We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 1-10 of 9,492

Network interference - a legal guide to the commercial risks and rewards of the social media phenomenon
  • Reed Smith LLP
  • European Union, Global, United Kingdom, USA
  • April 22 2014

Social media is a revolution in the way in which corporations communicate with consumers. This White Paper will help you to maximise the huge

Supreme court strikes down warrantless searches of hotel guest registries
  • McGuireWoods LLP
  • USA
  • June 29 2015

Hotels possess a treasure trove of private information about their guests. Everything from the guest’s name, address, credit card and vehicle

Privately speaking - issue 2, June 2015
  • Chapman Tripp
  • Australia, European Union, New Zealand, United Kingdom, USA
  • June 25 2015

The risks for organisations from a privacy breach can be very high. This applies both when the organisation is the victim as in industrial

Courts restrict ability of customers and employees to sue companies following a data breach, but risks of other liabilities remain
  • Jackson Lewis PC
  • USA
  • June 26 2015

Among the multitude of unpleasant issues facing a company whose network has been breached is potential liability to customers and employees whose

There's a difference between "confidential and proprietary information" and a trade secret
  • Brooks Pierce McLendon Humphrey & Leonard LLP
  • USA
  • June 24 2015

I can't remember the last time that the Business Court granted a motion opposing the designation of a case as a mandatory complex business case. And

CBM that recites scanning receipts, encrypting the data and transmitting not patent-eligible
  • McDermott Will & Emery
  • USA
  • June 30 2015

Addressing the subject-matter eligibility of a business-method patent for scanning receipts, encrypting the data, and then transmitting it to a cloud

Court refuses to recognize negligence claim for data breach
  • Berger Singerman LLP
  • USA
  • June 26 2015

According to the Identity Theft Resource Center, so far in 2015, 380 data breaches have occurred in the United States, exposing more than 117 million

Corporate espionage: not your typical sports-“gate”
  • Seyfarth Shaw LLP
  • USA
  • June 26 2015

Generally when one refers to "competitors" in the context of protecting trade secrets, it is in regard to business competitors, not competing sports

Supreme Court rejects Google’s appeal in Java API dispute
  • Proskauer Rose LLP
  • USA
  • June 30 2015

On Monday, the Supreme Court denied certiorari in Google's appeal of the Federal Circuit's 2014 ruling that that the declaring code and the structure

A new ruling by the French data protection authority: is the right to be forgotten crossing the Atlantic to the U.S.?
  • Debevoise & Plimpton LLP
  • France, USA
  • June 24 2015

France’s data protection authority, the Commission Nationale de l'Informatique et des Libertés (“CNIL”), has ordered Google to delist several