News & Analysis as of

Sensitive Business Information

Amendments to Australian Antitrust Regime Take Effect

by Jones Day on

The Situation: Australia has adopted a package of changes to its antitrust laws that are designed to give more power to its antitrust enforcement agency, the Australian Competition and Consumer Commission, and to increase...more

Exploring Legal Malpractice Exposure Faced by Law Firms and Lawyers from Use of Technology

by Reminger Co., LPA on

The relationship between technology and the practice of law is a paradox at best. Computers, tablets, cell phones, and other forms of technology provide an enormous benefit by permitting the creation, storage, transmission...more

China's State Secret Laws: What To Do When Trade Secrets Collide with State Secrets

by Kobre & Kim on

Multinational companies doing business in China should treat the sensitive information received from their Chinese partners with special care, particularly if the information originates from a state-owned enterprise (SOE)....more

Lessons You Can Learn From the Chadbourne Litigation and Ensuing Discovery Disputes

by Fisher Phillips on

When you combine an increased social awareness of pay disparity issues with an influx of new pay equity legislation at the state and local level, it’s no surprise that lawsuits involving large and high-profile employers are...more

National security reviews 2017: A global perspective — European Union

by White & Case LLP on

European investment screening "light" — first steps towards European investment controls - Due to the significant increase of foreign direct investment into European technology assets over the past 18 months, particularly...more

FTC Provides Guidance on Reasonable Data Security Practices (Part III of III)

by Patrick Law Group, LLC on

This is the third in a series of three articles on the FTC’s Stick with Security blog. Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

Keys to the Kingdom: How Confidentiality Agreements Are Key to Keeping Business Information Secret

by Payne & Fears on

In today’s business environment, greater employee mobility and technological advances underscore the need to protect a company’s confidential information and trade secrets. Stories of employees departing with confidential...more

Clawing Back Secrets After Shane Group

It is clear by now that the federal courts in Tennessee are not a safe place for most sensitive business information. Legitimate trade secrets are safe. Well-established privileges (e.g., attorney-client privilege) still...more

FTC Provides Guidance on Reasonable Data Security Practices (Part II of III)

by Patrick Law Group, LLC on

This is the second in a series of three articles on the FTC’s Stick with Security blog... Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

The Data Report Episode 17: What the GDPR Means for American Companies

by Bilzin Sumberg on

Module Five: International Law (Part II) In this episode of The Data Report, Litigation attorney Jay Ward expands his discussion on the GDPR, examining what it means for American companies and how thoughtful steps can be...more

Data Breach at Italy’s No. 1 Bank Exposes 400,000 Accounts

Italy’s top bank, UniCredit SpA, is yet another victim in a series of cyberattacks exploiting vulnerabilities in the financial services industry. Criminals made off with biographical and loan data from 400,000 UniCredit loan...more

Privacy Tip #94 – Keep Your Day Job and Stay Out of Jail

One of my favorite lines when I conduct employee education about data privacy and cybersecurity is “Keep Your Day Job.” The context of the comment is when I tell audiences about the dumb moves of employees who think they can...more

The Importance of Non-Compete Agreements

by Revision Legal on

It is a common business practice for employers to require their employees to sign a non-compete agreement as part of the terms of their employment. Use of non-compete agreements are a particularly popular practice in...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

Wyden’s C-THRU Act – Publicizing PBM Rebate Data

Last week, Senate Finance Committee Ranking Member Ron Wyden (D- Ore.) introduced the “Creating Transparency to Have Drug Rebates Unlocked (C-THRU) Act of 2017.” As its name suggests, it seeks to require parties (e.g., PBMs)...more

The Clock Has Started: What ISPs Need to Do and When to Comply with the FCC’s Broadband Privacy Rules

On December 2, 2016, the Federal Communications Commission (“FCC”) published its Report and Order entitled “Protecting the Privacy of Customers of Broadband and Other Telecommunications Services” (the “Order”) as a final rule...more

Trade secret protection under President-elect Trump

by Dentons on

Without question, US companies face a growing and daily threat from rival companies and foreign governments. Thieves operating in cyberspace and using sophisticated technologies can quickly steal and transfer massive...more

National security reviews: A global perspective — France

by White & Case LLP on

Following the Montebourg Decree in 2014, the scope of activities covered by national security reviews has been significantly extended to several key industries. The Bureau Multicom 2, which is located within the Ministry...more

EU Final Legislation on Requirements for Firms to Hold Information on Financial Contracts

by Shearman & Sterling LLP on

A Commission Delegated Regulation outlining Regulatory Technical Standards specifying the information on financial contracts that a firm may be required to maintain was published in the Official Journal of the European...more

Third-Party Risk Management – Part 2: Contract Termination

by Michael Volkov on

This second part of the series will take a look at the last phase in the lifecycle of third-party business relationship and that is contract termination. This is a phase a lot of times overlooked....more

Cybersecurity Risks to the Manufacturing Sector

The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM /X-Force Research 2016 Cyber Security...more

DOJ Continues to Monitor Interlocking Corporate Directorates with Restructuring of Tullett Prebon’s Acquisition of ICAP

by McDermott Will & Emery on

On July 14, 2016, the US Department of Justice (DOJ) announced that the restructuring of a planned $1.5 billion transaction between Tullett Prebon Group Ltd. (Tullett Prebon) and ICAP plc adequately addresses the DOJ’s...more

Three Tips to Verify the Security of Your E-Discovery Software

by Zapproved LLC on

SOC 2® Type 2 Certification and Zapproved–Building Trust and Confidence that Your Data is Secure - Today in e-discovery, it should be no surprise that cyber security is a rising concern among corporate leaders and that...more

Amended Rule 26: Protecting Against Competitively Sensitive Disclosures

by Cozen O'Connor on

Hundreds of billions of business e-mails are sent per day. That number may not come as a shock to many, but once a company is involved in litigation, e-discovery can be quite burdensome. Even the mention of the phrase...more

45 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.