CROSSOVER: Texas First Court: Lawyer Client Lists Can Be Trade Secrets—TUTSA Misappropriation and Damages Guidance for Family-Law “Client Poaching” & Confidential-File Disputes
Lance Christopher Kassab and Lance Christopher Kassab, P.C. d/b/a The Kassab Law Firm v. Michael A. Pohl and The Law Office of Michael A. Pohl, PLLC, 01-24-00220-CV, March 31, 2026.
On appeal from 281st District Court, Harris County, Texas
Synopsis
The First Court of Appeals held that a lawyer’s client fee contracts and client lists can qualify as “trade secrets” under TUTSA when the evidence shows real economic value from secrecy and reasonable measures to maintain confidentiality—even where a third party (a marketing vendor) had access. The court nevertheless reversed parts of the TUTSA judgment and damages package as legally unsupported and/or requiring correction, affirming only those portions that cleared sufficiency and proper-measurement hurdles and remanding as necessary.
Relevance to Family Law
Family-law practices are unusually vulnerable to “client poaching,” file migration after lawyer departures, vendor-hosted intake data, and contested access to confidential client information during breakups of firms or referral relationships. This opinion gives litigators a road map to plead and prove (or attack) TUTSA claims when one side acquires client lists, fee contracts, or intake spreadsheets—especially when obtained through a former employee, a disaffected vendor, or a third-party consultant. It also underscores a recurring family-law damages problem: tying litigation-defense fees and other downstream losses to a legally recognized TUTSA damages theory, with competent proof and correct submission.
Case Summary
Fact Summary
Pohl built a large Mississippi mass-tort practice using a marketing group (Precision) that helped identify and screen prospective claimants. Over time, Pohl amassed client materials that included (i) attorney–client fee contracts and (ii) lists reflecting actual, potential, or rejected clients with contact information and other sensitive details. The record emphasized the scale (roughly 11,000 clients), the money spent to develop the pipeline, and the steps taken to keep the information confidential: a secure office, controlled access, and explicit confidentiality instructions to the marketing group and temporary workers.
After Pohl closed the Mississippi office, Precision’s principal (Favre) took physical files and computers, refused to return them, and litigation ensued in Mississippi. That Mississippi case later settled with commitments to return originals and copies and to delete electronically stored client-identifying information.
While that Mississippi dispute was still in motion, Kassab—another Texas lawyer—entered an agreement with Favre and received documents from Pohl’s client materials, including fee contracts and client lists. Kassab then used the information to send State Bar-approved notices to individuals warning of potential barratry by Pohl; hundreds responded, Kassab signed them, and barratry/negligence suits and grievances followed. Pohl ultimately settled one case, defeated/dismissed others, and later sued Kassab under TUTSA for misappropriation, seeking (among other things) the fees he incurred defending the barratry litigation and grievance proceedings.
A jury found that the fee contracts and the client lists were Pohl’s trade secrets; that Kassab misappropriated them; and that the misappropriation was willful and malicious. The jury awarded multiple categories of damages (including defense fees, a “willing buyer/willing seller” use value, and “development costs avoided”), plus exemplary damages and attorney’s fees. The trial court signed judgment consistent with the verdict. On appeal, the First Court affirmed in part and reversed in part, holding that some components of the TUTSA verdict could stand while others could not.
Issues Decided
- Whether Pohl’s attorney–client fee contracts and client lists constituted “trade secrets” under the Texas Uniform Trade Secrets Act (TUTSA).
- Whether legally sufficient evidence supported the jury’s finding that Kassab misappropriated those trade secrets by acquiring and using them after receiving them from a third party.
- Whether the evidence and the charge supported the jury’s various damages findings under TUTSA (including downstream defense-fee damages, “use value,” and “costs avoided”), and what parts of the judgment required reversal/correction and remand.
- Whether the judgment could stand as to exemplary damages and other relief given the court’s rulings on liability and compensatory-damages categories.
Rules Applied
- TUTSA (Texas Uniform Trade Secrets Act), TEX. CIV. PRAC. & REM. CODE §§ 134A.001–.008 (including the statutory definition of “trade secret,” the definition of “misappropriation,” and permissible damages measures).
