PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART
|
|
- Lynn Mathews
- 8 years ago
- Views:
Transcription
1 PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART Michael G. King, Esq. (mking@hgla.com) Paul T. Martin, Esq. (pmartin@hgla.com) 4640 Admiralty Way Suite 850 Marina del Rey, CA (310)
2 INTELLECTUAL PROPERTY THEFT IS A SERIOUS PROBLEM Recent Survey Nearly 60% of Departing Employees Admitted Taking Company Data 40% Took Customer Lists 67% of Respondents Took Data to Leverage a New Job Q: How Many of Your Company s Employees Are Departing/Arriving with Data? Estimated Annual Cost of IP Theft - $250 Billion 2
3 WHO IS MOST LIKELY TO STEAL A COMPANY S IP? Insiders Employees and Contractors Employees Are Turning Over More Frequently Turnover Increases Risk of IP Theft 3
4 IMPACT OF NEW TECHNOLOGY & SOCIAL MEDIA More Tools to Take IP More Difficult to Detect/Prevent Increased Costs of Litigation 4
5 CIVIL & CRIMINAL CASES OF IP THEFT ARE COMMON Mattel Awarded $100 Million in Bratz Lawsuit Coca-Cola Secretary Convicted of Trade Secrets Theft Intel Insider Indicted for Stealing $1 Billion in Trade Secrets G-Men's Interest in Hilton's Alleged Trade Secret Theft 5
6 INTELLECTUAL PROPERTY THEFT IS A CRIME Employees/Contractors the #1 Threat to a Company s IP ISSUE - What Can In-House Counsel Do to Protect IP Amid Employee Turnover? Problem - Theft Only Evident Months After Employee Has Left Result - Potentially Valuable Information Lost 6
7 INTELLECTUAL PROPERTY THEFT IS A CRIME What Can Counsel Do to Detect, Deter and Preserve Evidence of IP Theft? What Civil Claims Can Be Asserted When IP Is Stolen? What Criminal Claims May Be Filed? 7
8 INTELLECTUAL PROPERTY THEFT IS A CRIME Discuss What to Do When: Hiring Employees/Contractors Key Employees/Contractors Are Leaving Evidence of Misappropriation Comes to Light 8
9 EMPLOYEE TURNOVER Where Does Fair Competition End and Unfair Competition Begin? What Employees Can Do Work for Competitor Business & Professions Code Solicit Co-Workers (Absent Contract Provision) Solicit Customers (Not Using Trade Secret Customer List) Use Skill, Knowledge, Training, Know-How 9
10 EMPLOYEE TURNOVER Where Does Fair Competition End and Unfair Competition Begin? What Employees Cannot Do Work for Competitor Before Quitting Solicit Co-Workers or Customers Before Quitting Use Former Employer s IP for New Employer 10
11 EMPLOYEE TURNOVER Where Does Fair Competition End and Unfair Competition Begin? Underlying Tension Employees Rights to Use Knowledge & Skill in New Job B&P vs. Employers Rights to Protect IP 11
12 INTELLECTUAL PROPERTY Where Do Intellectual Property Rights End and Unprotectable Information Begin? Copyrights Patents Trademarks Trade Secrets Where Intellectual Property Ends and Information Begins 12
13 WHAT IS A TRADE SECRET? 1. Information Formula, Pattern, Compilation, etc. 2. Economic Value, Actual or Potential 3. Value Derived from Not Being Generally Known to the Public or to Other Persons Who Can Obtain Economic Value from its Disclosure or Use 4. Reasonable Efforts to Maintain Secrecy Civil Code (d) 13
14 WHAT IF THE STOLEN INFORMATION ISN T PROTECTED BY COPYRIGHT, TRADEMARK, PATENT OR TRADE SECRET LAW? May Have Contract Claim Injunction and Damages CA Unauthorized Access to Computers Statute Federal Computer Fraud and Abuse Act Authorize a Civil Suit for Damages without Trade Secrets 14
15 WHAT TO DO WHEN HIRING TO PROTECT IP Each Employee Should Sign a Confidentiality and Non-Disclosure Agreement with the Following Provisions: 1. Non-Disclosure of Confidential Information 2. Don t Want Other Companies Confidential Information 3. Non-Solicitation of Employees 4. Ownership of Works 5. Cooperation 15
16 WHAT TO DO WHEN HIRING TO PROTECT IP Agreement re Non-Disclosure of Confidential Information Define Confidential Information Use Plain Language Not Too Broad Employee Promises: Not to Disclose Confidential Information Use It Only for Employer, Not Anyone Else Return It When Employment Ends Authorize Injunctive Relief Contract May Be Only Protection for Non-Trade Secrets 16
17 WHAT TO DO WHEN HIRING TO PROTECT IP For Sample Employee NDA, Contact: Mike King Paul Martin (310)
18 DURING EMPLOYMENT Identify Key Employees Access to the Company s IP Could Cause Serious Harm at a Competitor 18
19 WHEN A KEY EMPLOYEE LEAVES THE COMPANY Exit Interview Give Copy of Contracts with the Company Have Employee Sign Acknowledgement That: Aware of Agreement(s) and Their Continuing Effect Returned All Confidential Information to Company ID what needs to be returned or destroyed Confirm that laptop, home computer, home office, and garage were searched and all information returned Won t Use any Confidential Information for New Employer 19
20 WHEN A KEY EMPLOYEE LEAVES THE COMPANY Exit Interview (cont.) Where Is Employee Going to Work? ID All Patents, Inventions, Copyrights, & Trade Secrets Helped Create During Employment 20
21 PROTECT, PRESERVE & INVESTIGATE Computers Protect Change Password to Prevent Remote Access Forward Monitor Received After Employee Leaves Phones & Voic Forward Calls Change Password to Prevent Access 21
22 PROTECT, PRESERVE & INVESTIGATE Computers Preserve Phones Individual s Computer Take Out of Commission Ghost or Forensic Image of Hard Drive Server - Back-up Tape Blackberry Keep Copy of s Voic Messages 22
23 PROTECT, PRESERVE & INVESTIGATE Investigate Thieves Are Often Procrastinators Review the Last Few Days for Irregularities Check the Employee s Computer Crashed or Scrubbed? Any Forensic Analysis Should Be Done on Copies or Digital Images 23
24 PROTECT, PRESERVE & INVESTIGATE Investigate (cont.) Review Employee s s Review Access Logs to Company s IP Databases Night Before Resigned Access Company s IP 24
25 WHEN KEY EMPLOYEES LEAVE, NOTIFY THE NEW EMPLOYER Send Letter to the New Employer Attach Employee s Agreements Request Confirmation that Both Employer and Employee Will Comply Notice & Opportunity to Do the Right Thing May Help Establish Authorization/Ratification 25
26 NEW EMPLOYER S INVESTIGATION AND RESPONSE Opportunity to Investigate and Discover Bad Facts Before a Lawsuit is Filed Investigate to Determine: If New Employee Has Former Employer s Information Whether Former Employer s Information Is Trade Secret Whether Information Has Been Used for the Company 26
27 NEW EMPLOYER S INVESTIGATION AND RESPONSE Investigator Lawyer or Layperson? Advantage of Lawyer-Investigator Officers Can Testify They Took Allegations Seriously and Retained Outside Counsel to Fully Investigate Disadvantages of Lawyer-Investigator Lawyer-Witness Potential Work Product & Privilege Issues 27
28 NEW EMPLOYER S INVESTIGATION AND RESPONSE If New Employee Misappropriated Information, Consider: Firing Employee Returning Confidential Information Preserving Evidence Without Investigation & Action, New Employer Increases Risk of Authorization or Ratification 28
29 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Race to the Courthouse When Hiring Out-of-State Employees When Competitor/Infringer Is Out-of-State E.g., CA company hiring MA employee to work in CA MA enforces non-compete, customer non-solicitation provisions 29
30 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Disputed Issues Secret? Economic Value Derive from Being Secret? Reasonable Efforts to Maintain Secrecy? 30
31 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Plaintiffs Perspective View Stolen Information in Aggregate Claim Compilation Constitutes a Trade Secret Conseco Fin. Servicing Corp. v. N. Am. Mortgage Co., 381 F.3d 811 (8th Cir. 2004) (affirming finding that plaintiff s compilation of customer information its customers financial statements, loan applications, payroll, tax and banking information was a trade secret even though some information could be obtained from third parties and none was generated by plaintiff) 31
32 CIVIL LITIGATION: OVERVIEW OF TRADE SECRETS LITIGATION Defendants Perspective View Alleged Trade Secrets Individually Preemption Trade Secrets Statute May Preempt Common Law Claims (excluding contract and criminal claims) Based on Same Facts Potential Result If No Trade Secrets Then No Torts Still Have Contract Claim & Possibly Unauthorized Access to Computer Claims 32
33 CIVIL LITIGATION: COST OF TRADE SECRETS LITIGATION Expensive Attorneys Fees Potentially Recoverable Against Plaintiff or Defendant 33
34 CIVIL CLAIMS Copyright Patent Trademark Claims Breach of Contract Misappropriation of Trade Secrets Interference with Contract/Prospective Economic Advantage Unfair Competition Statutory & Common Law Breach of Fiduciary Duty (if Officer) Conversion Fraud 34
35 CRIMINAL STATUTES THAT PROVIDE CIVIL REMEDIES Receiving Stolen Property Authorizes Victim to Sue Civilly Treble Damages and Attorneys Fees [CA P.C. 496(c)] Unauthorized Access to Computers, Computer Systems and Computer Data Crime to Access or Use any Computer Hardware, Software or Data Without Authorization [CA P.C. 502] 35
36 CRIMINAL STATUTES THAT PROVIDE CIVIL REMEDIES Authorizes Civil Suit by the Owner or Lessee of the Computer System or Data Compensatory damages (including reasonable and necessary expenditures to verify that a computer system or data was or was not altered, damaged, or deleted by the access) Injunctive Relief Attorneys Fees Punitive Damages Federal Computer Fraud and Abuse Act 36
37 CRIMINAL LITIGATION: TRADE SECRETS Criminal Trade Secret Statute Trade Secrets Defined Effectively Same as UTSA Crime to Misappropriate Trade Secrets by Wrongful or Dishonest Means Crime to offer an Inducement or Reward to Misappropriate Trade Secrets [CA P.C. 502] 37
38 CRIMINAL LITIGATION: TRADE SECRETS Federal Economic Espionage Act Criminalizes Trade Secret Misappropriation Trade Secrets Definition Very Similar to UTSA Federal Jurisdictional Requirement - trade secret must relate to a product that is produced for or placed in interstate or foreign commerce Fines may be imposed up to $250,000 (for individuals) and $5 million (for organizations) and 10 years in prison. 18 U.S.C Federal mail and wire fraud and RICO statutes may apply 38
39 ADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Free Government Has Substantial Resources May Obtain Statements from Departing Employee Search Warrants - Seize Computers and Stolen Property Preserve Evidence Prosecutors May Seize Evidence Before Destroyed Defendants May Be Less Likely to Destroy Evidence in Face of Criminal Investigation 39
40 ADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Lends Credence to Civil Case - TRO Puts Pressure on Defendants Possible Jail Time Cost of Defending Two Proceedings 5th Amendment dilemma Taking 5th may be used against a defendant in a civil case. Unlike a criminal case, "taking the 5th" in a civil case is reason for a jury to properly infer (what they likely infer anyway) that the defendant did what he's accused of. Baxter v. Palmigiano, 425 U.S. 308, 318 (1976); Szmaciarz v. State Personnel Board, 79 Cal.App.3d 904, 919 (1978); Cf., CACI Instruction
41 ADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Conviction May Help Civil Suit Resolve (Issue/Claim Preclusion) Sends a Message that Company Is Serious about Protecting IP 41
42 DISADVANTAGES OF CRIMINAL INVESTIGATION/PROSECUTION Loss of Control Delay No Control Over When or Whether Prosecuted Less Control Over Settlement Defendants may be less motivated to settle civil suit with no guarantee that criminal suit will also resolve May Take Years to File Charges 3-Year Statute Stay of Discovery or Entire Action Possible Communications with Government are Discoverable Ensure Accuracy of Statements 42
43 FACTORS TO CONSIDER IN INITIATING CRIMINAL PROCEEDINGS Strong Evidence of Misappropriation? Absent Strong Evidence, Government Not Likely to Prosecute Respective Resources of Parties Defendant Judgment-Proof? Criminal Threat May Stop Misconduct Defendant Have Greater Resources? Criminal Case May Level Playing Field 43
44 CONCLUSION IP Theft Is Serious Problem Insiders #1 Threat to IP Hiring Have Employees Sign Confidentiality & Non- Disclosure Agreements Leaving Cut-off Access to the Company Preserve Hard Drives and Back-Up Tapes Investigate Employee s Actions in Last Few Days 44
45 CONCLUSION Notify New Employer of Employee s Obligations and Misappropriation If New Employer, Investigate and Take Remedial Action Litigation: Civil Claims Include Criminal Statutes with Civil Remedies Trade Secret Preemption Even if Not Trade Secret, Contract and Unauthorized Computer Claims Available Options Include Initiating Criminal Investigation 45
Protecting Trade Secrets: Best Practices for New and Departing Employees
NOVEMBER 6, 2014 Protecting Trade Secrets: Best Practices for New and Departing Employees Robert S. Shwarts What is Intellectual Property? Trade Secrets Trademarks / Trade Dress Copyrights Patents 2 Trade
More informationCybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
More informationPlease see Section IX. for Additional Information:
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 222 Prepared By:
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationLeveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies
Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Professor Prabuddha Ganguli Advisor, VISION-IPR & Adjunct Professor, SJM School of Management, Indian Institute
More informationProtecting Electronic Data and Trade Secrets
Protecting Electronic Data and Trade Secrets Presenter: Robert W. Kent, Jr. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationPointCentral Subscription Agreement v.9.2
PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (
More informationThe need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
More informationSources of Protection For Prohibit Information
Introduction to Corporate Information Security Law Andrea M. Matwyshyn a-matwyshyn@law.northwestern.edu Adjunct Professor of Law, Northwestern University Affiliate, Manufacturing and Technology Policy
More informationDiscovery Ethics Course Plan
The Ethics of Pre-Trial Discovery Discovery Ethics Course Plan I. Pre-Trial Discovery II. General Ethical Rules and Personal Mores Governing Discovery III. Ethical Considerations for Obtaining Informal
More informationCYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
More informationCredit Reports and the Fair Credit Reporting Act. The Credit Bureaus
Credit Reports and the Consumer Law Eric E. Johnson eejlaw.com Konomark Most rights sharable. The Credit Bureaus 1 State law causes of action against credit bureaus Defamation Invasion of privacy State
More informationSensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
More informationPENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
More informationINTERNET ISSUES: PROTECTING TRADE SECRETS NEW E-DISCOVERY RULES. William R. Denny Potter Anderson & Corroon LLP September 26, 2006
INTERNET ISSUES: PROTECTING TRADE SECRETS NEW E-DISCOVERY RULES William R. Denny Potter Anderson & Corroon LLP September 26, 2006 Agenda What is a Trade Secret? Tracking Down the Anonymous Blogger Strategies
More informationSan Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0
San Diego Chapter AUDITORS UNCOVERING CRIMINAL ACTS THE REAL BURDEN OF PROOF OR DBPP V1.0 Who is This Guy? George R. Thomas, MBA, CIA, CGAP, CRMA Detective Sergeant San Diego Police Department Current
More informationIDENTIFYING AND RESPONDING TO DATA BREACHES
IDENTIFYING AND RESPONDING TO DATA BREACHES Michael P. Hindelang Honigman Miller Schwartz and Cohn LLP October 14, 2015 Merit Security Summit DATA SECURITY RISKS, THREATS & REAL WORLD EXAMPLES OVERVIEW
More informationAlabama Trade Secrets Law
TRADE SECRETS By: Gregory C. Cook Trade Secrets Defined Trade secrets have become increasingly important in the modern economy as business competition becomes more intense, as employees stay with businesses
More informationMerchant Gateway Services Agreement
Merchant Gateway Services Agreement This Merchant Gateway Services Agreement ( Agreement ) is made as of, 20 ( Effective Date ), by and between American POS Alliance, LLC ( Reseller ) and the merchant
More informationIntellectual Property, Patents & Trademarks March 20, 2015. Big ideas SMU
Intellectual Property, Patents & Trademarks March 20, 2015 Big ideas SMU Andrea Perez aperez@kesslercollins.com (214) 379-0742 1. Type of Intellectual Property Copyrights Patents Trademarks Trade secrets
More informationPINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
More informationPlease read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA).
INSTRUCTIONS FOR COMPLETING THE LOS ANGELES WORLD AIRPORTS NON-DISCLOSURE AGREEMENT Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). The LAWA NDA must
More informationIN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WISCONSIN
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WISCONSIN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - LANDS END, INC., OPINION AND ORDER Plaintiff,
More informationData Preservation Duties and Protocols
Data Preservation Duties and Protocols November 2008 HOU:2858612.3 Discussion Outline I. The Differences Between Electronic and Paper Discovery II. The Parameters of Electronic Discovery III. Rule 37(e)
More informationU.S. Strategies for the Protection of Trade Secrets in a Global Economy
U.S. Strategies for the Protection of Trade Secrets in a Global Economy AIPPI Workshop VIII 2013 Helsinki AIPPI R. Mark Halligan, Partner, Intellectual Property and Trade Secrets Litigation, Nixon Peabody
More informationConsumers and Businesses May Claim Microsoft Settlement Benefits
SUPERIOR COURT FOR THE STATE OF CALIFORNIA, CITY AND COUNTY OF SAN FRANCISCO Consumers and Businesses May Claim Microsoft Settlement Benefits A court authorized this notice. This is not a solicitation
More informationELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014
ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014 These terms and conditions of service ("Terms of Service") apply to your use of this ElitePay payment website (the "Website") and all
More informationThese TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,
TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other
More informationSECURITIES LAW: The Risks of Raising Funds and Selling Interests in the Oil & Gas Industry
SECURITIES LAW: The Risks of Raising Funds and Selling Interests in the Oil & Gas Industry By: James (J.V.) F. Anderton, V and Michael G. Stefanko of Loomis, Ewert, Parsley, Davis & Gotting, P.C. 09/18/2013
More informationMARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
More informationTechnical Help Desk Terms of Service
Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection
More informationWhite Collar Criminal Defense, Internal Investigations & Corporate Compliance
Butzel Long :: Practice :: Practice Teams :: White Collar Criminal Defense, Internal Investigations & Corporate Compliance Team Contacts David F. DuMouchel Related Lawyers George B. Donnini Damien DuMouchel
More informationAutomatic Recurring Payment Application
Automatic Recurring Payment Application Schedule your payment to be automatically charged to your credit card. Just complete and sign this form to get started! Here s How Recurring Payments Work: You authorize
More informationData Breaches and Trade Secrets: What to Do When Your Client Gets Hacked
Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked R. Mark Halligan, FisherBroyles, LLP Andreas Kaltsounis, Stroz Friedberg Amy L. Carlson, Stoel Rives LLP Moderated by David A. Bateman,
More informationGLOSSARY OF SELECTED LEGAL TERMS
GLOSSARY OF SELECTED LEGAL TERMS Sources: US Courts : http://www.uscourts.gov/library/glossary.html New York State Unified Court System: http://www.nycourts.gov/lawlibraries/glossary.shtml Acquittal A
More informationE-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011
E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE Ana Maria Martinez April 14, 2011 This presentation does not present the views of the U.S. Department of Justice. This presentation is not legal advice.
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationWhat to Do When Your Witness Testimony Doesn t Match His or Her Declaration
What to Do When Your Witness Testimony Doesn t Match His or Her Declaration Russell R. Yurk Jennings, Haug & Cunningham, L.L.P. 2800 N. Central Avenue, Suite 1800 Phoenix, AZ 85004-1049 (602) 234-7819
More informationEmployment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty
Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty Michael Conley, Esq. (267) 216-2707 mconley@andersonkill.com AAPA Port Administration and Legal Issues Seminar Baltimore,
More informationConviction Integrity Unit Best Practices October 15, 2015
Conviction Integrity Unit Best Practices October 15, 2015 District Attorney s offices are increasingly creating Conviction Integrity Units (CIUs) to re examine questionable convictions and guard against
More informationCyber Liability. AlaHA Annual Meeting 2013
Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages
More informationINDEPENDENT CONTRACTOR AGREEMENT
INDEPENDENT CONTRACTOR AGREEMENT This Independent Contractor Agreement ( Agreement ) is entered between Nordstrom, Inc. ( Nordstrom ), with a business address at 1700 Seventh Avenue, Suite 1000, Seattle,
More informationNOT ACTUAL PROTECTION: ACTUAL INNOCENCE STANDARD FOR CRIMINAL DEFENSE ATTORNEYS IN CALIFORNIA DOES NOT ELIMINATE ACTUAL LAWSUITS AND ACTUAL PAYMENTS
NOT ACTUAL PROTECTION: ACTUAL INNOCENCE STANDARD FOR CRIMINAL DEFENSE ATTORNEYS IN CALIFORNIA DOES NOT ELIMINATE ACTUAL LAWSUITS AND ACTUAL PAYMENTS By Celeste King, JD and Barrett Breitung, JD* In 1998
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationThe traditional rule in American law is that
Employment Alert October 1999 Third Circuit Takes Hard Line on Waiver of Attorneys Fees When Settling Civil Rights Claims * * * An Unexpected Hurdle Confronts Employers Conducting Workplace Harassment
More informationPARRY G. CAMERON, Senior Attorney
Phone: 310.557.2009 Fax: 310.551.0283 Email: pcameron@tocounsel.com Parry Cameron has over twenty-three years experience in commercial and business litigation at both the trial and appellate levels. He
More informationFEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationPLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.
PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description
More informationAn Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy
An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims
More informationIN THE CIRCUIT COURT OF THE STATE OF OREGON IN AND FOR THE COUNTY OF MULTNOMAH
IN THE CIRCUIT COURT OF THE STATE OF OREGON IN AND FOR THE COUNTY OF MULTNOMAH LAURIE PAUL, individually and on behalf of all other similarly-situated individuals, Plaintiff, vs. PROVIDENCE HEALTH SYSTEMS-
More informationIN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA EXPLANATION AND ORDER
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA ARNOLD L. MESHKOV, M.D., : Plaintiff : : v. : 01-CV-2586 : UNUM PROVIDENT CORP., et al., : Defendants : EXPLANATION AND ORDER
More informationJames H. Greene and Mennie Johnson sued Cash America and other Defendants alleging that they made improper and unlawful payday loans.
THE STATE COURT OF COBB COUNTY, GEORGIA THIS IS A COURT ORDERED LEGAL NOTICE You may be affected by a class action lawsuit if you received a payday loan from or had a loan serviced by Georgia Cash America,
More informationLabor and Employment 2015 Conference
Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ
More informationESI Risk Assessment: Critical in Light of the new E-discovery and notification laws
ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws Scott Bailey, CISM Christopher Sobota, J.D. Enterprise Risk Management Group Disclaimer This presentation is for informational
More informationBest Practices Series Document Retention and Best Practices
Best Practices Series Document Retention and Best Practices 1. Sarbanes Oxley Act provides guidance to businesses Sections 802 and 1102 of SOX make it a crime to alter, cover up, falsify, or destroy any
More informationSoftware Development Offshore Outsourcing: Protecting IP A White Paper by Jack Olson
Software Development Offshore Outsourcing: Protecting IP A White Paper by Jack Olson August, 2014 Austin, Texas Concerns for IP protection when using offshore outsourcing for software development always
More informationSEPARATION AGREEMENT AND GENERAL RELEASE. into by and between ( Employee ) and ( the
SEPARATION AGREEMENT AND GENERAL RELEASE This Separation Agreement and General Release ( this Agreement ) is made and entered into by and between ( Employee ) and ( the Agency ) (collectively, the Parties
More informationNavigating the New MA Data Security Regulations
Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became
More informationColumbia University Service Provider Agreement
Columbia University Agreement Agreement ( Agreement ) dated as of, 20 (the Effective Date ) between The Trustees of Columbia University in the City of New York ( Columbia ) and ( Service Provider ). 1.
More informationSUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography
More informationINDEPENDENT CONTRACTOR AGREEMENT
INDEPENDENT CONTRACTOR AGREEMENT This Independent Contractor Agreement ("Agreement") is made and effective this day of, 20. BETWEEN: (the "Independent Contractor"), a company organized and existing under
More informationInsuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationSTRATEGIES FOR AVOIDING AND DEFENDING DISABILITY ACCESS LITIGATION
STRATEGIES FOR AVOIDING AND DEFENDING DISABILITY ACCESS LITIGATION DISABLED ACCESSIBILITY WORKSHOP Anthony J. DeCristoforo, Esq. Stoel Rives LLP 500 Capitol Mall, Suite 1600 Sacramento, CA 95814 (916)
More informationSCHEDULE E. Onboarding Documentation
. SCHEDULE E Onboarding Documentation The forms noted in Schedule E-1 through E-5 are required prior to Temporary Workers beginning assignment at Purchaser Facilities. Schedule E-1 Prescreening Validation
More informationU.S. Litigation (Strategic Preparations and Statistics)
U.S. Litigation (Strategic Preparations and Statistics) Thomas K. Scherer Federal and State Court, ITC actions Considerations of speed and remedies involved Eastern District of Texas Considerations of
More informationAs a current or former non-exempt PPG employee, you may be entitled to receive money from a class action settlement.
NOTICE OF PROPOSED CLASS ACTION SETTLEMENT AND HEARING DATE FOR COURT APPROVAL Penaloza, et al., v. PPG Industries, Inc., Case No. BC471369 As a current or former non-exempt PPG employee, you may be entitled
More informationOnline Banking Agreement and Disclosures
Online Banking Agreement and Disclosures This agreement states the terms and conditions that apply to your use of Online Banking services offered by Eastman Credit Union. Please read this agreement carefully.
More informationUNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014
I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,
More informationCODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
More informationStatement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP)
Statement of Work for Online Event Registration Product Deployment for Salesforce Implementation for Open Web Application Security Project (OWASP) July 9, 2010 TABLE OF CONTENTS INTRODUCTION... 3 SCOPE...
More informationPrivacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems
Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure
More informationDiscovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies. Teleconference Program Wednesday, March 29, 2006
Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies Teleconference Program Wednesday, March 29, 2006 Topic III A. Who is suing? Does it matter? 1. Whether suit is brought by
More informationAPPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
More informationEMPLOYEE TERMINATION LETTER & GUIDE
& GUIDE Included: Overview Dos and Don ts Checklist Employee Termination Letter Instructions Sample Employee Termination Letter 1. Overview At some point in the life of every organization, managers will
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationREPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft
REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft U.S. Department of Justice March 2013 REPORTING INTELLECTUAL PROPERTY
More informationMISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
More informationCalifornia's Unfair Competition Law - Uses, Abuses, and What the Future Holds. The Basics
California's Unfair Competition Law - Uses, Abuses, and What the Future Holds Kenneth Fitzgerald, Esq. Latham & Watkins LLP 600 West Broadway, Suite 1800 San Diego, CA 92101 Tel: (619) 236-1234 Fax: (619)
More informationInquiry Concerning A Florida Lawyer
Inquiry Concerning A Florida Lawyer This pamphlet provides general information relating to the purpose and procedures of the Florida lawyer discipline system. It should be read carefully and completely
More informationNASDAQ Futures, Inc. Off-Exchange Reporting Broker Agreement
2. Access to the Services. a. The Exchange may issue to the Authorized Customer s security contact person, or persons (each such person is referred to herein as an Authorized Security Administrator ),
More informationChapter 15 Criminal Law and Procedures
Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures
More informationGovernment Contract. Andrews Litigation Reporter. Intellectual Property Rights In Government Contracting. Expert Analysis
Government Contract Andrews Litigation Reporter VOLUME 23 h ISSUE 6 h July 27, 2009 Expert Analysis Commentary Intellectual Property Rights In Government Contracting By William C. Bergmann, Esq., and Bukola
More informationRiverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
More informationCOLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
More informationIN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION. v. CIVIL ACTION NO. 6:02-0911
IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF WEST VIRGINIA PARKERSBURG DIVISION BRIAN K. MARKS and JENNIFER D. MARKS, as individuals and on behalf of all others similarly situated,
More informationPursuit of Liability on Bank Resolution
Pursuit of Liability on Bank Resolution Presentation to the Deposit Insurance Corporation of Japan 8 th Roundtable: Legal Issues on Bank Resolution Fred W. Gibson, Acting Inspector General FDIC March 26,
More informationINFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
More informationService Agreement Hosted Dynamics GP
Service Agreement Hosted Dynamics GP This is a Contract between you ( Company ) and WebSan Solutions Inc. ( WebSan ) of 245 Fairview Mall Drive, Suite 508, Toronto, ON M2J 4T1, Canada. This contract applies
More informationSubscribe to Credit Monitoring and/or Submit a Claim Form to get benefits. EXCLUDE YOURSELF
SUPERIOR COURT OF THE STATE OF CALIFORNIA, COUNTY OF ORANGE If you applied for health insurance through WellPoint / Anthem Blue Cross before March 10, 2010, you could get benefits from a class action settlement.
More informationTHOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE
THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the
More informationCOMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers
COMPUTER FRAUD AND ABUSE ACT US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers (a) Whoever - (1) having knowingly accessed a computer without authorization
More informationETHICAL ISSUES IN THE EMPLOYMENT CONTEXT
ETHICAL ISSUES IN THE EMPLOYMENT CONTEXT Mark J. Oberti Oberti Sullivan LLP 723 Main Street, Suite 340 Houston, Texas 77002 (713) 401-3556 mark@osattorneys.com Edwin Sullivan Oberti Sullivan LLP 723 Main
More informationTerms of Service. This online privacy policy applies only to information collected through our website and not to information collected offline.
Terms of Service Privacy Policy Mahavitaran (mahadiscom) respects and protects the privacy of the individuals that access the information and use the services brought through them. Individually identifiable
More informationA LEGAL GUIDE TO MANAGED SERVICES. by Robert J. Scott
A LEGAL GUIDE TO MANAGED SERVICES by Robert J. Scott Introduction A managed services provider ( MSP ) provides organizations with predictable, business-focused information technology services that optimize
More informationIN THE UNITED STATES DISTRICT COURT FOR NORTHERN DISTRICT OF TEXAS DALLAS DIVISION
IN THE UNITED STATES DISTRICT COURT FOR NORTHERN DISTRICT OF TEXAS DALLAS DIVISION JPM NETWORKS, LLC, ) d/b/a KWIKBOOST ) ) Plaintiff, ) ) v. ) Civil Action No. ) 3:14-cv-1507 JCM FIRST VENTURE, LLC )
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationIn-House Insurance Defense Counsel
In-House Insurance Defense Counsel Permissible Cost-Saving Measure or Impermissible Conflict of Interest? by Nathan Price Chaney Why have In-House Counsel? From Company s point of view: Control Effective
More information