News & Analysis as of

Sensitive Business Information

Fisher Phillips

Protecting Data While Traveling Internationally: An Employer’s Guide for Foreign Nationals and Other Global-Traveling Workers

Fisher Phillips on

International travel may pose serious data security risks – especially for your foreign national workers carrying sensitive, proprietary, or regulated information. Travelers must be aware of potential border inspections,...more

Conn Maciel Carey LLP

[Webinar] Trade Secrets and Restrictive Covenants: Practical Advice to Safeguard Your Company’s Critical Assets - April 10th,...

Conn Maciel Carey LLP on

The protection of trade secrets and confidential information is critical to the success of many organizations. Employers must remain vigilant against the growing risk of sensitive information being compromised, especially...more

Osano

[Virtual Event] The Privacy Pro Survival Summit 2.0: This Time It’s Personal - April 10th, 10:30 am - 5:30 pm EST

Osano on

Privacy pros are passionate about doing good work, in every sense of the word. Yes, we care about managing privacy as thoroughly and efficiently as possible (and not getting fined). But we are all in this line of work for a...more

Fox Rothschild LLP

Preparing for a TikTok Ban: What Employers Should Do to Ensure Access to Crucial Information Before It Disappears

Fox Rothschild LLP on

In recent years, TikTok has become a widely used platform for communication and content sharing, boasting nearly 2 billion users globally and 170 million active users in the U.S. alone. And while other social media platforms...more

McCarter & English, LLP

Antitrust Guidelines for Worker-Related Business Practices: How to Stay on the Right Side of Antitrust Hiring Laws During the...

The Department of Justice Antitrust Division (DOJ) and the Federal Trade Commission (FTC) (together, the Agencies) issued Antitrust Guidelines for Business Activities Affecting Workers (2025 Guidelines) in January. The 2025...more

Jackson Lewis P.C.

Insider Threats: The Overlooked Risks of Departing Employees and Sensitive Data Theft

Jackson Lewis P.C. on

Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more

Hendershot Cowart P.C.

Checklist: Texas Employment Agreements for Out-of-State Employers

Hendershot Cowart P.C. on

Multistate employers with employees in Texas are subject to state laws regarding employment agreements. Whether your business is large or small, specific provisions within your agreements could render your agreements...more

Farrell Fritz, P.C.

Cap Table Confidential: Should Startup Employees Get a Peek?

Farrell Fritz, P.C. on

I’m often asked whether employees should have access to the company’s cap table.  The cap table is one of the most sensitive and critical documents in any startup.  At its most basic level, it lays out who owns what –...more

Alston & Bird

Collaborating Effectively Within Your Organization During Internal Investigations

Alston & Bird on

Our White Collar, Government & Internal Investigations Team offers effective and actionable best practices for companies to follow in conducting their internal investigations....more

Cimplifi

The Importance Of Data Migration In Contract Lifecycle Management CLM

Cimplifi on

In today’s fast-paced business environment, efficient contract lifecycle management (CLM) is essential for maintaining operational integrity and ensuring compliance. At the heart of effective CLM implementations lies data...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Ropes & Gray LLP

DOJ Issues Notice of Proposed Rulemaking to Restrict Flow of Bulk Sensitive Personal Data to China and other Countries of Concern

Ropes & Gray LLP on

On October 29, 2024, the Department of Justice (“DOJ”) published its Notice of Proposed Rulemaking (“NPRM”) to implement President Biden’s Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data...more

A&O Shearman

Germany: Immediate dismissal of board member for email forwarding to personal account

A&O Shearman on

During an investigation, it is not uncommon to discover that an individual has forwarded business emails to their private email address. This ruling from the Higher Regional Court Munich shows the potential implications of...more

Jaburg Wilk

The First Circuit Limits California’s Noncompete Ban

Jaburg Wilk on

On September 26, 2024, the First Circuit Court of Appeals ruled against extending California’s strict noncompete ban to agreements executed outside of California and governed by another state’s law. This decision highlights...more

Robinson+Cole Data Privacy + Security Insider

Woeful Lack of Training for Chatbot Use in Workplace

A new US National Cybersecurity Alliance survey  shows that over one-third (38%) of “employees share sensitive work information with artificial intelligence (AI) tools without their employer’s permission.” Not surprisingly,...more

Mitchell, Williams, Selig, Gates & Woodyard,...

What Federal Laws Protect Trade Secrets?

In the world of business, safeguarding your company’s valuable information is crucial to maintaining a competitive edge. One of the most important assets a company can have is its trade secrets. But what exactly are trade...more

Epstein Becker & Green

Preparing for the Cybersecurity and Fraud Risks of Deepfakes: What Executive Teams Need to Know

Epstein Becker & Green on

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more

Epstein Becker & Green

Why Executive Teams Should Prepare for the Cybersecurity and Fraud Risks of Deepfakes

Epstein Becker & Green on

The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more

Lowenstein Sandler LLP

Trade Matters - Lowenstein Sandler's Global Trade & National Security Newsletter - August 2024

Lowenstein Sandler LLP on

The Bureau of Industry and Security (BIS) issued new guidance to prevent the diversion of controlled items to Russia. This guidance recommends the use of the Trade Integrity Project (TIP) database, which tracks suppliers with...more

StoneTurn

NCSC Warns U.S. Startups and Investors of Foreign Bad Actors with Money to Spend

StoneTurn on

Last week, the National Counterintelligence and Security Center (“NCSC”), the Office of Economic Security and Emerging Technologies (“OESET”) and other coordinating government agencies issued a warning to U.S. venture...more

EDRM - Electronic Discovery Reference Model

What Everyone Gets Wrong About Inherent Risk, and Why it Really Matters

Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more

Lowenstein Sandler LLP

Trade Matters - Lowenstein Sandler's Global Trade & National Security Newsletter - JULY 12, 2024

Lowenstein Sandler LLP on

On June 20, the Department of Commerce’s Bureau of Industry and Security (BIS) for the first time banned a software and cybersecurity company using authority provided by June 2023’s “Protecting Americans’ Sensitive Data from...more

Latham & Watkins LLP

China’s Ministry of Finance Publishes Corporate Sustainability Disclosure Standards

Latham & Watkins LLP on

The Standards provide a framework for all Chinese companies’ sustainability disclosures and the applicability extends beyond listed companies. On May 27, 2024, China’s Ministry of Finance published the new Corporate...more

Epiq

Confidential Business Information: Protecting an Organization’s Most Valuable Secrets

Epiq on

When it comes to the true source of a company’s value, it’s not necessarily in the products or the services they offer, nor is it in the brand they’ve carefully developed. The core of a company’s value is in the trade secrets...more

Epiq

The Most Important Type of Data That No One Is Thinking About

Epiq on

Confidential Business Information (CBI) is the information that is unique to the corporation that owns it. It’s anything key to the business that the company would not want its competitors or the public to know. It’s the...more

179 Results
 / 
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide