Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Trade Secret Litigation: The Power of Protection
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
The FBI on Economic Espionage
Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
#WorkforceWednesday: Spilling Secrets: Employers - Train on Trade Secrets - Employment Law This Week®
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
Monthly Minute | Trade Secret Protection Best Practices–Exit Interviews
Nota Bene Episode 110: Mapping U.S. Domestic and Extraterritorial Trade Secret Protection and Enforcement with Robert Friedman
Pepe the Frog
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
JONES DAY PRESENTS®: Trade Secret Enforcement in the United Kingdom
JONES DAY PRESENTS®: Trade Secret Enforcement in Spain
JONES DAY PRESENTS®: Trade Secret Enforcement in France
JONES DAY PRESENTS®: Trade Secret Enforcement in Taiwan
JONES DAY TALKS®: Women in IP: Protecting Trade Secrets in Remote-Work Situations
JONES DAY PRESENTS®: Trade Secret vs. Patent Litigation
U.S. International Trade Commission
Podcast: The Current Trade Secrets Landscape: Criminal and Civil Litigation Strategies and Tactics
The SEC did not take its foot off the pedal in fiscal year (FY) 2024 when it came to prosecuting insider trading. In the third installment of Season's Readings, we consider several recent actions in which the agency secured...more
Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more
Introduction - The Computer Fraud and Abuse Act (“CFAA”) is the embodiment of Congress’s first attempt to draft laws criminalizing computer hacking. It is rumored that the Act was influenced by the 1983 movie WarGames, in...more
According to one blockchain and cryptocurrency security firm, this year is on pace to be the second highest in cryptocurrency theft, hacking and fraud, with January through May 2020 already seeing $1.36 billion stolen in...more
Loyal readers are familiar with the DOJ’s “China Initiative,” launched in November 2018 to prosecute the theft of U.S. trade secrets by or for Chinese interests. Attorney General Barr reaffirmed the DOJ’s commitment “to...more
In a well-publicized litigation, the Democratic National Committee (DNC) sued the Russian Federation for "unlawfully hacking into the DNC's computers in connection with the 2016 presidential election and thereafter...more
A federal court of appeals recently found that there was nothing wrong with a company monitoring a departed employee’s Facebook account and using that information to pursue a trade secrets claim against four former employees....more
In a recent case involving hackers that stole "payment card data" from Chipotle, Judge William J. Martinez in the United States District Court for the District of Colorado found on an issue of first impression that payment...more
In January of this year, Chinese wind turbine manufacturer Sinovel Wind Group Co. Ltd. was convicted of stealing trade secrets from U.S. company AMSC Inc. ...more
Most companies have strengthened their cybersecurity defenses against outside hackers, but many often neglect the equal threat posed by those within their network walls — employees who already have privileged access to...more
After the long break, students have returned to colleges and universities across the country where they will trade late summer nights out with friends for tossing Frisbees on the quad. As classes begin, we at TSW wanted to...more
First, a little background for those unfamiliar with the wonderful world of the International Trade Commission (ITC). Section 337 of the Tariff Act of 1930 (19 U.S.C. § 1337) prohibits “unfair methods of competition and...more
Motion to Withdraw — Meaning of Requirement to "Diligently Attempt" to Locate the Client: Caveman Foods, LLC v. Ann Payne's Caveman Foods, LLC, Civ. No. 2:12-1112 WBS DAD - Risk Management Issue: When a lawyer or law...more
Here’s a recent victory we obtained on behalf of our clients SunEdison, Inc., et al. The individual defendants (then-current employees of SunPower, Inc.) were alleged to have violated the federal Computer Fraud and Abuse Act...more
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more
There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more
The Obama Administration issued a Report earlier this month, entitled "Administration Strategy on Mitigating the Theft of U.S. Trade Secrets," that sets forth its efforts to prevent trade secret misappropriation. The Report...more