Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Trade Secret Litigation: The Power of Protection
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
The FBI on Economic Espionage
Partner Greg Rolen Discusses a Whistleblower Claim at Fremont Union School District’s Board Meeting
Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
#WorkforceWednesday: Spilling Secrets: Employers - Train on Trade Secrets - Employment Law This Week®
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
Monthly Minute | Trade Secret Protection Best Practices–Exit Interviews
Nota Bene Episode 110: Mapping U.S. Domestic and Extraterritorial Trade Secret Protection and Enforcement with Robert Friedman
Pepe the Frog
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
JONES DAY PRESENTS®: Trade Secret Enforcement in the United Kingdom
JONES DAY PRESENTS®: Trade Secret Enforcement in Spain
JONES DAY PRESENTS®: Trade Secret Enforcement in France
JONES DAY PRESENTS®: Trade Secret Enforcement in Taiwan
JONES DAY TALKS®: Women in IP: Protecting Trade Secrets in Remote-Work Situations
JONES DAY PRESENTS®: Trade Secret vs. Patent Litigation
U.S. International Trade Commission
On May 9, 2022, the U.S. District Court for the Middle District of Tennessee dismissed a would-be purchaser’s claims against the would-be seller’s lender arising from the lender’s refusal to consent to the sale. Ruby Tuesday,...more
CEP Magazine (November 2019) - Malaysian Attorney General Tommy Thomas filed criminal charges against an additional 17 employees of Goldman Sachs in connection with the 1Malaysia Development Berhad (1MDB) scandal....more
All of that SuperBowling seems to have put activist investor Starboard in the mood for some pizza—specifically, former NFL-partner Papa John’s, which has struggled in the wake of the removal of its founder and namesake John...more
What is a “tangible reproduction or representation”? This was the question that New York state’s highest court confronted when it heard the case of a former Goldman Sachs employee who had misappropriated the company’s source...more
As the saying goes, hard cases make bad law. And it certainly looked improper when Sergey Aleynikov downloaded high-frequency trading ("HFT") source code as he was leaving his job as a Goldman Sachs programmer, at least to...more
On April 20, 2017, the New York Court of Appeals issued a brief order continuing former Goldman Sachs programmer Sergey Aleynikov’s eight-year voyage through the state’s and country’s legal systems. Here’s the issue: does...more
Sergey Aleynikov, a former computer programmer at Goldman, Sachs & Co., has been on a legal roller coaster for the past few years. In the span of few days, that roller coaster plummeted steeply—twice. First, on January...more
In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more
On October 16, 2013, the U.S. District Court for the District of New Jersey, in Aleynikov v. The Goldman Sachs Group, Inc., found that a former vice president and computer programmer was an “officer” of Goldman Sachs & Co.,...more
The Obama Administration issued a Report earlier this month, entitled "Administration Strategy on Mitigating the Theft of U.S. Trade Secrets," that sets forth its efforts to prevent trade secret misappropriation. The Report...more
On December 28, 2012, President Obama enacted the Theft of Trade Secrets Clarification Act of 2012. The Act clarifies the scope of Section 1832 of the Economic Espionage Act and attempts to reverse the Second Circuit’s recent...more
This blog has previously covered the arrest, prosecution and trial of Sergey Aleynikov, the former employee and computer programmer of the Goldman Sachs Group accused and convicted of misappropriating computer source code...more