By any measure, the past few weeks have been eventful in Europe. Given the number of challenges facing European lawmakers — from continued hostilities in Ukraine, to last-minute negotiations over Greek debt, to anti-terrorism measures — it’s unlikely that trade secrets protection is at the top of anyone’s agenda in Brussels or Strasbourg. Still — as we have … Continue Reading
Throughout 2014, Seyfarth Shaw LLP’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever changing area of law. The series consisted of 10 webinars:2013 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete,… Continue Reading
A company faced with a security breach has a lengthy “to do” list, things to accomplish with respect to its incident response plan. It must, among other things, determine the root cause of the vulnerability or breach, investigate and eliminate the vulnerability or breach, determine the full nature and extent of the breach, determine who to notify and finalize the … Continue Reading
This week, the Connecticut Supreme Court issued an opinion which upheld a state common law negligence action against a healthcare provider for violation of privacy and confidentiality laws and regulations using as evidence of the standard of care the Health Information Portability and Accountability Act (HIPAA) and its accompanying regulations. The court denied defense arguments that HIPAA, which expressly does … Continue Reading
Way back in the 1980’s, there was a very simple way to keep computer information from being stolen. Every disk containing confidential information was locked in a Sargent and Greenleaf safe.
Of course, even then, there were problems: 22,000 or so 3.5 inch “microfloppy” disks hold the same amount of data as a 32 GB thumb drive can hold today. … Continue Reading
When & Where: This program will be held at three different locations.
November 13th at Seyfarth Shaw’s San Francisco Office (lunch and registration will begin at 11:30 a.m., program will begin at noon and go until 1:30 p.m.).
November 18th at Seyfarth Shaw’s … Continue Reading
ITechLaw is a not-for-profit organization established to inform and educate lawyers about the unique legal issues arising from the evolution, production, marketing, acquisition and use of information and communications technology.
Seyfarth partner Robert Milligan, an ITechLaw Member of the Board … Continue Reading
On October 1, 2014, Michael D. Wexler and Robert B. Milligan, partners and co-chairs of Seyfarth Shaw’s Trade Secrets, Computer Fraud & Non-Competes practice group participated in a Q&A mini-roundtable from Corporate Disputes Magazine on current trends in trade secret disputes and the steps companies can take to reduce these disputes. Below are fielded questions from the Seyfarth Shaw Reprint … Continue Reading
We are pleased to let you know that the webinar “Protecting Trade Secrets: The Current Landscape, Top Threats, Best Practices for Assessing and Protecting Trade Secrets, Proposed Legislation and Future Scenarios” is now available as a podcast and webinar recording.
The security breach news cycle continues. There remains a deluge of news stories about point-of-sale terminals being compromised, the ease of magnetic stripes being cloned, and the need for Chip and PIN technology being deployed on credit cards. The legal ramifications of all these events is just starting to become apparent – and it’s complicated. Individual liability is beginning to … Continue Reading
From organized crime and “hacktivists” to competitors and rouge employees, the threats to companies’ trade secrets are more pronounced today than ever before. A recent report by the Center for Responsible Enterprise And Trade (Create.org) and PricewaterhouseCoopers LLP (PwC) — Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats… Continue Reading
As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog post by digital forensics expert Trent Livingston, a Director of iDiscovery Solutions.
Do you recall the early days of the spy movie genre? Many of these movies depicted cloaked secret agents slinking around dark offices snapping pictures … Continue Reading
In Seyfarth’s seventh installment of its 2014 Trade Secrets Webinar series, Seyfarth attorneys, Justin K. Beyer, Dawn Mertineit, and James Yu discussed practical steps employers can take to protect … Continue Reading
It is not uncommon for companies to find that a company’s crown jewels – trade secrets – are overlooked, taken for granted or not properly protected. In a matter of minutes, these key assets can be lost or compromised through what is often benign neglect. This reality is compounded by outsiders and insiders bent on stealing valuable company assets. Sources … Continue Reading
In U.S. v. Liew, Judge White of the U.S. District Court for the Northern District of California sentenced defendant Walter Liew to 15 years in prison for misappropriating trade secrets from chemical giant DuPont and selling them to … Continue Reading
On Tuesday, August 26, 2014 at 12:00 p.m. Central, Seyfarth attorneys Scott Humphrey, Jason Stiehl and Rebecca Woods will present the sixth installment in its series of 2014 Trade Secret Webinars. They will focus on trade secret and client relationship considerations in the banking and finance industry, with a particular focus on a firm’s relationship with its FINRA members. Topics … Continue Reading
An employee entered into non-compete and confidentiality agreements with his employer. Following his resignation from that company, he went to work for a competitor. His job functions and territory with both employers were similar. In a suit for violation of the non-compete and confidentiality agreements, a Texas federal court held recently that — absent an injunction — disclosure to his … Continue Reading
With the Securities and Exchange Commission’s attention again returning to cybersecurity issues, many registrants are recalling the Commission’s intense focus on “Year 2000” issues over a decade ago.
Commissioner Luis Aguilar, in remarks at the SEC’s cybersecurity roundtable held on March 26, 2014, made a special point of discussing the SEC’s growing concerns about cybersecurity and observed … Continue Reading
In Seyfarth’s third installment of its 2014 Trade Secrets Webinar series, Seyfarth attorneys took a closer look at avoidance and mitigation techniques for data breaches, including where the … Continue Reading
On Thursday, June 19, 2014 at 12:00 p.m. Central, Laura Maechtlen and Michele Haydel Gehrke will present the webinar Bring Your Own Device Policies. As employees have widely adopted personal mobile devices such as smartphones and tablets, there has been a parallel trend of employers allowing (or requiring) their employees to use their own personal mobile devices at work. This … Continue Reading
A significant new bill was recently introduced in Congress seeking to add a federal civil cause of action for trade secret theft.
On Tuesday, April 29, 2014, in a bipartisan effort, Senators Christopher Coons (D-Del) and Orrin Hatch (R-Utah), both members of the Senate Judiciary Committee, introduced the bill.
Senators Coons and Hatch’s bill, … Continue Reading
As companies face increasing competitive and financial pressures, management is understandably consumed with running the day-to-day operations of the business and working to achieve business objectives and maximize the bottom line. As a result, it is not uncommon for companies to find themselves in situations where important assets are overlooked or taken for granted. … Continue Reading
With the ever-increasing need to maintain communications with customers and your employees, mobile phones have become a requirement for business people. Spanish telecommunications company Geeksphone is targeting the business market with Blackphone, the first mobile phone that encrypts data transmissions. No one would argue against the value of increased wireless data security, but do CIA-style cellular phones really provide enough … Continue Reading
Cross-Posted from The Global Privacy Watch
With all the high-profile cybersecurity breaches that seem to be in the news lately, there is a plethora of “guidance” on cybersecurity. The Attorney General of California has decided to add to this library of guidance with her “Cybersecurity in the Golden State” offering. Cybersecurity is a pretty mature knowledge domain, … Continue Reading