Protecting Trade Secrets: Best Practices for New and Departing Employees

Size: px
Start display at page:

Download "Protecting Trade Secrets: Best Practices for New and Departing Employees"

Transcription

1 NOVEMBER 6, 2014 Protecting Trade Secrets: Best Practices for New and Departing Employees Robert S. Shwarts

2 What is Intellectual Property? Trade Secrets Trademarks / Trade Dress Copyrights Patents 2

3 Trade Secret Theft Problem Profile in Silicon Valley 3

4 Profile of Employee IP Theft Trade Secret theft costs US companies $250 billion annually In 2012, asset theft (including IP theft) accounted for nearly 90% of all internal fraud in the workplace 60% of companies polled had experienced attempted IP theft The majority of IP thieves Are middle-aged male employees in technical positions. Signed IP agreements. Already accepted new jobs with competitors (65%) Stole data they were authorized to access (75%) 2011, Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall, Symantec Corp. 4

5 What Do Employees Steal? Trade secrets are the most common IP stolen by employees commercial information (business plans, customer information, and price lists) (48%) source code (20%) proprietary software (14%) 5

6 How Do Employees Steal? The majority of employees Believe there is nothing wrong with transferring employer data to personal devices and accounts (62%) Said it is acceptable to use competitive data from a previous employer (56%) Use , USB devices, remote network access, and cloud-storage to steal IP in the month before departure Personal cloud-based accounts are increasingly the most widely used method of data ex-filtration 6

7 What Does Trade Secret Theft Cost? $2.3 billion Pacesetter Inc. v. Nervicon Co. (2011) $919.9 million du Pont & Co. v. Kolon Industries, Inc. (2011) $465.4 million Lexar Media, Inc. v. Toshiba Corp. (2005) $310 million Bryant v. Mattel (2011) $192 million Sven Peter Mannsfeld v. Phenolchemie Inc. et al. (2008) $134 million USA Power LLC v. PacificCorp (2012) $118 million Bancorp Services LLC v. Hartford Life Insurance (2002) $112 million Brocade Commns Systems, Inc. v. A10 Networks (2012) 7

8 Trade Secrets Protecting Confidential Information 8

9 What is a Trade Secret? Information That is secret» disclosure to third parties without restriction destroys trade secret status That is subject to reasonable efforts to be kept secret That derives commercial value as a result of being secret 9

10 What is a Trade Secret? Source code Customer lists Sales forecasts and pipeline Business and marketing strategies Skills and work histories of other employees Product road maps 10

11 The Information Must be Secret To be a trade secret, the information must not be generally known Public, unrestricted disclosure destroys trade secret status» Publication on the Internet» Publication in treatises, books, articles» Presentations to third parties without nondisclosure agreements (NDAs), including trade shows and demos» Issuance of a patent 11

12 Reasonable Efforts to Maintain Secrecy To qualify as a trade secret, the information must be subject to reasonable efforts to protect its secrecy Examples:» Physical security» Electronic security» Consistent labeling» Employee training 12

13 The Impact of the Cloud There are lots of benefits from moving to the cloud, but using the cloud:» Reduces employer control of the data» Complicates forensic investigations» May undermine culture of trade secrecy» Policies need to take cloud usage into account 13

14 Derives Value as a Result of Being Secret If the information is not valuable, it is not a trade secret Must have value because it is kept secret Examples:» Source Code» Secret recipe for popular food/beverage 14

15 Misappropriation of Trade Secrets Misappropriation means: improper acquisition -ORimproper use -ORimproper disclosure of a trade secret 15

16 Misappropriation Disclosure or use of a trade secret by someone who A. used improper means to acquire the secret; or B. knew the secret i. came from someone who got it by improper means ii. iii. was acquired under circumstances giving rise to a duty of secrecy (e.g. departed employees, JV, NDA) derived from someone who was under such a duty (e.g., moonlighters) C. Knew they acquired a trade secret by mistake 16

17 Improper means Includes:» hacking» breach of a duty to maintain secrecy» unauthorized access» theft» bribery» misrepresentation 17

18 Common Misappropriation Scenarios Departing employees Joint development projects and collaborations 18

19 Available Remedies Injunction Damages for actual loss Unjust enrichment Reasonable royalty Exemplary damages for willful misappropriation (2x) Criminal prosecution and penalties 19

20 Trade Secret v. Patent Protection 20

21 Patents vs. Trade Secrets: Factors Favoring Patents Can t avoid patent infringement through reverse engineering or independent development Presumption of validity Exclusive monopoly VCs may prefer certainty of a patent 21

22 Patent vs. Trade Secrets: Factors Disfavoring Patents Finite duration Geographically limited to where patent is issued Provides competitors with window into your technology Invention may not be patentable 22

23 Patent vs. Trade Secrets: Factors Favoring Trade Secret Protection Unlimited in time (until disclosed) Unlimited in geographic reach Easier to get than a patent Cheaper (in theory) to obtain Immediately enforceable against misappropriation Don t have to reveal technology to competitors 23

24 Patent vs. Trade Secrets: Factors Disfavoring Trade Secret Protection Does not prevent reverse engineering Does not prevent independent development And MUST MAINTAIN SECRECY 24

25 Employee Mobility and IP Risks 25

26 Risky Business Risk that a new hire will bring confidential information that could lead to a lawsuit Risk that a departing employee will take valuable trade secrets to a competitor Triage high risk employees 26

27 Strategic Approaches to Mitigating IP Theft Create internal IP enforcement team Engage in pre-employment screening Adopt policies and best practices Training and education Continued monitoring a balance Risk assessment at employment exit 27

28 Departing Employees 28

29 Exit Procedures High-Risk Determination Exit Interview Termination Checklist Employee Certification Termination Letter Forensic Investigation? Enforcement? 29

30 Exit Interview Job satisfaction Reasons for departure New employer and new position Recruitment time line (interview, offer, acceptance) Retaining confidential information» Confirm employee is searched for and returned all company property, files, and data (including search of personal devices, electronic media, and webmail accounts) Disclosure of inventions Reminder of ongoing obligations 30

31 Termination Checklist HR items (benefit summary, commissions, final paycheck, etc.) Access terminated» Badge returned» IT credentials terminated Inventory all devices returned» USB drives and external hard drives, computers, tablets, smartphones, etc.» Include serial number, storage capacity, and as much identifying information as possible! 31

32 Employee Certification Searched for and returned all company data and materials, including any reproductions on cloud-storage accounts Compliance with Employment Agreement» Intent to comply with non-solicitation, non-disclosure and non-compete covenants Reminder of inventions disclosure and assignment provision 32

33 Termination Letter Standard letter to employee within one week following termination. Should include:» Reminder of ongoing contractual obligations» Summary of confidential information to which employee had access at company» HR/Legal contact information in the event issues arise Copy of letter to new employer if direct competitor 33

34 Follow-up: When to Investigate Initiate employee investigation where: Word of mouth that all is not kosher Recently used devices were not returned or recent data transfers occurred before exit Material false statements made during exit Solicitation of other employees Significant threat of inevitable disclosure at competitor 34

35 Investigation Process Collect and review key documents» Termination paperwork; agreements; employee s Assess employee s access to confidential information Evaluate competitive risk Perform forensic analysis of computer media and networks Develop response strategy based on business objectives 35

36 Criminal Trade Secret Statutes Federal: The Economic Espionage Act of 1996» Tracks civil trade secret standards, except adds a scienter requirement» Replace old patchwork system of prosecutor cases under mail fraud, wire fraud and ITSP» Different penalties for different types of defendants California: Cal. Penal Code 499c» Recently amended to criminalize misappropriation of nontechnical trade secrets 36

37 Pros and Cons of Simultaneous Criminal and Civil Trade Secret Cases PROS Puts Pressure on defendants in civil case Lends credence to civil case Civil discovery demands may require defendants to choose between taking the Fifth and capitulating in civil case Capitalizes on law enforcement authorities powerful investigative tools CONS Loss of Control Delay Lack of confidentiality or privilege Difficulty of gaining access to fruits of law enforcement authorities investigation Potential stay motion by defendants Potential pitfalls of relationship between civil plaintiff (victim) and law enforcement authorities 37

