News & Analysis as of

Trade Secrets Data Protection

A Trade Secret is any information, not generally known or easily ascertainable, by which an enterprise develops an economic advantage over competitors or customers. In order to maintain trade secrets'... more +
A Trade Secret is any information, not generally known or easily ascertainable, by which an enterprise develops an economic advantage over competitors or customers. In order to maintain trade secrets' protected legal status, enterprises must make reasonable efforts to keep the information secret and prevent unnecessary disclosure.  Trade Secrets may include processes, formulas, methods, designs, patterns, et cetera.   less -

Defending Trade Secrets In The Gig Economy

by Fisher Phillips on

Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too...more

Corporate E-Note - September 2017

by Burr & Forman on

Global companies must safeguard confidential, proprietary information and trade secrets—not just from cybercriminals, “hacktivists,” cyberterrorists, and competitors—but from former employees. Too often, terminated or...more

Data Security Law: Managing The Legal Risks Of Cloud And Collaboration Tools

by Ellis & Winters LLP on

As anyone with a Dropbox or Google Drive account knows, consumer-grade cloud storage and collaboration services are a convenient way to store and share personal photos, music, video and documents. Employees who use these...more

Brexit - Legal Implications

by McDermott Will & Emery on

In our latest memorandum, we have briefly outlined some of the main legal implications of Brexit according to different models, including the EEA model. In light of recent comments made by Theresa May, it is unlikely that...more

Go West: Venture Financings and Expansion Projects in the United States

At $15 billion, venture capital and private equity investment flow from the United States into Germany in Q1 2017 is already triple the levels of the prior two years. As the U.S. and German tech ecosystems become more closely...more

Privacy Tip #94 – Keep Your Day Job and Stay Out of Jail

One of my favorite lines when I conduct employee education about data privacy and cybersecurity is “Keep Your Day Job.” The context of the comment is when I tell audiences about the dumb moves of employees who think they can...more

The EC New Alert Mechanism to Detect Cartels: A Teaser Before a European General Framework for Whistleblowing

Whistleblowing has been part of the U.S. legal tradition, if not since the resolution passed by the Continental Congress in 1778, at least since the adoption of the 1863 False Claims Act. With regard to the disclosure of...more

4 Key Takeaways: All the Crime We Cannot See

Kilpatrick Townsend Partner Audra Dial recently served as moderator on a prestigious panel at the American Bar Association’s 32nd Annual Intellectual Property Law Conference (IPL Spring) in Arlington, Virginia. The panel,...more

Pooley’s Corner: Losing Secrets to Foreign Companies: How to Reduce the Risk

During a recent seminar I was asked, “What can companies do to stop the loss of trade secrets to places like China?” The questioner seemed stressed and a bit angry, perhaps reflecting a certain frustration that there may not...more

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

Data Theft And What’s “Tangible”: New York Appellate Division Reinstates Conviction Of Former Goldman Sachs Programmer Sergey...

The law often lags behind developments in the tech world. One problem for employers seeking to protect their data is that some anti-theft and trade secret protection laws drafted long ago refer to “goods” and “tangible”...more

DSM Watch: European Commission's data package explores data ownership, localization, liability and portability, highlighting...

by Hogan Lovells on

On January 10, 2017, the European Commission released a Communication, a fact sheet, a working document and a public consultation relating to Europe’s “data economy”. The fact sheet states that “data is a new type of...more

How to Prepare for Theft of Company Information

by Dorsey & Whitney LLP on

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

Impact of Brexit on Intellectual Property

Now that the dust is settling on the UK’s decision to leave the EU, our clients are asking what this means for them. Change always brings opportunities, as well as challenges, and we are focused on helping our clients...more

Will Privacy Enforcement Actions Impact “Reasonable” Security Measures Needed to Protect Trade Secrets?

by LeClairRyan on

In widely-publicized, contested privacy cases last year, the FTC advocated in favor of a high baseline for information security measures.  Among the security practices attacked by the FTC as critical mistakes by companies...more

Der Markteintritt für deutsche IT Firmen aus dem Bereich des Gesundheitswesens

by Arnall Golden Gregory LLP on

With expenditures of over $ 3 trillion of market in the field of health care in the United States is huge. Incentives of the Federal Government for the introduction of electronic medical records resulted increasingly in the...more

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - Global Overview

by WilmerHale on

With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more

That is SO last week - October 2015

by Zelle LLP on

Last week saw a lot of media coverage about “Yelp for People.” The app, called Peeple, allows users to rate friends, co-workers, and romantic partners based on a five-star rating system. Recruiters could review the ratings...more

US-China Cyber Deal Big on Promises, Short on Action

by LeClairRyan on

In the aftermath of recent cyberattacks attributed to China’s government and citizens, many observers prepared for a rather uncomfortable state visit by Chinese President Xi Jinping last week. Then, as President Xi began his...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

by Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Did Recent Changes in the Patent Laws Turn the Page on the Need for Accurate Laboratory Notebooks?

by BakerHostetler on

With the enactment of the Leahy-Smith America Invents Act (AIA), the U.S. patent system moved to a “first inventor to file” approach for examining all applications having an effective filing date on or after March 16, 2013....more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Intellectual Property Newsletter - July - August 2015

by King & Spalding on

Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more

Actions Foreshadow Uniform Cybersecurity Regulations for Federal Contractors - Two Recent Executive Agency Actions Lay the...

by Holland & Knight LLP on

Federal government contractors handling Controlled Unclassified Information (CUI) should take notice of two recent executive agency actions. Combined, they lay the groundwork for a new cybersecurity clause to be added to the...more

Corporate Espionage is Real

by Benesch on

Last month the country learned about the unauthorized access of the Houston Astros “Ground Control” database, which contained trade talks, proprietary statistics, and scouting reports, by members of the St. Louis Cardinals...more

60 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.