News & Analysis as of

Data Security Cybersecurity Trade Secrets

Ward and Smith, P.A.

Preventing Trade Secret Theft: Proactive Strategies for In-House Counsel

Ward and Smith, P.A. on

Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Morris, Manning & Martin, LLP

Navigating AI Risks: Balancing Innovation and Compliance in Your Enterprise

As artificial intelligence continues to revolutionize industries, businesses are facing increasing pressure to integrate AI solutions into their products and services to remain competitive. However, the adoption of AI...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Rumberger | Kirk

Why Your Organization Needs to Craft a Comprehensive GenAI Policy Now

Rumberger | Kirk on

The rapid advancement of generative artificial intelligence technologies has revolutionized various industries by automating complex tasks, creating content, and enhancing decision-making processes. However, it also poses...more

Morris, Manning & Martin, LLP

Legal Issues Around AI Are Real. And Complex.

Last week I had the pleasure of sitting down and discussing the legal implications of AI with a group of General Counsels. This group of GCs represented companies from the Fortune 100 all the way to mid-size enterprises. That...more

Alston & Bird

6th Circuit Upholds 20-year Sentence of Chinese Spy, Convicted of Espionage Crimes, Attempting to Steal Trade Secrets

Alston & Bird on

On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Epstein Becker & Green

More Critical Than Ever: Cyber Risk "Tabletop Exercises" in the AI Infused Workplace

Since the dawn of digitalization, the collection and retention of personal and other business confidential data by employers has implicated security and privacy challenges—by amassing a treasure trove of data for bad actors...more

Rothwell, Figg, Ernst & Manbeck, P.C.

The Pros And Cons Of Protecting AI As Trade Secrets

Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more

Fisher Phillips

Workplace Law Forecast 2024 - Your workplace law recap for 2023 and predictions for 2024 to help you prepare for the coming year.

Fisher Phillips on

When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more

HaystackID

[Webcast Transcript] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions

HaystackID on

Editor’s Note: HaystackID hosted an educational webcast on March 15, 2023, to discuss the growing importance of cyber and data hygiene in the context of privacy, cybersecurity, and data protection. The webcast focused on how...more

Fisher Phillips

Workplace Law Forecast 2023 - Legal predictions to help you prepare for the coming year in workplace law

Fisher Phillips on

It’s never easy to make accurate predictions about what we might expect to see in the workplace in the coming year. After all: - At the start of 2020, no one could have predicted COVID-19. - None of us had heard the phrase...more

Fisher Phillips

Forecast: March 2022 Edition

Fisher Phillips on

Welcome to FP Forecast, a monthly outlook featuring Fisher Phillips thought leaders providing their insights into what employers can expect in 2022 and beyond. By following along each month, you’ll be in the best position to...more

TransPerfect Legal

How to Improve Information Governance and Cyber Security

TransPerfect Legal on

Australian government research shows cyber-crime is costing the Australian economy approximately $3.5 billion a year. In fact, the government is considering whether to impose personal liability on corporate directors for...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Oberheiden P.C.

Theft of U.S. Companies’ IP Assets and Other National Security Issues Involving Foreign Governments and Foreign-Controlled...

Oberheiden P.C. on

Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more

Blank Rome LLP

[Webinar] Primers for Pandemic Litigation Update - Critical Assets at Risk: Protecting Data Privacy and Trade Secrets during...

Blank Rome LLP on

With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more

BakerHostetler

Cybercriminals' New Target: COVID-19 Treatments and Vaccines

BakerHostetler on

In March 2020, the U.S. government took extreme measures to crack down on the spread of COVID-19, including largely shutting down international air travel. However, no quarantine, lockdown, or social distancing measure...more

Fisher Phillips

Vulnerable Vendors: Automakers’ Data Breach Highlights Importance of Vendor Cybersecurity

Fisher Phillips on

This summer, several automakers, including Tesla, Toyota, General Motors, Ford, and Volkswagen learned that their closely held trade secrets were readily available on the internet. The source? An unprotected back-up server....more

Fisher Phillips

Why Your Company Should Be Using Email Enterprise Vaults, Anti-Deletion Programming and Key Stroke Surveillance Software in the...

Fisher Phillips on

Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more

Robinson+Cole Data Privacy + Security Insider

New York Stock Exchange releases cybersecurity guide for public companies

We continue to urge CEOs and boards of public companies (and private and not-for profits) to harken the call of getting a handle on cybersecurity risk to companies today. Not too soon, the New York Stock Exchange published a...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide