Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
#WorkforceWednesday: Bracket-Busting Trade Secret and Non-Compete Disputes in Sports - Employment Law This Week® - Spilling Secrets Podcast
California Employment News: Top Developments in Wage and Hour Law for 2024 (Podcast)
California Employment News: Top Developments in Wage and Hour Law for 2024
#WorkforceWednesday: Latest Developments – Restrictive Covenants in the Health Care Industry - Employment Law This Week® - Spilling Secrets Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
#WorkforceWednesday: Invention Ownership - Why the Tense Matters in Employee IP Provisions - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Non-Compete Law Update – Key Developments from 2023 - Employment Law This Week® - Spilling Secrets Podcast
The FBI on Economic Espionage
#WorkforceWednesday: Restrictive Covenants Around the World - Challenges for Multinational Employers - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Non-Compete Agreements in 2023: What Employers Need to Know - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: Attention Employers - How to Protect Trade Secrets in California - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday: When a Restrictive Covenant Dispute Goes Beyond the Injunction Phase - Employment Law This Week® - Spilling Secrets Podcast
Business Better Podcast Episode: Protecting Your Business From Theft of Trade Secrets, Loss of Customers, and Employees Being Hired Away
Editor’s Note: There’s much conversation around how our industry should best use generative artificial intelligence (gen AI) to do our jobs. On March 19, 2024, HaystackID sponsored an EDRM virtual workshop that explored how...more
Partners Jenny Colgate and Jennifer Maisel will present a webinar titled "Artificial Intelligence Litigation Risks for the Medical Technology Industry" for Medmarc, the leading expert in the products liability risks facing...more
Can privacy law and trade secret law coexist, or is compliance with both impossible? We are experiencing the fourth industrial revolution, driven by the rise in data and connectivity, analytics and artificial intelligence....more
A former hospital worker in Arizona was sentenced to 54 months in prison and ordered to pay restitution after pleading guilty to two felony counts involving identity theft and health information disclosure. In the plea deal,...more
Recent breakthroughs in generative artificial intelligence (AI) have captured significant media attention. Developers argue that the technology, which learns from data to produce new text, visual, or audio content based on a...more
Massachusetts-Based Background Check Company Creative Services Faces Multiple Lawsuits Over Data Breach - "'CSI determined that certain files dating from November 2018 to November 2021 may have been copied from their...more
Lawyers, ask yourselves: Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more
A federal appeals court recently addressed whether employees had standing to bring a lawsuit when their personally identifiable information (PII) was inadvertently circulated to other employees at the company, with no...more
Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more
2020 AG Elections- Ten AG elections were held on November 3, 2020. As of this writing, six incumbent AGs won their elections, and Republicans held the open-seats in Indiana and Montana. In the two undecided races, Democratic...more
As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more
As the coronavirus (COVID-19) spread around the world, most businesses were forced to close their doors temporarily and take steps towards working virtually. However, the U.S. construction industry, deemed “essential” by...more
Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more
The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more
Google Health’s Partnerships Raise Privacy Concerns - Recently, Google has been at the center of privacy concerns due to its health- sharing collaborations with the University of Chicago Medical Center (the Medical Center)...more
The bad news first. An estimated 3.5 million cybersecurity positions will be unfilled globally by 2021.* Leaving data security entirely up to the professionals isn’t a viable option. Like it or not we’re all on the...more
Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more
You’ve just learned someone registered a domain nearly identical to yours, or is using your brand online to sell similar products or offer related services. What do you do? A few months ago, you probably would’ve checked who...more
This article is Part 4 of our series on the GDPR for U.S.-based companies. Part 1 assisted U.S.-based companies in determining whether the GDPR applies to them; Part 2 provided an overview of the GDPR’s key concepts and...more
Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more
Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more
On Jan. 3, 2018, the Substance Abuse and Mental Health Services Administration (SAMHSA) issued its final rule regarding the Confidentiality of Substance Use Disorder Patient Records Part 2. These changes become effective Feb....more
We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more
Financial services firm Raymond James Financial Services Inc. (Raymond James) has agreed to settle an investigation by the Financial Industry Regulatory Authority (FINRA) for $500,000. The investigation stems from allegations...more
Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more