General Business Privacy Intellectual Property

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Enforceability of Confidentiality Agreements – Confidential Information Must Be “Confidential”

For many companies, entering into confidentiality or non-disclosure agreements is common practice when sharing confidential or proprietary information with third parties. However, as the recent case nClosures, Inc. v. Block...more

Protecting Confidentiality of Patent Infringement Settlements: Is Mediation Necessary?

Parties regularly opt to keep terms, conditions and licensing agreements confidential when settling patent infringement disputes. Often, patentees do not want the license terms to serve as precedent in other assertions of the...more

Law À La Mode - Issue 14 – October 2014 (Global)

In This Issue: - Understanding the EU Consumer Rights Directive: An overview of the new Directive on Consumer Rights and its implementation in Belgium, France, Italy and the UK - Free Zones in the UAE: What do...more

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

Customer Collaboration and Predictive Analytics Can Lead to Successful Product Manufacturing

Advanced manufacturing companies increasingly implement “Intellectual Property Plus,” an expanded view of IP assets and risks. Through this lens, companies incorporate customer expectations and preferences in new product...more

IP Rights In Data Handbook - Protecting and exploiting IP in data, big data and databases internationally

In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more

Denying Coverage Based on Advertising Injury, Court Finds Corporations are Not Persons

A New York appellate court recently found that a corporation is not the kind of "person" that can suffer a violation of privacy rights for purposes of advertising injury coverage. In Sportsfield Specialties, Inc. v. Twin City...more

Hedge Fund Hack Results in Trade Secret Loss, and Raises SEC Reporting Issues

Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more

Court Orders Google to Remove Site from Worldwide Search Results

In a recent decision by the British Columbia courts (Equustek Solutions Inc. v Jack , 2014 BCSC 1063), Google has been ordered to de-index a website selling goods that were the subject of intellectual property (IP)...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Data Security in a Technological World

The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

Can I Use The Social Media Picture For My Story? – Part Two

Last time, we looked at whether the media can use images from social media sites applying fair use to several typical situations. Today, we look at the specific terms of service of various popular sites to see if some make...more

Privacy Causes of Action

An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more

Business Law Newsletter - September 2013

In This Issue: - Proactive Steps to Protect Trade Secrets - Finding a Safe Path to Following the FCC’s Newest Consumer Privacy Directives - A Tactical Approach to Defending Virginia Non-Competes - Excerpt...more

Employment Newsletter - August 2013: Strong Policies and Vigilance Are Key to Protecting the Confidential Information of...

Unless companies are involved in technology or related products, most do not consider how they are going to protect their confidential information until there is a problem. Problems can arise in very common scenarios, for...more

Non-Disclosure Agreements: A Cautionary Tale

Agreements which contain non-disclosure obligations (also known as a confidentiality agreements, CAs, NDAs or confidential disclosure agreements) are common in many industries - from licensing deals to franchise agreements,...more

Help Clients Insure Against Cyberattacks

The constant threat of cyberattacks presents many and varying challenges for businesses. Insurance provides one way to deal with them....more

Texas Public Information Act: Shielding Your Company from the Open Records Sword

The Texas Public Information Act (the "Act" or "PIA") permits public access to government records and encourages open government through transparency. However, astute and enterprising companies and consultants have realized...more

Labor Letter, July 2013: Social Media And Trade Secrets

Most employers are well aware of the various implications that the social media explosion has on the workplace. The various issues created by Facebook, LinkedIn, and other similar platforms lead to constant requests for...more

Securing Your Company's Confidential Data and Intellectual Property

Many of my clients are concerned with confidential information and trade secrets in their businesses. Even if it happens to be a very small, family-run business, doing everything you can to make sure you have established and...more

Mobile App Series: Privacy by Design [Video]

Fenwick & West's Tyler Newby discusses the Federal Trade Commission's concept of Privacy by Design....more

BLG Monthly Update for April 2013

Bird deaths, contracts cases, Lindsay Lohan, IP and more in the BLG Monthly Update for April 2013...more

88 Results
|
View per page
Page: of 4

Follow General Business Updates on: