News & Analysis as of

Cybersecurity Trade Secrets

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Ward and Smith, P.A.

Preventing Trade Secret Theft: Proactive Strategies for In-House Counsel

Ward and Smith, P.A. on

Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

BakerHostetler

[Podcast] Slings and Arrows: Trade Secret Trends Reflect a Need for Safeguards

BakerHostetler on

Consider trade secret enforcement your armor on the battlefields of IP. Given greater exposure to cybersecurity breaches and data theft, a murky future for employee noncompete agreements, AI algorithms that challenge the...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Venable LLP

Understanding Trade Secret Laws and Assets

Venable LLP on

For companies, maintaining a competitive advantage over the market is necessary for long-term growth. In many cases, this competitive advantage takes the form of a federal- or state-protected trade secret, such as a...more

Morris, Manning & Martin, LLP

Navigating AI Risks: Balancing Innovation and Compliance in Your Enterprise

As artificial intelligence continues to revolutionize industries, businesses are facing increasing pressure to integrate AI solutions into their products and services to remain competitive. However, the adoption of AI...more

Orrick, Herrington & Sutcliffe LLP

Protecting Trade Secrets: Tips for AI Companies

AI companies should familiarize themselves with trade secret law to safeguard their innovations. A company does not need to register a trade secret to invoke it in litigation, unlike other IP protections. Trade secrets can...more

Fish & Richardson

Protecting and Enforcing Your Trade Secrets in a Global Economy

Fish & Richardson on

In the interconnected, global business environment, trade secret information regularly crosses international boundaries, and trade secret misappropriation can occur anywhere in the world. Trade secret holders should thus...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Procopio, Cory, Hargreaves & Savitch LLP

3 Steps to Protect Highly Sensitive Assets in an M&A Deal

Due diligence is a necessary part of any M&A transaction. This process can be an exhaustive deep dive into the target company’s history. In some cases, the buyer wants to assure itself of certain highly confidential and...more

Foley & Lardner LLP

AI in Drug Discovery: 2025 Outlook

Foley & Lardner LLP on

Looking forward to the 2025 prediction season, a survey of the emerging AI-powered drug discovery landscape has been making the rounds—and with good reason. The survey, summarized by Stanford’s Chris Bradbury, is likely the...more

Foley & Lardner LLP

Protecting IP in a Cyber-Threatened World: Insights from Zifino and Foley & Lardner

Foley & Lardner LLP on

As companies embrace digital transformation, they increasingly depend on proprietary technologies and data that requires robust cybersecurity measures to safeguard intellectual property (IP). Zifino and Foley & Lardner LLP...more

Fisher Phillips

Workplace Law Forecast 2025 - Your workplace law recap for 2024 and predictions for 2025 to help you prepare for the coming year.

Fisher Phillips on

As we close out 2024 and look ahead to 2025, one thing is clear: this has been a year like no other. From a groundbreaking Supreme Court ruling to a pivotal election result that will usher in a new administration, employers...more

Mandelbaum Barrett PC

Protecting Intellectual Property in the Digital Age

Mandelbaum Barrett PC on

By 2027, the global cost of cybercrime, such as IP theft, is estimated to reach over $23 trillion (up from roughly $8 trillion in 2022), highlighting the critical need for strong IP protection. However, as technology evolves,...more

Rumberger | Kirk

Why Your Organization Needs to Craft a Comprehensive GenAI Policy Now

Rumberger | Kirk on

The rapid advancement of generative artificial intelligence technologies has revolutionized various industries by automating complex tasks, creating content, and enhancing decision-making processes. However, it also poses...more

Morris, Manning & Martin, LLP

Legal Issues Around AI Are Real. And Complex.

Last week I had the pleasure of sitting down and discussing the legal implications of AI with a group of General Counsels. This group of GCs represented companies from the Fortune 100 all the way to mid-size enterprises. That...more

Foley & Lardner LLP

Cybersecurity in the Age of Industry 4.0 - Part 2

Foley & Lardner LLP on

This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more

Health Care Compliance Association (HCCA)

Privacy Briefs: September 2024

The HHS Centers for Medicare & Medicaid Services (CMS) and Wisconsin Physicians Service Insurance Corporation (WPS) are notifying 946,801 people whose protected health information or other personally identifiable information...more

Baker Donelson

Guardians of the Goldmine: Building an Effective Confidentiality Program

Baker Donelson on

On August 14, Judge Corrigan for the Middle District of Florida, in Properties of the Villages vs. FTC, found that the FTC did not have the authority to enter its planned Noncompete Rule, and entered an order granting an...more

Alston & Bird

6th Circuit Upholds 20-year Sentence of Chinese Spy, Convicted of Espionage Crimes, Attempting to Steal Trade Secrets

Alston & Bird on

On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Hogan Lovells

Navigating intellectual property and cybersecurity challenges in the life sciences sector

Hogan Lovells on

In the ever-evolving fields of life sciences and health care, protecting intellectual property (IP) and trade secrets is more crucial than ever. Ruud van der Velden, partner in the Hogan Lovells Intellectual Property, Media,...more

149 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide