We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 11-20 of 1,324

5 privacy and data security measures that can protect your company against trade secret theft
  • Covington & Burling LLP
  • USA
  • April 5 2013

At a recent forum in New York, a team of Covington lawyers addressed the growing concern among companies that their most valuable assets could leave


Protecting trade secrets with a mobile workforce and telecommuters
  • Jackson Lewis PC
  • USA
  • March 18 2013

Regardless of where one stands philosophically on the merits of working from a physical office where greater collegiality can be fostered, versus


Hurricane Sandy and crisis management
  • Ogletree Deakins
  • USA
  • October 30 2012

Hurricane Sandy is leaving a wake of destruction in major cities across the East Coast that can have a devastating effect on your business, management, employees, and customers


Employers beware: Fourth Circuit adopts narrow interpretation of Computer Fraud and Abuse Act
  • Seyfarth Shaw LLP
  • USA
  • August 6 2012

On July 26, 2012, the Fourth Circuit Court of Appeals decided WEC Carolina Energy Solutions LLC v. Miller, holding that departing employees are not liable under the Computer Fraud and Abuse Act (“CFAA”) for mere violations of a company computer use policy


Virginia Supreme Court overturns multi-million dollar "goodwill" damages award in trade secrets conspiracy case
  • Epstein Becker Green
  • USA
  • June 13 2012

One of the most elusive forms of damage that a company may suffer when its trade secrets are misappropriated or its former employees breach their post-employment restrictive covenants is the loss of goodwill


Michigan Federal Court limits use of Computer Fraud and Abuse Act to prosecute disloyal employee
  • Littler Mendelson
  • USA
  • June 12 2012

The Computer Fraud and Abuse Act prohibits (among other things) an employee from accessing an employer’s computers “without authorization” or in a manner that “exceeds authorized access.”


Don’t let BYOD become LFYO (liability for your organization)
  • Miller Canfield PLC
  • USA
  • June 11 2012

"BYOD" stands for "bring your own device," the practice of allowing employees and contractors to use personal devices, such as laptops, smartphones, home computers and tablets, to conduct the organization's business


Federal courts address question of employer-employee ownership of business-related social media accounts
  • Fenwick & West LLP
  • USA
  • June 5 2012

The question of whether an employer is entitled to trade secret protection over social media accounts used for business purposes is unfolding in several well-publicized cases currently pending in federal courts throughout the country


Eworkplace policies social-media, privacy & internet-security
  • Fenwick & West LLP
  • USA
  • April 3 2012

Traditional concerns for employers have included: harassing or other discriminatory actions; other conduct leading to liability to third-parties; forbidden fraternizing; criminal activity; “frolic and detour” or other slacking; and protection of trade secrets


Recent developments for the fourth quarter 2011
  • Baker & McKenzie
  • Canada, China, Denmark, Netherlands, Switzerland, United Kingdom, USA, European Union, France, Germany, Ireland, Italy, Japan
  • March 15 2012

The end of the year and beginning of a new year is always a busy time for us, as it is for most of our clients