News & Analysis as of

Risk Mitigation Confidential Information

Restrictive Covenants Can Swing Both Ways: A 3-Step Plan To Avoiding Legal Risks When Onboarding New Employees

by Fisher Phillips on

Employers have been using restrictive covenant agreements – contracts that contain non-compete, customer non-solicitation, employee non-solicitation, or non-disclosure of confidential information – with increasing frequency...more

Why You Shouldn’t Relax on Pretaliation—Even if Policymakers Do

by NAVEX Global on

About two years ago, the Securities and Exchange Commission (SEC) made history when it brought the first “pretaliation” whistleblower enforcement action against KBR Inc., a technology and engineering firm in Houston. The...more

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

The Most Cost Effective Way You Can Protect Your Trade Secrets

I was giving a talk recently when a senior executive asked me, “If we have the time and resources to focus on just one thing to improve our information security, what would you suggest?”  I didn’t hesitate: “Train your...more

Organizational Conflicts of Interest

by PilieroMazza PLLC on

OVERVIEW - - Introduction to Organizational Conflicts of Interest (“OCI”) - Unequal Access to Information - Biased Ground Rules - Impaired Objectivity - Waiving an OCI - Strategic...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

by Bennett Jones LLP on

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Twitter Terrorism: Criminals Choose the Hack Attack

by Wilson Elser on

In what appears to be yet another brazen demonstration of capability following an earlier hijack of government social media sites, a group calling itself the Syrian Electronic Army (SEA) recently hacked into the U.S. Army’s...more

Fighting Back: Identifying Risks Posed by an Angry Current or Former Employee

Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

9 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.