Presented by Jennifer E. Novoselsky, Reyes Kurson, Ltd. at 2018 NAMWOLF Conference
A company’s client lists and related intelligence, such as risk tolerance or purchasing history, are extremely valuable and must be protected. This program will explore the application of trade secret law to client lists, provide practical steps to safeguard these lists and quickly detect misappropriation, and identify the litigation options available when a former employee pilfers the company client list and uses it to solicit clients. With a Chicago pop culture theme, the program will help you answer three critical questions: (1) Are my client lists and information protected trade secrets? (2) What steps should the company take to protect this information and our client relationships? (3) Our employee just resigned, copied our client list and is soliciting our customers – how can I stop her?
Effective legal representation of innovators and inventors requires careful thought and consideration. Among other things, care must be taken to properly initiate communications, prepare assignments, and handle subsequent legal disputes. This webinar discusses common legal issues that often arise during the representation of innovators and inventors. It also includes valuable advice from both innovators/inventors and the IP attorneys who represent them.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/legal-issues-for-innovators-inventors-2021/
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
The GDPR changed the way the world collects, stores, and sends personal data.The GDPR is a broad EU regulation that requires businesses to protect the personal data of EU citizens, whether the business itself is in the EU or elsewhere. Since its implementation in 2018, companies that collect data on EU citizens must comply with strict rules for the protection of personal data or face heavy fines for non-compliance. This webinar will provide an overview of GDPR’s applicability and requirements, as well as how your organization may meet those standards.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-eu-general-data-protection-regulation-planning-implementation-and-compliance-2021/
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013RightScale
Speaker: Phil Cox - Director of Security and Compliance, RightScale
On January 25, 2013, the U.S. Department of Health and Human Services (HHS) released the final implementing regulations for many provisions of the HITECH Act (Health Insurance Technology for Economic and Clinical Health Act), often referred to as the Omnibus Rule. Many organizations have based their architectures and implementations on previous proposed and interim regulations, some of which are no longer valid. Anyone falling under HIPAA requirements is required to meet these new definitive compliance requirements by September 23, 2013. This talk will discuss the parts of the Omnibus rule that affect the cloud landscape, and how you can successfully deploy a HIPAA-compliant application in the public cloud.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
The scope of vendor or third-party requirements has significantly grown due to the global pandemic we’re living in. Not only are you working to ensure your vendor management efforts will result in compliance with GDPR, CCPA and other privacy regulations, now you must consider privacy risks associated with COVID-19.
Regulations have specific provisions that address vendors and extend companies’ data privacy obligations throughout their supply chains. Organizations need to be able to collect, maintain and track critical data for ongoing vendor management in order to properly evaluate, monitor and track their status.
This webinar will provide:
-Overview of privacy laws and regulations (i.e., CCPA, GDPR) and corresponding vendor and third-party requirements
-Summary of vendor management processes and how they can be supplemented to specifically address data privacy and security risks
-Best practices for managing data privacy in your vendor network
-Guidance on how to build & manage your vendor privacy management program with practical solutions
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
What is CCPA? The California Consumer Privacy Act increases the transparency of the collection and selling of physical and digital data, while providing California residents with more control over what happens to their personal information that companies collect. CCPA is approaching with a compliance deadline of January 2020. With the countdown to compliance less than 6 months away it’s critical to know how this can potentially impact your business in order to avoid violation fines. Join our webinar as we unpack the key requirements and considerations to keep in mind in order to stay compliant. See how CCPA impacts all advertisers, not just Californians.
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
Joe Youssef provides an insightful overview of the California Consumer Privacy Act (CCPA) that will take into effect in 2020. This presentation explores the key principles of the CCPA and how brands can prepare to ensure they are compliant with the policy.
Effective legal representation of innovators and inventors requires careful thought and consideration. Among other things, care must be taken to properly initiate communications, prepare assignments, and handle subsequent legal disputes. This webinar discusses common legal issues that often arise during the representation of innovators and inventors. It also includes valuable advice from both innovators/inventors and the IP attorneys who represent them.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/legal-issues-for-innovators-inventors-2021/
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
The GDPR changed the way the world collects, stores, and sends personal data.The GDPR is a broad EU regulation that requires businesses to protect the personal data of EU citizens, whether the business itself is in the EU or elsewhere. Since its implementation in 2018, companies that collect data on EU citizens must comply with strict rules for the protection of personal data or face heavy fines for non-compliance. This webinar will provide an overview of GDPR’s applicability and requirements, as well as how your organization may meet those standards.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-eu-general-data-protection-regulation-planning-implementation-and-compliance-2021/
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013RightScale
Speaker: Phil Cox - Director of Security and Compliance, RightScale
On January 25, 2013, the U.S. Department of Health and Human Services (HHS) released the final implementing regulations for many provisions of the HITECH Act (Health Insurance Technology for Economic and Clinical Health Act), often referred to as the Omnibus Rule. Many organizations have based their architectures and implementations on previous proposed and interim regulations, some of which are no longer valid. Anyone falling under HIPAA requirements is required to meet these new definitive compliance requirements by September 23, 2013. This talk will discuss the parts of the Omnibus rule that affect the cloud landscape, and how you can successfully deploy a HIPAA-compliant application in the public cloud.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
The scope of vendor or third-party requirements has significantly grown due to the global pandemic we’re living in. Not only are you working to ensure your vendor management efforts will result in compliance with GDPR, CCPA and other privacy regulations, now you must consider privacy risks associated with COVID-19.
Regulations have specific provisions that address vendors and extend companies’ data privacy obligations throughout their supply chains. Organizations need to be able to collect, maintain and track critical data for ongoing vendor management in order to properly evaluate, monitor and track their status.
This webinar will provide:
-Overview of privacy laws and regulations (i.e., CCPA, GDPR) and corresponding vendor and third-party requirements
-Summary of vendor management processes and how they can be supplemented to specifically address data privacy and security risks
-Best practices for managing data privacy in your vendor network
-Guidance on how to build & manage your vendor privacy management program with practical solutions
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
What is CCPA? The California Consumer Privacy Act increases the transparency of the collection and selling of physical and digital data, while providing California residents with more control over what happens to their personal information that companies collect. CCPA is approaching with a compliance deadline of January 2020. With the countdown to compliance less than 6 months away it’s critical to know how this can potentially impact your business in order to avoid violation fines. Join our webinar as we unpack the key requirements and considerations to keep in mind in order to stay compliant. See how CCPA impacts all advertisers, not just Californians.
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
Joe Youssef provides an insightful overview of the California Consumer Privacy Act (CCPA) that will take into effect in 2020. This presentation explores the key principles of the CCPA and how brands can prepare to ensure they are compliant with the policy.
Building Consumer Trust through Individual Rights / DSAR ManagementTrustArc
Perhaps the most customer facing and public compliance requirements for GDPR, CCPA and LGPD are around the rights of the data subject, often referred to as individual rights or data subject access requests (DSARs). These regulations have significantly increased the requirements on businesses regarding how they address individual rights and related requests, specifically the type of requests they need to address and the timeline and process they need to follow in order to fulfill the requests.
In order to build consumer trust and fulfil data subject rights requirements, organizations must have a consistent and streamlined process for the intake and management of consumer requests.
This webinar will review:
-Summary of data subject rights requirements for GDPR, CCPA & LGPD
-Best practices and tips to comply
-Practical steps for implementing a Data Subject Rights -Management program along with sample case studies
California Consumer Privacy Act - What You Need To KnowTokenEx
The California Consumer Privacy Act (AB 375, or CCPA for short) is a law passed by California’s state legislature in June of 2018. The new law will likely have major implications for organizations that obtain, process, or store the personal data of any California resident.
Common Data Protection Issues in Managing M&A DealsMatheson Law Firm
This article explores the potential application of the GDPR in running a typical Irish merger or acquisition and sets out some practical guidelines on how parties to the transaction can demonstrate compliance with the GDPR requirements.
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Don’t miss this chance to catch up on recent developments under whistleblower reward and whistleblower protection laws, including developments under the whistleblower provisions of the Dodd-Frank Act, the Sarbanes-Oxley Act, and False Claims Act. Our experienced faculty panel will provide you with practical insights on the following issues:
Impact of Supreme Court’s decision in Somers v. Digital Realty Trust on corporate whistleblowers and corporate compliance programs
Recent SEC whistleblower awards
Trend in DOL Administrative Review Board and federal court decisions on the scope of Sarbanes-Oxley protected conduct
The impact of the Supreme Court’s decision in Universal Health Services v. United States ex rel. Escobar on implied certification claims
The scope of the False Claims Act’s anti-retaliation provision and the interplay of whistleblower reward and whistleblower protection claims
Best practices for investigating and responding to whistleblower disclosures and
Tips for representing whistleblowers at the DOJ, SEC, CFTC, and IRS.
Draft Bill on the Protection of Personal DataRenato Monteiro
Presentation given at the DataGuidance´s webinar "Brazil: Towards Privacy Compliance", about the Brazlian Draft Bill for the Protection of Personal Data (Anteprojeto de Lei para a Proteção de Dados Pessoais) issued in January 2015, which introduced concepts such as Data Protection Officer and Binding Corporate Rules.
Pending legislation in Congress wuold protect whistleblowing about cybersecurity and data privacy. In the interim, some existing federal and state whistleblower protection laws provide limited protection for cybersecuriity and data privacy whistleblowing.
Watch the on-demand webinar: https://info.trustarc.com/WB-2019-10-23-CCPASurvivalGuideMasteringConsentDoNotSellConsumerRightsandLookBackRequirements_RegPage.html
The CCPA compliance deadline is fast approaching. Whether you are just starting, or have been working on your program for months, chances are you are having a lot of last minute implementation questions. Join this session to hear from a panel of industry experts who have been working on the front lines with companies of all sizes across all industries as they share tips and best practices on how to handle key aspects of CCPA compliance. You will also have the opportunity to ask the experts questions.
This webinar will provide:
-Tips on how to implement Do Not Sell and manage consumer rights requests
-Best practices and tools to support look back reporting requirements
-Updated guidance on the latest CCPA requirements changes
This is a presentation comparing the high level differences between the General Data Protection Regulation (GDPR) of the european union and the recently enacted California Consumer Privacy Act (CCPA). The presentation covers topics such as recent events in data privacy, who must comply with the laws, what is considered personal information, and requirements that organizations must follow under both laws.
The CCPA is set to be the toughest privacy law in the United States and a trailblazer for future state and potentially federal legislation. The Act expands the rights of consumers and requires businesses falling within its scope to be significantly more transparent about how they collect, use, and disclose personal information. Any business in scope are required to enhance their data management practices, expand their individual rights processes, and update their privacy policies by the 2020 deadline.
This webinar will review:
-10 step plan to reach CCPA compliance by the end of the year
-Key areas still under discussion and feedback from open forums
-How enforcement will work; private action and regulator enforcement
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
This class will provide students with a defined roadmap and checklist of steps one may take when presented with the specter of trade secret related significant business threats. Important subjects covered in the class include defining “win” scenarios upfront to avoid mission creep, working with outside counsel and a 3rd party computer forensic expert, the identification, preservation and analysis of evidence to inform appropriate actions, special considerations for handling of smartphone based evidence, leveraging evidence derived from smartphones, reasonable steps to take to preserve attorney-client communication security, and the acquisition of phone and text records via a subpoena.
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
Building Consumer Trust through Individual Rights / DSAR ManagementTrustArc
Perhaps the most customer facing and public compliance requirements for GDPR, CCPA and LGPD are around the rights of the data subject, often referred to as individual rights or data subject access requests (DSARs). These regulations have significantly increased the requirements on businesses regarding how they address individual rights and related requests, specifically the type of requests they need to address and the timeline and process they need to follow in order to fulfill the requests.
In order to build consumer trust and fulfil data subject rights requirements, organizations must have a consistent and streamlined process for the intake and management of consumer requests.
This webinar will review:
-Summary of data subject rights requirements for GDPR, CCPA & LGPD
-Best practices and tips to comply
-Practical steps for implementing a Data Subject Rights -Management program along with sample case studies
California Consumer Privacy Act - What You Need To KnowTokenEx
The California Consumer Privacy Act (AB 375, or CCPA for short) is a law passed by California’s state legislature in June of 2018. The new law will likely have major implications for organizations that obtain, process, or store the personal data of any California resident.
Common Data Protection Issues in Managing M&A DealsMatheson Law Firm
This article explores the potential application of the GDPR in running a typical Irish merger or acquisition and sets out some practical guidelines on how parties to the transaction can demonstrate compliance with the GDPR requirements.
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Don’t miss this chance to catch up on recent developments under whistleblower reward and whistleblower protection laws, including developments under the whistleblower provisions of the Dodd-Frank Act, the Sarbanes-Oxley Act, and False Claims Act. Our experienced faculty panel will provide you with practical insights on the following issues:
Impact of Supreme Court’s decision in Somers v. Digital Realty Trust on corporate whistleblowers and corporate compliance programs
Recent SEC whistleblower awards
Trend in DOL Administrative Review Board and federal court decisions on the scope of Sarbanes-Oxley protected conduct
The impact of the Supreme Court’s decision in Universal Health Services v. United States ex rel. Escobar on implied certification claims
The scope of the False Claims Act’s anti-retaliation provision and the interplay of whistleblower reward and whistleblower protection claims
Best practices for investigating and responding to whistleblower disclosures and
Tips for representing whistleblowers at the DOJ, SEC, CFTC, and IRS.
Draft Bill on the Protection of Personal DataRenato Monteiro
Presentation given at the DataGuidance´s webinar "Brazil: Towards Privacy Compliance", about the Brazlian Draft Bill for the Protection of Personal Data (Anteprojeto de Lei para a Proteção de Dados Pessoais) issued in January 2015, which introduced concepts such as Data Protection Officer and Binding Corporate Rules.
Pending legislation in Congress wuold protect whistleblowing about cybersecurity and data privacy. In the interim, some existing federal and state whistleblower protection laws provide limited protection for cybersecuriity and data privacy whistleblowing.
Watch the on-demand webinar: https://info.trustarc.com/WB-2019-10-23-CCPASurvivalGuideMasteringConsentDoNotSellConsumerRightsandLookBackRequirements_RegPage.html
The CCPA compliance deadline is fast approaching. Whether you are just starting, or have been working on your program for months, chances are you are having a lot of last minute implementation questions. Join this session to hear from a panel of industry experts who have been working on the front lines with companies of all sizes across all industries as they share tips and best practices on how to handle key aspects of CCPA compliance. You will also have the opportunity to ask the experts questions.
This webinar will provide:
-Tips on how to implement Do Not Sell and manage consumer rights requests
-Best practices and tools to support look back reporting requirements
-Updated guidance on the latest CCPA requirements changes
This is a presentation comparing the high level differences between the General Data Protection Regulation (GDPR) of the european union and the recently enacted California Consumer Privacy Act (CCPA). The presentation covers topics such as recent events in data privacy, who must comply with the laws, what is considered personal information, and requirements that organizations must follow under both laws.
The CCPA is set to be the toughest privacy law in the United States and a trailblazer for future state and potentially federal legislation. The Act expands the rights of consumers and requires businesses falling within its scope to be significantly more transparent about how they collect, use, and disclose personal information. Any business in scope are required to enhance their data management practices, expand their individual rights processes, and update their privacy policies by the 2020 deadline.
This webinar will review:
-10 step plan to reach CCPA compliance by the end of the year
-Key areas still under discussion and feedback from open forums
-How enforcement will work; private action and regulator enforcement
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
This class will provide students with a defined roadmap and checklist of steps one may take when presented with the specter of trade secret related significant business threats. Important subjects covered in the class include defining “win” scenarios upfront to avoid mission creep, working with outside counsel and a 3rd party computer forensic expert, the identification, preservation and analysis of evidence to inform appropriate actions, special considerations for handling of smartphone based evidence, leveraging evidence derived from smartphones, reasonable steps to take to preserve attorney-client communication security, and the acquisition of phone and text records via a subpoena.
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
Trade secrets are a more important form of an intellectual property asset than ever. Congress recently passed the Defend Trade Secrets Act of 2016, which created new federal laws that allow an owner of a trade secret to sue in federal court when its trade secrets have been misappropriated. And as technology continues to exponentially progress in the digital age of the 21st Century, the need for businesses to protect and limit access to valuable and confidential trade secret information continues to rise. The progress in technology and expansion of information also promotes means for monetizing and leveraging trade secrets. How do you identify your trade secrets, protect them, and leverage them? These are the questions this cutting-edge webinar discusses and seeks to answer.
To listen to this webinar on-demand, go to: https://www.financialpoise.com/financial-poise-webinars/leveraging-protecting-trade-secrets-2020/
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
The adoption of laws protecting the data of individuals and consumers is becoming a driving force to push organizations to revisit their security around client and personal data. In addition, with the rise of government legislated personal data protection laws such as GDPR, individuals in other jurisdictions are now looking for better personal data protection. In this presentation, we will examine two US laws as well as the ISO/IEC 27001 standard and we will look at commonalities and differences between these three and how data security is driven from each.
The webinar will covered:
• An overview of the state of data security/privacy today
• Current trends driving adoption of stronger data protection standards/laws
• An overview of data protection in ISO/IEC 27001, CCPA, and the NYC Shield Act
• A comparison of ISO/IEC 27001, CCPA and the NYC Shield Act
• Lessons to be applied
Recorded webinar:
Leveraging & Protecting Trade Secrets in the 21st Century (Series: Intellectu...Financial Poise
Trade secrets are a more important form of an intellectual property asset than ever.
Congress recently passed the Defend Trade Secrets Act of 2016, which created new federal laws that allow an owner of a trade secret to sue in federal court when its trade secrets have been misappropriated. And as technology continues to exponentially progress in the digital age of the 21st Century, the need for businesses to protect and limit access to valuable and confidential trade secret information continues to rise. The progress in technology and expansion of information also promotes means for monetizing and leveraging trade secrets.
