News & Analysis as of

Data Security Non-Disclosure Agreement

Ward and Smith, P.A.

Preventing Trade Secret Theft: Proactive Strategies for In-House Counsel

Ward and Smith, P.A. on

Ed. Note: This is the last in a series of articles taken from Gavin Parsons' CLE presentation for the North Carolina Bar Association's Antitrust and Complex Business Dispute CLE Program presented on Thursday, January 30,...more

Mintz - Intellectual Property Viewpoints

He Got the MrBeast Blueprint… and a Trade Secret Lawsuit

Imagine getting your hands on the ultimate creator cheat code — the behind-the-scenes playbook MrBeast uses to dominate YouTube. Now imagine going viral not for using it, but for allegedly walking off with it. That’s exactly...more

Fisher Phillips

Protecting Trade Secrets in the Life Sciences Industry: 8 Steps to Prevent Corporate Espionage and Theft

Fisher Phillips on

Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Mitchell, Williams, Selig, Gates & Woodyard,...

What Can a Court Do When Someone Violates the Secrecy of Trade Secrets?

When someone violates the secrecy of a company’s trade secrets, what can the company do about it? Writing a sternly worded cease and desist letter is often a good first step that we recommend to clients, however it must be...more

Reveal

How to Conduct Compliance Risk Assessment Efficiently (+Compliance Risk Assessment Template)

Reveal on

Is your business in compliance with every law, rule, and regulation that it should be? If you can’t confidently say yes, it’s time for a compliance risk assessment. And even if you could confidently say yes six months ago,...more

Davis Wright Tremaine LLP

China's Cyberspace Administration Proposes Draft Rules to Regulate Generative AI

Regulator proposes requiring content moderation, algorithmic transparency, data protection and security, nondiscrimination, and quality of training data - Regulators around the globe are paying close attention to the...more

ArentFox Schiff

The Four Things that Companies Need to Know About Protecting Trade Secrets

ArentFox Schiff on

Protecting trade secrets is critical for any company. Being proactive and consistent is the best way to keep your company’s secrets safe. Keeping Your Trade Secrets Secret - It is critical for new businesses (and...more

Holland & Knight LLP

Commercializing Your Startup's Big Secret Without Losing Its Value (Part 2)

Holland & Knight LLP on

In our first post, we discussed the scope of trade secret protection, as well as how a trade secret is established and enforced. In this second post, we discuss trade secret “hygiene” – that is, best practices for maintaining...more

Amundsen Davis LLC

Local and State Employment Law Update: COVID-19, Wage Transparency and Criminal Records

Amundsen Davis LLC on

Below are some of the latest state updates – INDIANA- Indiana Code 24-4.9-3-3, which addresses “reasonable” delays in reporting data security breaches, was amended by H.B. 1351 to impose a forty-five (45) day limit on...more

Mintz - Intellectual Property Viewpoints

Benefits of and Best Practices for Protecting Artificial Intelligence and Machine Learning Inventions as Trade Secrets

We previously discussed which portions of an artificial intelligence/machine-learning (“AI/ML”) platform can be patented. Under what circumstances, however, is it best to keep at least a portion of the platform a trade...more

Farella Braun + Martel LLP

Electric Fence: Protecting Proprietary Rights in Collected Energy Data

Like companies in other industries, a growing number of modern energy-related companies are focusing their efforts on data collection and analysis. For example, Enphase – an energy technology company – regularly tracks data...more

Smith Anderson

Protecting Company Relationships and Information Upon an Employee Departure

Smith Anderson on

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

Baker Donelson

Think Big Picture – minimize corporate export compliance risks while protecting your information security

Baker Donelson on

Recently I have attended several cyber security conferences. What I have learned about protecting information has changed how I view export controls. Senior management and board members should think about the big picture as...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide