News & Analysis as of

Cybersecurity Trade Secrets Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Schwabe, Williamson & Wyatt PC

Employees using free or unauthorized AI tools at work?

The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more

Ward and Smith, P.A.

Preventing Trade Secret Theft: Proactive Strategies for In-House Counsel

Ward and Smith, P.A. on

Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more

BakerHostetler

[Podcast] Slings and Arrows: Trade Secret Trends Reflect a Need for Safeguards

BakerHostetler on

Consider trade secret enforcement your armor on the battlefields of IP. Given greater exposure to cybersecurity breaches and data theft, a murky future for employee noncompete agreements, AI algorithms that challenge the...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Venable LLP

Understanding Trade Secret Laws and Assets

Venable LLP on

For companies, maintaining a competitive advantage over the market is necessary for long-term growth. In many cases, this competitive advantage takes the form of a federal- or state-protected trade secret, such as a...more

Morris, Manning & Martin, LLP

Navigating AI Risks: Balancing Innovation and Compliance in Your Enterprise

As artificial intelligence continues to revolutionize industries, businesses are facing increasing pressure to integrate AI solutions into their products and services to remain competitive. However, the adoption of AI...more

Fish & Richardson

Protecting and Enforcing Your Trade Secrets in a Global Economy

Fish & Richardson on

In the interconnected, global business environment, trade secret information regularly crosses international boundaries, and trade secret misappropriation can occur anywhere in the world. Trade secret holders should thus...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Procopio, Cory, Hargreaves & Savitch LLP

3 Steps to Protect Highly Sensitive Assets in an M&A Deal

Due diligence is a necessary part of any M&A transaction. This process can be an exhaustive deep dive into the target company’s history. In some cases, the buyer wants to assure itself of certain highly confidential and...more

Mandelbaum Barrett PC

Protecting Intellectual Property in the Digital Age

Mandelbaum Barrett PC on

By 2027, the global cost of cybercrime, such as IP theft, is estimated to reach over $23 trillion (up from roughly $8 trillion in 2022), highlighting the critical need for strong IP protection. However, as technology evolves,...more

Baker Donelson

Guardians of the Goldmine: Building an Effective Confidentiality Program

Baker Donelson on

On August 14, Judge Corrigan for the Middle District of Florida, in Properties of the Villages vs. FTC, found that the FTC did not have the authority to enter its planned Noncompete Rule, and entered an order granting an...more

Epstein Becker & Green

More Critical Than Ever: Cyber Risk "Tabletop Exercises" in the AI Infused Workplace

Since the dawn of digitalization, the collection and retention of personal and other business confidential data by employers has implicated security and privacy challenges—by amassing a treasure trove of data for bad actors...more

Benesch

Protecting Your Business in a Digital World: Top 10 Questions for Internal Teams and Stakeholders

Benesch on

The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more

Chambliss, Bahner & Stophel, P.C.

Trade Secret Protection in the Remote Working World

Out of necessity during the COVID-19 pandemic and related “stay-in-place” orders, many businesses have transitioned their workforce to work-from-home or similar remote working arrangements. The working world is making...more

Orrick, Herrington & Sutcliffe LLP

Go West: Venture Financing and Business Expansion Projects in the United States - Practical Guidelines for German Technology...

As the U.S. and German tech ecosystems become more closely connected, raising capital in the U.S. market is becoming a strategic consideration for many fast-growing German tech companies. For some, establishing a presence in...more

Orrick, Herrington & Sutcliffe LLP

A Cloud on the Horizon: Trade Secret Theft in the Cloud

As cloud services have transformed modern business, they have also changed the way companies protect and enforce their trade secrets. Companies and their employees increasingly store data on cloud - based platforms. While...more

Orrick - Trade Secrets Group

A New Month, A New Compliance Deadline In The European Union: What Businesses Need To Know About The EU Trade Secrets Directive

Just days after the European Union’s widely-discussed new data privacy regulations, the General Data Protection Regulation (“GDPR”), took effect on May 25, 2018, another EU-wide legal change quietly occurred.  ...more

Seyfarth Shaw LLP

Balancing Creativity With Exclusivity: How Companies Encourage Innovation While Protecting Intellectual Property

Seyfarth Shaw LLP on

On Friday, May 18, Eric Barton participated in a panel discussion at the 2018 ITechLaw World Technology Conference, updating attorneys from around the globe on the latest developments in cyber vulnerabilities and crime. In...more

Orrick - Trade Secrets Group

Trade Secrets and Cloud Services: Is the Sky the Limit?

Germany is not only known as one of the best countries for enjoying beer and bratwurst, but it is also known as a country with some of the strictest data privacy laws on the planet. Within this environment, should companies...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide