News & Analysis as of

Confidential Information

"Preserving Attorney-Client Privilege, Work-Product Protection During Internal Investigations"

When companies conduct investigations that remain strictly internal, maintaining confidentiality is straightforward. But many investigations are conducted in cooperation with U.S. government regulators, who expect companies...more

"DOJ and SEC Cooperation Policies"

Whereas the privilege and work-product doctrine generally require confidentiality, cooperation with the government often necessitates disclosure. The Department of Justice (DOJ) and Securities and Exchange Commission (SEC)...more

The Insurer’s Dilemma: To Produce, or Not to Produce?

by Zelle LLP on

“Request for Production Number 25: Produce the entire underwriter’s file for underwriting the policy.” This familiar discovery demand has become far too common in the realm of insurance coverage litigation, and the request is...more

There Is More To Come In Europe: The Draft Of The ePrivacy Regulation

by King & Spalding on

In January 2017, the European Commission (the “EC”) published its proposal for a new ePrivacy Regulation (the “ePrivacy Proposal”), which will replace the ePrivacy Directive of 2002 (2002/58/EC) and the Cookie Directives of...more

Don’t Forget to Establish Personal Jurisdiction in Defend Trade Secrets Act Cases

by Seyfarth Shaw LLP on

It is well known that 18 U.S.C. § 1836, et seq. (the Defend Trade Secrets Act or “DTSA”) finally provides a mechanism for pursing trade secret claims in federal court. A recent decision, however, serves as an excellent...more

Are My Customer Lists a Trade Secret?

by Seyfarth Shaw LLP on

A lawyer’s favorite phrase might be “it depends.” And when an employer asks whether its customer lists qualify as a trade secret, “it depends” is often the answer. But even if it’s difficult to definitively state whether...more

4 Key Takeaways: All the Crime We Cannot See

Kilpatrick Townsend Partner Audra Dial recently served as moderator on a prestigious panel at the American Bar Association’s 32nd Annual Intellectual Property Law Conference (IPL Spring) in Arlington, Virginia. The panel,...more

Restrictive Covenants Can Swing Both Ways: A 3-Step Plan To Avoiding Legal Risks When Onboarding New Employees

by Fisher Phillips on

Employers have been using restrictive covenant agreements – contracts that contain non-compete, customer non-solicitation, employee non-solicitation, or non-disclosure of confidential information – with increasing frequency...more

Tokyo Dispute Resolution & Crisis Management Newsletter – April 2017

by King & Spalding on

US Department of Justice Issues New Corporate Compliance Guidelines - Criteria for the Criminal Division’s Evaluation of Corporate Compliance Programs - Introduction - Recently, and without the fanfare that often...more

Don’t Be Chatty about FMLA Leave

If you’re not careful, a casual reference to an employee’s FMLA leave might give rise to an FMLA interference claim. A recent Florida case, Holtrey v. Collier County Bd. of Commissioners, reminds us that you can get into...more

Corporate Law & Governance Update - April 2017

by McDermott Will & Emery on

The following developments from the past month offer guidance on corporate law and governance law as they may be applied to nonprofit health care organizations: OVERSIGHT OF CORPORATE CULTURE - A significant emerging...more

Beware Of Relying on Your Confidential Information

by Jones Day on

If you are involved in an IPR and you are contemplating whether to rely on your own confidential information as part of a filing, you need to consider the risk that the Board will deny your motion to file under seal because...more

Fifth Circuit Holds that Unpatented Products Can Be Given Patent-Like Protections by Contract

by Liskow & Lewis on

In a breach of contract case involving the overlay of intellectual property and contract law, Luv n’ care, Ltd, a global leader in the design and sale of baby products, filed suit against its former distributor, Groupo Rimar,...more

Immigration Fact and Fiction for the U.S. Employer: More on CBP Searching Electronic Devices – What is Left of the Fourth...

As mentioned in a prior blog post, the U.S. Customs and Border Protection (CBP) can conduct searches of individuals departing the United States, a fact that many are not aware of. In fact, the rule that failure to declare...more

It’s Positioning That Matters: Texas Court of Appeals Holds Proof Of Actual Use Not Required At The Temporary Injunction Phase

Christopher Hughes worked for Age Industries, Ltd. (“AI”) for nearly 20 years. He was the general manager of one of AI’s branch facilities and a limited partner of the company. In this role, Hughes had access to much of AI’s...more

Bankruptcy Bulletin Blamed for Blabbing Bondholders; New York Court Appoints Itself Arbiter of Who is “Legitimate Media”

by Bryan Cave on

We are all very used to (and very bored of) the on-going debate of what actually constitutes “the media” or “legitimate news.” In most instances, this sort of debate pits exclusive, Columbia-educated, “proper” journalists...more

UK Regulator Fines Former Investment Banker for Communicating Confidential Information Via WhatsApp

by Shearman & Sterling LLP on

The Financial Conduct Authority fined former investment banker Christopher Niehaus £37,198 for sharing client confidential information over WhatsApp. Mr. Niehaus was previously a managing director in the Investment Banking...more

Protective Agreements Before and During BPCIA Litigation: Prosecution and Regulatory Bars

by Fish & Richardson on

Protective orders that regulate the disclosure and use of confidential information exchanged during patent litigations are commonplace. However, the patent dispute resolution procedures under the Biologics Price Competition...more

What is Penalty For Giving Out Secrets?

by Hassan Elhais on

Question: A member of my family was working for a company and he forwarded confidential information to a third party. He did not know that it was a crime and now he has been arrested. What should he expect as...more

Don’t Let New Technology Cloud Your Legal Judgment

Law firms are slowly but steadily moving to the cloud. According to an American Bar Association report, 37.5% of lawyers reported the use of web-based software services or solutions in 2016, up from 31% in 2015, and 30% in...more

Procurement Pulse - April 2017

by DLA Piper on

Breach of the procurement rules raises the difficult dilemma of providing sufficient information to disaffected bidders to ensure that the playing field is as level as possible in terms of the information they have available...more

Business Litigation Alert: "The Risks of File Sharing Sites - Is using DropBox like leaving a document on a park bench?"

by Porter Hedges LLP on

File sharing sites such as DropBox have become commonplace, allowing users to upload and access electronic documents from a variety of locations. These sites are particularly convenient when multiple people are required to...more

Infused oils, investment managers and one combining factor: confidential information

by Dentons on

Cases involving confidential information have been keeping the High Court busy over the last few months. In this article, we look at two such recent cases: Kerry Ingredients (UK) Ltd v. Bakkavor Group Ltd and Marathon Asset...more

Guidebook: Cybersecurity in the Pharma, Biotech, and Medical Devices Industries

by Foley & Lardner LLP on

As a life sciences or medical device company, it is mission critical to protect lab books, drug and clinical test data, product formulas and production processes that underlie your patents, trade secrets and know-how from...more

Missouri Legislator Introduces Bill to Ban Restrictive Covenants

by Seyfarth Shaw LLP on

Since July 1, 2001, Missouri law with respect to non-solicitation clauses has been fairly straightforward. Specifically, § 431.202 of the Missouri Statutes states that a covenant not to solicit between an employer and an...more

1,077 Results
|
View per page
Page: of 44
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!