It is an infringement of a trade secret for a person, without the consent of the owner, to obtain possession of or access to a proprietary program or a compilation of proprietary information that is stored as data in a computer and make or cause to be made a copy of that program or data if the program or data:
1. Is used in the owner’s business;
2. Gives the owner an opportunity to obtain an advantage over competitors who do not know or use it;
3. Is treated by the owner as secret; and
4. Is not copyrighted because an application therefor would result in the program or data no longer being secret.
(Added to NRS by 1983, 1349)