Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Trade Secret Litigation: The Power of Protection
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
The FBI on Economic Espionage
Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
#WorkforceWednesday: Spilling Secrets: Employers - Train on Trade Secrets - Employment Law This Week®
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
Monthly Minute | Trade Secret Protection Best Practices–Exit Interviews
Nota Bene Episode 110: Mapping U.S. Domestic and Extraterritorial Trade Secret Protection and Enforcement with Robert Friedman
Pepe the Frog
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
JONES DAY PRESENTS®: Trade Secret Enforcement in the United Kingdom
JONES DAY PRESENTS®: Trade Secret Enforcement in Spain
JONES DAY PRESENTS®: Trade Secret Enforcement in France
JONES DAY PRESENTS®: Trade Secret Enforcement in Taiwan
JONES DAY TALKS®: Women in IP: Protecting Trade Secrets in Remote-Work Situations
JONES DAY PRESENTS®: Trade Secret vs. Patent Litigation
U.S. International Trade Commission
Podcast: The Current Trade Secrets Landscape: Criminal and Civil Litigation Strategies and Tactics
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Imagine getting your hands on the ultimate creator cheat code — the behind-the-scenes playbook MrBeast uses to dominate YouTube. Now imagine going viral not for using it, but for allegedly walking off with it. That’s exactly...more
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
AT A GLANCE - Beyond whether DeepSeek used data from existing AI application program interfaces (APIs) to train its models lie concerns about whether querying an AI API may lead to trade secret misappropriation....more
Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more
Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
In the past decade, the prevalence of videoconferencing, social media, and other technological platforms have flooded college dorm rooms and boardroom meetings alike. The ubiquity of these technologies is unavoidable, and...more
The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
On April 16, 2020, the White House issued its “Guidelines for Opening Up America Again,” and several states have begun a slow process of emerging from the shutdown....more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
Social media contact lists have become an increasingly important part of a business’s customer lists. While courts are still grappling with who legally “owns” the data that the employee acquired on the employer’s dime—such...more
Employers continuously face a key employee or consultant leaving or separating from the company to join or start a competing business. In these inevitable scenarios, the loss – potential or actual – of the company's...more
A Tennessee District Court recently ruled in Wachter Inc. v. Cabling Innovations, LLC, 3:18-cv-00488 (W.D. Tenn. May 7, 2019) that two former employees with permitted access to company computers were not liable under the...more
A district court in Tennessee recently concluded in Wachter Inc. v. Cabling Innovations LLC that two former employees who allegedly shared confidential company information found on the company’s computer system with a...more
It’s among an in-house counsel’s worst nightmares. A former business partner, ex-employee, consultant, or competitor has stolen your company’s trade secret information. Company management demands swift action....more
A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more
In a recent case involving hackers that stole "payment card data" from Chipotle, Judge William J. Martinez in the United States District Court for the District of Colorado found on an issue of first impression that payment...more
Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more
Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too...more
Recently, the United States Court of Appeals for the Eleventh Circuit, sitting in Miami, heard oral argument in the case of LabMD, Inc. v. Federal Trade Commission, No. 16-16270. ...more
First, a little background for those unfamiliar with the wonderful world of the International Trade Commission (ITC). Section 337 of the Tariff Act of 1930 (19 U.S.C. § 1337) prohibits “unfair methods of competition and...more
In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more
Trade secret misappropriation presents a significant concern for companies. Pilfered trade secrets can have devastating effects on a company’s business, especially when trade secrets that are central to the successful...more