Confidential Information Misappropriation

News & Analysis as of

Sixth Circuit Differentiates Trade Secrets and Confidential Information Under Texas Law

Last week, in a diversity jurisdiction case, the Sixth Circuit analyzed Texas law to identify the relationship among three separate categories of business information: (1) trade secrets, (2) contractually protected...more

At Risk: Law Firms Bringing Bad Faith Trade Secrets Claims

Companies get anxious when key employees leave to start new ventures. A company may try to shield itself from the risk of losing confidential information by seeking an injunction preventing its former employees and their new...more

Trade Secrets Unwrapped: Packaging Materials Case Demonstrates The Importance Of Keeping Confidential Information Sealed Shut

There are many ways to gain trade secret protection, but also many ways to lose it. As the recent motion to dismiss ruling in Fleetwood Packaging v. Hein from the Northern District of Illinois illustrates, how a company...more

Employees and “Authorized Access”: A Threat from Within?

Workplace privacy has become an increasingly challenging issue for employees and employers alike. With technological advancements, employers have enhanced visibility into employee behavior including their use of company...more

The Katten Kattwalk - Issue 08

The Katten Kattwalk discusses legal issues in the fashion industry affecting the trademarks, patents and copyrights associated with companies, brands and products. Letter From the Editor - Fashion Week has come and...more

Protecting Company Relationships and Information Upon an Employee Departure

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

Utah Supreme Court Lays Out Pro-Plaintiff Presumption of Harm Standard in Trade Secret Cases

The Utah Supreme Court recently issued a significant decision laying out a presumption of harm evidentiary standard in trade secret cases, which will be very useful for plaintiffs seeking injunctive relief in cases involving...more

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more

Post-Newman Reality: Investigations Involving Unwitting “Tips” to Close Friends and Relatives Will Continue

Earlier this week, the United States Supreme Court declined to hear the federal government’s appeal of the ruling by the Court of Appeals for the Second Circuit in U.S. v. Newman. This leaves intact the Second Circuit’s quid...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Financial Projections, Strategic Plans, And Customer Contract Proposals Can Be Trade Secrets

Two competitors who do research and analysis for advertisers and media companies, concerning how television viewing impacts consumer purchasing, have been in a legal battle over alleged trade secret misappropriation, patent...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

New York v. Aleynikov: New York State’s Penal Code (Like Federal Criminal Law) Does Not Cover Electronic Reproduction of Source...

In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more

Modification of Protective Orders to Permit Use of Discovery Material in Foreign Litigation Must Consider 28 U.S.C. § 1782 Factors...

The U.S. Court of Appeals for the Federal Circuit vacated an order modifying a protective order to allow the use of confidential discovery material in foreign litigation, explaining that courts facing such questions must...more

Non-Compete and Trade Secret Provisions: Protecting Your Company and Assets

Now more than ever, employers must take active steps to protect their confidential information and trade secrets from the prying eyes of competitors. In our digital age, trade secrets can be misappropriated in an instant, and...more

Baker’s Trade Secret Lawsuit Does Not Lead to ‘Sweet’ Dreams

In an opinion issued on July 23, 2015 in Sweet Street Desserts, Inc. v. Better Bakery, LLC, the United States District Court for the Eastern District of Pennsylvania underscored the need to think carefully before filing a...more

The Fine Line Between Spying and Strategy: Competitive Intelligence’s Legal Limits and Practical Considerations

Although the market trends may change faster than ever today, companies have been gathering competitive intelligence (“CI”) since the dawn of capitalism. It’s not a new concept, but there are new ways to do it—some more...more

[Webinar] Trade Secret Protection: The Reasonable Steps Requirement - July 28, 11:00am EDT

The loss of trade secrets – ranging from proprietary formulas to confidential information to production methodologies – can have devastating impacts for a company. When there is misappropriation, in a growing number of...more

Jawbone Cries Foul – Fitbit’s Success Due To Stolen Trade Secrets

Fitbit better watch its step because Jawbone has a serious bone to pick with its competitor. On May 27, 2015, Jawbone, a maker of wearable fitness and activity tracker devices, filed suit in California state court...more

Appellate Decision Teaches New Jersey Employees How To Remove Confidential Documents and Trade Secrets from Employers

Like the hit show "How to Get Away with Murder," the recent New Jersey ruling in Spencer Sav. Bank SLA v. McGrover (App. Div. March 5, 2015), instructs employees looking to remove their employers' confidential documents and...more

There's A Difference Between "Confidential And Proprietary Information" And A Trade Secret

I can't remember the last time that the Business Court granted a motion opposing the designation of a case as a mandatory complex business case. And since the Business Court Modernization Act went into effect in October...more

Protecting food industry innovations as the scope of patentable subject matter narrows

Strong intellectual property increases the value of a company. Copyrights, trademarks, patents, and trade secrets are some avenues to protect intellectual property, but understanding when they’re available and understanding...more

Is your confidential information “property” if it does not qualify as a trade secret?

The answer likely is “no” according to a recent decision from a federal court in San Francisco. The plaintiff in that case, a data storage company, alleged that a competitor misappropriated its trade secrets by illegally...more

Supreme Court of Arizona Weighs in on the Preemption Provision of the State’s Trade Secrets Act

Orca Communications Unlimited, LLC v. Noder - The Uniform Trade Secrets Act’s (UTSA) displacement provision creates an exclusive cause of action for claims based on misappropriation of trade secrets and preempts...more

Arizona Supreme Court Holds the Arizona Uniform Trade Secrets Act Does Not Preempt Tort Claims Based on Misappropriation of...

On November 19, 2014, the Arizona Supreme Court ruled in Orca Communications Unlimited, LLC v. Noder that the Arizona Uniform Trade Secrets Act (AUTSA) does not preempt common law tort claims for misappropriation of...more

39 Results
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.