Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Trade Secret Litigation: The Power of Protection
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
The FBI on Economic Espionage
Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
#WorkforceWednesday: Spilling Secrets: Employers - Train on Trade Secrets - Employment Law This Week®
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
Monthly Minute | Trade Secret Protection Best Practices–Exit Interviews
Nota Bene Episode 110: Mapping U.S. Domestic and Extraterritorial Trade Secret Protection and Enforcement with Robert Friedman
Pepe the Frog
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
JONES DAY PRESENTS®: Trade Secret Enforcement in the United Kingdom
JONES DAY PRESENTS®: Trade Secret Enforcement in Spain
JONES DAY PRESENTS®: Trade Secret Enforcement in France
JONES DAY PRESENTS®: Trade Secret Enforcement in Taiwan
JONES DAY TALKS®: Women in IP: Protecting Trade Secrets in Remote-Work Situations
JONES DAY PRESENTS®: Trade Secret vs. Patent Litigation
U.S. International Trade Commission
Podcast: The Current Trade Secrets Landscape: Criminal and Civil Litigation Strategies and Tactics
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more
In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more
David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more
THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more
Last week, the FTC sent a closing letter to Morgan Stanley Smith Barney LLC (“Morgan Stanley”) relating to the agency’s investigation over whether Morgan Stanley engaged in unfair or deceptive acts or practices by failing to...more