Cybersecurity Trade Secrets

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Will Your Cyber Insurance Respond When You Need It Most?

On May 7, Columbia Casualty Company, an insurance company, filed one of the first lawsuits by an insurer seeking to deny coverage for a privacy class action under a cyber insurance policy. Why is this significant? As the...more

Executive Order Creates Cybersecurity Sanctions Framework

On April 1, 2015, President Obama issued an Executive Order authorizing the imposition of sanctions against designated individuals or entities found to be engaged in malicious cyber activity, including various forms of...more

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more

Five Minutes With … National Security and Cybercrime Professor Ahmed Ghappour

This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally.  These will be question-and-answers with notable figures in the trade secrets world. TSW got a chance to sit down with UC...more

Corporate Hacking and the Financial Services Industry

The question is not whether you are going to be hacked, but rather when and how often. That thinking is so pervasive in the cyber-security industry that industry participants now refer to “cyber-resilience” to better describe...more

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Trade Secrets Protection Act of 2014 Introduced in Bi-Partisan Effort to Protect Businesses From Cyber Security Threats

On July 29, 2014, North Carolina Congressman George Holding introduced the Trade Secrets Protection Act of 2014, H.R. 5233, which seeks to create a private federal remedy for victims of trade secret theft. Representative...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

3 Data Breach Liability and Care Standards to Know Now

Privacy and Cyber Security Litigation (PCS Litigation) has recently experienced extensive growth, particularly when it comes to the liabilities associated with a data breach. PCS Litigation involving data breach may be...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Protecting Trade Secrets When Employees Depart [Video]

Employment and labor lawyer Richard Warren discusses how employers can better protect one of their most valuable assets—their trade secrets....more

BREAKING: David Nosal Sentenced To Prison On CFAA Computer Intrusion And Trade Secret Charges

Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more

Trade Secrets Watch 2013 Year-In-Review

It’s been a hot year in the trade secrets field, with some huge verdicts and settlements, a renewed spotlight on cyberattacks, and an unusual flurry of trade secrets legislation. Trade Secrets Watch’s 2013 Year-in-Review...more

BYOD Can Be A Four-Letter Word

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

UPDATE: Sur-Sur-Sur Reply Highlights The Short Arm Of U.S. Law In Trade Secret Theft

A few months ago, we discussed the federal government’s difficulties prosecuting foreign companies and individuals for theft of U.S. trade secrets. We highlighted three cases in which foreign defendants effectively stalled...more

Business Litigation Report -- August 2013

In This Issue: Main Article: ..Remedying Cyber Attacks Through Trade Secret Claims at the ITC Practice Area Notes: ..Appellate Practice Update ..Arbitration Practice Update ..Class Action Litigation...more

Recent Developments In Information Technology Law – Second Quarter 2013

In This Issue: - I. U.S. Supreme Court - A. Trademarks 3 - II. U.S. Courts of Appeal - A. Patents - B. Copyrights - C. Copyrights/Criminal - D. Trademarks - E. Trademarks/Unfair Trade...more

The Short Arm Of The Law: U.S. Problems Prosecuting Foreigners For Trade Secret Theft

They say politics stops at the water’s edge. Increasingly, so does the power of the United States to thwart trade secret theft....more

LEGISLATIVE UPDATE: Rep. Zoe Lofgren Proposes New Legislation, Including A Civil Cause Of Action For Trade Secret Misappropriation

We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more

Intellectual Property Bulletin - Spring 2013: Legalizing “Hack-Back” Trade Secret Protections

Continuing the momentum for nationwide legal reform in response to recent high-profile international trade secret thefts, a panel of leading foreign policy and business experts issued a report last month calling for...more

Pols Gone Wild: Congress Discovers Trade Secret Theft And Cybersecurity Are Problems; We Sort Through The Explosion Of Legislation

Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more

It’s Not Just For Patents Anymore: Using The ITC To Combat Theft Of Trade Secrets

Trade secret theft knows no borders in an age of cybertheft and global corporate espionage....more

The Real Lesson of Chinese Cyberhacking

There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more

Mitigating Theft of Trade Secrets

In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more

39 Results
|
View per page
Page: of 2

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×