We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 51

The Smartphone: A Treasure Trove of Evidence in Trade Secret Cases
  • Seyfarth Shaw LLP
  • USA
  • July 13 2017

It’s hard to believe the first smartphone was released over 20 years ago. At that time, few thought it would become such an integral part of our lives


Why Healthcare and Life Sciences Companies Need to Step Up Their Compliance Efforts in Advance of a U.S. Government Investigation
  • Hogan Lovells
  • USA
  • May 8 2017

In this hoganlovells.com interview, Hogan Lovells partner Gejaa Gobena discusses how the perception of compliance, remediation, and self-disclosure


Smartphone blunders in the workplace
  • Seyfarth Shaw LLP
  • USA
  • November 16 2016

In a world where smart phones and apps are evolving faster than you have time to update them, it’s important to take a moment to reflect on the


Turkey Establishes Specialty Department for Investigating Digital Forensics
  • Moroğlu Arseven
  • Turkey
  • September 20 2016

Turkey has established a new specialty area for investigating digital forensics in the wake of the 90 day of State of Emergency declared on 21 July


Notarization for Evidence in Labor Disputes
  • King & Wood Mallesons
  • China
  • August 12 2016

Notarization for evidence means the extraction, storage, fixing, description of the evidences and the behavior processes which are related to the


Japanese enforcer increasingly relying on digital forensics, JFTC officials say
  • PaRR
  • Japan
  • October 16 2015

Investigators at the Japan Fair Trade Commission (JFTC) are using more digital forensics, and the increased use of corporate data on cloud-based


A desk guide to data protection and breach response - part 4
  • Haynes and Boone LLP
  • USA
  • March 6 2014

Once your company becomes aware of a suspected data breach, time is of the essence. Losses from the breach are likely mounting, the clock is running


Protect your IP: hashing your passwords
  • Briggs and Morgan
  • USA
  • July 20 2012

The legal system provides civil litigation as a means for vindicating IP rights that have been violated


The use of digital forensics in trade secret matters (Part 2 of 3)
  • Seyfarth Shaw LLP
  • USA
  • May 23 2012

This post is designed to build on Part 1 of this three part series on digital forensics


Got forensics? The use of digital forensics in trade secret matters
  • Seyfarth Shaw LLP
  • USA
  • April 2 2012

In today’s world, the amount of communication is astronomical