A New Day: New Department of Justice Memo to Increase Prosecutions of White Collar Executives and Other Employees
Selling Cyber Insurance to Professional Services Firms
Rod Beckstrom Discusses Cyber Security and Metasploit
Look At Business Strategy Before the Bribe
Corruption Risk in the Defense Sector
Why You Should Have a White Collar Litigator on Speed Dial
Big Data: A Good Return on Investment for Your Business?
A Front-Line Interview on "the Currency of Impact" with Author Dorie Clark
FCPA Compliance and Ethics Report-Episode 198-Leona Lewis on her new podcast, the Masters of Disaster
Cyber Caremark: Protecting Your Board from Shareholder Derivative Litigation After a Data Loss Event
Why We Say Yes to Corruption
What will happen at my mediation?
How Ethical Behaviors Can "All Go So Wrong."
Information-sharing legislation is coming: Senator Chambliss shares 4 top points for companies
FCPA Compliance and Ethics Report-Episode 190-Interview with Vivian Carpenter, author of The Fifth Letter
Front Line Interview Episode 1. Alison Taylor: Organizations, Compliance & Corruption
FCPA Compliance and Ethics Report-Episode 189-Compliance Evangelist
The Social Engineering Cyber Exposure
Taking A Proactive Approach to Cyber Security
An FCPA Journey to the Darkside & Steps to Protect Your Organization
Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more
A few years back, we had a client – a manufacturing business – that decided to sue an ex-employee for stealing its trade secrets. Our client had developed a process that was unique. Using this process, it was able to...more
Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more
Do your employees understand the importance of intellectual property (IP) to your company and steps that they should be taking to protect it? Do they recognize that exposing proprietary information, such as product...more
On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more
Human error was the number one cause of data security incidents according to a new report released today by the Privacy and Data Protection Team at BakerHostetler. In the incidents that the firm worked on last year, employee...more
Paul Karlsgodt, Leader of BakerHostetler's Class Action Defense team, talks about class actions privacy and litigation issues....more
Advanced manufacturing companies increasingly implement “Intellectual Property Plus,” an expanded view of IP assets and risks. Through this lens, companies incorporate customer expectations and preferences in new product...more
In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material.
Why the excitement? Simply put, graphene is easy. It’s...more
The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more
If you think your company may have had a data breach, you need to see this video!...more
Bird deaths, contracts cases, Lindsay Lohan, IP and more in the BLG Monthly Update for April 2013...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
?Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more
Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more
For New York and New Jersey businesses, 2013 is slated to be a big year for intellectual property law. In addition to the further implementation of the America Invents Act, several important copyright, trademark, and patent...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.
With the cloud transition well underway, the spotlight has turned to securing end-user devices like...more
The attorneys of Wendel Rosen’s Technology Practice Group have compiled this list of 10 common mistakes they’ve seen in the trenches. Smart companies will take the time to address these issues early in formation to prevent a...more
The article outlines the basic features of Armenian corporate law. Fundamentals of corporate formation, administration and other aspects of corporate activities are summarized in a few short paragraphs....more
RESOLVE TO SAFEGUARD COMPANY INFORMATION IN 2012
For many businesses, employees are the biggest investment and the primary safeguard of their confidential, proprietary and competitive information. For some employees,...more
A reader asks: With all of the buzz surrounding Google +, I’ve been contemplating using it to replace my company’s intranet. I realize there are likely some risks that go with the savings this will create, but are there any...more
Table of Contents
•Smith v. Summit Entertainment LLC
•Armstrong v. NBC Universal, Inc.
Smith v. Summit Entertainment LLC, USDC ND Ohio, June 6, 2011
•District Court refuses to dismiss copyright owner’s claims for (1)...more
Find a Business Organization Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top