PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART

Size: px
Start display at page:

Download "PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART"

Transcription

1 PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART Michael G. King, Esq. (mking@hgla.com) Paul T. Martin, Esq. (pmartin@hgla.com) 4640 Admiralty Way Suite 850 Marina del Rey, CA (310)

2 INTELLECTUAL PROPERTY THEFT IS A SERIOUS PROBLEM Recent Survey Nearly 60% of Departing Employees Admitted Taking Company Data 40% Took Customer Lists 67% of Respondents Took Data to Leverage a New Job Q: How Many of Your Company s Employees Are Departing/Arriving with Data? Estimated Annual Cost of IP Theft - $250 Billion 2

3 WHO IS MOST LIKELY TO STEAL A COMPANY S IP? Insiders Employees and Contractors Employees Are Turning Over More Frequently Turnover Increases Risk of IP Theft 3

4 IMPACT OF NEW TECHNOLOGY & SOCIAL MEDIA More Tools to Take IP More Difficult to Detect/Prevent Increased Costs of Litigation 4

5 CIVIL & CRIMINAL CASES OF IP THEFT ARE COMMON Mattel Awarded $100 Million in Bratz Lawsuit Coca-Cola Secretary Convicted of Trade Secrets Theft Intel Insider Indicted for Stealing $1 Billion in Trade Secrets G-Men's Interest in Hilton's Alleged Trade Secret Theft 5

6 INTELLECTUAL PROPERTY THEFT IS A CRIME Employees/Contractors the #1 Threat to a Company s IP ISSUE - What Can In-House Counsel Do to Protect IP Amid Employee Turnover? Problem - Theft Only Evident Months After Employee Has Left Result - Potentially Valuable Information Lost 6

7 INTELLECTUAL PROPERTY THEFT IS A CRIME What Can Counsel Do to Detect, Deter and Preserve Evidence of IP Theft? What Civil Claims Can Be Asserted When IP Is Stolen? What Criminal Claims May Be Filed? 7

8 INTELLECTUAL PROPERTY THEFT IS A CRIME Discuss What to Do When: Hiring Employees/Contractors Key Employees/Contractors Are Leaving Evidence of Misappropriation Comes to Light 8

9 EMPLOYEE TURNOVER Where Does Fair Competition End and Unfair Competition Begin? What Employees Can Do Work for Competitor Business & Professions Code Solicit Co-Workers (Absent Contract Provision) Solicit Customers (Not Using Trade Secret Customer List) Use Skill, Knowledge, Training, Know-How 9

10 EMPLOYEE TURNOVER Where Does Fair Competition End and Unfair Competition Begin? What Employees Cannot Do Work for Competitor Before Quitting Solicit Co-Workers or Customers Before Quitting Use Former Employer s IP for New Employer 10

11 EMPLOYEE TURNOVER Where Does Fair Competition End and Unfair Competition Begin? Underlying Tension Employees Rights to Use Knowledge & Skill in New Job B&P vs. Employers Rights to Protect IP 11

12 INTELLECTUAL PROPERTY Where Do Intellectual Property Rights End and Unprotectable Information Begin? Copyrights Patents Trademarks Trade Secrets Where Intellectual Property Ends and Information Begins 12

13 WHAT IS A TRADE SECRET? 1. Information Formula, Pattern, Compilation, etc. 2. Economic Value, Actual or Potential 3. Value Derived from Not Being Generally Known to the Public or to Other Persons Who Can Obtain Economic Value from its Disclosure or Use 4. Reasonable Efforts to Maintain Secrecy Civil Code (d) 13

14 WHAT IF THE STOLEN INFORMATION ISN T PROTECTED BY COPYRIGHT, TRADEMARK, PATENT OR TRADE SECRET LAW? May Have Contract Claim Injunction and Damages CA Unauthorized Access to Computers Statute Federal Computer Fraud and Abuse Act Authorize a Civil Suit for Damages without Trade Secrets 14

15 WHAT TO DO WHEN HIRING TO PROTECT IP Each Employee Should Sign a Confidentiality and Non-Disclosure Agreement with the Following Provisions: 1. Non-Disclosure of Confidential Information 2. Don t Want Other Companies Confidential Information 3. Non-Solicitation of Employees 4. Ownership of Works 5. Cooperation 15

16 WHAT TO DO WHEN HIRING TO PROTECT IP Agreement re Non-Disclosure of Confidential Information Define Confidential Information Use Plain Language Not Too Broad Employee Promises: Not to Disclose Confidential Information Use It Only for Employer, Not Anyone Else Return It When Employment Ends Authorize Injunctive Relief Contract May Be Only Protection for Non-Trade Secrets 16

17 WHAT TO DO WHEN HIRING TO PROTECT IP For Sample Employee NDA, Contact: Mike King Paul Martin (310)

18 DURING EMPLOYMENT Identify Key Employees Access to the Company s IP Could Cause Serious Harm at a Competitor 18

19 WHEN A KEY EMPLOYEE LEAVES THE COMPANY Exit Interview Give Copy of Contracts with the Company Have Employee Sign Acknowledgement That: Aware of Agreement(s) and Their Continuing Effect Returned All Confidential Information to Company ID what needs to be returned or destroyed Confirm that laptop, home computer, home office, and garage were searched and all information returned Won t Use any Confidential Information for New Employer 19

20 WHEN A KEY EMPLOYEE LEAVES THE COMPANY Exit Interview (cont.) Where Is Employee Going to Work? ID All Patents, Inventions, Copyrights, & Trade Secrets Helped Create During Employment 20

21 PROTECT, PRESERVE & INVESTIGATE Computers Protect Change Password to Prevent Remote Access Forward Monitor Received After Employee Leaves Phones & Voic Forward Calls Change Password to Prevent Access 21

22 PROTECT, PRESERVE & INVESTIGATE Computers Preserve Phones Individual s Computer Take Out of Commission Ghost or Forensic Image of Hard Drive Server - Back-up Tape Blackberry Keep Copy of s Voic Messages 22

23 PROTECT, PRESERVE & INVESTIGATE Investigate Thieves Are Often Procrastinators Review the Last Few Days for Irregularities Check the Employee s Computer Crashed or Scrubbed? Any Forensic Analysis Should Be Done on Copies or Digital Images 23

24 PROTECT, PRESERVE & INVESTIGATE Investigate (cont.) Review Employee s s Review Access Logs to Company s IP Databases Night Before Resigned Access Company s IP 24

25 WHEN KEY EMPLOYEES LEAVE, NOTIFY THE NEW EMPLOYER Send Letter to the New Employer Attach Employee s Agreements Request Confirmation that Both Employer and Employee Will Comply Notice & Opportunity to Do the Right Thing May Help Establish Authorization/Ratification 25

26 NEW EMPLOYER S INVESTIGATION AND RESPONSE Opportunity to Investigate and Discover Bad Facts Before a Lawsuit is Filed Investigate to Determine: If New Employee Has Former Employer s Information Whether Former Employer s Information Is Trade Secret Whether Information Has Been Used for the Company 26

27 NEW EMPLOYER S INVESTIGATION AND RESPONSE Investigator Lawyer or Layperson? Advantage of Lawyer-Investigator Officers Can Testify They Took Allegations Seriously and Retained Outside Counsel to Fully Investigate Disadvantages of Lawyer-Investigator Lawyer-Witness Potential Work Product & Privilege Issues 27

28 NEW EMPLOYER S INVESTIGATION AND RESPONSE If New Employee Misappropriated Information, Consider: Firing Employee Returning Confidential Information Preserving Evidence Without Investigation & Action, New Employer Increases Risk of Authorization or Ratification 28

29 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Race to the Courthouse When Hiring Out-of-State Employees When Competitor/Infringer Is Out-of-State E.g., CA company hiring MA employee to work in CA MA enforces non-compete, customer non-solicitation provisions 29

30 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Disputed Issues Secret? Economic Value Derive from Being Secret? Reasonable Efforts to Maintain Secrecy? 30

31 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Plaintiffs Perspective View Stolen Information in Aggregate Claim Compilation Constitutes a Trade Secret Conseco Fin. Servicing Corp. v. N. Am. Mortgage Co., 381 F.3d 811 (8th Cir. 2004) (affirming finding that plaintiff s compilation of customer information its customers financial statements, loan applications, payroll, tax and banking information was a trade secret even though some information could be obtained from third parties and none was generated by plaintiff) 31

32 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Defendants Perspective View Alleged Trade Secrets Individually Preemption Trade Secrets Statute May Preempt Common Law Claims (excluding contract and criminal claims) Based on Same Facts Potential Result If No Trade Secrets Then No Torts Still Have Contract Claim & Possibly Unauthorized Access to Computer Claims 32

33 CIVIL LITIGATION: COST OF TRADE SECRETS LITIGATION Expensive Attorneys Fees Potentially Recoverable Against Plaintiff or Defendant 33

34 CIVIL CLAIMS Copyright Patent Trademark Claims Breach of Contract Misappropriation of Trade Secrets Interference with Contract/Prospective Economic Advantage Unfair Competition Statutory & Common Law Breach of Fiduciary Duty (if Officer) Conversion Fraud 34

35 CRIMINAL STATUTES THAT PROVIDE CIVIL REMEDIES Receiving Stolen Property Authorizes Victim to Sue Civilly Treble Damages and Attorneys Fees [CA P.C. 496(c)] Unauthorized Access to Computers, Computer Systems and Computer Data Crime to Access or Use any Computer Hardware, Software or Data Without Authorization [CA P.C. 502] 35

36 CRIMINAL STATUTES THAT PROVIDE CIVIL REMEDIES Authorizes Civil Suit by the Owner or Lessee of the Computer System or Data Compensatory damages (including reasonable and necessary expenditures to verify that a computer system or data was or was not altered, damaged, or deleted by the access) Injunctive Relief Attorneys Fees Punitive Damages Federal Computer Fraud and Abuse Act 36

37 CRIMINAL LITIGATION: TRADE SECRETS Criminal Trade Secret Statute Trade Secrets Defined Effectively Same as UTSA Crime to Misappropriate Trade Secrets by Wrongful or Dishonest Means Crime to offer an Inducement or Reward to Misappropriate Trade Secrets [CA P.C. 502] 37

38 CRIMINAL LITIGATION: TRADE SECRETS Federal Economic Espionage Act Criminalizes Trade Secret Misappropriation Trade Secrets Definition Very Similar to UTSA Federal Jurisdictional Requirement - trade secret must relate to a product that is produced for or placed in interstate or foreign commerce Fines may be imposed up to $250,000 (for individuals) and $5 million (for organizations) and 10 years in prison. 18 U.S.C Federal mail and wire fraud and RICO statutes may apply 38

39 ADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Free Government Has Substantial Resources May Obtain Statements from Departing Employee Search Warrants - Seize Computers and Stolen Property Preserve Evidence Prosecutors May Seize Evidence Before Destroyed Defendants May Be Less Likely to Destroy Evidence in Face of Criminal Investigation 39

40 ADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Lends Credence to Civil Case - TRO Puts Pressure on Defendants Possible Jail Time Cost of Defending Two Proceedings 5th Amendment dilemma Taking 5th may be used against a defendant in a civil case. Unlike a criminal case, "taking the 5th" in a civil case is reason for a jury to properly infer (what they likely infer anyway) that the defendant did what he's accused of. Baxter v. Palmigiano, 425 U.S. 308, 318 (1976); Szmaciarz v. State Personnel Board, 79 Cal.App.3d 904, 919 (1978); Cf., CACI Instruction

41 ADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Conviction May Help Civil Suit Resolve (Issue/Claim Preclusion) Sends a Message that Company Is Serious about Protecting IP 41

42 DISADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Loss of Control Delay No Control Over When or Whether Prosecuted Less Control Over Settlement Defendants may be less motivated to settle civil suit with no guarantee that criminal suit will also resolve May Take Years to File Charges 3-Year Statute Stay of Discovery or Entire Action Possible Communications with Government are Discoverable Ensure Accuracy of Statements 42

43 FACTORS TO CONSIDER IN INITIATING CRIMINAL PROCEEDINGS Strong Evidence of Misappropriation? Absent Strong Evidence, Government Not Likely to Prosecute Respective Resources of Parties Defendant Judgment-Proof? Criminal Threat May Stop Misconduct Defendant Have Greater Resources? Criminal Case May Level Playing Field 43

44 CONCLUSION IP Theft Is Serious Problem Insiders #1 Threat to IP Hiring Have Employees Sign Confidentiality & Non- Disclosure Agreements Leaving Cut-off Access to the Company Preserve Hard Drives and Back-Up Tapes Investigate Employee s Actions in Last Few Days 44

45 CONCLUSION Notify New Employer of Employee s Obligations and Misappropriation If New Employer, Investigate and Take Remedial Action Litigation: Civil Claims Include Criminal Statutes with Civil Remedies Trade Secret Preemption Even if Not Trade Secret, Contract and Unauthorized Computer Claims Available Options Include Initiating Criminal Investigation 45

Protecting Trade Secrets: Best Practices for New and Departing Employees

Protecting Trade Secrets: Best Practices for New and Departing Employees NOVEMBER 6, 2014 Protecting Trade Secrets: Best Practices for New and Departing Employees Robert S. Shwarts What is Intellectual Property? Trade Secrets Trademarks / Trade Dress Copyrights Patents 2 Trade

More information

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer

More information

Please see Section IX. for Additional Information:

Please see Section IX. for Additional Information: The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 222 Prepared By:

More information

Clients Legal Needs in HIPAA Security Compliance

Clients Legal Needs in HIPAA Security Compliance Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance

More information

Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies

Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Professor Prabuddha Ganguli Advisor, VISION-IPR & Adjunct Professor, SJM School of Management, Indian Institute

More information

Protecting Electronic Data and Trade Secrets

Protecting Electronic Data and Trade Secrets Protecting Electronic Data and Trade Secrets Presenter: Robert W. Kent, Jr. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

PointCentral Subscription Agreement v.9.2

PointCentral Subscription Agreement v.9.2 PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (

More information

The need for companies to have a predetermined plan in place in the

The need for companies to have a predetermined plan in place in the Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security

More information

Sources of Protection For Prohibit Information

Sources of Protection For Prohibit Information Introduction to Corporate Information Security Law Andrea M. Matwyshyn a-matwyshyn@law.northwestern.edu Adjunct Professor of Law, Northwestern University Affiliate, Manufacturing and Technology Policy

More information

Discovery Ethics Course Plan

Discovery Ethics Course Plan The Ethics of Pre-Trial Discovery Discovery Ethics Course Plan I. Pre-Trial Discovery II. General Ethical Rules and Personal Mores Governing Discovery III. Ethical Considerations for Obtaining Informal

More information

CYBERCRIME LAWS OF THE UNITED STATES

CYBERCRIME LAWS OF THE UNITED STATES CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications

More information

Credit Reports and the Fair Credit Reporting Act. The Credit Bureaus

Credit Reports and the Fair Credit Reporting Act. The Credit Bureaus Credit Reports and the Consumer Law Eric E. Johnson eejlaw.com Konomark Most rights sharable. The Credit Bureaus 1 State law causes of action against credit bureaus Defamation Invasion of privacy State

More information

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private

More information

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft

More information

INTERNET ISSUES: PROTECTING TRADE SECRETS NEW E-DISCOVERY RULES. William R. Denny Potter Anderson & Corroon LLP September 26, 2006

INTERNET ISSUES: PROTECTING TRADE SECRETS NEW E-DISCOVERY RULES. William R. Denny Potter Anderson & Corroon LLP September 26, 2006 INTERNET ISSUES: PROTECTING TRADE SECRETS NEW E-DISCOVERY RULES William R. Denny Potter Anderson & Corroon LLP September 26, 2006 Agenda What is a Trade Secret? Tracking Down the Anonymous Blogger Strategies

More information

San Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0

San Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0 San Diego Chapter AUDITORS UNCOVERING CRIMINAL ACTS THE REAL BURDEN OF PROOF OR DBPP V1.0 Who is This Guy? George R. Thomas, MBA, CIA, CGAP, CRMA Detective Sergeant San Diego Police Department Current

More information

IDENTIFYING AND RESPONDING TO DATA BREACHES

IDENTIFYING AND RESPONDING TO DATA BREACHES IDENTIFYING AND RESPONDING TO DATA BREACHES Michael P. Hindelang Honigman Miller Schwartz and Cohn LLP October 14, 2015 Merit Security Summit DATA SECURITY RISKS, THREATS & REAL WORLD EXAMPLES OVERVIEW

More information

Alabama Trade Secrets Law

Alabama Trade Secrets Law TRADE SECRETS By: Gregory C. Cook Trade Secrets Defined Trade secrets have become increasingly important in the modern economy as business competition becomes more intense, as employees stay with businesses

More information

Merchant Gateway Services Agreement

Merchant Gateway Services Agreement Merchant Gateway Services Agreement This Merchant Gateway Services Agreement ( Agreement ) is made as of, 20 ( Effective Date ), by and between American POS Alliance, LLC ( Reseller ) and the merchant

More information

Intellectual Property, Patents & Trademarks March 20, 2015. Big ideas SMU

Intellectual Property, Patents & Trademarks March 20, 2015. Big ideas SMU Intellectual Property, Patents & Trademarks March 20, 2015 Big ideas SMU Andrea Perez aperez@kesslercollins.com (214) 379-0742 1. Type of Intellectual Property Copyrights Patents Trademarks Trade secrets

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA).

Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). INSTRUCTIONS FOR COMPLETING THE LOS ANGELES WORLD AIRPORTS NON-DISCLOSURE AGREEMENT Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). The LAWA NDA must

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WISCONSIN

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WISCONSIN IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WISCONSIN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - LANDS END, INC., OPINION AND ORDER Plaintiff,

More information

Data Preservation Duties and Protocols

Data Preservation Duties and Protocols Data Preservation Duties and Protocols November 2008 HOU:2858612.3 Discussion Outline I. The Differences Between Electronic and Paper Discovery II. The Parameters of Electronic Discovery III. Rule 37(e)

More information

U.S. Strategies for the Protection of Trade Secrets in a Global Economy

U.S. Strategies for the Protection of Trade Secrets in a Global Economy U.S. Strategies for the Protection of Trade Secrets in a Global Economy AIPPI Workshop VIII 2013 Helsinki AIPPI R. Mark Halligan, Partner, Intellectual Property and Trade Secrets Litigation, Nixon Peabody

More information

Consumers and Businesses May Claim Microsoft Settlement Benefits

Consumers and Businesses May Claim Microsoft Settlement Benefits SUPERIOR COURT FOR THE STATE OF CALIFORNIA, CITY AND COUNTY OF SAN FRANCISCO Consumers and Businesses May Claim Microsoft Settlement Benefits A court authorized this notice. This is not a solicitation

More information

ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014

ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014 ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014 These terms and conditions of service ("Terms of Service") apply to your use of this ElitePay payment website (the "Website") and all

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

SECURITIES LAW: The Risks of Raising Funds and Selling Interests in the Oil & Gas Industry

SECURITIES LAW: The Risks of Raising Funds and Selling Interests in the Oil & Gas Industry SECURITIES LAW: The Risks of Raising Funds and Selling Interests in the Oil & Gas Industry By: James (J.V.) F. Anderton, V and Michael G. Stefanko of Loomis, Ewert, Parsley, Davis & Gotting, P.C. 09/18/2013

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

Technical Help Desk Terms of Service

Technical Help Desk Terms of Service Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection

More information

White Collar Criminal Defense, Internal Investigations & Corporate Compliance

White Collar Criminal Defense, Internal Investigations & Corporate Compliance Butzel Long :: Practice :: Practice Teams :: White Collar Criminal Defense, Internal Investigations & Corporate Compliance Team Contacts David F. DuMouchel Related Lawyers George B. Donnini Damien DuMouchel

More information

Automatic Recurring Payment Application

Automatic Recurring Payment Application Automatic Recurring Payment Application Schedule your payment to be automatically charged to your credit card. Just complete and sign this form to get started! Here s How Recurring Payments Work: You authorize

More information

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked R. Mark Halligan, FisherBroyles, LLP Andreas Kaltsounis, Stroz Friedberg Amy L. Carlson, Stoel Rives LLP Moderated by David A. Bateman,

More information

GLOSSARY OF SELECTED LEGAL TERMS

GLOSSARY OF SELECTED LEGAL TERMS GLOSSARY OF SELECTED LEGAL TERMS Sources: US Courts : http://www.uscourts.gov/library/glossary.html New York State Unified Court System: http://www.nycourts.gov/lawlibraries/glossary.shtml Acquittal A

More information

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011 E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

What to Do When Your Witness Testimony Doesn t Match His or Her Declaration

What to Do When Your Witness Testimony Doesn t Match His or Her Declaration What to Do When Your Witness Testimony Doesn t Match His or Her Declaration Russell R. Yurk Jennings, Haug & Cunningham, L.L.P. 2800 N. Central Avenue, Suite 1800 Phoenix, AZ 85004-1049 (602) 234-7819

