How to Combat Corporate Theft: Office Space - Hiring to Firing Podcast
6 Key Takeaways | Criminal Trade Secret Theft
The ABCs of Employee Theft [More With McGlinchey Ep. 7]
Podcast: Conductive Discussions Episode 2: Criminal Prosecution of Trade Secret Theft, with a Focus on China
IP|Trend: International Remedies for Misappropriation of Trade Secrets
ITC: Protecting Intellectual Property in the US – Interview with Joe Hameline, Member, Mintz Levin
Maritime Reflections: Pirates
Elon Musk’s Ventures and Controversies - Elon Musk is well known for his many ventures as well as his disdain for convention. While serving as the CEO of Tesla, Inc., Musk acquired Twitter (now X Corp.) and founded a private...more
Multi-jurisdictional civil fraud matters often present multiple challenges that make the tracing and recovery of assets a complex, costly, and time-consuming investigative process. Making a fraud victim whole again requires...more
...Financial Elder Abuse Cases in California in the Real Estate context - This blog provides general legal information regarding the topic of financial elder abuse in California, with a focus on cases involving real estate...more
While romance might be viewed as a personal matter, an employee falling for a romance scam can have a direct impact on an organization’s bottom line. Not only could their performance suffer, but a criminal may try to steal...more
New York Governor Kathy Hochul recently signed off on anti-deed theft legislation, as outlined in Senate bill 2023-S.6577 with companion Assembly bill 2023-A.6656.[1] The Governor signed the new legislation on November 14,...more
From October 3rd to 5th in Boston, the Attorney General Alliance (AGA) held a series of working group meetings focused on topics uppermost in the minds of state AGs: cybersecurity, organized retail crime (ORC) and cannabis....more
Financial Services Firms Expand Cryptocurrency Custody Services - According to recent reports, the cryptocurrency custody arm of a major international bank has launched its institutional cryptocurrency custody services in...more
Payment scams exploiting the lure of cryptocurrency are a growing concern for individuals and businesses—losses from crypto scams increased from $907 million in 2021 to $2.57 billion in 2022. These scams typically involve...more
Report on Patient Privacy Volume 23, no 1 (January 2023) The Centers for Medicare & Medicaid Services (CMS) said a data breach at a Medicare subcontractor impacted the personally identifiable information and protected...more
Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still...more
While technology makes it easier for bad actors to steal the retirement assets of plan participants, it’s far easier to steal from 401(k) plans with crypto investments. 401(k) plans that have Bitcoin investments would have a...more
Report on Patient Privacy 22, no. 10 (October, 2022) - Thirty Democratic senators led by Sen. Patty Murray, D-Wash., have called on HHS to strengthen federal privacy protections under HIPAA to broadly restrict providers...more
The much-ballyhooed legal battle over trade secrets concerning self-driving automobile technology involving Uber took its latest (and perhaps final) turn last week, when engineer Anthony Levandowski was sentenced to 18 months...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
In a massive win for Amazon (because, again, Jeff NEEDS it), Court of Federal Claims Judge Patricia Campbell-Smith has granted the company’s motion for an injunction halting Microsoft’s work on the $10 billion cloud-computing...more
On May 3, 2019, following a jury verdict rendered last November, a Santa Clara, California court entered a final judgment for $845 million in favor of semiconductor maker, ASML, in its suit against rival, XTAL, for stealing...more
While electronic funds transfer is considered a convenient and quicker way to process payments and receive funds on construction projects, this practice presents significant risk to project participants. Contractual and...more
If you are a business owner in the Inland Empire, what would you identify as the greatest threat to the security of your data? Is it hackers looking for credit-card numbers? Could it be foreign governments stealing industrial...more
In Cardenas v. M. Fanaian, D.D.S., Inc., Case No. F069305 (Cal. App. 5 Dist.), a California Court of Appeal determined that Plaintiff Cardenas could pursue a California Labor Code Section 1102.5 retaliation claim against her...more
Invoking the Fifth Amendment privilege is not just for scenes from Law & Order or Better Call Saul. These days commercial cases, especially those involving individual defendants, are commonly filled with claims that have...more
The debate over standing in data breach litigation is gaining more attention lately. While many courts have hesitated to find standing prior to lost personally identifiable information (PII) actually being misused, the U.S....more
Even freed from bricks and mortar, online retailers and service providers are realizing that market share is not infinite. A complaint recently filed by Angie’s List Inc. against Amazon Local LLC for its newly launched online...more
In 2014, grocers and restaurants continued to be plagued by attacks leading to the theft of credit card information. Among others, Supervalu Inc. and Jimmy John’s both experienced intrusions in 2014, extending the string of...more
Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more