News & Analysis as of

Today's Popular Updates Confidential Information Corporate Counsel

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
Proskauer - Trade Secrets

$30 Million Message: Jury Awards Substantial Punitive Damages for Trade Secret Theft

A nearly decade-long legal battle in the U.S. District Court for the Northern District of Illinois recently concluded with a significant jury verdict, underscoring the potentially severe consequences of trade secret theft...more

Esquire Deposition Solutions, LLC

How AI Is Helping Corporate Legal Departments

According to a recent survey, artificial intelligence gained a significant foothold in corporate legal departments in 2025, where it is being used mostly for contract drafting and review, legal research, and document...more

Seyfarth Shaw LLP

Analysis of FTC Non-Compete Ban Legal Challenges: Does the Ban Pass Constitutional Muster? (And Other Issues)

Seyfarth Shaw LLP on

On April 23, 2024, the Federal Trade Commission (FTC) voted in a 3 to 2 decision along party lines to adopt its Final Non-Compete Clause Rule (“Noncompete Rule”) banning post-employment non-compete clauses between employers...more

Wyrick Robbins Yates & Ponton LLP

The California Attorney General's Settlement with Glow: A Wake-Up Call for Consumer Health App Developers

Consumer-directed health apps are experiencing a boom thanks to COVID-19, as consumers seeking to avoid doctors’ office waiting rooms are increasingly relying on apps to measure and maintain their health.  That trend is...more

Vinson & Elkins LLP

Individual Criminal Liability For Failure To Disclose Data Breach Establishes A New Level Of Risk For Companies And Executives

Vinson & Elkins LLP on

General Counsel and in-house legal departments have long struggled with articulating the risk of and determining the appropriate response to breaches of the company network and the potential exposure of confidential...more

McDermott Will & Schulte

Uber Criminal Complaint Raises the Stakes for Breach Response

On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more

Hinshaw & Culbertson - Insights for Insurers

No Protection for Vendor's Forensic Report in Post-Breach Litigation? - Preserving Privilege and Work Product Protection in Light...

A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more

Womble Bond Dickinson

Federal Court Finds Cybersecurity Forensic Report Not Privileged Under Attorney Work Product Doctrine

Womble Bond Dickinson on

The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more

Troutman Pepper Locke

How Safe Is That Harbor? The Impact of the Defend Trade Secrets Act's Whistleblower Immunity Provision on a Trade Secret Owner's...

Troutman Pepper Locke on

Imagine that your company has just commenced an internal compliance investigation in response to an allegation that the company is violating various federal laws. The next day, a longtime employee with access to the company’s...more

Seyfarth Shaw LLP

For The First Time, A Massachusetts Court Weighs In On The New Noncompetition Agreement Act – Well, Sort Of

Seyfarth Shaw LLP on

As we’ve previously written about on this blog, last summer the Massachusetts legislature passed a non-compete reform bill which went into effect on October 1, 2018. ...more

Zuckerman Spaeder LLP

Gone Phishing: Employer Faces Liability for Mistakenly Disclosing W-2 Forms to Scammer

Zuckerman Spaeder LLP on

Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more

Ward and Smith, P.A.

In-House Counsel: How to Avoid Missteps in the Social Media Minefield

Ward and Smith, P.A. on

While social media has become ubiquitous, attorneys are subject to particular restrictions online. During Ward and Smith’s 2017 In-House Counsel Seminar two attorneys reviewed some of the potential pitfalls in-house counsel...more

Ladas & Parry LLP

Trade Secrets: Changes In The Law On Protection Of Trade Secrets In The United States And European Union

Ladas & Parry LLP on

Concerns about trade secret theft have been increasing in both the United States and Europe in recent years. Traditionally, American law disfavored trade secret protection vis à vis patenting on the basis that publication of...more

Littler

NLRB Ruling in Social Media Case Provides Useful Guidance for Employers

Littler on

Drafting a social media policy in compliance with Section 7 of the National Labor Relations Act (“NLRA” or “the Act”) has become increasingly challenging for employers, as the National Labor Relations Board (“NLRB” or “the...more

Hinshaw & Culbertson LLP

Court Dismisses Case Filed Under the Defend Trade Secrets Act

Earlier this year, we notified you about the passage of the Defend Trade Secrets Act of 2016 (DTSA) and how it affects employers. On August 8, 2016, a U. S. District Judge in the Southern District of Florida dismissed one of...more

Faegre Drinker Biddle & Reath LLP

Unionized Employers, Take Note: E-Verify Is a Minefield

On May 13, 2016, a National Labor Relations Board (NLRB) judge ordered The Ruprecht Company, a meat processor and food manufacturer, to provide confidential immigration documents to the union and to rescind its participation...more

Pillsbury - Internet & Social Media Law Blog

From Ashley Madison to the Panama Papers: Is Hacked Data Fair Game?

We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more

Epstein Becker & Green

Restrictive Covenants: Do Yours Meet a Changing Landscape?

Epstein Becker & Green on

Restrictive covenants are an important tool for businesses concerned about the protection of their confidential business information and the costs of employee training and turnover. When properly crafted and utilized,...more

Baker Donelson

Valuable Information Security Lessons from the Olympus Mortgage vs. Guaranteed Rate Case

Baker Donelson on

Late last month a jury awarded Mount Olympus Mortgage Company (MOMC) more than $25 million for their claims against Guaranteed Rate (Guaranteed), which alleged Guaranteed along with other former employees of MOMC illegally...more

Seyfarth Shaw LLP

Recent Decision Highlights Important Pleading Requirements for Computer Fraud and Abuse Act Claims

Seyfarth Shaw LLP on

Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more

FordHarrison

Data privacy in the Americas - At a glance

FordHarrison on

As multinational employers are aware, data privacy laws can vary greatly from jurisdiction to jurisdiction. Ensuring compliance with the different requirements can be challenging, and the penalties for noncompliance can be...more

Robins Kaplan LLP

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Robins Kaplan LLP on

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

BakerHostetler

Time for an Updated Cyber Risk Approach; BPI Data Breach

BakerHostetler on

Our traditional approach to cyber risk and security has been focused on privacy and financial data. The data breach or loss concerns that typically rank high on our risk ratings are private and confidential data like names...more

Foley & Lardner LLP

Five Intellectual Property Considerations for Startups - Part I

Foley & Lardner LLP on

A successful startup provides a solution to a market need. Typically, the solution involves a new or improved device or technique. As a startup defines and develops its solution, intellectual property (IP) becomes a core...more

Akerman LLP - Health Law Rx

Court Allows Counterclaim Against Whistleblower for Breach of Employment Agreement

A federal court in New Jersey has permitted a defendant in a False Claims case to defend itself on the grounds that the whistleblower/ex-employees breached their employment agreements by using and disclosing confidential...more

26 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide