Compliance Tip of the Day: Bringing Predictive Analytics into Your Compliance Regime
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
In a time where headlines are dominated with executive orders and political shake-ups, non-profit boards cannot afford to be distracted from leadership decisions that matter most. Your CEO plays a pivotal role in guiding your...more
When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more
Introduction - As we enter a new era of business landscape dynamics, Seyfarth Shaw is pleased to present the latest edition of our annual cornerstone publication. This comprehensive 50-State Non-Compete Desktop Reference,...more
With the increase in popularity of artificial intelligence uses in business, companies are scratching the surface of AI’s potential to create efficient processes, automate tasks, and generate content at a low cost. With...more
While economists continue to debate the prospects for a recession, layoffs are impacting employees across the U.S., and not just in the technology sector. Given the greater potential for trade secret misappropriation in the...more
There have been a number of recent prominent examples of the unauthorised use of trade secrets by employees or former employees of large businesses. In November 2021, pharmaceutical giant Pfizer sued a 'soon to be former'...more
Companies often hire employees to develop new products, improve processes, create new technologies, and develop new markets. But how should employers address the ownership of intellectual property created by their employees...more
Trade secrets are typically associated with a company’s most profitable products and services, and maintaining control of critical confidential information is often essential to a company’s revenue stream and continued...more
As businesses consider how to transition to a "new normal," a thorough review of intellectual property (IP) assets and a protocol for managing those assets should be part of the planning process. For many companies, the...more
On April 14, 2020, California Governor Gavin Newsom outlined the six “critical indicators” the state will monitor during the next phase of its COVID-19 response as it considers when to modify its statewide shelter-in-place...more
What do you do when a key employee leaves and you believe he/she has taken your company’s trade secrets to a competitor? Or when a strategic business partner uses your trade secret information to compete against you?...more
Picture this: Your company is in a highly competitive industry with several leading players heavily supported by major corporate investors and/or venture capital funds. The market is expected to generate potentially hundreds...more
Over the past decade, companies are increasingly losing trade secret theft cases. Even when corporate secrets are stolen, courts are dismissing claims of disputed trade secret cases because plaintiffs have not taken...more
Employers may face risks of departing employees, particularly involuntarily terminated employees, taking the employer’s confidential information or trade secrets with them when they leave. ...more
The sharing of confidential and proprietary information among competitors and potential competitors (even during due diligence) can raise serious antitrust concerns. In particular, parties must avoid exchanging information...more
Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more
Employers have been using restrictive covenant agreements – contracts that contain non-compete, customer non-solicitation, employee non-solicitation, or non-disclosure of confidential information – with increasing frequency...more
When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more
I was giving a talk recently when a senior executive asked me, “If we have the time and resources to focus on just one thing to improve our information security, what would you suggest?” I didn’t hesitate: “Train your...more
Something lost is always in the last place you look (by definition). It can also sometimes be in the first. Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems...more