Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
The 'Secrets' of Trade Secrets in Government Contracting
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
On-Demand Webinar | Protecting Information in a Work-From-Home World
Coronavirus and the workplace (Housebound edition)
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more
Looking forward to the 2025 prediction season, a survey of the emerging AI-powered drug discovery landscape has been making the rounds—and with good reason. The survey, summarized by Stanford’s Chris Bradbury, is likely the...more
As companies embrace digital transformation, they increasingly depend on proprietary technologies and data that requires robust cybersecurity measures to safeguard intellectual property (IP). Zifino and Foley & Lardner LLP...more
Trade secrets have become a de facto intellectual property right for securing valuable artificial intelligence information. Despite regulatory trends toward greater transparency of AI models, federal policy acknowledges,...more
The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more
The “The Age of AI – Sports and Sports Betting” Webinar offered a brief overview of how generative AI (“GenAI”) works and how AI is being used or is planning to be used in the sports and sports betting industries, and...more
The FAA Aircraft Registry recently announced, effective immediately, it is “restricting access to ancillary documents to only Federal employees and Federal contractors. Permit holders’ electronic access to ancillary documents...more
As remote work continues, employers have begun to characterize remote workers as the “invisible workforce” – because remote workers are not able to be seen or monitored in the same way as those performing in-person work. The...more
Ford Motor Company (“Ford”) issued new Production Purchasing Global Terms and Conditions (“Terms”) related to the purchase of goods, services and tech products, including tooling and service parts purchased on or after July...more
Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more
29th Annual Employment Practices Liability Insurance - ACI’s 29th Annual Employment Practices Liability Insurance conference returns on January 26-28, 2021 in an interactive, virtual format! This yearly conference is the...more
The coronavirus pandemic has created profound changes to how many Americans do their work, with an outsized number now working from home. This arrangement, while necessary given social distancing requirements and the...more
Mark Eting is one of Duncey’s Caps top outside sales agents. Because the company is based in Texas, but Mark lives in Cleveland and sells for the company in the northeast, Mark purchased a personal computer and a laptop to...more
• Limited access to autonomous vehicle operations data remains a key barrier to insurance companies’ development of adaptive insurance policies. • Representatives from the insurance industry support federal regulation of...more
If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more
A decade ago, I litigated a trade secret/unfair competition dispute between two large plastics manufacturers. The Plaintiff was based in southwest Florida, the Defendant in southern Alabama. The factual dispute is...more
Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more
What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more
On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures“) for public comment: the Draft Measures remain open for comments until...more