Latest Posts › Data Security

Share:

Commercializing Your Startup's Big Secret Without Losing Its Value (Part 2)

In our first post, we discussed the scope of trade secret protection, as well as how a trade secret is established and enforced. In this second post, we discuss trade secret “hygiene” – that is, best practices for maintaining...more

Problem of Sequential Numbers and "Screen Scraping"

When I was in high school, the seniors would pull a prank in the late spring after college acceptance letters came in. It usually involved animals. The class above us released crickets in the lunchroom; another class set up...more

Hash Functions: Their Utility for Both Clients and Lawyers

"You're storing the passwords in plaintext?" My college professor looked at me puzzled. I had to immediately fix this. It was a huge security problem in my senior project, a web-based e-commerce platform. If any hacker tapped...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide