News & Analysis as of

Email Trade Secrets Hackers

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Fisher Phillips

A Company’s Facebook Snooping Didn’t Prevent Critical Trade Secrets Injunction

Fisher Phillips on

Can a former employer’s alleged misconduct defeat a request for injunctive relief against former employees when those departing workers take confidential information and clients to another employer? A federal appeals court...more

Orrick - Trade Secrets Group

(Alleged) Spammer Squares Off With (Alleged) Hacker, Highlighting Risk of Cyber Threats

What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more

Orrick - Trade Secrets Group

Smoking Gun Or Blowing Smoke? Five Tips To Make Sure That Computer Forensic Evidence Of Trade Secret Theft Is What You Think It Is

Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide