News & Analysis as of

Electronically Stored Information Trade Secrets Data Protection

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Array

This Week in eDiscovery: Sedona Conference Commentary on Cross-Border Discovery | $845K Spoliation Award

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of December 8-14. Here’s what’s...more

Mayer Brown

IP Pitfalls in Data Monetization Projects

Mayer Brown on

Join Mayer Brown partners Richard Assmus and Oliver Yaros as they discuss with host Julian Dibbell how to address the IP pitfalls in data monetization. Their discussion will focus on the unseen value of data, the difficulties...more

Shook, Hardy & Bacon L.L.P.

Tesla Seeks Inspection Of Former Employee’s Cloud Storage Accounts – Lawsuit Highlights The Need For Diligent Security Efforts By...

In a recently developing story, on June 20, 2018, automaker and renewable energy giant Tesla filed suit against its now former employee Martin Tripp in the U.S. District Court for the District of Nevada. ...more

Foley & Lardner LLP

Press Delete, Go Directly to Jail? The Scope of the Computer Fraud and Abuse Act’s Damage Provision

Foley & Lardner LLP on

Can deleting information, even personal information, from your work computer land you in prison? That was the central question posed in USA v. Zeng, Case No. 4:16-cr-00172 in the Northern District of California. Mr. Zeng...more

Seyfarth Shaw LLP

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Orrick - Trade Secrets Group

Smoking Gun Or Blowing Smoke? Five Tips To Make Sure That Computer Forensic Evidence Of Trade Secret Theft Is What You Think It Is

Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide