Protect Yourself and Your Business with Indemnification Understanding
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
Former FBI Executive and Cybersecurity Leader Herbert Stapleton Joins Dinsmore’s National Corporate Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Fox on Podcasting: Harnessing the Power of Niche
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
6 Takeaways | From Tension to Teamwork: Real Strategies for Legal Collaboration
Hsu Untied interview with David Cohen, General Counsel at Infinite Athlete
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Hsu Untied interview with D'Lonra Ellis, CLO of Oakland A's
Your Guide to Dealing with Subpoenas Effectively
Episode 371 -- DOJ's New Corporate Enforcement Program
Shout Outs and Rants: Episode 153, The CW 25 Edition
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
AI just took a major step forward, and lawyers need to be paying attention. In this episode, I break down the launch of new AI browsers from ChatGPT and Perplexity. These tools are designed to act on your behalf, reading...more
The scenario happens all the time: Your engineering department has identified a need for more personnel who will work with export-controlled information. Management has approved the hiring, and your Human Resources manager...more
U.S. Customs searches have become increasingly invasive over the years. Pursuant to Department of Homeland Security (DHS) policy, U.S. Customs and Border Protection (CBP) operates under the “broad search exception”, which...more
While social media has become ubiquitous, attorneys are subject to particular restrictions online. During Ward and Smith’s 2017 In-House Counsel Seminar two attorneys reviewed some of the potential pitfalls in-house counsel...more
It is well known that 18 U.S.C. § 1836, et seq. (the Defend Trade Secrets Act or “DTSA”) finally provides a mechanism for pursing trade secret claims in federal court. A recent decision, however, serves as an excellent...more
Confidential information can be one of a business's most prized and valuable assets, regardless of the industry in question. However, it is rarely something which can be locked in a safe because employees often require access...more
Concerns about trade secret theft have been increasing in both the United States and Europe in recent years. Traditionally, American law disfavored trade secret protection vis à vis patenting on the basis that publication of...more
We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more
On March 30, the United States Court of Appeals for the Federal Circuit published amended Federal Circuit Rules of Practice. Below is a summary of the most significant changes that are likely to impact your practice before...more
A recent development from the 3D printing world reminds us that threats of trade secret misappropriation are more varied than cyber-espionage or the disgruntled employee taking confidential information to a competitor. With...more
Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more
As multinational employers are aware, data privacy laws can vary greatly from jurisdiction to jurisdiction. Ensuring compliance with the different requirements can be challenging, and the penalties for noncompliance can be...more
Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more
Despite the complexity of employment law and the speed with which the law, technology, and the workplace are changing, there are a few basic principles that capture the best advice we can give to employers. They’re not a...more
Two competitors who do research and analysis for advertisers and media companies, concerning how television viewing impacts consumer purchasing, have been in a legal battle over alleged trade secret misappropriation, patent...more
As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more