Protecting Trade Secrets: Best Practices for New and Departing Employees
|
|
|
- Beryl Rose
- 10 years ago
- Views:
Transcription
1 NOVEMBER 6, 2014 Protecting Trade Secrets: Best Practices for New and Departing Employees Robert S. Shwarts
2 What is Intellectual Property? Trade Secrets Trademarks / Trade Dress Copyrights Patents 2
3 Trade Secret Theft Problem Profile in Silicon Valley 3
4 Profile of Employee IP Theft Trade Secret theft costs US companies $250 billion annually In 2012, asset theft (including IP theft) accounted for nearly 90% of all internal fraud in the workplace 60% of companies polled had experienced attempted IP theft The majority of IP thieves Are middle-aged male employees in technical positions. Signed IP agreements. Already accepted new jobs with competitors (65%) Stole data they were authorized to access (75%) 2011, Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall, Symantec Corp. 4
5 What Do Employees Steal? Trade secrets are the most common IP stolen by employees commercial information (business plans, customer information, and price lists) (48%) source code (20%) proprietary software (14%) 5
6 How Do Employees Steal? The majority of employees Believe there is nothing wrong with transferring employer data to personal devices and accounts (62%) Said it is acceptable to use competitive data from a previous employer (56%) Use , USB devices, remote network access, and cloud-storage to steal IP in the month before departure Personal cloud-based accounts are increasingly the most widely used method of data ex-filtration 6
7 What Does Trade Secret Theft Cost? $2.3 billion Pacesetter Inc. v. Nervicon Co. (2011) $919.9 million du Pont & Co. v. Kolon Industries, Inc. (2011) $465.4 million Lexar Media, Inc. v. Toshiba Corp. (2005) $310 million Bryant v. Mattel (2011) $192 million Sven Peter Mannsfeld v. Phenolchemie Inc. et al. (2008) $134 million USA Power LLC v. PacificCorp (2012) $118 million Bancorp Services LLC v. Hartford Life Insurance (2002) $112 million Brocade Commns Systems, Inc. v. A10 Networks (2012) 7
8 Trade Secrets Protecting Confidential Information 8
9 What is a Trade Secret? Information That is secret» disclosure to third parties without restriction destroys trade secret status That is subject to reasonable efforts to be kept secret That derives commercial value as a result of being secret 9
10 What is a Trade Secret? Source code Customer lists Sales forecasts and pipeline Business and marketing strategies Skills and work histories of other employees Product road maps 10
11 The Information Must be Secret To be a trade secret, the information must not be generally known Public, unrestricted disclosure destroys trade secret status» Publication on the Internet» Publication in treatises, books, articles» Presentations to third parties without nondisclosure agreements (NDAs), including trade shows and demos» Issuance of a patent 11
12 Reasonable Efforts to Maintain Secrecy To qualify as a trade secret, the information must be subject to reasonable efforts to protect its secrecy Examples:» Physical security» Electronic security» Consistent labeling» Employee training 12
13 The Impact of the Cloud There are lots of benefits from moving to the cloud, but using the cloud:» Reduces employer control of the data» Complicates forensic investigations» May undermine culture of trade secrecy» Policies need to take cloud usage into account 13
14 Derives Value as a Result of Being Secret If the information is not valuable, it is not a trade secret Must have value because it is kept secret Examples:» Source Code» Secret recipe for popular food/beverage 14
15 Misappropriation of Trade Secrets Misappropriation means: improper acquisition -ORimproper use -ORimproper disclosure of a trade secret 15
16 Misappropriation Disclosure or use of a trade secret by someone who A. used improper means to acquire the secret; or B. knew the secret i. came from someone who got it by improper means ii. iii. was acquired under circumstances giving rise to a duty of secrecy (e.g. departed employees, JV, NDA) derived from someone who was under such a duty (e.g., moonlighters) C. Knew they acquired a trade secret by mistake 16
17 Improper means Includes:» hacking» breach of a duty to maintain secrecy» unauthorized access» theft» bribery» misrepresentation 17
18 Common Misappropriation Scenarios Departing employees Joint development projects and collaborations 18
19 Available Remedies Injunction Damages for actual loss Unjust enrichment Reasonable royalty Exemplary damages for willful misappropriation (2x) Criminal prosecution and penalties 19
20 Trade Secret v. Patent Protection 20
21 Patents vs. Trade Secrets: Factors Favoring Patents Can t avoid patent infringement through reverse engineering or independent development Presumption of validity Exclusive monopoly VCs may prefer certainty of a patent 21
22 Patent vs. Trade Secrets: Factors Disfavoring Patents Finite duration Geographically limited to where patent is issued Provides competitors with window into your technology Invention may not be patentable 22
23 Patent vs. Trade Secrets: Factors Favoring Trade Secret Protection Unlimited in time (until disclosed) Unlimited in geographic reach Easier to get than a patent Cheaper (in theory) to obtain Immediately enforceable against misappropriation Don t have to reveal technology to competitors 23
24 Patent vs. Trade Secrets: Factors Disfavoring Trade Secret Protection Does not prevent reverse engineering Does not prevent independent development And MUST MAINTAIN SECRECY 24
25 Employee Mobility and IP Risks 25
26 Risky Business Risk that a new hire will bring confidential information that could lead to a lawsuit Risk that a departing employee will take valuable trade secrets to a competitor Triage high risk employees 26
27 Strategic Approaches to Mitigating IP Theft Create internal IP enforcement team Engage in pre-employment screening Adopt policies and best practices Training and education Continued monitoring a balance Risk assessment at employment exit 27
28 Departing Employees 28
29 Exit Procedures High-Risk Determination Exit Interview Termination Checklist Employee Certification Termination Letter Forensic Investigation? Enforcement? 29
30 Exit Interview Job satisfaction Reasons for departure New employer and new position Recruitment time line (interview, offer, acceptance) Retaining confidential information» Confirm employee is searched for and returned all company property, files, and data (including search of personal devices, electronic media, and webmail accounts) Disclosure of inventions Reminder of ongoing obligations 30
31 Termination Checklist HR items (benefit summary, commissions, final paycheck, etc.) Access terminated» Badge returned» IT credentials terminated Inventory all devices returned» USB drives and external hard drives, computers, tablets, smartphones, etc.» Include serial number, storage capacity, and as much identifying information as possible! 31
32 Employee Certification Searched for and returned all company data and materials, including any reproductions on cloud-storage accounts Compliance with Employment Agreement» Intent to comply with non-solicitation, non-disclosure and non-compete covenants Reminder of inventions disclosure and assignment provision 32
33 Termination Letter Standard letter to employee within one week following termination. Should include:» Reminder of ongoing contractual obligations» Summary of confidential information to which employee had access at company» HR/Legal contact information in the event issues arise Copy of letter to new employer if direct competitor 33
34 Follow-up: When to Investigate Initiate employee investigation where: Word of mouth that all is not kosher Recently used devices were not returned or recent data transfers occurred before exit Material false statements made during exit Solicitation of other employees Significant threat of inevitable disclosure at competitor 34
35 Investigation Process Collect and review key documents» Termination paperwork; agreements; employee s Assess employee s access to confidential information Evaluate competitive risk Perform forensic analysis of computer media and networks Develop response strategy based on business objectives 35
36 Criminal Trade Secret Statutes Federal: The Economic Espionage Act of 1996» Tracks civil trade secret standards, except adds a scienter requirement» Replace old patchwork system of prosecutor cases under mail fraud, wire fraud and ITSP» Different penalties for different types of defendants California: Cal. Penal Code 499c» Recently amended to criminalize misappropriation of nontechnical trade secrets 36
37 Pros and Cons of Simultaneous Criminal and Civil Trade Secret Cases PROS Puts Pressure on defendants in civil case Lends credence to civil case Civil discovery demands may require defendants to choose between taking the Fifth and capitulating in civil case Capitalizes on law enforcement authorities powerful investigative tools CONS Loss of Control Delay Lack of confidentiality or privilege Difficulty of gaining access to fruits of law enforcement authorities investigation Potential stay motion by defendants Potential pitfalls of relationship between civil plaintiff (victim) and law enforcement authorities 37
38 New Hires 38
39 Onboarding Procedures Repeatedly make clear that the company does not want stolen trade secrets Offer letter» Contingent upon employee being free and clear of burdensome contractual obligations to former employers HR/Legal Intake Interview New Hire Training» Incorporate training on IP/confidential information from former employers» Additional HR/Legal counseling session if high-risk Employee Certification Ombudsman Process trade secrets firewall 39
40 HR/Legal Intake and Screening Evaluate and assess claims against the company: Contractual obligations with former employers» Copy of agreement» Legal exit with former employer? Compliance» Employee searched for and returned all computer media and materials containing CI at exit? Recruitment timeline» interview, offer, acceptance, and who was involved New role for similarity/overlap» customers, technology, job duties 40
41 Employee Certification Comply with all former employee agreements. Regardless of whether an agreement was signed, never use or disclose to any company employee or customer any confidential information of former employer. Notify the company if the former employer corresponds with or in any way raises issues concerning his/her ongoing contractual obligations. 41
42 The Legalese: Employment Policies to Protect IP 42
43 Employee Agreement Non-solicitation covenant (customers and employees)» typical duration one year» obligation to notify company of new employers» questionable enforceability Non-disclosure covenant Inventions Assignment» Post termination obligations» Labor code
44 Employee Agreement Obligation to search for and return all company and third-party confidential information and property upon termination Waiver of privacy interest in IT assets, company computers and networks, and data Conflict of interest» Duty of loyalty» No violation of agreement with prior employers 44
45 HR Policies Employee use of computers, networks, and IT assets Employee personal and work use of:» electronic storage devices» cloud-storage accounts» web-based accounts Privacy policies that permit software monitoring Conflict of interest policies BYOD policies Work from home and remote access policies? 45
46 IT Policies Prohibit or regulate BYO device, computer, cloud policies Identify and control core IP» Monitor check-ins and check-outs Limit remote access Ongoing monitoring? Terminate all user access promptly upon resignation 46
47 Cloud Usage Policies Electronic designation of confidential data or digital watermarking Segregate secure project folders Electronic encryption Limit admin rights and user access. Maintain highest level of audit trail. Keep Core IP off the cloud 47
Ten Actions You Can Take Now to Protect Your Company s Trade Secrets. www.networkedlawyers.com
Ten Actions You Can Take Now to Protect Your Company s Trade Secrets www.networkedlawyers.com Businesses face increasing threats to valuable trade secrets and other critical business information. To combat
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies
Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Professor Prabuddha Ganguli Advisor, VISION-IPR & Adjunct Professor, SJM School of Management, Indian Institute
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014
I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,
Destiny Media Technology s Code of Conduct
Destiny Media Technology s Code of Conduct INTRODUCTION Destiny Media Technology s ( Destiny ) reputation depends on the conduct of its employees, officers and directors who have an obligation to Destiny
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Top Ten Legal Mistakes Made By Entrepreneurs
Top Ten Legal Mistakes Made By Entrepreneurs J. Matthew Lyons Andrews Kurth LLP 512.320.9284 [email protected] April 8, 2015 Copyright 2015 Andrews Kurth LLP and J. Matthew Lyons. All rights reserved. Andrews
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas [email protected] (214) 880-8115 Michelle B. Brookshire Littler, Dallas [email protected]
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Cyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
Protecting Electronic Data and Trade Secrets
Protecting Electronic Data and Trade Secrets Presenter: Robert W. Kent, Jr. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology
Top Ten Legal Mistakes Made By Entrepreneurs
Top Ten Legal Mistakes Made By Entrepreneurs J. Matthew Lyons Andrews Kurth LLP 512.320.9284 [email protected] April 2, 2014 Copyright 2014 Andrews Kurth LLP and J. Matthew Lyons. All rights reserved. Andrews
MODULE. 04 Trade Secrets
MODULE 04 Trade Secrets MODULE 04. Trade Secrets OUTLINE LEARNING POINT 1: Basics of trade secrets 1. Definition of a trade secret 2. Type of information that could be a trade secret LEARNING POINT 2:
The need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT
SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT This Software Subscription Service (SaaS) Agreement (the Agreement ) sets forth the obligations and conditions between you ( Client ) and mysalesman, LLC,
Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA).
INSTRUCTIONS FOR COMPLETING THE LOS ANGELES WORLD AIRPORTS NON-DISCLOSURE AGREEMENT Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). The LAWA NDA must
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
code of Business Conduct and ethics
code of Business Conduct and ethics Introduction This document provides information about our Code of Business Conduct and Ethics. All directors, officers and employees are individually and collectively
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
Intellectual Property Issues for Asset Managers
Intellectual Property Group January 2010 Intellectual Property Issues for Asset Managers In today s economy, an effective intellectual property (IP) strategy is increasingly important to success. Companies
Breach Notification Policy
1. Breach Notification Team. Breach Notification Policy Ferris State University ( Ferris State ), a hybrid entity with health care components, has established a Breach Notification Team, which consists
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,
FedRAMP Package Access Request Form For Review of FedRAMP Security Package
FedRAMP Package Access Request Form For Review of FedRAMP Security Package INSTRUCTIONS: 1. Please complete this form, then print and sign. 2. Distribute to your Government Supervisor for review and signature.
A LEGAL GUIDE TO MANAGED SERVICES. by Robert J. Scott
A LEGAL GUIDE TO MANAGED SERVICES by Robert J. Scott Introduction A managed services provider ( MSP ) provides organizations with predictable, business-focused information technology services that optimize
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
HIPAA Data Use Agreement Policy R&G Template Updated for Omnibus Rule HIPAA DATE USE AGREEMENT 1
HIPAA DATE USE AGREEMENT 1 This Data Use Agreement (the "Agreement") is effective as of (the "Agreement Effective Date") by and between ("Covered Entity") and ("Data User"). RECITALS WHEREAS, Covered Entity
DATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
ALPHA TEST LICENSE AGREEMENT
ALPHA TEST LICENSE AGREEMENT IMPORTANT NOTICE! PLEASE READ THIS STATEMENT AND THE ALPHA TEST LICENSE AGREEMENT COMPLETELY BEFORE USING THIS ALPHA SOFTWARE. BY CLICKING ON THE BUTTON MARKED YES BELOW OR
SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT
SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT PLEASE READ THIS LICENSE AND REMOTE HOSTED SERVICES AGREEMENT CAREFULLY BEFORE USING THIS WEB SITE BY CHOOSING THE ACCEPT BUTTON YOU ARE (1)
PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS
PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS By Michelle Worrall Tilton UIA - 55 th Congress, Miami, FL November 2, 2011 Liability Insurance Terms
Issues in Software Licensing, Acquisition and
Issues in Software Licensing, Acquisition and Development July 18, 2013 David Jennings Context For Our Purposes; What s a license? Fundamentally, it is a permission to do something(s). A license conveys
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
California Mutual Insurance Company Code of Business Conduct and Ethics
California Mutual Insurance Company Code of Business Conduct and Ethics This Code of Business Conduct and Ethics (the Code ) applies to all officers, employees, and directors of California Mutual Insurance
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.
PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description
U.S. Litigation (Strategic Preparations and Statistics)
U.S. Litigation (Strategic Preparations and Statistics) Thomas K. Scherer Federal and State Court, ITC actions Considerations of speed and remedies involved Eastern District of Texas Considerations of
OCS Student / Parent Laptop Agreement
OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK
SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK Whitepaper 2 Secure File Sharing and Collaboration: The Path to Increased Productivity and Reduced Risk Executive
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Information Security Incident Response Part 1. Purpose. This guideline establishes the minimum requirements for Information
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox ([email protected]) Peter D. Hardy ([email protected]) Robert Brandfass ([email protected]) (Mr. Brandfass
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Acceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
A Guide To Conducting IP Due Diligence In M&A
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] A Guide To Conducting IP Due Diligence In M&A Law360,
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
Entrepreneur-in-Residence Programs Key Legal Issues
Entrepreneur-in-Residence Programs Key Legal Issues July 2004 2486113 Introduction Informal entrepreneur-in-residence ("EIR") programs are a traditional feature of the private equity industry Recently,
DERMATOLOGY ASSOCIATES, LLC 50 Sewall Street Portland, Maine 04102 (207) 775-3526 NOTICE OF PRIVACY PRACTICES
DERMATOLOGY ASSOCIATES, LLC 50 Sewall Street Portland, Maine 04102 (207) 775-3526 NOTICE OF PRIVACY PRACTICES THIS NOTICE OF PRIVACY PRACTICES DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND
The Recover Report. It s business. But it s personal.
The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
A buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business:
Buying a business This briefing highlights the main legal risks to consider when buying another business or enterprise. A buyer should always take legal advice at the outset of any acquisition. Structuring
AB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
CUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)
Insuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT
FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is made and entered into to be effective as of, 20 (the Effective Date ), by and between ( Covered Entity ) and
Labor and Employment 2015 Conference
Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
CCH Small Firm Services 2008 License Agreement for Online Applications Terms and Conditions
CCH Small Firm Services 2008 License Agreement for Online Applications Terms and Conditions Universal Tax Systems, Inc. d/b/a CCH Small Firm Services, its successors, and assigns ( CCH SFS ) licenses all
WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015
WEBSITE HOSTING SERVICES AGREEMENT Effective Date: 1/1/2015 1) Scope of Services. Company will provide Client a shared or dedicated virtual machine, an Internet address for storage and access to Content,
NPSA GENERAL PROVISIONS
NPSA GENERAL PROVISIONS 1. Independent Contractor. A. It is understood and agreed that CONTRACTOR (including CONTRACTOR s employees) is an independent contractor and that no relationship of employer-employee
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
Sycamore Leaf Solutions LLC
Sycamore Leaf Solutions LLC Terms of Service Terms of Service The Terms of Service for Sycamore Leaf Solutions ("Terms of Service") are effective immediately upon the User's acceptance of the Terms of
AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT
AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT Participation Agreement (this Agreement ) made as of the day of, 20, by and among Hewitt Financial Services LLC ( HFS ) and ( Fund Manager
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.
Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches Gerard M. Stegmaier [email protected] @1sand0slawyer Data Breach Trends 2011 Average Loss to Organization = $5.5 million
Social Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
