This post originally appeared in the June edition of Cyber Law & Strategy.

Somewhere today at least one data security breach is likely to happen. It might not have been publicized and may not have involved millions of records, but there is no doubt it will happen. That is because cybercrime remains one of the most common crimes in the world, and non­criminal exposures are fairly common as well.
Continue Reading Security Breach Responses — As Important and Difficult As Ever

Please join us for a one-hour CLE webinar on Tuesday, July 24, 2018, at 1:00 p.m. Eastern / 12:00 p.m. Central / 10:00 a.m. Pacific.

Trade secrets are critical intellectual property for most businesses. The threat to trade secrets, whether through cybersecurity or other issues, continues to increase year after year, especially with the increased use of cloud technology, social
Continue Reading Upcoming Webinar! Protecting Trade Secrets from Cyber and Other Threats

On Friday, May 18, Eric Barton participated in a panel discussion at the 2018 ITechLaw World Technology Conference, updating attorneys from around the globe on the latest developments in cyber vulnerabilities and crime. In today’s world, businesses and individuals face the certain knowledge that electronic systems are not entirely secure. Mr. Barton’s presentation provided “real world” guidance on how companies
Continue Reading Eric Barton Presents at 2018 ITechLaw World Technology Law Conference

Seyfarth Shaw LLP is pleased to be a Global Sponsor at ITechLaw’s 2018 World Technology Conference in Seattle, May 16-18.

Fairmont Olympic Hotel
411 University Street
Seattle, WA 98101

ITechLaw is a not-for-profit organization established to inform and educate lawyers about the unique legal issues arising from the evolution, production, marketing, acquisition and use of information and communications technology.

The
Continue Reading Seyfarth Trade Secrets Attorneys to Participate in ITechLaw 2018 World Technology Law Conference in Seattle

Continuing our annual tradition, we present the top developments/headlines for 2017/2018 in trade secret, computer fraud, and non-compete law.

1. Notable Defend Trade Secrets Act Developments

Just two years after its enactment, the Defend Trade Secrets Act (“DTSA”) continues to be one of the most significant and closely followed developments in trade secret law. The statute provides for a federal civil cause of action for trade secret theft, protections for whistleblowers, and new remedies (e.g., ex parte seizure of property), that were not previously available under state trade secret laws.
Continue Reading Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2017/2018

On January 25th at 12:00 p.m. Central Time, in Seyfarth’s first installment of its 2018 Trade Secrets Webinar series, Seyfarth attorneys will review noteworthy cases and other legal developments from across the nation over the last year in the areas of trade secrets and data theft, non-competes and other restrictive covenants, and computer fraud. Plus, they will provide their predictions
Continue Reading Upcoming Webinar! 2017 National Year In Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete, and Computer Fraud Law

Throughout 2017, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing area of law. The series consisted of six webinars:

  1. 2016 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets,
    Non-Compete and Computer Fraud Law
  2. Simple Measures for Protecting Intellectual Property and Trade Secrets
  3. Protecting Confidential Information and Client Relationships in the Financial Services Industry
  4. Protecting Your Trade Secrets in the Pharmaceutical Industry
  5. Trade Secret Protection: What Every Employer Needs to Know
  6. Protecting Trade Secrets in the Social Media Age

Continue Reading 2017 Trade Secrets Webinar Series Year in Review

As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Jonathan Karchmer, a senior managing consultant at iDiscovery Solutions.

Determining whether programs or malware actually ran on a system is an important goal of seasoned examiners when investigating computer evidence. Generally, there are several artifacts left behind anytime executables are run—regardless of whether the program is Outlook, Chrome, or something malicious. Today we’ll cover some artifacts we encounter on Windows systems.
Continue Reading Locating Digital Breadcrumbs: Programs Can Run, But They Can’t Hide

Social media and related issues in the workplace can be a headache for employers. There is no denying that social media has transformed the way that companies conduct business. In light of the rapid evolution of social media, companies today face significant legal challenges on a variety of issues, ranging from employee privacy and protected activity to data practices, identity
Continue Reading Upcoming Webinar! Protecting Trade Secrets in the Social Media Age

The use of open file sharing platforms in business continues to increase in 2017; Dropbox alone has over 200,000 active business accounts. Unfortunately, the convenience of these platforms and the increase in use by businesses attracts the attention of hackers as well. File sharing platforms and accounts have a high “hack value”—the overall value of the accounts on the dark web—due to the relative ease with which account can be obtained and the sensitivity of the information stored on these platforms.

The risk associated with the use of file share platforms is twofold. First, company supported file share is attractive to attackers because it is guaranteed to contain sensitive information. Second, file share platforms available to employees outside of the company—e.g. the employee Google Drive account—may be used to store company information, but likely do not use the same security standards as those enforced by the company. Attacks on file share platforms are also very real. In August of 2016 Dropbox forced users to reset their passwords based on a breach—60 million account credentials compromised—that had been discovered but was executed four years earlier in 2012.
Continue Reading File Share Platforms and Business Risk