Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Trade Secret Litigation: The Power of Protection
JONES DAY PRESENTS®: Cross-Border Trade Secret Litigation in the United States
The FBI on Economic Espionage
Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
#WorkforceWednesday: Spilling Secrets: Employers - Train on Trade Secrets - Employment Law This Week®
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
Monthly Minute | Trade Secret Protection Best Practices–Exit Interviews
Nota Bene Episode 110: Mapping U.S. Domestic and Extraterritorial Trade Secret Protection and Enforcement with Robert Friedman
Pepe the Frog
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
JONES DAY PRESENTS®: Trade Secret Enforcement in the United Kingdom
JONES DAY PRESENTS®: Trade Secret Enforcement in Spain
JONES DAY PRESENTS®: Trade Secret Enforcement in France
JONES DAY PRESENTS®: Trade Secret Enforcement in Taiwan
JONES DAY TALKS®: Women in IP: Protecting Trade Secrets in Remote-Work Situations
JONES DAY PRESENTS®: Trade Secret vs. Patent Litigation
U.S. International Trade Commission
Podcast: The Current Trade Secrets Landscape: Criminal and Civil Litigation Strategies and Tactics
As legal and business professionals focused on protecting intellectual property—especially those of us in business litigation—it's crucial to stay attuned to the expanding influence of generative AI (“GenAI”). While patents...more
This month’s cases involve a cert petition to the U.S. Supreme Court on the extraterritorial application of the federal Defend Trade Secrets Act, a matter of first impression before the Court of Federal Claims, and a reminder...more
Can you protect a personal “aesthetic” or “vibe?” Social media influencer Sydney Nicole Gifford believes so, as she recently sued fellow social media influencer Alyssa Sheil in Texas Federal Court, in what is now known as the...more
Welcome to WilmerHale’s bulletin on recent trade secret case law and relevant news items. We’ve affectionately nicknamed it “Readily Ascertainable” because, unlike a trade secret, it should be easy to figure out....more
Continuing our series on electric vehicle (EV) trade secret litigation, see here and here, a California judge has tentatively given Tesla the green light to proceed with a trial against rival Rivian in March of 2025. This...more
On March 5, 2020, the U.S. District Court for the Northern District of Illinois entered a final judgment on a jury verdict of approximately $764.6 million in a high profile trade secret misappropriation case — Motorola...more
Continuing our annual tradition, we have compiled our top developments and headlines for 2019 & 2020 in trade secret, non-compete, and computer fraud law. Here’s what you need to know to keep abreast of the ever-changing law...more
The United States District Court for the Eastern District of Louisiana recently held that, under the Defend Trade Secrets Act, 18 U.S.C. § 1836, et seq., information included in a patent application remains an actionable...more
On May 3, 2019, following a jury verdict rendered last November, a Santa Clara, California court entered a final judgment for $845 million in favor of semiconductor maker, ASML, in its suit against rival, XTAL, for stealing...more
Switching from defense to offense, Zillow Group, Inc., best known for its residential real estate marketplace technology, recently filed a lawsuit in the U.S. District Court for the Western District of Washington alleging a...more
In This Issue - US Taxation of IP After Tax Reform - U.S. taxation of intellectual property has become astoundingly more complex after the Tax Cuts and Jobs Act. The new rules are so complex that the IRS and Treasury...more
Bitcoin is often portrayed as an untraceable method of payment that facilitates illicit activities by enabling criminals to make and receive payments without being tracked. This depiction implies that users transacting in...more
THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more
In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more
Trade secret misappropriation cases create a unique problem for courts. The parties become quickly embroiled in litigation over the misappropriation of trade secrets, sometimes with only bare-bone allegations of those trade...more