News & Analysis as of

Data Security Trade Secrets Hackers

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Blank Rome LLP

[Ongoing Program] Protecting Information from Insider Threats and External Hacker - February 22nd, 12:00 pm - 12:30 pm ET

Blank Rome LLP on

Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more

Fisher Phillips

Will Supreme Court Enforce Law And Order In The Digital Workplace?

Fisher Phillips on

Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more

Blank Rome LLP

[Webinar] Primers for Pandemic Litigation Update - Critical Assets at Risk: Protecting Data Privacy and Trade Secrets during...

Blank Rome LLP on

With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more

Butler Snow LLP

Court Allows Company to Surreptitiously Monitor Former Employee’s Social Media Account to Support its Trade Secrets Claim

Butler Snow LLP on

A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more

Foley Hoag LLP - Security, Privacy and the...

U.S. Steel ITC Case Alleging Chinese Government Hacked Its Network and Stole Its Secret Formulas May Be Revived

First, a little background for those unfamiliar with the wonderful world of the International Trade Commission (ITC). Section 337 of the Tariff Act of 1930 (19 U.S.C. § 1337) prohibits “unfair methods of competition and...more

Orrick - Trade Secrets Group

U.S. Considers Sanctions Against China For Cyber Hacking And Trade Secret Misappropriation

You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more

Orrick - Trade Secrets Group

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide