Privacy Intellectual Property

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Five Drivers of E-Discovery in the APAC Region

In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more

Are Your Trade Secrets Safe?

A few years back, we had a client – a manufacturing business – that decided to sue an ex-employee for stealing its trade secrets. Our client had developed a process that was unique. Using this process, it was able to...more

Cybersecurity for Startups Now a Cost of Entry for Consideration by Larger Clients: What is Your Company's Plan?

For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more

Intellectual Property Newsletter - July - August 2015

Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more

How To Make Computer Fraud Claims Stick

Employers need clear policies in order to use a federal criminal law as a civil remedy against workers. The recent decision in Allied Portables v. Youmans from the U.S. District Court for the Middle District of Florida...more

Socially Aware - Volume 6, Issue 3 - July/August 2015

Welcome to the newest issue of Socially Aware, our Burton Award winning guide to the law and business of social media. In this edition, we present a “grand unifying theory” of today’s leading technologies and the legal...more

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

Data Breach Decisions Setting A Higher Threshold For Standing For Plaintiffs Do Not Mean Businesses Are Off The Hook

There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

OPM and Where The Lines Are

The recent hacking of the sensitive personal information of millions of American public servants at the Office of Personnel Management (OPM) points out a noteworthy distinction in how the U.S. government views some types of...more

Supreme Court Update: Horne V. Dep't Of Agriculture (14-275), Kimble V. Marvel Entertainment (13-720), Patel V. City Of Los...

Raisins, radioactive wrists, Red Roof registries, and reformatory roughhousing were all on the Court's radar Monday (it's a very broad radar horizon), as it issued decisions in Horne v. Dep't of Agriculture (14-275), holding...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Cardinals Hacking Update

St. Louis Cardinals owner Bill DeWitt, Jr. threw staff members under the bus following the breaking story last week that the Cardinals have been hacking into the Astros’ database for up to three years. According to DeWitt, a...more

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

Labor & Employment E-Note - June 2015

In This Issue: - Debruge and Childs Alabama Law Survey on Employee Privacy Laws Published to Practical Law - "WTF", Under the NLRB, Employers Should "Cut the Crap?" - Tom Brady, Deflategate, and Florida...more

Maintaining Trade Secret Confidentiality in Litigation

Early Monday morning you learn that Jane, your former employee, has stolen your company’s confidential information and her new employer is using it. You call your lawyer and tell her that you want to put Jane in jail. Your...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Intellectual Property and Technology News (North America), Issue 26, Q2 2015

The Internet of Things: EU vs US guidance - Reports from the European Commission and the FTC on privacy and security best practices for IoT - key issues and highlights... Are IPRs impacting the pharmaceutical...more

[Webinar] Digital Health Update: Focus on Health Tech Startups - June 23, 1:00 CDT

Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more

"WTF", Under the NLRB, Employers Should "Cut the Crap?" The NLRB on Employer Rules, Handbooks, and Increased Employee...

As you have likely seen by now, on March 18, 2015, the National Labor Relations Board Office of the General Counsel ("GC") issued an extensive memorandum offering guidance on employer rules and handbooks. This memorandum...more

What Employees Need to Know about IP Protection

Do your employees understand the importance of intellectual property (IP) to your company and steps that they should be taking to protect it? Do they recognize that exposing proprietary information, such as product...more

Getting the Deal Through - Advertising and Marketing 2015: Canada

Legislation and Regulation - What are the principal statutes regulating advertising generally? The principal federal statute regulating advertising in Canada is the Competition Act, which is a law of general...more

[Webinar] Cyber Threats and the Crown Jewels: Practical Steps to Protect Corporate Assets - June 24, 9 a.m. EDT

Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more

The New Space Race: Protecting Trade Secrets on the Final Frontier

Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more

453 Results
|
View per page
Page: of 19

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×