News & Analysis as of

Today's Popular Updates Data Security Patents

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
Rothwell, Figg, Ernst & Manbeck, P.C.

The Pros And Cons Of Protecting AI As Trade Secrets

Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more

Troutman Pepper

Drafting Consumer Breach Notices — From a Litigation Perspective - Unauthorized Access Podcast

Troutman Pepper on

In this episode of Unauthorized Access, Kamran and Sadia welcome their firm colleague, Privacy + Cyber Partner and Team Leader Ron Raether, in a discussion on consumer breach notices — specifically from Ron's perspective as a...more

Robins Kaplan LLP

[Webinar] Second Annual AI Legal Summit - Session II | AI on the Edge: Legal Considerations for Artificial Intelligence Systems...

Robins Kaplan LLP on

Recognize the IP risks that arise as artificial intelligence and machine learning take a greater foothold in your business. Our three-part seminar will present solutions to risks that are unique to AI/ML, including: -...more

Holland & Knight LLP

Blockchain in the Supply Chain: Stake Your IP Claims Now!

Holland & Knight LLP on

Many companies are exploring the use of blockchain in their supply chain to make sure they are well positioned from a business perspective when blockchain use becomes ubiquitous. But another important consideration in...more

Robins Kaplan LLP

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Robins Kaplan LLP on

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide