Cybersecurity Trade Secrets

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

2015 Hot Topics for Multinational Companies

As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues...more

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Trade Secrets Protection Act of 2014 Introduced in Bi-Partisan Effort to Protect Businesses From Cyber Security Threats

On July 29, 2014, North Carolina Congressman George Holding introduced the Trade Secrets Protection Act of 2014, H.R. 5233, which seeks to create a private federal remedy for victims of trade secret theft. Representative...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

3 Data Breach Liability and Care Standards to Know Now

Privacy and Cyber Security Litigation (PCS Litigation) has recently experienced extensive growth, particularly when it comes to the liabilities associated with a data breach. PCS Litigation involving data breach may be...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Protecting Trade Secrets When Employees Depart [Video]

Employment and labor lawyer Richard Warren discusses how employers can better protect one of their most valuable assets—their trade secrets....more

BREAKING: David Nosal Sentenced To Prison On CFAA Computer Intrusion And Trade Secret Charges

Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more

Trade Secrets Watch 2013 Year-In-Review

It’s been a hot year in the trade secrets field, with some huge verdicts and settlements, a renewed spotlight on cyberattacks, and an unusual flurry of trade secrets legislation. Trade Secrets Watch’s 2013 Year-in-Review...more

BYOD Can Be A Four-Letter Word

So your employee wants to use his new iPhone5S to respond to work emails while on vacation. As an employer, you’re thrilled. You don’t have to pay for the technology (or the data plan), but your employee is now accessible...more

UPDATE: Sur-Sur-Sur Reply Highlights The Short Arm Of U.S. Law In Trade Secret Theft

A few months ago, we discussed the federal government’s difficulties prosecuting foreign companies and individuals for theft of U.S. trade secrets. We highlighted three cases in which foreign defendants effectively stalled...more

Business Litigation Report -- August 2013

In This Issue: Main Article: ..Remedying Cyber Attacks Through Trade Secret Claims at the ITC Practice Area Notes: ..Appellate Practice Update ..Arbitration Practice Update ..Class Action Litigation...more

Recent Developments In Information Technology Law – Second Quarter 2013

In This Issue: - I. U.S. Supreme Court - A. Trademarks 3 - II. U.S. Courts of Appeal - A. Patents - B. Copyrights - C. Copyrights/Criminal - D. Trademarks - E. Trademarks/Unfair Trade...more

The Short Arm Of The Law: U.S. Problems Prosecuting Foreigners For Trade Secret Theft

They say politics stops at the water’s edge. Increasingly, so does the power of the United States to thwart trade secret theft....more

LEGISLATIVE UPDATE: Rep. Zoe Lofgren Proposes New Legislation, Including A Civil Cause Of Action For Trade Secret Misappropriation

We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more

Intellectual Property Bulletin - Spring 2013: Legalizing “Hack-Back” Trade Secret Protections

Continuing the momentum for nationwide legal reform in response to recent high-profile international trade secret thefts, a panel of leading foreign policy and business experts issued a report last month calling for...more

Pols Gone Wild: Congress Discovers Trade Secret Theft And Cybersecurity Are Problems; We Sort Through The Explosion Of Legislation

Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more

It’s Not Just For Patents Anymore: Using The ITC To Combat Theft Of Trade Secrets

Trade secret theft knows no borders in an age of cybertheft and global corporate espionage....more

The Real Lesson of Chinese Cyberhacking

There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more

Mitigating Theft of Trade Secrets

In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more

The Computer Fraud And Abuse Act, And Protecting Employer’s Electronic Data

The Southern District of New York recently joined a number of other jurisdictions in foreclosing one avenue of recovery for employers seeking to recover against employees who steal company information for competitors. In...more

Obama Administration Solicits Public Help in Preventing Foreign Trade Secret Theft

On Tuesday, the U.S. Intellectual Property Enforcement Coordinator, Victoria Espinel, published a notice in the Federal Register "requesting any recommendations for legislative changes that would enhance enforcement against,...more

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

How to Protect Your Company From Hackers [Video]

March 8 (Bloomberg Law) -- With reports of corporate espionage and hacking on the rise, the US government and private companies need to take steps to prevent the loss of trade secrets and threats to national security says...more

Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets

The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance. Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities...more

34 Results
|
View per page
Page: of 2