News & Analysis as of

Confidential Information Confidential Business Information (CBI)

Epiq

Confidential Business Information: Protecting an Organization’s Most Valuable Secrets

Epiq on

When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more

BakerHostetler

Byte-Sized Terms: Drafting AI Contracts That Generate Success

BakerHostetler on

As technology continues to evolve, the use of generative artificial intelligence (AI) in business operations is reshaping the way we approach standard tech transactions. The traditional pillars of contract negotiation –...more

Fisher Phillips

A Lawyer’s Confession: Don’t Count on Contracts and Courts to Protect Your Company’s Confidential Information

Fisher Phillips on

Many people were shocked by the recent leak of a Supreme Court draft opinion. The idea that an employee would subvert confidentiality rules at the nation’s highest court on matters of national significance seemed far-fetched....more

Williams Mullen

EPA Proposes Rule for Confidential Business Information Claims under TSCA

Williams Mullen on

The 2016 amendments to the Toxic Substances Control Act (“TSCA”) made numerous changes to TSCA, including increasing public transparency of chemical information.  To accomplish this, the amendments required EPA to establish a...more

Bergeson & Campbell, P.C.

EPA Issues Final TSCA Fees Rule

On September 27, 2018, the U.S. Environmental Protection Agency (EPA) issued a final fees rule under the Toxic Substances Control Act (TSCA). The final rule largely tracks the proposed rule. ...more

Beveridge & Diamond PC

Unique Identifiers: A Little-Noticed TSCA Provision Could Have a Big Impact on CBI

Beveridge & Diamond PC on

Protection for confidential business information (CBI) could be at risk under one provision of the amended Toxic Substance Control Act (TSCA) now under consideration by EPA. TSCA’s little-noticed section 14(g)(4) requires...more

Baker Donelson

Eight Keys to Securing Portable Devices

Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide