Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
#WorkforceWednesday: Bracket-Busting Trade Secret and Non-Compete Disputes in Sports - Employment Law This Week® - Spilling Secrets Podcast
California Employment News: Top Developments in Wage and Hour Law for 2024 (Podcast)
California Employment News: Top Developments in Wage and Hour Law for 2024
#WorkforceWednesday: Latest Developments – Restrictive Covenants in the Health Care Industry - Employment Law This Week® - Spilling Secrets Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
#WorkforceWednesday: Invention Ownership - Why the Tense Matters in Employee IP Provisions - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Non-Compete Law Update – Key Developments from 2023 - Employment Law This Week® - Spilling Secrets Podcast
The FBI on Economic Espionage
#WorkforceWednesday: Restrictive Covenants Around the World - Challenges for Multinational Employers - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Non-Compete Agreements in 2023: What Employers Need to Know - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Attention Employers - How to Protect Trade Secrets in California - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: When a Restrictive Covenant Dispute Goes Beyond the Injunction Phase - Employment Law This Week® - Spilling Secrets Podcast
On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
The new technology advancement using artificial intelligence (“AI”), ChatGPT (Chat Generative Pre-Trained Transformer) is a computer model that uses machine learning to generate relevant responses that mimic human-like...more
Massachusetts-Based Background Check Company Creative Services Faces Multiple Lawsuits Over Data Breach - "'CSI determined that certain files dating from November 2018 to November 2021 may have been copied from their...more
Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more
As technology becomes more sophisticated, so too do the security issues its users encounter. These challenges impact attorneys and law firms particularly, as they regularly deal with confidential data and privileged...more
A federal appeals court recently addressed whether employees had standing to bring a lawsuit when their personally identifiable information (PII) was inadvertently circulated to other employees at the company, with no...more
As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more
Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more
A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more
As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more
If you are working from home more often, you are likely eating from home more often. Online ordering of takeout food from Uber, Grubhub, DoorDash and the rest is up dramatically...more
The bad news first. An estimated 3.5 million cybersecurity positions will be unfilled globally by 2021.* Leaving data security entirely up to the professionals isn’t a viable option. Like it or not we’re all on the...more
A Florida staffing agency which provides physicians to hospitals and nursing homes, has agreed to a $500,000 settlement with the U.S. Department of Health and Human Services, Office for Civil Rights. The settlement comes...more
Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more
After several years of cyberattacks, you may be lulled into thinking large, sophisticated companies have now employed adequate safeguards to prevent disclosure of your confidential information. Don’t be so sure. Earlier this...more
On June 18, 2018, the U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) announced that an HHS Administrative Law Judge (“ALJ”) granted summary judgment to OCR in an enforcement action...more
This article is Part 4 of our series on the GDPR for U.S.-based companies. Part 1 assisted U.S.-based companies in determining whether the GDPR applies to them; Part 2 provided an overview of the GDPR’s key concepts and...more
We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more
Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more
With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more
With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets. But, in some industries, the greatest...more
FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more