Milligan: Data theft of valuable company trade secrets … Continue Reading
In Seyfarth’s third installment of its 2015 Trade Secrets Webinar series, Seyfarth attorneys focused on non-compete and trade secret considerations from an international perspective. Specifically, the webinar will involved a discussion of non-compete and trade secret … Continue Reading
Seyfarth attorneys Wan Li, Ming Henderson and Daniel Hart will focus on non-compete and trade secret considerations from an international perspective. Specifically, the webinar will involve a discussion of … Continue Reading
By any measure, the past few weeks have been eventful in Europe. Given the number of challenges facing European lawmakers — from continued hostilities in Ukraine, to last-minute negotiations over Greek debt, to anti-terrorism measures — it’s unlikely that trade secrets protection is at the top of anyone’s agenda in Brussels or Strasbourg. Still — as we have … Continue Reading
Throughout 2014, Seyfarth Shaw LLP’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever changing area of law. The series consisted of 10 webinars:2013 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete,… Continue Reading
As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry by Bartosz Sujecki, an attorney from Bavelaar Advocaten in the Netherlands, on the European Commission’s proposed Directive to provide harmonized trade secret protections in Europe.
-Robert Milligan, Editor of Trading Secrets
The protection of trade secrets … Continue Reading
As many readers will know, non-compete clauses in employment contracts are only valid in France if, among other conditions, an employee receives a financial consideration of 40 to 60% salary depending on the sector and the role for the duration of the restriction. But do confidentiality clauses need to be subject to the same treatment?
The recently published decision of … Continue Reading
ITechLaw is a not-for-profit organization established to inform and educate lawyers about the unique legal issues arising from the evolution, production, marketing, acquisition and use of information and communications technology.
Seyfarth partner Robert Milligan, an ITechLaw Member of the Board … Continue Reading
On October 1, 2014, Michael D. Wexler and Robert B. Milligan, partners and co-chairs of Seyfarth Shaw’s Trade Secrets, Computer Fraud & Non-Competes practice group participated in a Q&A mini-roundtable from Corporate Disputes Magazine on current trends in trade secret disputes and the steps companies can take to reduce these disputes. Below are fielded questions from the Seyfarth Shaw Reprint … Continue Reading
From organized crime and “hacktivists” to competitors and rouge employees, the threats to companies’ trade secrets are more pronounced today than ever before. A recent report by the Center for Responsible Enterprise And Trade (Create.org) and PricewaterhouseCoopers LLP (PwC) — Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats… Continue Reading
As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry about trade secrets in India by technology and corporate attorneys Sajai Singh and Soumya Patnaik of J. Sagar Associates in Bengaluru, India. Sajai serves as the President of ITechLaw, a leading technology law organization. This entry is part two … Continue Reading
As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry about non-compete covenants in India by technology and corporate attorneys Sajai Singh and Soumya Patnaik of J. Sagar Associates in Bengaluru, India. Sajai serves as the President of ITechLaw, a leading technology law organization. This entry is part one … Continue Reading
In China, employers may require the employee to continue to perform the non-compete obligation and pay liquidated damages in accordance with the non-compete agreement after breach occurs.
In the past, however, the following uncertainties could impede the employer from … Continue Reading
Ever since the first laws on the 35-hour week were enacted over fifteen years ago, monitoring working time has been a headache for employers in France. With the introduction of new technology and mobile devices, the situation has worsened. The French approach to flexible working is to reaffirm that employees have the right to … Continue Reading
The plaintiff corporation — now a Delaware LLC based in Kansas — was headquartered in Alberta, Canada at the time its employees signed agreements containing confidentiality and non-compete covenants. The agreements designated the applicable law to be that of Alberta. When its ex-employees allegedly violated the covenants, the plaintiff sued them and their new employer in a Kansas federal court. … Continue Reading
The fifth webinar in the 2014 series, was presented by Wan Li, Ming Henderson, Justine Turnbull and Daniel Hart, focused on non-compete and trade secret considerations from an international perspective. Specifically, the webinar involved a discussion … Continue Reading
In Sunrise Brokers LLP v Rodgers  EWHC 2633 the High Court held that an employer does not have to accept that a ‘walk out’ by an employee will terminate the contractual relationship. The employer has … Continue Reading
The traditional approach taken by the English Courts to restrictive covenants was confirmed in the decision of the Court of Appeal in Prophet plc v Huggett  EWCA Civ 1013. The Court of Appeal overturned a High Court judge’s decision that the words “or similar thereto” should be added to the relevant clause in order for it to make … Continue Reading
When the Walt Disney Company built the “It’s a Small World” ® ride for the New York World’s Fair in 1964, they probably had no idea of the challenges that globalization could pose 50 years later. From cases involving the sale of stolen trade secrets to foreign companies to departing employees setting up competing business in different jurisdictions, many … Continue Reading
To accommodate our global audience, the fifth installment in the 2014 Trade Secrets Webinar Series will be available as an on-demand broadcast on Thursday, July 31, 2014 at 9:00 a.m. Central. Please register to receive access to the broadcast.
Seyfarth attorneys Wan Li, Ming Henderson, Justine Turnbull and Daniel Hart will focus on non-compete and trade secret considerations from an … Continue Reading
In Seyfarth’s fourth installment of its 2014 Trade Secrets Webinar series, Seyfarth attorneys discussed the significant changes to several laws regarding trade secrets, restrictive covenants, and social media, as well as proposed legislation pending in other jurisdictions.… Continue Reading
This week, at the ITech Law World Technology Conference in New York, Seyfarth attorney Dan Hart briefed members of the International Technology Law Association’s Intellectual Property Committee about the European Commission’s proposed Directive on trade secret protection. As we have written, the new Directive, if enacted, will substantially alter the legal landscape in Europe regarding trade secret protection and … Continue Reading
Later this month, voters in the European Union’s 28 Member States will cast their votes for representatives in the European Parliament. Regardless of the makeup of the European Parliament following the election, trade secret regulation is one of the many issues that members are likely to take up when … Continue Reading
With the ever-increasing need to maintain communications with customers and your employees, mobile phones have become a requirement for business people. Spanish telecommunications company Geeksphone is targeting the business market with Blackphone, the first mobile phone that encrypts data transmissions. No one would argue against the value of increased wireless data security, but do CIA-style cellular phones really provide enough … Continue Reading