News & Analysis as of

Confidential Information Risk Management

Morgan Lewis

Trade Secrets in the Automotive Industry

Morgan Lewis on

As recent innovations in automotive technology continue to fuel unprecedented growth across the industry, companies must adapt their privacy and confidentiality capabilities to safeguard highly valuable trade secrets. With...more

JD Supra Perspectives

Doing Work in Public Spaces: Confidentiality Lessons from Airplanes, Trains & Beyond

JD Supra Perspectives on

Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more

Herbert Smith Freehills Kramer

Handy client guide to privilege

We have published a client guide to legal professional privilege under English law. This guide comprises: A decision tree: intended as a quick reference to help determine which documents can legitimately be withheld on...more

Offit Kurman

Safeguarding Your Business Data

Offit Kurman on

In this week's episode of OK at Work, attorneys Sarah Sawyer and Russell Berger from Offit Kurman discuss the importance of protecting sensitive business information such as client lists and proprietary data. Using the...more

Orrick, Herrington & Sutcliffe LLP

OIG makes seven recommendations for CFPB following major incident

On May 5, the OIG for the Fed authored a report with several recommendations for the CFPB following a major security incident regarding confidential supervisory information (CSI). The OIG issued four findings with seven...more

Conn Maciel Carey LLP

Best Practices to Safeguard Your Company’s Trade Secrets — Case Study

Conn Maciel Carey LLP on

The number one risk for trade secrets exfiltration is from insider threats—employees, contractors, or even executives with access to sensitive information who either intentionally or accidentally compromise it. Sometimes it’s...more

Venable LLP

Addressing Insider Threats to Intellectual Property

Venable LLP on

Want to learn more about drafting, negotiating, and understanding intellectual property and technology contracts and have 10 minutes to spare? Grab your morning coffee or afternoon tea and dig into our Tech Contract Quick...more

Kilpatrick

5 Key Takeaways | Protecting Your IP When People are Coming and Going

Kilpatrick on

Kilpatrick’s Katie Barton, Nena Bains, and Destiny Williams recently presented a webinar in partnership with the Association of Corporate Council on the topic of “Protecting Your IP When People are Coming and Going.”...more

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

EDRM - Electronic Discovery Reference Model

When AI Gets Personal: Legal Implications of Artificial Intimacy

ComplexDiscovery Editor’s Note: Emotional bonds with AI are no longer speculative—they’re shaping user behavior and redefining the risks legal professionals must address. This thoughtful exploration of artificial intimacy...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Potomac Law Group, PLLC

Three Tips for Your Company's Form Agreements

What’s missing from your company’s form agreements? Using form agreements allows companies to achieve efficiencies, consistency, and preferred contract language, but reliance on the standard terms that have become routine in...more

Ward and Smith, P.A.

Trade Secret Protection in 2025: What In-House Counsel Need to Know

Ward and Smith, P.A. on

Recent developments in workplace dynamics, regulatory changes, and several high-profile cases have highlighted the growing importance of understanding and protecting your company's trade secrets. For in-house counsel, staying...more

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Hicks Johnson

How to Develop a Successful Trade Secret Litigation Strategy: 7 Best Practices for In-House Counsel

Hicks Johnson on

In today’s competitive business environment, trade secrets have emerged as some of an organization’s most prized assets. They are the hidden formulas, proprietary processes, and specialized know-how that give companies their...more

Flaster Greenberg PC

Why Do I Need a Lawyer if I Have ChatGPT?

Flaster Greenberg PC on

Artificial intelligence has seen rapid advancements, including large language models and chatbots that understand and respond to questions using aggregated information. While mostly everyone is familiar with ChatGPT and some...more

Littler

Considerations for Artificial Intelligence Policies in the Workplace

Littler on

In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more

TransPerfect Legal

Preserving Attorney-Client Privilege in the Era of Generative AI: Essential Guidance for Lawyers

TransPerfect Legal on

As legal practices increasingly adopt generative AI (GenAI) technologies, protecting attorney-client privilege and client confidentiality has become a pressing concern. Recent data reveals that 81% of in-house counsel worry...more

MG+M The Law Firm

Release of Engineers and Geoscientists of British Columbia Practice Advisory on Use of Artificial Intelligence in Professional...

MG+M The Law Firm on

On November 22, 2024, Engineers and Geoscientists British Columbia (EGBC) released Use of Artificial Intelligence (AI) in Professional Practice, a practice advisory for EGBC registrants that provides guidelines on the use of...more

Venable LLP

Understanding Trade Secret Laws and Assets

Venable LLP on

For companies, maintaining a competitive advantage over the market is necessary for long-term growth. In many cases, this competitive advantage takes the form of a federal- or state-protected trade secret, such as a...more

U.S. Legal Support

Best Practices to Secure Law Firm Documents

U.S. Legal Support on

Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more

NAVEX

Workplace Whistleblowing: Should You Allow Anonymous Reporting?

NAVEX on

The biggest risks to your business are often the ones you can’t see. But with many people still reluctant to “speak up” about workplace issues, these risks can remain hidden. Enabling anonymous reporting about workplace...more

Goldberg Segalla

The Corporate Client: You’re My Lawyer, Right?

Goldberg Segalla on

The ABA recently provided insight for attorneys who represent corporate clients. While that engagement is often limited to an attorney’s duty to the organization, there is a very real risk that the organization’s members –...more

Offit Kurman

Five Things to Take into Consideration When Negotiating and Settling a Case

Offit Kurman on

Settling a case is hard. Negotiating the terms and coming to an agreement can take weeks or months. But once the parties agree to the general terms of a settlement (e.g., the amount of money changing hands and the timing of...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

159 Results
 / 
View per page
Page: of 7

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide