Email Trade Secrets

News & Analysis as of

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Employees: Your Role in Keeping Trade Secrets ‘Secret’

As an employee, do you know what you should be doing to protect your company’s critical business information and trade secrets? It’s likely that in your employment contract you agreed not to disclose confidential corporate...more

Russian Perspective: Can Sending Confidential Information to Your Personal Email Address Constitute a Disclosure of a Trade...

Imagine that you are the General Director of a company (the Russian equivalent of an American CEO), and your information security department finds out that an employee, who you have long suspected of industrial espionage, has...more

Smoking Gun Or Blowing Smoke? Five Tips To Make Sure That Computer Forensic Evidence Of Trade Secret Theft Is What You Think It Is

Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more

Confidentiality From The Boardroom To The Bedroom

Sometimes we can learn valuable employment law lessons from even the non-employment law court decisions. What happens if the boardroom meeting to discuss your company’s trade secrets ends up as pillow talk between an...more

Second Circuit Rules U.S. Court Has Personal Jurisdiction over Foreign Employee Who Allegedly Misappropriated Trade Secrets...

Last month, a federal appeals court issued a ruling permitting an employer in Connecticut to pursue a claim against a former employee who allegedly misappropriated the employer's confidential information from outside the...more

Effective Data-Use Policies Can Have “Far-Reaching” Benefits in Cracking Down on Employee Cyber Theft

In a decision that could make it easier for U.S. companies to enforce claims against employees who commit cyber theft from remote locations, including from beyond U.S. borders, the Second Circuit breathed life into a...more

7 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.