Who Should Attend: In-house counsel, IT professionals, HR professionals, Privacy professionals, corporate executives, risk managers, and directors.
When & Where: This program will be held at three different locations.
November 13th at Seyfarth Shaw’s San Francisco Office (lunch and registration will begin at 11:30 a.m., program will begin at noon and go until 1:30 p.m.).
November 18th at Seyfarth Shaw’s Los Angeles – Century City Office (lunch and registration will begin at 11:30 a.m., program will begin at noon and go until 1:30 p.m.).
December 3rd at the Westin Palo Alto in Palo Alto (breakfast and registration will begin at 8:30 a.m., program will begin at 9:00 a.m. and go until 1:30 p.m.).
In today’s highly mobile and competitive world, employees frequently move between companies within the same industry. Rarely a day goes by without a news report of another high-profile theft of important data from a company, or the loss of key employees to competitors.
Employee mobility, coupled with the digitalization of company assets, has increased the need for creative and thoughtful protections of valuable company data. It has become extremely easy for employees, especially disgruntled or irresponsible ones, to take and disseminate confidential information to the detriment of their current and former employers. The need to protect company trade secrets and other confidential data against departing employees and to follow best practices when hiring a competitor’s employees has never been greater.
Seyfarth attorneys Robert Milligan and Jim McNairy will be joined by Jim Vaughn of iDiscovery Solutions, Kathleen Deibert of Intel, and Joshua Kagan of PCH International, to present a lively discussion that focuses on:
Best practices when hiring new employees:
- Proper employee onboarding — a cradle to grave approach
- Employing effective non-disclosure and invention assignment agreements and computer access and bring your own device policies
Best practices for protecting your company when employees depart:
- Proper exit interview techniques and certifications
- Reducing risk of disclosure of trade secrets in social media and via online repositories and other electronic means
- Identifying the unauthorized taking/disclosure of trade secrets through the use of digital forensics
Discussion of recent cases/legislation:
- The current circuit split on the Computer Fraud and Abuse Act
- Trade secret preemption
- Forum selection/choice of law clauses
High level strategies for addressing California’s prohibition on non-compete agreements
Registration: Attendance is limited to enable attendee participation so please RSVP as soon as possible. There is no cost to attend, but registration is required and seating is limited. This program is designed for company representatives and not outside counsel.
For questions, please contact Seyfarth Events at events@seyfarth.com and reference this program.