How do you identify your trade secrets, protect them, and leverage them? These are the questions this cutting-edge webinar discusses and seeks to answer.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/leveraging-protecting-trade-secrets-in-the-21st-century-2021/
This course provides an overview of whistleblower protections for employees who blow the whistle on cybersecurity or data privacy concerns. And it offers practical tips and insights for practitioners on how to evaluate potential cybersecurity whistleblower claims and overlapping remedies to maximize damages. In addition, the course addresses the challenging issues that arise when a whistleblower simultaneously prosecutes both whistleblower retaliation and whistleblower rewards claims.
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Trade secret theft is a hot topic among companies today. Winston & Strawn attorneys David Enzminger, Sheryl Falk, and John Keville have successfully prosecuted trade secret cases across the US. In this dynamic presentation, these experienced attorneys shared practical advice to help you navigate your trade secret issues.
In this presentation, Catherine Coulter discusses the Federal Privacy Law and how this can affect your company. Touching on privacy in corporate transactions, Canada-USA cross border data transfers and the Federal Privacy Commissioner Guidelines, learn how to act if your organization finds itself in a breach situation.
What You Need To Know About Privacy - Now!Now Dentons
This presentation gives an update on Federal Privacy Law, privacy in corporate transactions, Canada-USA Cross-Border Data Transfers and federal privacy commissioner.
Future-Proof Your Workplace Privacy Approach for CPRA and BeyondTrustArc
The California Privacy Rights Act (CPRA) is coming fast and even companies currently complying with the California Consumer Privacy Act (CCPA) will face new challenges, including the protection of human resource (HR) data, something previously exempt under the CCPA.
Before the CPRA comes into effect, HR professionals need to be prepared to understand and comply with this new legislation. While employers’ were previously obligated to provide disclosure notices, they will now be required to provide their employees with the right to access, correct, and delete data.
Explore what employers need to consider to be compliant with CPRA.
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
HIPAA's implications for privacy and security practices in American businesses, addressed in March of 2001 at the Employers' Summit on Health Care, by Stephen Cobb, CISSP. Uploaded in 2014 for the historical record.
Cybersecurity, Privacy and Data Security from a Business Lawyer's PerspectiveData Con LA
Data Con LA 2020
Description
The presentation includes a discussion of data breach cases and the takeaways from these cases, i.e., that no companies (large, medium or small) are immune from liability. I discuss the potential impact of a data breach on a business and the steps that businesses can take to protect themselves along the timeline of a breach (i.e, before, during and after.) I discuss the FTC's role in the regulation and enforcement of actions related to data security and data breaches, and talk about the commercially reasonable standard that the FTC applies to determine liability, what that standard means from a legal perspective, and how it relates to data security measures and cyber insurance. I present examples of practices that the FTC has found to be commercially unreasonable and discuss what security experts have deemed to be some of the best practices when it comes to data security. I also discuss businesses' liability for their vendor's data breaches, cyber insurance and current and future data security and privacy regulations and legislation including the GDPR and CCPA.
The objectives of the presentation are to:
1) ensure that attendees know that they are exposed to risk in the area of cybersecurity and data breaches;
2) provide them with information to minimize that risk;
3) make them aware of current and expected privacy laws and regulations; and
4) provide pragmatic, specific actionable information to help enable them to comply with their legal obligations.
Speaker
Kathy Winger, Law Offices of Kathy Delaney Winger, Attorney/Owner
Data breach events result in significant losses each year. Our partners at Bonahoom & Bobilya, LLC, created a presentation about understanding the hidden regulatory risks of a data breach so you can keep your company from going out of business.
This presentation has been shared with permission.
Trade Secret and Unfair Competition - Employment IssuesQWCooper
Protecting Trade Secrets is critical for business success.
This presentation will provide a general overview of trade secrets
and unfair competition in the work place and provide some tools for companies to safeguard trade secrets and mitigate potential risks.
Trade Secret and Unfair Competition - Employment IssuesQWCooper
Protecting Trade Secrets is critical for business success.
This presentation will provide a general overview of trade secrets
and unfair competition in the work place and provide some tools for companies to safeguard trade secrets and mitigate potential risks.
Does your organization take credit card information? Do you store personal information on your staff, clients or donors. Raffa can help you avoid the pitfalls and penalties that can come from storing these privacy related items in unsecured ways.
PCI DSS, the Payment Card Industry Data Security Standard is a set of requirements designed to ensure that all companies that process, store or transmit credit card information maintain a secure environment. This applies to essentially any merchant that has a Merchant ID (MID).
HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company that deals with protected health information must ensure that all the required physical, network, and process security measures are in place and followed. This includes anyone who provides treatment, payment and operations in healthcare, and anyone with access to patient information and provides support in treatment, payment or operations.
Come learn the basics of these industry regulations, including:
-Who it applies to
-Requirements for compliance
-Penalties for noncompliance
Similar to Hey that's my client! Protecting client lists and confidential information when a star employee jumps ship. (20)
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Hey that's my client! Protecting client lists and confidential information when a star employee jumps ship.
1. HEY, THAT’S MY CLIENT!
PROTECTING CLIENT LISTS AND CONFIDENTIAL
INFORMATION WHEN A STAR EMPLOYEE JUMPS SHIP.
2. 2
The Panel
Jennifer Novoselsky
Reyes Kurson Ltd.
Cindy S. Stuyvesant
Wintrust Financial Corporation
Donyelle Gray
Illinois Human Rights Commission
Gavin McCarty
WEC Energy Group, Inc.
Anna Aguilar
Aguilar Bentley LLC
Who are these people and why are we here?
4. 4
The Uniform Trade Secrets Act (UTSA) – What is it and where has it been adopted?
• The UTSA was first published by the Uniform Law Commission in 1979, and amended
in 1985.
• The stated goals of UTSA include “clarifying and simplifying the law” and “providing
uniformity.”
• Adopted in some form by 47 states
• New York, Massachusetts and North Carolina have not adopted the UTSA as yet,
although the North Carolina Act is very similar to the UTSA.
The Uniform Trade Secrets Act
5. 5
“Trade secret” means information, including a formula, pattern, compilation,
program, device, method, technique, or process, that:
(i) derives independent economic value, actual or potential, from not
being generally known to, and not being readily ascertainable by proper
means by, other persons who can obtain economic value from its disclose or
use, and
(ii) is the subject of efforts that are reasonable under the circumstances
to maintain its secrecy.
The UTSA Definition of “Trade Secret”
6. 6
Not Very.
Approximately half the states adopting the UTSA modify the definition of “trade secret” in some
form.
•Most commonly, the Preamble of the UTSA is modified to expand the list of information that
“may” qualify for trade secret protection, including “a list of actual or potential customers.”
See, e.g., 765 ILCS § 1065/2(d).
•However, this does not fundamentally change the analysis of whether a client list will be a
trade secret: it still must meet the requirements identified in the UTSA.
How “Uniform” Is the “Uniform” Definition of Trade Secret?
7. 7
Governed by common law, “trade secrets” are generally defined as:
“any formula, pattern, device or compilation which is used in one’s business, and which gives
[the owner] an opportunity to obtain an advantage over competitors who do not know or use it.”
Definition of Trade Secret – Non-UTSA
8. 8
In Plain English – What does “trade secret” mean?
•For any information – including client/customer lists – to fall within the
definition of trade secret, courts will require the information to:
(a) have independent economic value, actual or potential;
(b) not be generally known to other persons who would benefit from it;
(c) not be readily ascertainable by proper means; and
(d) subject to reasonable efforts to maintain secrecy.
•Courts frequently blend – appropriately – the elements evaluating whether the
information is publicly known and not ascertainable by proper means.
9. 9
• Despite general agreement as to factors to consider when determining if information qualifies as a trade
secret, application varies widely based on the facts of the case as well as the jurisdiction.
As one court aptly observed, “The concept of a trade secret is at best a nebulous one.”
• For this reason, many courts also consider the six (6) factors
identified in a comment to the Second Restatement of Torts
and utilized by non-UTSA adopting jurisdictions.
Fact Specific Inquiry Without Brightline Rules
10. 10
Client/Customer Lists Are Subject to Same “Nebulous” Standard
•Client lists are not entitled to blanket protection as trade secrets. Instead, the content of
the list, its treatment by the company, and the availability (or lack thereof) of the information contained on
the list from other sources are key considerations.
Client Lists Too?!
11. 11
What is the DTSA?
•The DTSA, 18 U.S.C. § 1831 et seq., provides a
federal cause of action to the owner of a trade
secret that is misappropriated and is related to a
product or service used in, or intended for use in,
interstate or foreign commerce.
The Defend Trade Secrets Act of 2016
12. 12
Information is protectible as a trade secret under the DTSA if:
•the owner of the information “has taken reasonable measures to keep such
information secret;” and
•“the information derives independent economic value, actual or potential, from not
being generally known to, and not being readily ascertainable through proper means
by, another person who can obtain economic value from the disclosure of use of the
information.”
18 U.S.C. § 1839(5).
How Does the DTSA Define “Trade Secret?”
14. 14
It cannot be emphasized enough:
if you want your client list to be
afforded trade secret protection,
you must treat it that way.
It seems obvious, but… keep your secrets actually secret
15. 15
Absolute secrecy not required.
Reasonable Efforts and Measures: Instead, the relevant inquiry is whether “reasonable” efforts
were made to maintain its secrecy “under the circumstances” (UTSA) or whether “reasonable
measures” were taken to protect the information (DTSA).
Roxie: “But he was trying to burgle me!”
Harrison: “From what I hear, he’s been burgling you three times
a week for the past month.”
What Level of Security is Actually Required?
16. 16
While there are no explicit requirements set forth in the relevant statutes, courts
often consider whether:
(1) the employee was required to sign a confidentiality agreement;
(2) the company’s policy, procedures and/or employee handbook identifies the information as
confidential;
(3) employees received reminders of company policies regarding confidentiality;
(4) access to the information was limited to those employees with a “need to know;”
(5) procedures were in place to monitor efforts to access the information; and
(6) the company has a secure network and physical facility.
Measures to Protect “Secret” Information
17. Our Former Employee Copied Our Client List And Is Soliciting – What
Do We Do Before We Sue?
18. 18
Identify precisely what information was taken.
Did anyone else receive the information?
•Was it sent to competitors?
•New employers?
Stop the leak!
•Determine how the breach occurred
•Have any additional employees accessed similar information in the same time period?
•In short – lock it down.
Implement Document Preservation Measures.
•While companies always hope to avoid litigation, it is crucial to be prepared and ensure that any
potentially relevant documents are preserved.
We Have a Breach – What To Do Now
19. 19
•Determine if the former employee executed a non-solicitation, non-compete
and/or non-disclosure agreement.
•If so, identify the provisions of the agreement concerning accessing and
utilizing “confidential” company information.
•Pay particular attention to whether the specific type of information – here,
client lists – is included in the definition of “confidential” or “proprietary”
information.
Do you have a non-compete or non-solicitation agreement?
20. 20
It is essential to send a cease and desist letter as soon as possible following discovery of breach.
Who should receive the letter?
•The former employee, of course, must receive the letter.
•New employer? If you have reason to believe the new employer is aware of the misappropriation, it is appropriate
to send the cease and desist to the new employer as well.
What should be contained in the letter? At minimum:
•demand return of misappropriated information;
•destruction of any original documents and physical or electronic copies in the possession of the former employee;
and
•demand that the former employee cease and desist from utilizing the misappropriated information to solicit
customers.
Cease and desist
22. 22
Choice of law.
•UTSA or DTSA claims follow the traditional choice of law analysis.
•Choice of law and forum selection clauses, often contained in employment agreements, will
also be enforced.
Defendants.
•Former Employee.
•New Employer? Depends on the facts. Generally, third parties – such as new employers –
may be found liable for misappropriation when they have actual or constructive knowledge
of the misappropriation.
Procedural Considerations
23. 23
Preliminary Injunctions & Emergency Relief: Time is of the essence.
Claims arising under the UTSA almost always require filing for a TRO or a Preliminary Injunction.
•Likelihood of Success on the Merits: This will be discussed in a subsequent sections.
•Irreparable Harm.
•Common non-compete/non-solicitation agreements
include provisions providing that a breach of the relevant
provision will cause the non-breaching party irreparable harm.
•Courts routinely recognize that the loss of clients and client
goodwill may cause irreparable harm.
Our Lady of Blessed Acceleration, don’t fail me now.
Procedural Considerations
24. 24
While specific elements or the description of these elements will
vary by jurisdiction, in general, a plaintiff must establish two
things:
•the existence of a trade secret; and
•misappropriation (i.e., acquisition by improper means).
Elements - Misappropriation of Trade Secrets
25. 25
Remember, client lists are not entitled to blanket protection as trade secrets.
The same key questions courts ask when evaluating whether any type of information is a trade
secret apply to client lists:
•Does the client list have independent economic value?
•Does the client list contain information that is not generally known?
•Does the client list contain information that is not readily ascertainable by those in the industry via
proper means?
•Have reasonable efforts been made to maintain the secrecy of the client list?
Is Your Client List a Trade Secret?
26. 26
•The more information, the more likely it is to be a trade secret.
•A “bare bones” client list which simply identifies the names of customers and their contact
information will usually not be considered a trade secret.
•However, trade secret status will be accorded to lists
of customers in limited circumstances, depending
on the nature of the industry. For example, a list
of purchasers of HIV medications is treated as
a trade secret, as are lists of purchasers of such
unusual goods or services that are generally not
known to even the industry at large.
How much information is on the client list?
27. 27
•Does the client list include information about customer preferences and/or
confidential personal information?
•A client list that includes additional, non-public information about the client such as credit
history, net worth, purchasing history, specific pricing information, sales volume, risk
tolerance, and other client preferences, is more likely to be afforded trade secret
protection.
•The same is true for a list that includes additional, non-public information about the
employer’s efforts to service the client, including information like costs, project staffing,
profit margin, and plans to propose expansion of services.
Does the list have confidential customer information?
28. 28
Stale data frequently fails to establish the economic value of the client/customer list.
Is the information on the client list current?
We all miss those Frango mints!
29. 29
If the information is available publicly – even if assembling it would be time-consuming – it will not
be afforded trade secret protection.
The ability of a competitor to discover the information through legitimate channels likewise often
dooms a claim that a client list is a trade secret.
Courts have rejected client list claims when the identities of the customers can be obtained
through:
• independent development,
• reverse engineering,
• licenses,
• published observations and literature,
• membership in trade associations, and/or
• simple legwork, such as searching information found on the internet or calling local businesses.
Is the information publicly available or discoverable by proper means?
30. 30
How did the company treat the client list?
Has the information been shared outside the company?
•If shared outside the company without requiring the recipient contractor, business partner or purchaser to
execute a confidentiality agreement, many courts will refuse to grant the information trade secret
protection.
Is access to the list limited to “need to know” within the company?
•Limiting the number of employees within a company who are aware of or have access to the information
tends to protect trade secret status.
Within the company, are there confidentiality agreements and policies concerning non-
disclosure in place and applicable to customer lists?
•Courts carefully analyze both whether the company has policies and procedures established to guard the
secrecy of client lists and whether those policies and procedures are adequately enforced.
31. 31
•Who developed the client list and information contained therein?
•Courts are often hesitant to afford trade secret status to a customer list that has been primarily generated by the
individual, departing employee
•How much time, effort and money was expended on developing the information?
•Courts frequently consider whether the client list and information contained therein was developed through
significant time, effort and/or expense.
Who developed the client list and how?
32. 32
Compensatory Damages
• May include actual loss caused by the misappropriation and unjust enrichment caused by the misappropriation that is not taken
into account in calculating actual loss.
• Means of calculating damages may also include lost profits or the imposition of liability for a reasonable royalty
Exemplary Damages
• The UTSA also permits a court to award exemplary damages where “willful and malicious” misappropriation is shown.
Attorneys’ Fees
I’m feeling saucy today…Do you accept cash?
What May I Recover?
33. 33
Check Your State Statute and Authority!
• Interpretation varies widely across jurisdictions. To determine whether additional causes of action are appropriate and the scope of
damages, look to the relevant state’s statute and caselaw for guidance.
Preemption. States vary significantly on how broadly they will permit the UTSA to preempt other claims.
• The majority of jurisdictions take a broad view, finding that the UTSA preempts common-law torts based on the misappropriation
of information even if that information does not meet the definition of a “trade secret” under the UTSA.
• A minority – though still significant number – of jurisdictions takes the opposite approach and concludes that the UTSA only
preempts claims involving misappropriation of information that qualifies as a “trade secret” under the statute.
Damages. States vary with respect to remedies and damages available as well.
• The issue frequently arises in connection with “unknowing misappropriation” and the question of whether monetary damages may
be imposed on an unsuspecting defendant.
• The measure of compensatory damages and the availability of punitive damages and attorneys’ fees varies by state.
Additional Causes of Action - Procedure
34. 34
Breach of Non-Compete, Non-Solicitation and/or Non-Disclosure Agreement.
• A simple breach of contract claim may be asserted based on violation of the relevant provision of the non-solicitation/non-disclosure
agreement.
Unfair Competition.
• Preemption - whether unfair competition claims are preempted by state trade secrets acts varies by state, so it is key to evaluate the
relevant jurisdiction’s statute and caselaw. If not preempted, an unfair competition claim may be asserted in connection with a
misappropriation of a client list.
Tortious Interference with Contract/Business Advantage.
• These claims may be asserted against the new employer in limited circumstances. This claim is most frequently asserted when the
employee has a non-compete/non-solicitation/non-disclosure agreement with their former employer and: (1) the new employer is aware
of that contract; (2) the new employer intentionally or improperly procures the breach; and (3) the former employer loses customers as a
result. The sticking point is most commonly the third element – intentional or improper procurement of a breach.
Conversion.
• A claim for conversion may be asserted arising from the deprivation of the company’s right in, or use or possession of, its property – the
client list – without its consent and without justification. While specific conversion elements will vary by jurisdiction, this claim if often
included despite the likelihood of preemption should the court reach a decision on the merits.
Causes of Action Frequently Included in Misappropriation Complaint