More information

Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty

Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty Michael Conley, Esq. (267) 216-2707 mconley@andersonkill.com AAPA Port Administration and Legal Issues Seminar Baltimore,

More information

Conviction Integrity Unit Best Practices October 15, 2015

Conviction Integrity Unit Best Practices October 15, 2015 Conviction Integrity Unit Best Practices October 15, 2015 District Attorney s offices are increasingly creating Conviction Integrity Units (CIUs) to re examine questionable convictions and guard against

More information

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

INDEPENDENT CONTRACTOR AGREEMENT

INDEPENDENT CONTRACTOR AGREEMENT INDEPENDENT CONTRACTOR AGREEMENT This Independent Contractor Agreement ( Agreement ) is entered between Nordstrom, Inc. ( Nordstrom ), with a business address at 1700 Seventh Avenue, Suite 1000, Seattle,

More information

NOT ACTUAL PROTECTION: ACTUAL INNOCENCE STANDARD FOR CRIMINAL DEFENSE ATTORNEYS IN CALIFORNIA DOES NOT ELIMINATE ACTUAL LAWSUITS AND ACTUAL PAYMENTS

NOT ACTUAL PROTECTION: ACTUAL INNOCENCE STANDARD FOR CRIMINAL DEFENSE ATTORNEYS IN CALIFORNIA DOES NOT ELIMINATE ACTUAL LAWSUITS AND ACTUAL PAYMENTS NOT ACTUAL PROTECTION: ACTUAL INNOCENCE STANDARD FOR CRIMINAL DEFENSE ATTORNEYS IN CALIFORNIA DOES NOT ELIMINATE ACTUAL LAWSUITS AND ACTUAL PAYMENTS By Celeste King, JD and Barrett Breitung, JD* In 1998

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

The traditional rule in American law is that

The traditional rule in American law is that Employment Alert October 1999 Third Circuit Takes Hard Line on Waiver of Attorneys Fees When Settling Civil Rights Claims * * * An Unexpected Hurdle Confronts Employers Conducting Workplace Harassment

More information

PARRY G. CAMERON, Senior Attorney

PARRY G. CAMERON, Senior Attorney Phone: 310.557.2009 Fax: 310.551.0283 Email: pcameron@tocounsel.com Parry Cameron has over twenty-three years experience in commercial and business litigation at both the trial and appellate levels. He

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

IN THE CIRCUIT COURT OF THE STATE OF OREGON IN AND FOR THE COUNTY OF MULTNOMAH

IN THE CIRCUIT COURT OF THE STATE OF OREGON IN AND FOR THE COUNTY OF MULTNOMAH IN THE CIRCUIT COURT OF THE STATE OF OREGON IN AND FOR THE COUNTY OF MULTNOMAH LAURIE PAUL, individually and on behalf of all other similarly-situated individuals, Plaintiff, vs. PROVIDENCE HEALTH SYSTEMS-

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA EXPLANATION AND ORDER

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA EXPLANATION AND ORDER IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA ARNOLD L. MESHKOV, M.D., : Plaintiff : : v. : 01-CV-2586 : UNUM PROVIDENT CORP., et al., : Defendants : EXPLANATION AND ORDER

More information

James H. Greene and Mennie Johnson sued Cash America and other Defendants alleging that they made improper and unlawful payday loans.

James H. Greene and Mennie Johnson sued Cash America and other Defendants alleging that they made improper and unlawful payday loans. THE STATE COURT OF COBB COUNTY, GEORGIA THIS IS A COURT ORDERED LEGAL NOTICE You may be affected by a class action lawsuit if you received a payday loan from or had a loan serviced by Georgia Cash America,

More information

Labor and Employment 2015 Conference

Labor and Employment 2015 Conference Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ

More information

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational

More information

Best Practices Series Document Retention and Best Practices

Best Practices Series Document Retention and Best Practices Best Practices Series Document Retention and Best Practices 1. Sarbanes Oxley Act provides guidance to businesses Sections 802 and 1102 of SOX make it a crime to alter, cover up, falsify, or destroy any

More information

Software Development Offshore Outsourcing: Protecting IP A White Paper by Jack Olson

Software Development Offshore Outsourcing: Protecting IP A White Paper by Jack Olson Software Development Offshore Outsourcing: Protecting IP A White Paper by Jack Olson August, 2014 Austin, Texas Concerns for IP protection when using offshore outsourcing for software development always

More information

SEPARATION AGREEMENT AND GENERAL RELEASE. into by and between ( Employee ) and ( the

SEPARATION AGREEMENT AND GENERAL RELEASE. into by and between ( Employee ) and ( the SEPARATION AGREEMENT AND GENERAL RELEASE This Separation Agreement and General Release ( this Agreement ) is made and entered into by and between ( Employee ) and ( the Agency ) (collectively, the Parties

More information

Navigating the New MA Data Security Regulations

Navigating the New MA Data Security Regulations Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became

More information

Columbia University Service Provider Agreement

Columbia University Service Provider Agreement Columbia University Agreement Agreement ( Agreement ) dated as of, 20 (the Effective Date ) between The Trustees of Columbia University in the City of New York ( Columbia ) and ( Service Provider ). 1.

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

INDEPENDENT CONTRACTOR AGREEMENT

INDEPENDENT CONTRACTOR AGREEMENT INDEPENDENT CONTRACTOR AGREEMENT This Independent Contractor Agreement ("Agreement") is made and effective this day of, 20. BETWEEN: (the "Independent Contractor"), a company organized and existing under

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

STRATEGIES FOR AVOIDING AND DEFENDING DISABILITY ACCESS LITIGATION

STRATEGIES FOR AVOIDING AND DEFENDING DISABILITY ACCESS LITIGATION STRATEGIES FOR AVOIDING AND DEFENDING DISABILITY ACCESS LITIGATION DISABLED ACCESSIBILITY WORKSHOP Anthony J. DeCristoforo, Esq. Stoel Rives LLP 500 Capitol Mall, Suite 1600 Sacramento, CA 95814 (916)

More information

SCHEDULE E. Onboarding Documentation

SCHEDULE E. Onboarding Documentation . SCHEDULE E Onboarding Documentation The forms noted in Schedule E-1 through E-5 are required prior to Temporary Workers beginning assignment at Purchaser Facilities. Schedule E-1 Prescreening Validation

More information

U.S. Litigation (Strategic Preparations and Statistics)

U.S. Litigation (Strategic Preparations and Statistics) U.S. Litigation (Strategic Preparations and Statistics) Thomas K. Scherer Federal and State Court, ITC actions Considerations of speed and remedies involved Eastern District of Texas Considerations of

More information

As a current or former non-exempt PPG employee, you may be entitled to receive money from a class action settlement.

As a current or former non-exempt PPG employee, you may be entitled to receive money from a class action settlement. NOTICE OF PROPOSED CLASS ACTION SETTLEMENT AND HEARING DATE FOR COURT APPROVAL Penaloza, et al., v. PPG Industries, Inc., Case No. BC471369 As a current or former non-exempt PPG employee, you may be entitled

More information

Online Banking Agreement and Disclosures

Online Banking Agreement and Disclosures Online Banking Agreement and Disclosures This agreement states the terms and conditions that apply to your use of Online Banking services offered by Eastman Credit Union. Please read this agreement carefully.

More information

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014 I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business

More information

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP)

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP) Statement of Work for Online Event Registration Product Deployment for Salesforce Implementation for Open Web Application Security Project (OWASP) July 9, 2010 TABLE OF CONTENTS INTRODUCTION... 3 SCOPE...

More information

Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems

Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure

More information

Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies. Teleconference Program Wednesday, March 29, 2006

Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies. Teleconference Program Wednesday, March 29, 2006 Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies Teleconference Program Wednesday, March 29, 2006 Topic III A. Who is suing? Does it matter? 1. Whether suit is brought by

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

EMPLOYEE TERMINATION LETTER & GUIDE

EMPLOYEE TERMINATION LETTER & GUIDE & GUIDE Included: Overview Dos and Don ts Checklist Employee Termination Letter Instructions Sample Employee Termination Letter 1. Overview At some point in the life of every organization, managers will

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft U.S. Department of Justice March 2013 REPORTING INTELLECTUAL PROPERTY

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

California's Unfair Competition Law - Uses, Abuses, and What the Future Holds. The Basics

California's Unfair Competition Law - Uses, Abuses, and What the Future Holds. The Basics California's Unfair Competition Law - Uses, Abuses, and What the Future Holds Kenneth Fitzgerald, Esq. Latham & Watkins LLP 600 West Broadway, Suite 1800 San Diego, CA 92101 Tel: (619) 236-1234 Fax: (619)

More information

Inquiry Concerning A Florida Lawyer

Inquiry Concerning A Florida Lawyer Inquiry Concerning A Florida Lawyer This pamphlet provides general information relating to the purpose and procedures of the Florida lawyer discipline system. It should be read carefully and completely

More information

NASDAQ Futures, Inc. Off-Exchange Reporting Broker Agreement

NASDAQ Futures, Inc. Off-Exchange Reporting Broker Agreement 2. Access to the Services. a. The Exchange may issue to the Authorized Customer s security contact person, or persons (each such person is referred to herein as an Authorized Security Administrator ),

More information

Chapter 15 Criminal Law and Procedures

Chapter 15 Criminal Law and Procedures Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures

More information

Government Contract. Andrews Litigation Reporter. Intellectual Property Rights In Government Contracting. Expert Analysis

Government Contract. Andrews Litigation Reporter. Intellectual Property Rights In Government Contracting. Expert Analysis Government Contract Andrews Litigation Reporter VOLUME 23 h ISSUE 6 h July 27, 2009 Expert Analysis Commentary Intellectual Property Rights In Government Contracting By William C. Bergmann, Esq., and Bukola

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION. v. CIVIL ACTION NO. 6:02-0911

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION. v. CIVIL ACTION NO. 6:02-0911 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION BRIAN K. MARKS and JENNIFER D. MARKS, as individuals and on behalf of all others similarly situated,

More information

Pursuit of Liability on Bank Resolution

Pursuit of Liability on Bank Resolution Pursuit of Liability on Bank Resolution Presentation to the Deposit Insurance Corporation of Japan 8 th Roundtable: Legal Issues on Bank Resolution Fred W. Gibson, Acting Inspector General FDIC March 26,

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Service Agreement Hosted Dynamics GP

Service Agreement Hosted Dynamics GP Service Agreement Hosted Dynamics GP This is a Contract between you ( Company ) and WebSan Solutions Inc. ( WebSan ) of 245 Fairview Mall Drive, Suite 508, Toronto, ON M2J 4T1, Canada. This contract applies

More information

Subscribe to Credit Monitoring and/or Submit a Claim Form to get benefits. EXCLUDE YOURSELF

Subscribe to Credit Monitoring and/or Submit a Claim Form to get benefits. EXCLUDE YOURSELF SUPERIOR COURT OF THE STATE OF CALIFORNIA, COUNTY OF ORANGE If you applied for health insurance through WellPoint / Anthem Blue Cross before March 10, 2010, you could get benefits from a class action settlement.

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers COMPUTER FRAUD AND ABUSE ACT US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers (a) Whoever - (1) having knowingly accessed a computer without authorization

More information

ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT

ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT Mark J. Oberti Oberti Sullivan LLP 723 Main Street, Suite 340 Houston, Texas 77002 (713) 401-3556 mark@osattorneys.com Edwin Sullivan Oberti Sullivan LLP 723 Main

More information

Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.

Terms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline. Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable

More information

A LEGAL GUIDE TO MANAGED SERVICES. by Robert J. Scott

A LEGAL GUIDE TO MANAGED SERVICES. by Robert J. Scott A LEGAL GUIDE TO MANAGED SERVICES by Robert J. Scott Introduction A managed services provider ( MSP ) provides organizations with predictable, business-focused information technology services that optimize

More information

IN THE UNITED STATES DISTRICT COURT FOR NORTHERN DISTRICT OF TEXAS DALLAS DIVISION

IN THE UNITED STATES DISTRICT COURT FOR NORTHERN DISTRICT OF TEXAS DALLAS DIVISION IN THE UNITED STATES DISTRICT COURT FOR NORTHERN DISTRICT OF TEXAS DALLAS DIVISION JPM NETWORKS, LLC, ) d/b/a KWIKBOOST ) ) Plaintiff, ) ) v. ) Civil Action No. ) 3:14-cv-1507 JCM FIRST VENTURE, LLC )

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

In-House Insurance Defense Counsel

In-House Insurance Defense Counsel In-House Insurance Defense Counsel Permissible Cost-Saving Measure or Impermissible Conflict of Interest? by Nathan Price Chaney Why have In-House Counsel? From Company s point of view: Control Effective

More information