It’s common sense that, to protect a trade secret, the information must remain secret. However, when trade secret misappropriation claims arise and litigation ensues, the court and the parties involved need to understand at...more
Imagine the following scenario: Your company has filed several lawsuits around the world, all concerning generally the same subject matter, but against different parties because of jurisdictional limitations. The litigation...more
Developments in technology have led to advanced ways of protecting trade secrets. In an age where passwords, metadata, and paper trails are often the stories told to demonstrate misappropriation, it may seem that trade...more
Social media today connects people more than ever. It can be a means to bring together long-lost friends, new acquaintances, and love interests, or the public with celebrities, sports teams, new products, and companies—to...more
9/10/2018
/ Affirmative Defenses ,
Counterclaims ,
Customer Lists ,
Defamation ,
Digital Assets ,
Digital Communications ,
Embedded Tweets ,
Former Employee ,
Intellectual Property Litigation ,
Intellectual Property Protection ,
Social Media ,
Trade Secrets ,
Twitter
Self-driving cars—once a thing of the future—are now becoming a reality. And, as with any new technology, there is a learning curve. Once consumers are able to test out new products, they adapt, preferences change, and what...more
Imagine preparing for that big meeting on your way to work, while you ride along in your car—without the need for a driver. What sounds like it might be out of a sci-fi movie, may actually be the not-so-distant future. Such...more
Over the years, it has proven difficult to fit software in any one category of IP protection. And while software’s ability to seemingly transcend patents, copyright, and trade secrets provides software developers and...more
Ringing in the New Year provides a unique opportunity to reflect on the past and look ahead to the future. This mirrors the day-to-day reality for legal practitioners: the future is shaped by precedent from the past. And in...more
Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more