Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
#WorkforceWednesday: Bracket-Busting Trade Secret and Non-Compete Disputes in Sports - Employment Law This Week® - Spilling Secrets Podcast
California Employment News: Top Developments in Wage and Hour Law for 2024 (Podcast)
California Employment News: Top Developments in Wage and Hour Law for 2024
#WorkforceWednesday: Latest Developments – Restrictive Covenants in the Health Care Industry - Employment Law This Week® - Spilling Secrets Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
#WorkforceWednesday: Invention Ownership - Why the Tense Matters in Employee IP Provisions - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Non-Compete Law Update – Key Developments from 2023 - Employment Law This Week® - Spilling Secrets Podcast
The FBI on Economic Espionage
#WorkforceWednesday: Restrictive Covenants Around the World - Challenges for Multinational Employers - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Non-Compete Agreements in 2023: What Employers Need to Know - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Attention Employers - How to Protect Trade Secrets in California - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: When a Restrictive Covenant Dispute Goes Beyond the Injunction Phase - Employment Law This Week® - Spilling Secrets Podcast
The past few years have seen a sharp increase in the use of artificial intelligence (AI) across a variety of industries and workplaces. Many businesses have implemented AI to help streamline the recruitment and hiring process...more
This week, two class actions were filed in the U.S. District Court for the Eastern District of Pennsylvania against David’s Bridal based on two data breaches. The actions allege that David’s Bridal failed to protect the...more
In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
1. THE ATTORNEY-CLIENT PRIVILEGE - Historically, the attorney-client privilege developed upon two assumptions: (1) good legal assistance requires full disclosure of a client’s legal problems; and (2) a client will only...more
Everyone is talking about the new rule approved by the Federal Trade Commission on April 23 (published on May 7 and set to take effect – pending legal challenges – on September 4, 2024 ). It is referred to as the...more
The Internal Revenue Service (IRS) has begun the process of informing over 70,000 taxpayers that their confidential tax information was leaked in a widespread breach by a former IRS contractor. Those impacted should take...more
Partner Janine Anthony Bowen explores data-related issues in technology contracts in the age of GenAI....more
How do you protect trade secrets? You take reasonable efforts to maintain the secrecy of the information. As we have outlined in prior installments of this series, taking reasonable efforts to maintain secrecy is a key issue...more
On January 16, 2024, New Jersey became the first state to enact a comprehensive data privacy law in the new year, with Gov. Phil Murphy (D-NJ) signing the New Jersey Privacy Act (NJPA) (SB 332) into law. The New Jersey law...more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
Employee separation commonly involves investigations, litigation, and eDiscovery. Many employees continue to access information from their employers after separation and almost ¾ of employers report that they’ve been...more
The new technology advancement using artificial intelligence (“AI”), ChatGPT (Chat Generative Pre-Trained Transformer) is a computer model that uses machine learning to generate relevant responses that mimic human-like...more
In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more
Create a divesture strategy, monitor the portfolio, find a buyer, prepare to separate a portion of the business, close the sale, and oversee the transitionary period. This is the usual flow of events during a divestiture, but...more
By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more
The European Medicines Agency (EMA) published Version 1.1 of its “Guidance on how to approach the safeguarding of personal protected data (“PPD”) and commercially confidential information (“CCI”) while using the Clinical...more
A former hospital worker in Arizona was sentenced to 54 months in prison and ordered to pay restitution after pleading guilty to two felony counts involving identity theft and health information disclosure. In the plea deal,...more
On June 30, 2023, ARx Patient Solutions filed a notice of data breach with the Attorney General of Maine after discovering that an employee’s M365 email account was accessed by an unauthorized party. In this notice, ARx...more
Companies continue to adopt Bring Your Own Device (BYOD) policies to save money and relieve employees of the “two-phone burden.” However, such policies come with clear risks. Companies must remain particularly concerned when...more
An estimated 82% of the data breaches that occurred in 2022 involved human error or intentional misconduct. That’s why organizations need to be diligent in protecting their data from both internal and external threats. One...more
In the FTC’s first case focused on the privacy and security of genetic information, the FTC alleges that San Francisco-based Vitagene, Inc. – now known as 1Health.io – failed to live up to its promises and unfairly changed...more
The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more
On May 10, the National Institute of Standards and Technology (NIST) released its initial public draft of SP 800-171, Revision 3, a set of updated guidelines aimed at helping organizations better handle confidential...more