News & Analysis as of

Sensitive Business Information Confidential Information

Potomac Law Group, PLLC

Border Search Inspection of Electronic Devices: What Organizations and Their Employees Need to Know

Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more

Littler

Tenth Circuit Affirms Summary Judgment Due to Plaintiff’s Failure to Sufficiently Establish Existence of Trade Secrets

Littler on

The Tenth Circuit’s  recent decision in Double Eagle Alloys, Inc. v. Hooper, __F.4th __ (10th Cir. Apr. 22, 2025), provides a cautionary tale regarding the necessity of identifying trade secrets with particularity and...more

Conn Maciel Carey LLP

[Webinar] Trade Secrets and Restrictive Covenants: Practical Advice to Safeguard Your Company’s Critical Assets - April 10th,...

Conn Maciel Carey LLP on

The protection of trade secrets and confidential information is critical to the success of many organizations. Employers must remain vigilant against the growing risk of sensitive information being compromised, especially...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Hendershot Cowart P.C.

Checklist: Texas Employment Agreements for Out-of-State Employers

Hendershot Cowart P.C. on

Multistate employers with employees in Texas are subject to state laws regarding employment agreements. Whether your business is large or small, specific provisions within your agreements could render your agreements...more

Farrell Fritz, P.C.

Cap Table Confidential: Should Startup Employees Get a Peek?

Farrell Fritz, P.C. on

I’m often asked whether employees should have access to the company’s cap table.  The cap table is one of the most sensitive and critical documents in any startup.  At its most basic level, it lays out who owns what –...more

Alston & Bird

Collaborating Effectively Within Your Organization During Internal Investigations

Alston & Bird on

Our White Collar, Government & Internal Investigations Team offers effective and actionable best practices for companies to follow in conducting their internal investigations....more

A&O Shearman

Germany: Immediate dismissal of board member for email forwarding to personal account

A&O Shearman on

During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more

Mitchell, Williams, Selig, Gates & Woodyard,...

What Federal Laws Protect Trade Secrets?

In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more

StoneTurn

NCSC Warns U.S. Startups and Investors of Foreign Bad Actors with Money to Spend

StoneTurn on

Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more

Epiq

Confidential Business Information: Protecting an Organization’s Most Valuable Secrets

Epiq on

When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more

Epiq

The Most Important Type of Data That No One Is Thinking About

Epiq on

Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more

ArentFox Schiff

AI in Family Offices: A Closer Look at Privacy, Confidentiality, and Fiduciary Responsibility

ArentFox Schiff on

The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more

Barnea Jaffa Lande & Co.

Merger Parties Fined for Exchanging Sensitive Information

At the end of May, the Israel Competition Authority’s Director General published a consent decree with Mizra Delicacy Food Industries and Zilber Meat and Sausage Products Industries. Both companies agreed to pay approximately...more

Mitratech Holdings, Inc

[Webinar] Data Security Secrets for HR: Background Screening, I-9, & Beyond - March 6th, 1:00 pm CST

Mitratech Holdings, Inc on

In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more

NAVEX

Part 3: 4 Characteristics of a Successful Whistleblower Hotline

NAVEX on

So far, in this three-part series, we discussed the various kinds of whistleblowing hotlines and the key components that comprise of a whistleblower hotline. In part three, we’ll discuss the four characteristics of a...more

K2 Integrity

A Strong Foundation: Safeguarding The Construction Industry In The Digital Age

K2 Integrity on

The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more

Lippes Mathias LLP

Efficiency at What Costs? Creating Internal AI Policies Mitigates Legal and Business Risks Now.

Lippes Mathias LLP on

With the increase in popularity of artificial intelligence uses in business, companies are scratching the surface of AI’s potential to create efficient processes, automate tasks, and generate content at a low cost. With...more

Nextpoint, Inc.

Don’t Let Redactions Cause Distractions: How to Properly Censor and Remove Information when Reviewing and Producing Documents

Nextpoint, Inc. on

Redacted legal documents can create a host of issues when not handled properly during document review. Here are some common redaction mistakes – and tips on how to avoid them....more

Fisher Phillips

6 Proactive Tips to Address Employee Defection Concerns Before a Crisis Unfolds

Fisher Phillips on

It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more

Proskauer Rose LLP

How To Navigate Claims Brought By 'Trust' Employees

Proskauer Rose LLP on

In a typical enterprise, most employees are hired to further the primary mission of the organization — whether providing goods and services, creating new products, engaging in sales and marketing, and so forth. ...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - November 16th, 12:00 pm AEDT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Epiq

[Webinar] Beyond the Breach – Managing Data Classification & Notification Projects - November 4th, 6:00 pm AEDT

Epiq on

The immediate cyber incident is over – what happens next? Join our esteemed panellists as they outline key considerations when managing post-breach data classification and notification projects. Setting the scene through the...more

Epiq

[Webinar] What is insider risk, and why do companies ignore it? - October 7th, 11:30 am - 12:10 pm GMT

Epiq on

What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more

Butler Snow LLP

Protecting Your Trade Secrets and Confidential, and Sensitive Information from a Public Records Request

Butler Snow LLP on

It is common for businesses to disclose confidential information to governmental entities for regulatory and/or other purposes. However, once that information is disclosed, it may be vulnerable to public records requests....more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide