News & Analysis as of

Data Protection Proprietary Information

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

Fisher Phillips

Protecting Data While Traveling Internationally: An Employer’s Guide for Foreign Nationals and Other Global-Traveling Workers

Fisher Phillips on

International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more

Array

This Week in eDiscovery: Sedona Conference Commentary on Cross-Border Discovery | $845K Spoliation Award

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of December 8-14. Here’s what’s...more

Venable LLP

Advertising Agreements: An Excerpt from the Advertising Law Tool Kit

Venable LLP on

Join us as we spotlight select chapters of Venable’s popular Advertising Law Tool Kit, which helps marketing teams navigate the legal risk of campaigns and promotions....more

Rothwell, Figg, Ernst & Manbeck, P.C.

The Pros And Cons Of Protecting AI As Trade Secrets

Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more

Reveal

Data Classification Policy: What it is and How it Can Boost Your Information Governance Efforts

Reveal on

An estimated 82% of the data breaches that occurred in 2022 involved human error or intentional misconduct. That’s why organizations need to be diligent in protecting their data from both internal and external threats. One...more

Fisher Phillips

6 Proactive Tips to Address Employee Defection Concerns Before a Crisis Unfolds

Fisher Phillips on

It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more

Reveal

5 Ways to Protect Sensitive Information From Unauthorized Disclosure

Reveal on

Sensitive information is everywhere, from clients’ names and addresses to the trade secrets a business relies on to beat its competition. As such, organizations can’t avoid collecting, processing, storing, and transferring...more

Robinson+Cole Data Privacy + Security Insider

Password Manager LastPass Admits to Hack

Password manager LastPass, reportedly used by more than 33 million users, recently announced that it was hacked, and although it reports that no passwords of users were compromised in the incident, unfortunately, its source...more

Goodwin

Companies Can Protect Proprietary Data When Responding to CCPA Privacy Requests

Goodwin on

Since its passage almost three years ago, the California Consumer Privacy Act (“CCPA”) has offered California-based consumers certain rights over the personal information companies collect and process about them. While...more

Fisher Phillips

One Year Later: How the Evolving Work-from-Home Climate Prompts Reminders for Technology Best Practices

Fisher Phillips on

Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more

Fisher Phillips

7 Steps to Address Privacy Concerns Arising with the Remote “Invisible Workforce”

Fisher Phillips on

As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Fisher Phillips

Trade Secret Protection With A Remote Workforce: 7 Practical Considerations for Employers

Fisher Phillips on

The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more

Stinson - Government Contracting Matters

A Case for Protecting Data Rights – The Boeing Co. v. Secretary of the Air Force

The Government has many rules regarding the protection of data. Government contractors must understand these rules and the importance of timely and properly marking data that they own or develop in performance of a government...more

International Lawyers Network

Protecting Your IP: Social Media Dos and Don’ts

Social media continues to offer an invaluable platform for natural products brands to engage and expand their customer base. In these times, consumers are using social media more and more—particularly on their mobile...more

Lighthouse

Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?

Lighthouse on

Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more

Nossaman LLP

On-Demand Webinar | Protecting Information in a Work-From-Home World

Nossaman LLP on

Each month, Nossaman's complimentary Employment BUZZ webinar series covers a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more

Farella Braun + Martel LLP

Electric Fence: Protecting Proprietary Rights in Collected Energy Data

Like companies in other industries, a growing number of modern energy-related companies are focusing their efforts on data collection and analysis. For example, Enphase – an energy technology company – regularly tracks data...more

Fisher Phillips

Will Supreme Court Enforce Law And Order In The Digital Workplace?

Fisher Phillips on

Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more

Nossaman LLP

[Webinar] Protecting Information in a Work-From-Home World - November 17th, 10:00 am - 10:45 am PT

Nossaman LLP on

Each month, Nossaman's complimentary Employment BUZZ webinar series will cover a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more

Constangy, Brooks, Smith & Prophete, LLP

Coronavirus and the workplace (Housebound edition)

Host Leigh Tyson interviews . . . Leigh Tyson, as she shelters in place. This special edition of Close-Up on Workplace Law covers wage and hour concerns related to teleworking, how employers can protect their confidential and...more

Sheppard Mullin Richter & Hampton LLP

A Cautionary Tale: Don’t Wait Until There Is A Problem To Protect Your Trade Secrets

A federal decision recently reminded businesses about the importance of taking appropriate measures to protect their proprietary information before any misappropriation occurs. In Abrasic 90 Inc. v. Weldcote Medals, Inc., the...more

Verrill

12 Days of HR: All I Want For Christmas Is . . . A Side Hustle?

Verrill on

In recent years, “side hustles” have become an increasingly common phenomenon among employees in all industries to supplement income from a “traditional” job. A key attribute of side hustles is that they are self-managed, and...more

Gray Reed

An Employer’s Spooky Interpretation of its Bring Your Own Device (BYOD) Policy

Gray Reed on

Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide