Safeguarding Your Business Data
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday®: Trade Secret Litigation - Lessons from High-Stakes Group Exits - Spilling Secrets Podcast - Employment Law This Week®
New Developments in Health Information Policy
#WorkforceWednesday®: 2024’s Biggest Trade Secrets and Non-Compete Developments - Spilling Secrets Podcast - Employment Law This Week®
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
#WorkforceWednesday®: Beyond Non-Competes - IP and Trade Secret Assessment Strategies for Employers - Spilling Secrets Podcast - Employment Law This Week®
4 Tips for Protecting Your AI Products
6 Things To Consider Before Litigation
#WorkforceWednesday®: Wizarding and the World of Trade Secrets - Spilling Secrets Podcast - Employment Law This Week®
What's the Tea in L&E? Can You Share An Employee's Medical Info?
Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
#WorkforceWednesday: Bracket-Busting Trade Secret and Non-Compete Disputes in Sports - Employment Law This Week® - Spilling Secrets Podcast
Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more
The Tenth Circuit’s recent decision in Double Eagle Alloys, Inc. v. Hooper, __F.4th __ (10th Cir. Apr. 22, 2025), provides a cautionary tale regarding the necessity of identifying trade secrets with particularity and...more
The protection of trade secrets and confidential information is critical to the success of many organizations. Employers must remain vigilant against the growing risk of sensitive information being compromised, especially...more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
Multistate employers with employees in Texas are subject to state laws regarding employment agreements. Whether your business is large or small, specific provisions within your agreements could render your agreements...more
I’m often asked whether employees should have access to the company’s cap table. The cap table is one of the most sensitive and critical documents in any startup. At its most basic level, it lays out who owns what –...more
Our White Collar, Government & Internal Investigations Team offers effective and actionable best practices for companies to follow in conducting their internal investigations....more
During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more
In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more
Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more
The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more
At the end of May, the Israel Competition Authority’s Director General published a consent decree with Mizra Delicacy Food Industries and Zilber Meat and Sausage Products Industries. Both companies agreed to pay approximately...more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
So far, in this three-part series, we discussed the various kinds of whistleblowing hotlines and the key components that comprise of a whistleblower hotline. In part three, we’ll discuss the four characteristics of a...more
The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more
With the increase in popularity of artificial intelligence uses in business, companies are scratching the surface of AI’s potential to create efficient processes, automate tasks, and generate content at a low cost. With...more
Redacted legal documents can create a host of issues when not handled properly during document review. Here are some common redaction mistakes – and tips on how to avoid them....more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
In a typical enterprise, most employees are hired to further the primary mission of the organization — whether providing goods and services, creating new products, engaging in sales and marketing, and so forth. ...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
The immediate cyber incident is over – what happens next? Join our esteemed panellists as they outline key considerations when managing post-breach data classification and notification projects. Setting the scene through the...more
It is common for businesses to disclose confidential information to governmental entities for regulatory and/or other purposes. However, once that information is disclosed, it may be vulnerable to public records requests....more