnerability refers to the specific ways in which individuals and groups are exposed to harm, domination, or exclusion due to their reliance on digital technologies and algorithmic decision-making systems. This includes not only obvious risks, such as data breaches or surveillance, but also subtle forms of influence and dependence that affect autonomy, deliberation, and social relationships. Key characteristics involved in this issue include structural asymmetries in access and knowledge; that is, people with lower digital literacy or limited access to technology are at a disadvantage, which can compromise their ability to benefit from innovations and protect themselves from harm.
This shows how people in situations of digital vulnerability have their development constrained and are more likely to make mistakes in the digital environment, whether due to difficulty in recognizing information manipulation, greater exposure to data breaches, or lack of access to technologies.
If, in an ontological sense, we are all vulnerable by virtue of our embodied and relational condition, digital vulnerability is situational and, in many cases, pathogenic: it stems from technical-legal arrangements that expose certain individuals and groups to heightened risks of exclusion, discrimination, and opaque decision-making. People living in poverty, racialized populations, women, persons with disabilities, migrants, and residents of urban peripheries tend to be more exposed to automated decisions, without adequate information about the criteria employed, meaningful opportunities to contest outcomes, or effective avenues for redress. Unlike traditional forms of vulnerability, which are often linked to relatively stable socioeconomic conditions or long-standing structural factors, digital vulnerability manifests in a highly contextual way: anyone can become vulnerable in specific scenarios of interaction with opaque or asymmetrical technologies.
In this sense, the concept of digital vulnerability brings together three dimensions. First, there is the information asymmetry between those who develop and control AI systems and those who are affected by them (
Kaufman 2022, p. 76). Second, there is the growing dependence on private digital infrastructures for the exercise of basic rights—such as accessing financial services, participating in the labour market, receiving social benefits, or interacting with the justice system (
Dubber et al. 2024). Third, there is the structural difficulty of contesting automated decisions, either because of a lack of transparency or because there are no procedural mechanisms adapted to this reality (
Cozman and Kaufman 2022). Against this backdrop, the discussion on the international harmonisation of intellectual property rules becomes relevant: IP instruments, especially trade secrets, are not neutral; they help configure the conditions under which subjects are rendered more or less vulnerable (or protected) in the age of AI.
This is the kind of vulnerability that matters for our purposes here. It is crucial to understand that AI opacity can generate vulnerability, and that problems of information, explainability, and automated decision-making, especially when such decisions are opaque, intensify people’s vulnerability. In other words, while robust protection of investments and innovation is desirable, it also carries the risk of increasing digital vulnerability by entrenching opacity (cf.
DiMaggio et al. 2021). This gives rise to a dual challenge: on the one hand, the urgency of harmonising rules in a technologically volatile field and on the other, the need to ensure that such harmonisation is compatible with the protection of human rights, algorithmic transparency, and the possibility of independent audits.
Thus, this study has sought to build the conceptual vocabulary that will guide the analysis. On one side, it considers AI as technology and infrastructure. On another, it examines the trade secret regime as a central legal mechanism for protecting AI-related know-how. Finally, it introduces digital vulnerability as a theoretical key for understanding who is exposed, to which risks, and with what possibilities of response. On this basis, it becomes possible to critically assess the effects of harmonising intellectual property rules on the distribution of risks and protections in the contemporary digital environment. The remaining question, then, is how to achieve a sustainable balance—this is what we turn to in the discussion.