- Legal sufficiency review standards for “no evidence” challenges (e.g., 4Front Eng’red Sols., Inc. v. Rosales, 505 S.W.3d 905 (Tex. 2016); Volkswagen of Am., Inc. v. Ramirez, 159 S.W.3d 897 (Tex. 2004); and the court’s articulation in the opinion).
- General Texas trade-secret principles embedded in TUTSA case law: secrecy-derived economic value and reasonable measures to maintain secrecy; and the requirement that damages fit within TUTSA’s recognized frameworks (actual loss, unjust enrichment not captured by actual loss, reasonable royalty, and exemplary damages for willful/malicious misappropriation).
Application
The court treated this as a classic “trade secret through a third party” fact pattern: the defendant did not steal the information directly from the plaintiff’s server; instead, he obtained it from a vendor who had previously been entrusted with access. That matters in family law because many practices outsource intake, SEO/marketing, lead-gen, answering services, and CRM administration—creating predictable “leak points” where a later dispute becomes a trade-secret dispute.
On the trade-secret question, the opinion’s thrust is that client lists and fee contracts are not categorically excluded from trade-secret status merely because they involve “clients.” Instead, the analysis tracks TUTSA’s statutory definition: the information must derive independent economic value from not being generally known/readily ascertainable, and the owner must take reasonable measures to keep it secret. The evidence the court recited—large investment in marketing, the compilation aspect, controlled access, explicit confidentiality instructions, and a confidentiality agreement—supported the jury’s ability to treat the materials as protectable, notwithstanding that a marketing firm had access.
On misappropriation, the court focused on acquisition and use. Kassab’s agreement with Favre, receipt of Pohl’s fee contracts and lists, and deployment of that information to contact the identified individuals and generate barratry litigation provided the factual bridge from “possession” to “use.” For family-law litigators, the takeaway is that the “use” element can be satisfied by targeted client outreach, solicitation-adjacent contact, or leveraging confidential intake/contract data to generate litigation positions—even if the outreach is packaged as compliance-oriented or “consumer warning” correspondence.
Where the opinion becomes most instructive for Texas trial lawyers is damages. The jury awarded multiple TUTSA damages types, including the fees Pohl incurred defending the downstream barratry suits and grievance proceedings. The First Court affirmed some portions of the judgment but reversed others for lack of legally sufficient support and/or the need for correction—signaling that TUTSA plaintiffs must match the proof to the permissible measure and must avoid “stacking” overlapping theories without careful segregation and evidentiary support. In short: liability may be relatively straightforward if you can show secrecy + reasonable measures + acquisition/use, but the case can still be won or lost on how damages are framed, supported, and submitted.
Holding
The court affirmed in part the TUTSA liability findings, holding that the evidence was sufficient for the jury to treat Pohl’s attorney–client fee contracts and client lists as trade secrets and to find misappropriation based on Kassab’s acquisition and use of those materials obtained through Favre and Precision.
The court reversed in part the trial court’s judgment on Pohl’s TUTSA verdict as to certain components of the damages and/or related relief, concluding that some portions lacked legally sufficient evidentiary support or required correction under the governing TUTSA damages frameworks. The court remanded as necessary for further proceedings consistent with its opinion.
Practical Application
For Texas family-law litigators, the case is less about mass torts and more about information custody and monetization—exactly where modern family practices are exposed:
- Departing-lawyer and firm-split scenarios (the “client file migration” fight). If a lawyer walks with fee agreements, lead lists, intake sheets, or CRM exports, this case bolsters the argument that those compilations can be trade secrets when the firm can prove value-from-secrecy and reasonable secrecy measures. Conversely, if you defend the departing lawyer, this opinion highlights where to attack: were the “lists” readily ascertainable, were they maintained confidentially, were there enforceable confidentiality obligations, and is the plaintiff trying to convert a client’s right to choose counsel into a proprietary claim?
- Vendor-hosted intake and marketing data (answering services, CRMs, lead brokers). Many family-law firms do not control the pipes: the vendor does. This case is a warning that vendor access does not destroy secrecy—but it also telegraphs what plaintiffs must prove: documented confidentiality expectations, restricted access, and proof that the compilation has economic value beyond what can be scraped from public sources.
- Protective orders, subpoenas, and discovery battles in divorce/custody litigation. Family cases increasingly involve subpoenas to third parties (marketing vendors, accountants, practice-management platforms) for client communications and business-development data. This decision supports a more disciplined approach: treat certain categories as trade-secret candidates early, build a protective-order record, and preserve the ability to seek injunctive relief if the information is misused.
- Damages discipline in family-law “business tort” add-ons. If you plead TUTSA in a divorce-adjacent business dispute (e.g., competing firms operated by spouses, or a spouse’s new venture staffed by the other spouse’s former employees), you must select a coherent damages model: actual loss, unjust enrichment, reasonable royalty, and—if warranted—exemplary damages. The First Court’s partial reversal is a reminder that overreaching damages theories invite appellate surgery.
Checklists
Trade-Secret Readiness for a Family-Law Practice (Client Lists, Intake, Fee Agreements)
- Identify the exact “information” claimed as secret (CRM export fields, intake notes, fee-contract templates, signed contracts, referral-source mappings).
- Document why it has independent economic value from not being generally known (conversion rates, acquisition costs, unique segmentation, non-public contact channels).
- Implement access controls (role-based CRM permissions, MFA, download restrictions, audit logs).
- Use written confidentiality agreements with vendors, contractors, and temporary staff.
- Mark sensitive exports and compilations as confidential; maintain a distribution log.
- Maintain policies that prohibit copying/exporting client lists to personal devices or accounts.
Pleading and Proving Misappropriation in “Client Poaching” Fact Patterns
- Plead acquisition and use with specificity: who provided the information, when, what exactly was obtained, and how it was deployed.
- Preserve electronic proof: download logs, email forwarding, CRM export history, vendor access records.
- Develop testimony on the chain of custody (especially when a third party “handed over” the information).
- Tie the outreach to the confidential information (e.g., “these contacts were only in the CRM,” not publicly available).
- Consider early injunctive relief to stop ongoing use and to force forensic preservation.
Damages: Avoiding the “Partial Reversal” Problem
- Choose a primary TUTSA damages model and build the evidence to fit it (actual loss vs. unjust enrichment vs. reasonable royalty).
- If claiming “reasonable royalty,” retain a qualified damages expert and anchor the royalty to comparable licenses/market evidence.
- If claiming “costs avoided,” prove what development costs were actually avoided and why the avoided work is attributable to the misappropriated secret (not general know-how).
- If seeking downstream litigation-defense fees as “actual loss,” build causation carefully and segregate fees to the misappropriation-caused proceedings.
- Avoid double recovery: do not stack “use value,” “costs avoided,” and “actual loss” without explaining how they do not overlap.
- Preserve charge error: ensure the jury questions track the statutory measures and the evidence you actually have.
Defense Checklist for the Accused “Poacher” in a Family-Law Setting
- Challenge trade-secret status: argue readily ascertainable information, lack of secrecy measures, and overbreadth (“every client name is a trade secret”).
- Establish independent source: show the same contacts came from public sources, referrals, or the client’s own outreach.
- Attack “use”: show communications were generalized, compliance-driven, or not derived from the alleged secret.
- Target damages: force election/segregation, challenge royalty and avoided-cost foundations, and preserve no-evidence points.
- Consider privilege/ethics overlays: client’s right to choose counsel and limitations on restraining client communications.
Citation
Lance Christopher Kassab and Lance Christopher Kassab, P.C. d/b/a The Kassab Law Firm v. Michael A. Pohl and The Law Office of Michael A. Pohl, PLLC, No. 01-24-00220-CV (Tex. App.—Houston [1st Dist.] Mar. 31, 2026).
Full Opinion
Family Law Crossover
In a divorce or custody case involving a lawyer-spouse, a firm co-owner, or a side business that competes with the marital/community practice, this opinion can be weaponized in two directions. A party can use it offensively to support emergency injunctive relief and a TUTSA claim when the opposing spouse (or the spouse’s new firm) obtains CRM exports, signed fee agreements, intake spreadsheets, or vendor-held lead lists and then uses them to recruit clients or to seed grievances/claims that destabilize the practice during the divorce. On the defense side, it supplies the counterplay: force the proponent to prove real secrecy measures and a legally valid damages model, then press the appellate-grade arguments that frequently unravel these cases—overbroad “everything is secret” theories, weak proof of “use,” and damages that do not fit TUTSA’s permitted measures or that improperly stack overlapping categories.
~~1b67fee8-826e-441b-bd0e-7190301ce2d9~~
Share this content:
