Go to Top

Tag Archives

Tag Archives: Trade Secrets

Shocking Survey Reveals Only 31% of Organizations are Prepared for a Trade Secret Misappropriation

Baker McKenzie Survey Exposes Board-Level Risks that Companies are NOT Prepared For[1] The scenario Your client’s IT Director tells his boss that he has observed suspicious behavior on the company’s network. It seems a senior software code designer for the high-speed securities trading company is downloading massive volumes of proprietary trading software code and copying it to a CD burner. Not good. The employee has recently complained about the strategic …Read More

Is Your Data Secure In Our ‘Internet Of Things’ World?

Think Halloween is scary?  How about a hacker shutting down your pacemaker? The Chief Information Security Officer of the Year Award Breakfast is always a great opportunity to learn more about what is keeping elite CISOs up at night.  The annual event brings together a who’s who of the most talented information security executives from America’s best companies.  This year’s program was no exception, and we were honored to be …Read More

An Executive Resigns: Misconduct Suspected, Employer Cannot Access Evidence on His Mobile Phone

“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today.  We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one of their smart phones after the user of the phone, a key executive suspected of misconduct, abruptly resigned.  Why?  Because the device, a newer Apple iPhone, was password protected and …Read More

Your Law Firm Has Just Suffered a Data Breach…Do you Tell Your Clients?

Recent Law Firm Data Breaches are Reigniting This Debate Cyber attacks against some of the country’s top law firms are creating fresh concerns about protecting client data, and when lawyers should advise their clients that a breach has occurred. The Wall Street Journal has reported that hackers have attacked the networks of Cravath Swaine & Moore LLP,  Weil Gotshal & Manges LLP, and others.  While the motives of the hackers …Read More

Deepwater Horizon Revisited: Computer Fraud & Abuse is One of the Few Criminal Convictions in This Case

Engineer’s Guilty Plea for Deleting Text Messages Stands Out in a Series of Not Guilty Findings In the months following the 2010 BP Deepwater Horizon oil rig disaster, 52 criminal counts were filed against 5 men that prosecutors believed were criminally responsible for the explosion and resulting deaths of 11 people.  Of those 52 charges, 23 were withdrawn, 23 were dismissed, and jurors acquitted on three counts.  Last week the …Read More

For Sale: Your Stolen Pre-Released Press Releases!

Hackers Busted Selling Press Releases to Traders – How Secure is Your Vendor’s Info Security?    In light of the rash of data security events in the last few years, your company has invested heavily in upgraded security hardware and software.  In addition, you recently completed a comprehensive security awareness training program for all your employees, reinforcing the importance of data security (in particular, reminding them not to open those …Read More

Are Your Trade Secrets Safe in Our New Mobile World?

Tablets and Smart Phones Have Out-Shipped Laptops for the First Time Ever Mobile device use in the workplace is changing the landscape of Computer Forensics and Electronic Discovery like never before. The opportunities for investigators and litigation attorneys are significant, and they are encountering a whole new world of electronic evidence…and new ways to find that “smoking gun” we always hear about. Consider this… More tablets and smart phones were …Read More

BYOD: The #1 eDiscovery Challenge for Inside Counsel

Jeffrey Hartman Partner, 4Discovery @Jeff4Discovery   Survey of inside counsel at Fortune 1,000 companies highlights growing BYOD fears The Scenario You are the general counsel of an investment firm, and have recently learned that your company has been accused of trade secret misappropriation by a competing firm.  It seems that the 9 traders your company has recently recruited from a competitor may have brought client lists and other trade secrets …Read More

Breakfast Discovery

Half of all employees say they would take Trade Secrets with them to a new employer[1] Join the experts at 4Discovery as we examine eDiscovery trends and tips over breakfast at the beautiful Union League Club.   Each month, our computer forensics and eDiscovery team will provide a brief presentation on “Tips from the Trenches” and eDiscovery trends that are important to your practice. This month’s session focuses on Trade …Read More

Computer Fraud and Abuse Act (CFAA) Does it still make sense?

Good laws badly applied are still good laws. There has been much-needed debate over the relevance of the Computer Fraud and Abuse Act (CFAA) in light of Aaron Swartzʼ recent tragic suicide. Mr. Swartz, you will recall, was a young technology entrepreneur accused of inappropriately downloading millions of scientific journals from MIT and JSTOR, a journal storage repository. Swartz, 26, had been an advocate for open access and the freedom …Read More