News & Analysis as of

Risk Management Data Security Trade Secrets

Wolf, Greenfield & Sacks, P.C.

Spring Cleaning and Tune-up for Your Trade Secret Portfolio: Eight Steps

Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more

Ward and Smith, P.A.

Trade Secret Protection in 2025: What In-House Counsel Need to Know

Ward and Smith, P.A. on

Recent developments in workplace dynamics, regulatory changes, and several high-profile cases have highlighted the growing importance of understanding and protecting your company's trade secrets. For in-house counsel, staying...more

Purpose Legal

How to Prevent Data Exfiltration and Protect Your IP – Q&A with Steve Davis

Purpose Legal on

What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Morris, Manning & Martin, LLP

Navigating AI Risks: Balancing Innovation and Compliance in Your Enterprise

As artificial intelligence continues to revolutionize industries, businesses are facing increasing pressure to integrate AI solutions into their products and services to remain competitive. However, the adoption of AI...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Epstein Becker & Green

More Critical Than Ever: Cyber Risk "Tabletop Exercises" in the AI Infused Workplace

Since the dawn of digitalization, the collection and retention of personal and other business confidential data by employers has implicated security and privacy challenges—by amassing a treasure trove of data for bad actors...more

Ankura

Outsourcing Services: An Increasingly Common Origin for Insider Threats in the Supply Chain

Ankura on

On May 10, 2022, a former Coca-Cola chemist was sentenced to 14 years in prison for selling trade secrets to a Chinese government-backed corporation. This example demonstrates the way the supply chain increasingly presents...more

Mintz - Intellectual Property Viewpoints

Benefits of and Best Practices for Protecting Artificial Intelligence and Machine Learning Inventions as Trade Secrets

We previously discussed which portions of an artificial intelligence/machine-learning (“AI/ML”) platform can be patented. Under what circumstances, however, is it best to keep at least a portion of the platform a trade...more

Blank Rome LLP

[Ongoing Program] Protecting Information from Insider Threats and External Hacker - February 22nd, 12:00 pm - 12:30 pm ET

Blank Rome LLP on

Join Us for Protecting Trade Secrets & Gaining a Competitive Edge in the Digital Age - Sophisticated Strategies to Protect Critical Assets When Key Employees Depart & Business Relationships Break Down - The protection...more

Seyfarth Shaw LLP

Conducting Trade Secret and Restrictive Covenant Investigations Remotely

Seyfarth Shaw LLP on

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide