News & Analysis as of

Cybersecurity Non-Disclosure Agreement

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Ward and Smith, P.A.

Preventing Trade Secret Theft: Proactive Strategies for In-House Counsel

Ward and Smith, P.A. on

Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Orrick, Herrington & Sutcliffe LLP

Protecting Trade Secrets: Tips for AI Companies

AI companies should familiarize themselves with trade secret law to safeguard their innovations. A company does not need to register a trade secret to invoke it in litigation, unlike other IP protections. Trade secrets can...more

Baker Donelson

How Remote Hiring Practices Could Lead to Infiltration of Your Organization: North Korea Operatives are Exploiting Remote Hiring...

Baker Donelson on

In today's fast-paced digital world, businesses often seek to access a global pool of skilled professionals by turning to remote talent to fill gaps in their IT needs. Although this practice has many advantages, it also...more

Integreon

Post-Breach Data Review: 5 Reasons Why You Should Not Go at It Alone

Integreon on

After a data breach, organizations need to understand the scope of the incident in order to quickly resolve it and ensure they are able to meet notification requirements. The urgency often leads to the misguided belief that...more

Constangy, Brooks, Smith & Prophete, LLP

Where should the buck stop? Risks to CISOs in today’s regulatory environment

Joseph Sullivan, Uber’s beleaguered former Chief Information Security Officer, was back in the news last month when he appealed his 2023 conviction for his role in concealing a 2016 breach of Uber’s network and customer data....more

Baker Donelson

Guardians of the Goldmine: Building an Effective Confidentiality Program

Baker Donelson on

On August 14, Judge Corrigan for the Middle District of Florida, in Properties of the Villages vs. FTC, found that the FTC did not have the authority to enter its planned Noncompete Rule, and entered an order granting an...more

Foster Swift Collins & Smith

Risks Make AI Workplace Policies a Requirement

Artificial intelligence (AI) is fast becoming an integral element in the operation of virtually every business and organization. As with most modern technologies, the use of AI-powered apps and tools comes with its own set...more

Davis Wright Tremaine LLP

China's Cyberspace Administration Proposes Draft Rules to Regulate Generative AI

Regulator proposes requiring content moderation, algorithmic transparency, data protection and security, nondiscrimination, and quality of training data - Regulators around the globe are paying close attention to the...more

Mitratech Holdings, Inc

The Top Five Habits of Successful Legal Teams (& How to Make Them Second Nature!)

See how today’s top legal teams are leveraging technology to build habits that drive compliance, innovation, and efficiency. Experts agree that daily habits are the bedrock of success. The wisdom of the adage “an apple a...more

King & Spalding

The Big Questions for Employers in the UK for 2021

King & Spalding on

2020 was a year of exceptional change for employers and their staff. As the pandemic unfolded, businesses navigated their way through adjusting to a remote workforce to furloughing to creating COVID-secure workplaces and...more

Mintz - Intellectual Property Viewpoints

Steps Your Company Should Consider Now to Protect Value with a Wave of Trade Secret Litigation on the Horizon Due to COVID-19...

The coronavirus pandemic has created profound changes to how many Americans do their work, with an outsized number now working from home. This arrangement, while necessary given social distancing requirements and the...more

Chambliss, Bahner & Stophel, P.C.

Trade Secret Protection in the Remote Working World

Out of necessity during the COVID-19 pandemic and related “stay-in-place” orders, many businesses have transitioned their workforce to work-from-home or similar remote working arrangements. The working world is making...more

Seyfarth Shaw LLP

How To Keep Your Company’s Trade Secret Protections From Being A Halloween Fright Night

Seyfarth Shaw LLP on

Built into the definition of a trade secret is the requirement to have reasonable secrecy measures. Companies that do not use non-disclosure agreements with their employees can be at a tremendous disadvantage if they decide...more

Foley & Lardner LLP

Guidebook: Cybersecurity in the Pharma, Biotech, and Medical Devices Industries

Foley & Lardner LLP on

As a life sciences or medical device company, it is mission critical to protect lab books, drug and clinical test data, product formulas and production processes that underlie your patents, trade secrets and know-how from...more

Troutman Pepper Locke

Testing the Limits – Cyber Coverage Litigation Update

Troutman Pepper Locke on

The growing percentage of businesses that purchase cyber security and data privacy insurance portends a growing number of claims and, inevitably, litigation over some of those claims. Wells Fargo’s 2015 Cyber Security and...more

Baker Donelson

Think Big Picture – minimize corporate export compliance risks while protecting your information security

Baker Donelson on

Recently I have attended several cyber security conferences. What I have learned about protecting information has changed how I view export controls. Senior management and board members should think about the big picture as...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide