Confidential Information

News & Analysis as of

TSCA: EPA Proposes Requirements for TSCA Inventory Notification (Active-Inactive)

On January 13, 2017, the U.S. Environmental Protection Agency (EPA) published a proposed rule that would require an electronic notification for chemical substances listed on the Toxic Substances Control Act (TSCA) Inventory...more

Simple Steps to Help Keep Your Trade Secrets Safe

As illustrated by the recent lawsuit by America’s Test Kitchen against celebrity chef Christopher Kimball, companies in a variety of industries are vulnerable to losing their trade secrets....more

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

NY DFS Proposed Cybersecurity Regulations Revised and Implementation Delayed

We previously reported on the New York Department of Financial Services’ proposed cybersecurity regulations. During the public comment period, the DFS received over 150 comments. In response, the DFS announced on December 28,...more

Six Days In Court – Almost As Fun As A Christmas Party

I missed the office Christmas party. Doing so was one benefit of having a six-day trial 116 miles away. It wasn't just me who missed the holiday luncheon. My partners Joe and Tim and a legal assistant named Cheri each...more

EU Commission Publishes Its Proposals for New e-Privacy Regulation

On 10 January, the EU Commission proposed a new Regulation on Privacy and Electronic Communications (“proposed Regulation”) to replace Directive 2002/58 (known as the “ePrivacy Directive”). The proposed Regulation...more

A Cloud on the Horizon? Attorneys’ Obligations when Using a Third-Party’s Cloud-Based Services

When we think of clouds, we likely picture cumulus, stratus, and cirrus ones, not the type of “cloud” that holds data and software. The latter type of cloud is generally controlled by a third-party service provider and is...more

2016 Year In Review: Securities Litigation And Regulation

2016 was an active year in securities litigation. In the first half of 2016 alone, plaintiffs filed 119 new federal class action securities cases. It was also a busy year for SEC enforcement proceedings, with a record 868...more

Philadelphia to Enact Law Prohibiting Inquiry Into a Prospective Employee's Wage History

Seyfarth Synopsis: Philadelphia is positioning to be the next jurisdiction to prohibit employers from inquiring into jobapplicants’ wage history during the employment application process....more

EU Proposed ePrivacy Rules to Extend to all Electronic Communications Providers

On January 10, the European Commission proposed new legislation that would update and supplement current ePrivacy rules and extend their scope to all providers of electronic communication services. The following is a...more

Two Decisions Issued the Same Day Highlight Choice of Laws Issues: Part II

Last week's Privilege Point described a Maine case applying the narrow pre-Upjohn "control group" standard for corporate communications. Harris Mgmt., Inc. v. Coulombe, 2016 ME 166, ---A.3d---. Illinois is by far the largest...more

Informing Illinois Newsletter - January 2017

How to Protect Business Information From Disclosure Under Illinois' FOIA - Local governments often possess sensitive proprietary information of their vendors or of regulated businesses. Because the Illinois Freedom of...more

DTSA Immunity: A plaintiff’s dream or a burdensome nightmare?

If you are a regular reader of TSW, you know we have been monitoring developments relating to the Defend Trade Secrets Act of 2016 (DTSA). While the Northern District of California was the first court to enter a written...more

Gavel to Gavel: First steps in buying or selling a business

Acquiring or divesting an existing business is a complex endeavor that requires considerable planning and analysis by both the seller and the buyer to protect their respective interests. Originally published in The...more

5 Tips for Protecting Your Business This Year: The Best Offense Remains a Good Defense

Whether you are starting a new business in 2017 or gearing up for another year with an existing company, the New Year brings the excitement of fresh opportunities. That enthusiasm, however, should not overshadow employment...more

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

Business Litigation Alert: "U.S. Supreme Court Upholds Broader Reach of Insider Trading Laws – What Does this Mean for...

In December 2016, the U. S. Supreme Court announced its decision in the closely watched insider trading case Salman v. US, ruling that if someone leaks confidential information to a friend or family member with the goal of...more

Baring It All: Judge Orders Swingers’ Club to Produce Email Distribution List

A recent case in the Southern District of Florida serves as a reminder that even trade secrets may be subject to production to opposing counsel. Magistrate Judge Jonathan Goodman recently ordered a defendant “swingers’” club...more

California Court Permits Whistleblowing Lawyer To Use Privileged Information

A California Federal Magistrate Judge in Sanford S. Wadler v. Bio-Rad Laboratories Inc. et al., No. 3:15-cv-02356 (N.D. Cal. Dec. 20, 2016), recently ruled that the Sarbanes-Oxley Act preempts California’s ethical rules...more

Lawyers Beware: Sending Native File Documents to Third Parties May Violate Your Ethical Obligations

The rules governing discovery of electronically stored information, though not fully developed, have matured enough to provide the basic “do’s and don’ts” for attorneys. Frequently, a party must produce electronic documents,...more

Trading and Markets Enforcement Report - January 2017

January 2017 - The last several years have seen law enforcement and regulatory bodies sharpen their focus on trading activity in the securities and derivatives markets. This focus has coincided with the advent of new and...more

Protecting Confidential Information from Untrustworthy Employees

Employers that maintain records of their employees and customers and allow employees have access to confidential information have long needed policies that not only secure the information, but ensure that employees who have...more

Wake Forest Leaks Scandal May Offer “Playbook” For Businesses Seeking Trade Secret Protection

After a long political season that took many twists and turns due in part to revelations from WikiLeaks, the holiday season finally arrived. For many, that meant family traditions, time away from work, and massive amounts of...more

Court Throws Out Back Massager Trade Dress Infringement Claims on Motion to Dismiss

As the first-filed paper in nearly any litigation, the complaint is typically subject to rigorous scrutiny from the named defendant to identify any flaws that may dispatch the case via a motion to dismiss. A plaintiff in the...more

Protective Order Dispute Is Resolved

Fallon, M.J. Court resolves protective order dispute. The dispute centers on what information may be disclosed to foreign counsel in non-US counterpart litigation. The magistrate previously asked the parties to be...more

980 Results
|
View per page
Page: of 40
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×