Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
CMMC Is Coming: Are You Ready?
FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more
The Tenth Circuit’s recent decision in Double Eagle Alloys, Inc. v. Hooper, __F.4th __ (10th Cir. Apr. 22, 2025), provides a cautionary tale regarding the necessity of identifying trade secrets with particularity and...more
The protection of trade secrets and confidential information is critical to the success of many organizations. Employers must remain vigilant against the growing risk of sensitive information being compromised, especially...more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
Multistate employers with employees in Texas are subject to state laws regarding employment agreements. Whether your business is large or small, specific provisions within your agreements could render your agreements...more
I’m often asked whether employees should have access to the company’s cap table. The cap table is one of the most sensitive and critical documents in any startup. At its most basic level, it lays out who owns what –...more
Our White Collar, Government & Internal Investigations Team offers effective and actionable best practices for companies to follow in conducting their internal investigations....more
During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more
In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more
Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more
The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more
At the end of May, the Israel Competition Authority’s Director General published a consent decree with Mizra Delicacy Food Industries and Zilber Meat and Sausage Products Industries. Both companies agreed to pay approximately...more
In this webinar, discover why data security is more than a checkbox and gain insights into the risks and best practices that can safeguard your organization. Join industry experts as they delve into the risks, laws and...more
So far, in this three-part series, we discussed the various kinds of whistleblowing hotlines and the key components that comprise of a whistleblower hotline. In part three, we’ll discuss the four characteristics of a...more
The adoption of new and advanced technologies has allowed for a digital transformation across business industries. Infrastructure and services supported by technologies such as artificial intelligence (AI), advanced analytics...more
With the increase in popularity of artificial intelligence uses in business, companies are scratching the surface of AI’s potential to create efficient processes, automate tasks, and generate content at a low cost. With...more
Redacted legal documents can create a host of issues when not handled properly during document review. Here are some common redaction mistakes – and tips on how to avoid them....more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
In a typical enterprise, most employees are hired to further the primary mission of the organization — whether providing goods and services, creating new products, engaging in sales and marketing, and so forth. ...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
The immediate cyber incident is over – what happens next? Join our esteemed panellists as they outline key considerations when managing post-breach data classification and notification projects. Setting the scene through the...more
It is common for businesses to disclose confidential information to governmental entities for regulatory and/or other purposes. However, once that information is disclosed, it may be vulnerable to public records requests....more