Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Trade Secret Litigation: The Power of Protection
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
The FBI on Economic Espionage
Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
#WorkforceWednesday: Spilling Secrets: Employers - Train on Trade Secrets - Employment Law This Week®
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
Monthly Minute | Trade Secret Protection Best Practices–Exit Interviews
Nota Bene Episode 110: Mapping U.S. Domestic and Extraterritorial Trade Secret Protection and Enforcement with Robert Friedman
Pepe the Frog
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
JONES DAY PRESENTS®: Trade Secret Enforcement in the United Kingdom
JONES DAY PRESENTS®: Trade Secret Enforcement in Spain
JONES DAY PRESENTS®: Trade Secret Enforcement in France
JONES DAY PRESENTS®: Trade Secret Enforcement in Taiwan
JONES DAY TALKS®: Women in IP: Protecting Trade Secrets in Remote-Work Situations
JONES DAY PRESENTS®: Trade Secret vs. Patent Litigation
U.S. International Trade Commission
Podcast: The Current Trade Secrets Landscape: Criminal and Civil Litigation Strategies and Tactics
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of December 8-14. Here’s what’s...more
The U.S. District Court for the District of Kansas granted in part a plaintiff’s emergency motion for expedited discovery to allow forensic imaging of the defendant’s employees’ laptops to search for evidence of trade secret...more
In Xyngular Corp. v. Schenkel, a shareholder and director suspected that his colleagues on the board of directors were engaging in improper self-dealing, so he asked an IT department employee to download documents disclosing...more
Company new hires sometimes commit “unforced errors” when departing one company and joining another, leading to trade secrets disputes with the prior employer that could have been prevented by following basic rules and...more
On December 3, 2020, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on considerations and approaches that can help organizations proactively and reactively...more
When trade secret lawyers advise executives transitioning to a job with a competitor, they typically tell them to “take nothing with you” on the way out – meaning that no confidential, proprietary or trade secret information...more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
During the course of a trade secrets litigation, neglecting to preserve electronically stored information (“ESI”) may result in a finding of spoliation. In a recent Order issued by Judge Edward Davila (United States District...more
A recent decision issued by the U.S. District Court for the Northern District of California, San Jose Division, presents a stark example of what can result when a defendant accused of trade secret misappropriation is careless...more
One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more
In litigation, the term “spoliation” generally refers to loss or destruction of evidence. Spoliation can involve physical evidence, paper documents, or electronic data. Spoliation can be intentional or unintentional....more
A New London Connecticut Superior Court jury awarded an $839,423 verdict in November 2019, involving theft of trade secrets for a $70 million U.S. Navy underwater drone project. This case, LBI, Inc. v. Sparks, et al.,...more
Preservation of electronically stored evidence (ESI) may be critical in trade secret cases. When a dispute revolves around whether a defendant accessed and/or transmitted the plaintiff’s trade secret material maintained in an...more
A Tennessee District Court recently ruled in Wachter Inc. v. Cabling Innovations, LLC, 3:18-cv-00488 (W.D. Tenn. May 7, 2019) that two former employees with permitted access to company computers were not liable under the...more
The equitable defense of "unclean hands" is often raised but rarely proven. Sometimes stated as "he who comes into equity must come with clean hands," it is based on the maxim that "he that hath committed iniquity shall not...more
In a recently developing story, on June 20, 2018, automaker and renewable energy giant Tesla filed suit against its now former employee Martin Tripp in the U.S. District Court for the District of Nevada. ...more
New York recognizes conversion claims based on intangible property, such as electronically stored information or trade secrets.[1] But does a conversion claim exist when the theft of the intangible property does not deprive...more
The federal Computer Fraud and Abuse Act of 1986 (“CFAA”) has generated controversy and disagreement among courts and commentators regarding the scope of its application. The statute, 18 U.S.C. § 1030, which provides for...more
The Defend Trade Secrets Act (DTSA) Ex Parte Seizure mechanism allows victims of trade secret misappropriation to quickly prevent further dissemination of confidential information by asking a court to direct federal marshals...more
In Super Starr Int’l, LLC v. Fresh Tex Produce, LLC, a Texas entity that distributes produce throughout the United States filed suit against another Texas entity that imports foreign grown produce into the United States and...more
The court ordered, on an interim application, that the claimants’ confidential information be searched for and destroyed on the defendants’ computers. In an area of law where there was previously no direct authority, Arthur J...more
In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more
Much attention, including here at Trade Secrets Watch, has been focused in recent weeks on the Defend Trade Secret Act (“DTSA”), which overwhelmingly passed both houses of Congress in April and was signed into law by...more
THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more