Protect Yourself and Your Business with Indemnification Understanding
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
Former FBI Executive and Cybersecurity Leader Herbert Stapleton Joins Dinsmore’s National Corporate Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Fox on Podcasting: Harnessing the Power of Niche
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
6 Takeaways | From Tension to Teamwork: Real Strategies for Legal Collaboration
Hsu Untied interview with David Cohen, General Counsel at Infinite Athlete
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Hsu Untied interview with D'Lonra Ellis, CLO of Oakland A's
Your Guide to Dealing with Subpoenas Effectively
Episode 371 -- DOJ's New Corporate Enforcement Program
Shout Outs and Rants: Episode 153, The CW 25 Edition
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
A nearly decade-long legal battle in the U.S. District Court for the Northern District of Illinois recently concluded with a significant jury verdict, underscoring the potentially severe consequences of trade secret theft...more
According to a recent survey, artificial intelligence gained a significant foothold in corporate legal departments in 2025, where it is being used mostly for contract drafting and review, legal research, and document...more
On April 23, 2024, the Federal Trade Commission (FTC) voted in a 3 to 2 decision along party lines to adopt its Final Non-Compete Clause Rule (“Noncompete Rule”) banning post-employment non-compete clauses between employers...more
Consumer-directed health apps are experiencing a boom thanks to COVID-19, as consumers seeking to avoid doctors’ office waiting rooms are increasingly relying on apps to measure and maintain their health. That trend is...more
General Counsel and in-house legal departments have long struggled with articulating the risk of and determining the appropriate response to breaches of the company network and the potential exposure of confidential...more
On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more
A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more
The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more
Imagine that your company has just commenced an internal compliance investigation in response to an allegation that the company is violating various federal laws. The next day, a longtime employee with access to the company’s...more
As we’ve previously written about on this blog, last summer the Massachusetts legislature passed a non-compete reform bill which went into effect on October 1, 2018. ...more
Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more
While social media has become ubiquitous, attorneys are subject to particular restrictions online. During Ward and Smith’s 2017 In-House Counsel Seminar two attorneys reviewed some of the potential pitfalls in-house counsel...more
Concerns about trade secret theft have been increasing in both the United States and Europe in recent years. Traditionally, American law disfavored trade secret protection vis à vis patenting on the basis that publication of...more
Drafting a social media policy in compliance with Section 7 of the National Labor Relations Act (“NLRA” or “the Act”) has become increasingly challenging for employers, as the National Labor Relations Board (“NLRB” or “the...more
Earlier this year, we notified you about the passage of the Defend Trade Secrets Act of 2016 (DTSA) and how it affects employers. On August 8, 2016, a U. S. District Judge in the Southern District of Florida dismissed one of...more
On May 13, 2016, a National Labor Relations Board (NLRB) judge ordered The Ruprecht Company, a meat processor and food manufacturer, to provide confidential immigration documents to the union and to rescind its participation...more
We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more
Restrictive covenants are an important tool for businesses concerned about the protection of their confidential business information and the costs of employee training and turnover. When properly crafted and utilized,...more
Late last month a jury awarded Mount Olympus Mortgage Company (MOMC) more than $25 million for their claims against Guaranteed Rate (Guaranteed), which alleged Guaranteed along with other former employees of MOMC illegally...more
Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more
As multinational employers are aware, data privacy laws can vary greatly from jurisdiction to jurisdiction. Ensuring compliance with the different requirements can be challenging, and the penalties for noncompliance can be...more
As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more
Our traditional approach to cyber risk and security has been focused on privacy and financial data. The data breach or loss concerns that typically rank high on our risk ratings are private and confidential data like names...more
A successful startup provides a solution to a market need. Typically, the solution involves a new or improved device or technique. As a startup defines and develops its solution, intellectual property (IP) becomes a core...more
A federal court in New Jersey has permitted a defendant in a False Claims case to defend itself on the grounds that the whistleblower/ex-employees breached their employment agreements by using and disclosing confidential...more