Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
CMMC Is Coming: Are You Ready?
FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
With the increase in popularity of artificial intelligence uses in business, companies are scratching the surface of AI’s potential to create efficient processes, automate tasks, and generate content at a low cost. With...more
It is often said that the best defense is a good offense. That is certainly true if you are an employer conducting a risk assessment of potential employee defections that could expose your company to losses of valuable...more
Congratulations! Your startup is developing a revolutionary product or service that has the potential to transform an industry. Whatever the nature of that new product or service, at its core is an innovation – perhaps an...more
What is insider risk? Managing and minimising risk in your organisation starts with understanding the types of risks in the modern workplace. Some risks are driven by external events and factors that are outside of direct...more
It is common for businesses to disclose confidential information to governmental entities for regulatory and/or other purposes. However, once that information is disclosed, it may be vulnerable to public records requests....more
Florida has given employers a new weapon in their trade secret protection arsenal: the Combatting Corporate Espionage in Florida Act. With the Biden Administration’s goal of curtailing non-competes and the Supreme Court’s...more
When responding to requests for proposals (RFPs), vendors should be conscious that they might be disclosing highly confidential or commercially sensitive material to the potential customer, with no guarantee of securing the...more
In addition to the many complications, concerns and changes that working in the COVID-19 environment brings, it is important to evaluate the impact it plays on a company’s internal workings, one of which is a company’s trade...more
The risk of disclosure of sensitive business information significantly increases with more employees working remotely due to COVID-19 as information is accessed outside the office. ...more
Maine is on track to launch its first recreational marijuana businesses in June, four years after its residents voted in favor of legalization. A year ago, Maine created an Office of Marijuana Policy (OMP) within its...more
Recently, the Division of Corporation Finance (CorpFin) of the SEC released CF Disclosure Guidance: Topic No. 8, Intellectual Property and Technology Risks Associated with International Business Operations (Guidance)....more
Businesses understand that their trade secrets are valuable assets. However, businesses fail to understand how vulnerable their trade secrets are to misappropriation and straight-out theft....more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
New York recognizes conversion claims based on intangible property, such as electronically stored information or trade secrets.[1] But does a conversion claim exist when the theft of the intangible property does not deprive...more
This second part of the series will take a look at the last phase in the lifecycle of third-party business relationship and that is contract termination. This is a phase a lot of times overlooked....more
The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM /X-Force Research 2016 Cyber Security...more
The National Labor Relations Board continues to infiltrate the workplace even where there are no unions. Standard workplace policies — including those relating to employee conduct, protecting intellectual property, use of...more