This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Privacy breaches are becoming commonplace in today’s business landscape and cybersecurity is top of mind for many organizations— and for good reason. This situation is exacerbated by the risk of litigation, as lawsuits are a legitimate consequence of a privacy breach.
Several years ago, the Privacy Commissioner of Canada filed a reference with the federal court in a case that was billed as settling the “right to be forgotten” privacy issue. His client – whose identity remains confidential under order of the court – filed the complaint that ultimately led to federal court decision.
And Other Connected Cases while deciding on a litany of 9 litigations. Among other issues, the Court dealt with the question of, whether “ Publishers of judgments, like Indian Kanoon, and other law journals, have no right to publish the details of parties ignoring the privacy rights of litigants which includes their right to be forgotten.”
I worked within the legal team, under the supervision of Denise Lacombe, Head of Legal and collaborated with Lynne Sweeney, Legal Counsel and Cristina Aguirre, Privacy Officer as well. Once the patent expires, the product’s position in the marketplace is compromised as generics can enter without risking infringement litigation.
A settlement agreement was reached where Elation could inspect the software developed by Shi and prevent the use of any trade secrets or confidential information. Elation is an important decision for California companies suing to recover and prevent the use of confidential information in violation of confidentiality agreements or NDAs.
Companies now use generative AI tools to streamline innovation, expedite the patenting process, and generate unique ideas while ensuring the confidentiality of valuable IP assets. This is where platforms like IQ Ideas+ excel, providing a secure, closed ecosystem where data remains confidential and entirely within the organization’s control.
Unlocking Your Team’s Full Creative Potential Compass AI unique approach allows organizations to unleash their full creative potential while ensuring the security and privacy of proprietary solutions. Unlike other tools, Compass AI operates in a closed, secure environment that prioritizes data confidentiality.
Modification of the SPO: Under the SPO, which is automatically entered in all inter partes proceedings, only outside counsel have access to confidential material and information that is designated as AEO. In short, the Board has an interest in "protecting confidential information and protecting against its inappropriate release."
Seyfarth’s Commercial Litigation practice group is pleased to present the fourth annual installment of the Commercial Litigation Outlook, which provides insights on litigation issues and trends to expect in 2024. Register for the 2024 Commercial Litigation Outlook Webinar Series Dates and details are below.
The complaint, filed on January 20, 2023, alleges that State Farm illegally submitted personal and confidential information about Plaintiffs’ insurance claims, including medical treatment information, to Verisk / ISO for inclusion in an immense database it maintains. Privacy is the control over knowledge about oneself.
Courts have interpreted this broad legal obligation to include specific duties such as protecting confidential information and avoiding conflicts of interest. Common governance policies include: Conflict of interest policies; Codes of conduct; Confidentiality and privacy policies; Whistleblower policies; and Risk management frameworks.
In the interim order, it was found that there is a prima facie case to uphold the petitioner’s RTBF, based on (1) the protection of his right to privacy and reputation both online and offline, and (2) providing an acquitted person the right to have their name redacted and stop being identified as an accused person. News from India.
DTSA fully opened the federal courts to trade secret litigation as well as added several new features, including an ex parte seizure remedy and whistleblower immunity. David Almeling and Victoria Cundiff are two of the most experienced trade secret litigators in the nation. DTSA added to the large and growing federal caseloads.
Employers should implement a holistic strategy for protecting trade secrets at every stage of the employment relationship, from onboarding to pre-litigation enforcement efforts post-termination, with coordination between HR, Legal, IT, and other stakeholders within the company.
While the option of moving in-person proceedings to a virtual format can be even more convenient to the conventional model, this “new normal” poses a new threat to privacy. [4] This blog proposes public policy arguments and concrete solutions to the laissez-faire approach to privacy in criminal court proceedings.
Real data is hard to come by and expensive to label; using synthetic data instead is not only cheaper but also promises to sidestep the thorny issues of privacy and copyright infringement (see Lee 2024 ). Even synthetic data that comes with privacy guarantees is necessarily a distorted version of the real data.
Supreme Court of India , which dealt with issues of confidentiality, privacy (prior consent) of litigants and witnesses, restrictions on access to proceedings of trials and the preservation of the larger public interest due to the sensitivity of the proceedings. These are based on the principles set forth in Swapnil Tripathi v.
If youre a victim of the University of Michigan Matt Weiss hacking scandal, discover your legal rights, options for compensation, and how Traverse Legal’s expertise in data privacy, security, and forensics makes our law firm different. Your privacy, security, login information, and well-being may have been severely compromised.
Trade secret litigation presents a variety of procedural and practical complexities at every stage of the proceeding. The issue is further exacerbated because adverse litigants in trade secret cases are frequently industry competitors. After all, both parties likely want their sensitive documents protected from disclosure.
In his defence, he also identified the Proctorio lawsuit as part of a growing trend of “SLAPP” litigation — Strategic Lawsuits against Public Participation — intended to deter and ultimately silence outspoken critics and inhibit participation in public affairs. On March 11, 2022, the decision Proctorio, Incorporated v.
In addition to regularly reviewing IP assets, a company should regularly make sure that its privacy and data use policies comport with the manner in which it collects and uses customer and employee data. If a company conducts business internationally, it may have to adhere to the privacy laws of foreign countries.
Upon that, The IPKat is delighted to host the following guest post co-authored by Anja Geller (PhD candidate at Ludwig-Maximilians-Universität and Junior Research Fellow at the Max Planck Institute for Innovation and Competition) and Zihao Li (PhD candidate at CREATe, University of Glasgow, on privacy and data protection in the Chinese Civil Code).
On July 10th, the European Commission issued its Implementing Decision regarding the adequacy of the EU-US Data Privacy Framework (“DPF”). Since the structure of the program wasn’t the primary reason for Privacy Shield’s revocation, from a business perspective, the current DPF looks a lot like the old Privacy Shield.
alleging a pizza franchisee failed to maintain the confidentiality of Texas pizza chain CiCi Enterprises LP’s trade secrets after two affiliates inked a development deal with competitor, Papa John’s. A judge in the Northern District of Texas recently declined to dismiss a lawsuit, CiCi Enterprises LP et al. Mucho Pizza, LLC et al.
Before she hangs up her litigation gloves, her goal is to work on a case involving airplanes. Those who needed to know then had to sign a separate confidentiality agreement. This Kat loves airplanes. If that case involved trade secrets, even better.
Additionally, it also provides for measures that remedy those risks and deals with the issue of confidentiality and national security. Prosecution and Litigation: AI has emerged as a crucial instrument in the process of trademark search and clearance.
He has written and spoken widely on copyright, privacy and other areas of technology law. In 2015, he authored The Duty of Confidentiality in the Surveillance Age, 17 J. She teaches in the area of criminal law, primarily in the Civil-Criminal Litigation Clinic and the Juvenile Justice Clinic, a clinic which she directs and co-founded.
He has written and spoken widely on copyright, privacy and other areas of technology law. In 2015, he authored The Duty of Confidentiality in the Surveillance Age, 17 J. She teaches in the area of criminal law, primarily in the Civil-Criminal Litigation Clinic and the Juvenile Justice Clinic, a clinic which she directs and co-founded.
A recent decision by the Second Circuit reminds litigants that a party asserting a trade secret misappropriation claim under the federal Defend Trade Secrets Act (DTSA), or New York law, must detail in a pleading “the “reasonable measures” employed to maintain the secrecy of the alleged trade secret. CargoSprint, LLC , No.
One of the most important tools to protect your business – your ideas (copyrights, trademarks, trade secrets, confidential and proprietary information), customer relationships and talent pool – is your written contract. text: ‘Privacy’, }. }. }); }); Review Your Contracts Every Year. __ATA.initDynamicSlot({.
Invariably, businesses identify this type of information as proprietary and trade secret in their employee confidentiality agreements and handbooks and subject them to duties of confidentiality.
LinkedIn case, which up until now was the most important case in the history of US web-scraping litigation. 2019) (stating that “[t]he fact that the [confidentiality] Agreement does not state a time limitation, but instead applies forever, further supports a finding that it is unenforceable”); Howard Schultz & Assocs.
A perennial issue in trade secret litigation is: what factual allegations must be pled regarding what trade secrets are left when there are related patents from the same company on the same technology. The recent decision Safe Haven Wildlife Removal and Property Management Experts, LLC v.
These interests include business good will, trade secrets, or other confidential and proprietary information. In view of the competing interests and complex issues involved, companies should consult experienced non-compete litigation counsel before suing for enforcement. Failure to request reformation may result in a waiver.
With the ever increasing move towards remote working, more and more out-of-state employers may find themselves in a California court pursuing or defending against claims that arose from an employment agreement that was ostensibly supposed to be litigated outside of California. The Superior Court, 75 Cal. 5th 844 (2022).).
Customer Data Breach Litig., This litigation followed. California Consumer Privacy Act : The CCPA provides a private right of action for actual or statutory damages to “[a]ny consumer whose nonencrypted and nonredacted personal information. In re Blackbaud, Inc., 3:20-mn-02972-JMC, MDL No. 2972, 2021 WL 3568394 (D.S.C.
Indeed, with large swaths of the workforce working from home, spouses, roommates, or others living in the same area had an increased opportunity to purloin confidential information that might not have been available to them previously.
Seyfarth’s third installment in the 2023 Trade Secrets Webinar Series will provide valuable insights and practical tips on how to manage and safeguard your company’s confidential information in a remote work environment. As businesses continue to operate remotely, protecting trade secrets has become increasingly important.
In determining whether to keep certain records sealed, Courts must evaluate whether good cause exists to prevent access, balancing “the asserted right of access against the other party’s interest in keeping the information confidential.”
Litigators know it is generally not easy to recover attorneys’ fees in defense of a trade secret misappropriation action. TransPerfect is an important decision for trade secret litigants on both the plaintiff and defense side. ” [1] But what exactly does bad faith mean and what is the threshold? ” Id. ” Id.
” The order enjoined the defendants from “using Mallet’s confidential, proprietary and/or trade secret information in any respect” but did not explain what, exactly, constituted Mallet’s alleged trade secrets.
On June 16, and then on July 6, 2021, Connecticut Governor Ned Lamont signed into law a pair of bills that together address privacy and cybersecurity in the state.
Results: fear of potential litigation motivates permission seeking even when free speech rules would likely allow the use, e.g. in movies. A: contracts were confidential but may be able to talk about standard terms. RT: Litigated cases about influencers might have the contracts as part of the record.
In the world of IP, blockchain technologies offer real-time possibilities for IP protection, evidence and registration at either the registry stage or in the court when it comes to questions of data security and privacy concerns – a hot topic of recent times. An opt-in scheme could address the confidentiality concerns of IP owners.
We organize all of the trending information in your field so you don't have to. Join 9,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content