This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
He has written and spoken widely on copyright, privacy and other areas of technology law. In 2015, he authored The Duty of Confidentiality in the Surveillance Age, 17 J. Kim Thomas, HLS '99, is a Clinical Professor of Law at the University of Michigan Law School, where she has taught since 2003. Internet L.
He has written and spoken widely on copyright, privacy and other areas of technology law. In 2015, he authored The Duty of Confidentiality in the Surveillance Age, 17 J. Kim Thomas, HLS '99, is a Clinical Professor of Law at the University of Michigan Law School, where she has taught since 2003. Internet L.
Upon that, The IPKat is delighted to host the following guest post co-authored by Anja Geller (PhD candidate at Ludwig-Maximilians-Universität and Junior Research Fellow at the Max Planck Institute for Innovation and Competition) and Zihao Li (PhD candidate at CREATe, University of Glasgow, on privacy and data protection in the Chinese Civil Code).
Vs timepiece Communication Pvt Ltd on 27 March 2003. Law action of breach of confidence- On a breach of confidence, the Court would think about an aggrieved party’s request for an injunction and damages. In Zee Telefilms Ltd.
No broader than necessary to protect one or more of the following legitimate business interests: The employer’s trade secrets; The employer’s confidential information that does not qualify as a trade secret; or. The employer’s goodwill. Vega III , 136 D.P.R. Pérez Rivera , 159 D.P.R.
We organize all of the trending information in your field so you don't have to. Join 9,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content