News & Analysis as of

Confidential Information Misappropriation Employment Policies

Payne & Fears

[Event] Employee Mobility and Confidential Information: Key Issues to Consider When Onboarding and Offboarding Employees -...

Payne & Fears on

A company can reduce legal risk by adopting strong policies and procedures when onboarding an employee from a competitor. Similarly, when offboarding, there are several measures companies should consider to prevent theft of...more

Nilan Johnson Lewis PA

My Mom is a Client. When I Move Firms, Can I Wish Her Happy Birthday? How Restrictive Covenants and Trade Secret Laws Can Impact...

Nilan Johnson Lewis PA on

We defend many financial advisory firms and individuals in restrictive covenant and trade secret litigation. When an advisor moves from one firm to another, we help manage legal risk, and, if necessary, defend against the...more

Fisher Phillips

3 Reminders for Employers Mitigating the Risk of Trade Secret Misappropriation in the Face of Mounting Layoffs

Fisher Phillips on

While economists continue to debate the prospects for a recession, layoffs are impacting employees across the U.S., and not just in the technology sector. Given the greater potential for trade secret misappropriation in the...more

McGuireWoods LLP

Five Key Takeaways: Protection of Trade Secrets

McGuireWoods LLP on

Whether in the deal room or the workplace, trade secret protection is a critical component of a company’s intellectual property strategy. In some ways, the nature of that protection has evolved in light of the pandemic and an...more

Fisher Phillips

Trade Secret Protection With A Remote Workforce: 7 Practical Considerations for Employers

Fisher Phillips on

The COVID-19 remote work era is now in its tenth month, and employees continue to work away from the physical office, without in-person supervision, and perhaps outside of the company network. During this time, many employees...more

Winstead PC

Protecting Your Most Valuable Assets: How to Identify and Maintain Your Institution’s Trade Secrets

Winstead PC on

An institution’s trade secrets generally include confidential information with commercial value. Trade secret protection may be available by common law, under state laws, or under federal law. In addition, there may be both...more

Seyfarth Shaw LLP

What Underlying Facts are Required to Assert a Valid CFAA Claim Based on “Exceeds Authorized Access” in Georgia?

Seyfarth Shaw LLP on

The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more

Foley & Lardner LLP

Federal Court Reminds Trade Secret Owners That the Statute of Limitations Isn't Everything When it Comes to Misappropriation...

Foley & Lardner LLP on

Several years after an employee leaves your company, you realize that he or she has been using confidential and proprietary information acquired from your business to compete against you. Your non-compete agreement with the...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide