Tips for Conducting a Trade Secret Assessment with Rob Jensen
Safeguarding Your Business Data
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday®: Trade Secret Litigation - Lessons from High-Stakes Group Exits - Spilling Secrets Podcast - Employment Law This Week®
New Developments in Health Information Policy
#WorkforceWednesday®: 2024’s Biggest Trade Secrets and Non-Compete Developments - Spilling Secrets Podcast - Employment Law This Week®
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
#WorkforceWednesday®: Beyond Non-Competes - IP and Trade Secret Assessment Strategies for Employers - Spilling Secrets Podcast - Employment Law This Week®
4 Tips for Protecting Your AI Products
6 Things To Consider Before Litigation
#WorkforceWednesday®: Wizarding and the World of Trade Secrets - Spilling Secrets Podcast - Employment Law This Week®
What's the Tea in L&E? Can You Share An Employee's Medical Info?
Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
Most states have a law that protects trade secrets. California, for example, has CUTSA (California Uniform Trade Secret Act). Arizona has the Arizona Uniform Trade Secrets Act ("AUTSA") found in chapter 4 of title 44 of the...more
The Situation: Protecting intangible property can be extremely challenging, but significant and effective tools are available under English law to minimize significant harm to entities that have been victimized by a data...more
Waking up to news of another major data breach seems to have become a daily routine. On the front pages and cable news, we hear about hackers, rogue governments, and shadowy figures involved with these data breaches. But too...more
A decade ago, I litigated a trade secret/unfair competition dispute between two large plastics manufacturers. The Plaintiff was based in southwest Florida, the Defendant in southern Alabama. The factual dispute is...more
Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more
The sorry story of Chris Correa, the St. Louis Cardinal executive convicted of hacking into the Houston Astros computer system expanded last month when Federal Judge Lynn Hughes unsealed details about the extent of the...more
It doesn’t always pay to be a hacker. Major League Baseball (MLB) this week made a strong statement about its tolerance for teams hacking other teams. We previously reported on the incident when a Cardinals employee hacked...more
Christopher Correa, a former scout for the St. Louis Cardinals, was recently sentenced to almost four years in prison for hacking the Houston Astros player-personnel database. While it seems far-fetched that hacking would...more
Employment agreements are not unusual, particularly for managers and executives. As new laws come into existence and as the work environment is changed by data and data security, drafting adequate, enforceable agreements can...more
You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more
In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more
With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets. But, in some industries, the greatest...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more