News & Analysis as of

Trade Secrets Data Protection

A Trade Secret is any information, not generally known or easily ascertainable, by which an enterprise develops an economic advantage over competitors or customers. In order to maintain trade secrets'... more +
A Trade Secret is any information, not generally known or easily ascertainable, by which an enterprise develops an economic advantage over competitors or customers. In order to maintain trade secrets' protected legal status, enterprises must make reasonable efforts to keep the information secret and prevent unnecessary disclosure.  Trade Secrets may include processes, formulas, methods, designs, patterns, et cetera.   less -

The EC New Alert Mechanism to Detect Cartels: A Teaser Before a European General Framework for Whistleblowing

Whistleblowing has been part of the U.S. legal tradition, if not since the resolution passed by the Continental Congress in 1778, at least since the adoption of the 1863 False Claims Act. With regard to the disclosure of...more

4 Key Takeaways: All the Crime We Cannot See

Kilpatrick Townsend Partner Audra Dial recently served as moderator on a prestigious panel at the American Bar Association’s 32nd Annual Intellectual Property Law Conference (IPL Spring) in Arlington, Virginia. The panel,...more

Pooley’s Corner: Losing Secrets to Foreign Companies: How to Reduce the Risk

During a recent seminar I was asked, “What can companies do to stop the loss of trade secrets to places like China?” The questioner seemed stressed and a bit angry, perhaps reflecting a certain frustration that there may not...more

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

Data Theft And What’s “Tangible”: New York Appellate Division Reinstates Conviction Of Former Goldman Sachs Programmer Sergey...

The law often lags behind developments in the tech world. One problem for employers seeking to protect their data is that some anti-theft and trade secret protection laws drafted long ago refer to “goods” and “tangible”...more

DSM Watch: European Commission's data package explores data ownership, localization, liability and portability, highlighting...

by Hogan Lovells on

On January 10, 2017, the European Commission released a Communication, a fact sheet, a working document and a public consultation relating to Europe’s “data economy”. The fact sheet states that “data is a new type of...more

How to Prepare for Theft of Company Information

by Dorsey & Whitney LLP on

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

Impact of Brexit on Intellectual Property

Now that the dust is settling on the UK’s decision to leave the EU, our clients are asking what this means for them. Change always brings opportunities, as well as challenges, and we are focused on helping our clients...more

Will Privacy Enforcement Actions Impact “Reasonable” Security Measures Needed to Protect Trade Secrets?

by LeClairRyan on

In widely-publicized, contested privacy cases last year, the FTC advocated in favor of a high baseline for information security measures.  Among the security practices attacked by the FTC as critical mistakes by companies...more

Der Markteintritt für deutsche IT Firmen aus dem Bereich des Gesundheitswesens

by Arnall Golden Gregory LLP on

With expenditures of over $ 3 trillion of market in the field of health care in the United States is huge. Incentives of the Federal Government for the introduction of electronic medical records resulted increasingly in the...more

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - Global Overview

by WilmerHale on

With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more

That is SO last week - October 2015

by Zelle LLP on

Last week saw a lot of media coverage about “Yelp for People.” The app, called Peeple, allows users to rate friends, co-workers, and romantic partners based on a five-star rating system. Recruiters could review the ratings...more

US-China Cyber Deal Big on Promises, Short on Action

by LeClairRyan on

In the aftermath of recent cyberattacks attributed to China’s government and citizens, many observers prepared for a rather uncomfortable state visit by Chinese President Xi Jinping last week. Then, as President Xi began his...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

by Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Did Recent Changes in the Patent Laws Turn the Page on the Need for Accurate Laboratory Notebooks?

by BakerHostetler on

With the enactment of the Leahy-Smith America Invents Act (AIA), the U.S. patent system moved to a “first inventor to file” approach for examining all applications having an effective filing date on or after March 16, 2013....more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Intellectual Property Newsletter - July - August 2015

by King & Spalding on

Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more

Actions Foreshadow Uniform Cybersecurity Regulations for Federal Contractors - Two Recent Executive Agency Actions Lay the...

by Holland & Knight LLP on

Federal government contractors handling Controlled Unclassified Information (CUI) should take notice of two recent executive agency actions. Combined, they lay the groundwork for a new cybersecurity clause to be added to the...more

Corporate Espionage is Real

by Benesch on

Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more

Top Ten Things to Do When an Employee Resigns to Join a Competitor

by Fisher Phillips on

When an employee resigns to join a competitor, it is important to respond promptly. Odds are that the employee has been orchestrating his or her departure for weeks or months. The security of your trade secrets and/or...more

Digital Disruption When You Least Expect (Or Want) It

by DLA Piper on

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Will Your Cyber Insurance Respond When You Need It Most?

On May 7, Columbia Casualty Company, an insurance company, filed one of the first lawsuits by an insurer seeking to deny coverage for a privacy class action under a cyber insurance policy. Why is this significant? As the...more

Be Global - A look ahead to key international employment law developments expected in 2015

by DLA Piper on

In This Issue: - ASIA PACIFIC: - Australia: Gender Equality Reporting Update - China: Predicted Increase in Collective Bargaining - China: Compliance with 10% Cap on Dispatch Workers - Hong Kong:...more

New Year’s Resolutions for Companies Seeking to Protect Their Trade Secrets in 2015

The start of a new year is a perfect opportunity to set lofty goals of self-improvement. While the odds of completing a New Year’s resolution aren’t exactly inspiring (over half are expected to fail within six months) studies...more

Don’t Be the Next Data Breach Target

by Conduent on

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

55 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!