Cybersecurity Trade Secrets

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Actions Foreshadow Uniform Cybersecurity Regulations for Federal Contractors - Two Recent Executive Agency Actions Lay the...

Federal government contractors handling Controlled Unclassified Information (CUI) should take notice of two recent executive agency actions. Combined, they lay the groundwork for a new cybersecurity clause to be added to the...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Caught Stealing More Than Bases, St. Louis Cardinals Teach Trade Secret Safety to All Employers

The recent hacking attack against the Houston Astros is a wake-up call for all employers: no organization is safe from its adversaries’ attempts to steal proprietary information to gain a leg up in the competition. The...more

3D Printing, Innovation Protection, and Manufacturing: The Big Change is Now

Intellectual property (IP) law is undergoing a major transformation just as additive manufacturing? or 3D printing? has begun to revolutionize the manufacturing industry. The interplay between these two forces could end up...more

[Webinar] Cyber Threats and the Crown Jewels: Practical Steps to Protect Corporate Assets - June 24, 9 a.m. EDT

Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more

The New Space Race: Protecting Trade Secrets on the Final Frontier

Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more

Will Your Cyber Insurance Respond When You Need It Most?

On May 7, Columbia Casualty Company, an insurance company, filed one of the first lawsuits by an insurer seeking to deny coverage for a privacy class action under a cyber insurance policy. Why is this significant? As the...more

Executive Order Creates Cybersecurity Sanctions Framework

On April 1, 2015, President Obama issued an Executive Order authorizing the imposition of sanctions against designated individuals or entities found to be engaged in malicious cyber activity, including various forms of...more

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more

Five Minutes With … National Security and Cybercrime Professor Ahmed Ghappour

This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally.  These will be question-and-answers with notable figures in the trade secrets world. TSW got a chance to sit down with UC...more

Corporate Hacking and the Financial Services Industry

The question is not whether you are going to be hacked, but rather when and how often. That thinking is so pervasive in the cyber-security industry that industry participants now refer to “cyber-resilience” to better describe...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Trade Secrets Protection Act of 2014 Introduced in Bi-Partisan Effort to Protect Businesses From Cyber Security Threats

On July 29, 2014, North Carolina Congressman George Holding introduced the Trade Secrets Protection Act of 2014, H.R. 5233, which seeks to create a private federal remedy for victims of trade secret theft. Representative...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

3 Data Breach Liability and Care Standards to Know Now

Privacy and Cyber Security Litigation (PCS Litigation) has recently experienced extensive growth, particularly when it comes to the liabilities associated with a data breach. PCS Litigation involving data breach may be...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Protecting Trade Secrets When Employees Depart [Video]

Employment and labor lawyer Richard Warren discusses how employers can better protect one of their most valuable assets—their trade secrets....more

BREAKING: David Nosal Sentenced To Prison On CFAA Computer Intrusion And Trade Secret Charges

Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more

Trade Secrets Watch 2013 Year-In-Review

It’s been a hot year in the trade secrets field, with some huge verdicts and settlements, a renewed spotlight on cyberattacks, and an unusual flurry of trade secrets legislation. Trade Secrets Watch’s 2013 Year-in-Review...more

BYOD Can Be A Four-Letter Word

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

UPDATE: Sur-Sur-Sur Reply Highlights The Short Arm Of U.S. Law In Trade Secret Theft

A few months ago, we discussed the federal government’s difficulties prosecuting foreign companies and individuals for theft of U.S. trade secrets. We highlighted three cases in which foreign defendants effectively stalled...more

Business Litigation Report -- August 2013

In This Issue: Main Article: ..Remedying Cyber Attacks Through Trade Secret Claims at the ITC Practice Area Notes: ..Appellate Practice Update ..Arbitration Practice Update ..Class Action Litigation...more

Recent Developments In Information Technology Law – Second Quarter 2013

In This Issue: - I. U.S. Supreme Court - A. Trademarks 3 - II. U.S. Courts of Appeal - A. Patents - B. Copyrights - C. Copyrights/Criminal - D. Trademarks - E. Trademarks/Unfair Trade...more

46 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×