Don’t go too far when investigating trade secret misappropriation by an employee (Fairly Competing, Podcast Episode 17)
Navigating the Nuances of the COBRA Subsidy Under the American Rescue Plan Act
Noncompete Agreements - Traps for the Unwary: Part 2
Noncompete Agreements - Traps for the Unwary: Part 1
Part 2: Practical Considerations in Managing the Risk of Employing Former Government Employees
Part 1: Practical Considerations in Managing the Risk of Employing Former Government Employees
COBRA Deadlines and Proofs of Mailing in Carter v. Southwest Airlines Co. Board of Trustees
JONES DAY PRESENTS®: Helping Clients with Trade Secret Protection
Podcast: Non-binding Guidance: Examining FDA’s Enforcement Authority Over Stem Cell Clinics and Compounders
II-36- Holiday Party Tips, the 2018/2019 Federal Regulatory Agenda, and Noteworthy Cases On Suing and Being Sued
Meritas Capability Webinar - California’s Prohibition Against Non-Compete Agreements (B&P Code § 16600), the Protection of Trade Secrets and the Practical Relationship Between the Two
Potential Employer Liability for Late Manifesting Occupational Diseases
Protecting Trade Secrets When Employees Depart
A recent breach involving Indian fintech company Kirana Pro serves as a reminder to organizations worldwide: even the most sophisticated cybersecurity technology cannot make up for poor administrative data security hygiene....more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
Five former Memphis-based hospital employees and another man have pled guilty to unlawfully disclosing patient information in violation of HIPAA, U.S. Attorney for the Western District of Tennessee Kevin Ritz announced....more
The Third Circuit Court of Appeals has given new life to a putative class action suit led by a former employee of a company that suffered a ransomware attack, leading to her sensitive information being released onto the Dark...more
A critical access hospital in Colorado will pay $114,000 in a settlement with the Office of Civil Rights (OCR) stemming from the failure to terminate a former employee’s access to a hospital database containing protected...more
The Situation: Despite Equifax's use of a cover story to keep employees from learning it was the victim of a serious data breach, a then-employee allegedly figured it out and made illegal securities trades based on the...more
The U.S. Court of Appeals for the Third Circuit has found that plaintiffs must show a causal connection between the theft of their personal information and the purported harm that they have suffered in order to survive a...more
Wage and Hour - Decision Upholds Class Action Waivers in Arbitration Clauses, Resolves Circuit Split - The U.S. Supreme Court issued a long-awaited decision in Epic Systems Corp. v. Lewis on May 21, 2018, holding that...more
If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more
On July 12, the U.S. House of Representatives Committee on Science, Space, and Technology (the “Science Committee”) released a report regarding its investigation of an October 2015 data breach and the subsequent response of...more
Last week, Mille Lacs County and former investigator for the Mille Lacs County Family Services, Mikki Jo Peterick, agreed to pay $1 million to settle a proposed federal class action which alleged that a former employee of...more
For the second time in history, on January 13, 2016, an Administrative Law Judge (ALJ) upheld the imposition of civil money penalties charged against a covered entity by the Office of Civil Rights in the Department of Health...more
The debate over standing in data breach litigation is gaining more attention lately. While many courts have hesitated to find standing prior to lost personally identifiable information (PII) actually being misused, the U.S....more
Breathing a sigh of relief that he neither works for U.S. agencies requiring security clearances nor do his hiring policies require the details of mental illnesses, drug and alcohol use, past arrests, bankruptcies, Joe Hyre...more
Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more