38 New Hires 38

39 Onboarding Procedures Repeatedly make clear that the company does not want stolen trade secrets Offer letter» Contingent upon employee being free and clear of burdensome contractual obligations to former employers HR/Legal Intake Interview New Hire Training» Incorporate training on IP/confidential information from former employers» Additional HR/Legal counseling session if high-risk Employee Certification Ombudsman Process trade secrets firewall 39

40 HR/Legal Intake and Screening Evaluate and assess claims against the company: Contractual obligations with former employers» Copy of agreement» Legal exit with former employer? Compliance» Employee searched for and returned all computer media and materials containing CI at exit? Recruitment timeline» interview, offer, acceptance, and who was involved New role for similarity/overlap» customers, technology, job duties 40

41 Employee Certification Comply with all former employee agreements. Regardless of whether an agreement was signed, never use or disclose to any company employee or customer any confidential information of former employer. Notify the company if the former employer corresponds with or in any way raises issues concerning his/her ongoing contractual obligations. 41

42 The Legalese: Employment Policies to Protect IP 42

43 Employee Agreement Non-solicitation covenant (customers and employees)» typical duration one year» obligation to notify company of new employers» questionable enforceability Non-disclosure covenant Inventions Assignment» Post termination obligations» Labor code

44 Employee Agreement Obligation to search for and return all company and third-party confidential information and property upon termination Waiver of privacy interest in IT assets, company computers and networks, and data Conflict of interest» Duty of loyalty» No violation of agreement with prior employers 44

45 HR Policies Employee use of computers, networks, and IT assets Employee personal and work use of:» electronic storage devices» cloud-storage accounts» web-based accounts Privacy policies that permit software monitoring Conflict of interest policies BYOD policies Work from home and remote access policies? 45

46 IT Policies Prohibit or regulate BYO device, computer, cloud policies Identify and control core IP» Monitor check-ins and check-outs Limit remote access Ongoing monitoring? Terminate all user access promptly upon resignation 46

47 Cloud Usage Policies Electronic designation of confidential data or digital watermarking Segregate secure project folders Electronic encryption Limit admin rights and user access. Maintain highest level of audit trail. Keep Core IP off the cloud 47

Ten Actions You Can Take Now to Protect Your Company s Trade Secrets. www.networkedlawyers.com

Ten Actions You Can Take Now to Protect Your Company s Trade Secrets. www.networkedlawyers.com Ten Actions You Can Take Now to Protect Your Company s Trade Secrets www.networkedlawyers.com Businesses face increasing threats to valuable trade secrets and other critical business information. To combat

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business

More information

Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies

Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Professor Prabuddha Ganguli Advisor, VISION-IPR & Adjunct Professor, SJM School of Management, Indian Institute

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014 I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,

More information

Destiny Media Technology s Code of Conduct

Destiny Media Technology s Code of Conduct Destiny Media Technology s Code of Conduct INTRODUCTION Destiny Media Technology s ( Destiny ) reputation depends on the conduct of its employees, officers and directors who have an obligation to Destiny

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Top Ten Legal Mistakes Made By Entrepreneurs

Top Ten Legal Mistakes Made By Entrepreneurs Top Ten Legal Mistakes Made By Entrepreneurs J. Matthew Lyons Andrews Kurth LLP 512.320.9284 [email protected] April 8, 2015 Copyright 2015 Andrews Kurth LLP and J. Matthew Lyons. All rights reserved. Andrews

More information

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace

Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas [email protected] (214) 880-8115 Michelle B. Brookshire Littler, Dallas [email protected]

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Protecting Electronic Data and Trade Secrets

Protecting Electronic Data and Trade Secrets Protecting Electronic Data and Trade Secrets Presenter: Robert W. Kent, Jr. Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology

More information

Top Ten Legal Mistakes Made By Entrepreneurs

Top Ten Legal Mistakes Made By Entrepreneurs Top Ten Legal Mistakes Made By Entrepreneurs J. Matthew Lyons Andrews Kurth LLP 512.320.9284 [email protected] April 2, 2014 Copyright 2014 Andrews Kurth LLP and J. Matthew Lyons. All rights reserved. Andrews

More information

MODULE. 04 Trade Secrets

MODULE. 04 Trade Secrets MODULE 04 Trade Secrets MODULE 04. Trade Secrets OUTLINE LEARNING POINT 1: Basics of trade secrets 1. Definition of a trade secret 2. Type of information that could be a trade secret LEARNING POINT 2:

More information

The need for companies to have a predetermined plan in place in the

The need for companies to have a predetermined plan in place in the Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security

More information

SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT

SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT This Software Subscription Service (SaaS) Agreement (the Agreement ) sets forth the obligations and conditions between you ( Client ) and mysalesman, LLC,

More information

Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA).

Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). INSTRUCTIONS FOR COMPLETING THE LOS ANGELES WORLD AIRPORTS NON-DISCLOSURE AGREEMENT Please read and execute the attached Los Angeles World Airports (LAWA) Non-Disclosure Agreement (NDA). The LAWA NDA must

More information

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not

More information

code of Business Conduct and ethics

code of Business Conduct and ethics code of Business Conduct and ethics Introduction This document provides information about our Code of Business Conduct and Ethics. All directors, officers and employees are individually and collectively

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Intellectual Property Issues for Asset Managers

Intellectual Property Issues for Asset Managers Intellectual Property Group January 2010 Intellectual Property Issues for Asset Managers In today s economy, an effective intellectual property (IP) strategy is increasingly important to success. Companies

More information

Breach Notification Policy

Breach Notification Policy 1. Breach Notification Team. Breach Notification Policy Ferris State University ( Ferris State ), a hybrid entity with health care components, has established a Breach Notification Team, which consists

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,

More information

FedRAMP Package Access Request Form For Review of FedRAMP Security Package

FedRAMP Package Access Request Form For Review of FedRAMP Security Package FedRAMP Package Access Request Form For Review of FedRAMP Security Package INSTRUCTIONS: 1. Please complete this form, then print and sign. 2. Distribute to your Government Supervisor for review and signature.

More information

A LEGAL GUIDE TO MANAGED SERVICES. by Robert J. Scott

A LEGAL GUIDE TO MANAGED SERVICES. by Robert J. Scott A LEGAL GUIDE TO MANAGED SERVICES by Robert J. Scott Introduction A managed services provider ( MSP ) provides organizations with predictable, business-focused information technology services that optimize

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

HIPAA Data Use Agreement Policy R&G Template Updated for Omnibus Rule HIPAA DATE USE AGREEMENT 1

HIPAA Data Use Agreement Policy R&G Template Updated for Omnibus Rule HIPAA DATE USE AGREEMENT 1 HIPAA DATE USE AGREEMENT 1 This Data Use Agreement (the "Agreement") is effective as of (the "Agreement Effective Date") by and between ("Covered Entity") and ("Data User"). RECITALS WHEREAS, Covered Entity

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

ALPHA TEST LICENSE AGREEMENT

ALPHA TEST LICENSE AGREEMENT ALPHA TEST LICENSE AGREEMENT IMPORTANT NOTICE! PLEASE READ THIS STATEMENT AND THE ALPHA TEST LICENSE AGREEMENT COMPLETELY BEFORE USING THIS ALPHA SOFTWARE. BY CLICKING ON THE BUTTON MARKED YES BELOW OR

More information

SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT

SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT PLEASE READ THIS LICENSE AND REMOTE HOSTED SERVICES AGREEMENT CAREFULLY BEFORE USING THIS WEB SITE BY CHOOSING THE ACCEPT BUTTON YOU ARE (1)

More information

PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS

PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS By Michelle Worrall Tilton UIA - 55 th Congress, Miami, FL November 2, 2011 Liability Insurance Terms

More information

Issues in Software Licensing, Acquisition and

Issues in Software Licensing, Acquisition and Issues in Software Licensing, Acquisition and Development July 18, 2013 David Jennings Context For Our Purposes; What s a license? Fundamentally, it is a permission to do something(s). A license conveys

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

California Mutual Insurance Company Code of Business Conduct and Ethics

California Mutual Insurance Company Code of Business Conduct and Ethics California Mutual Insurance Company Code of Business Conduct and Ethics This Code of Business Conduct and Ethics (the Code ) applies to all officers, employees, and directors of California Mutual Insurance

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013. TOYOTA ASSOCIATE DISPUTE RESOLUTION ( T-ADR ): Summary Description

More information

U.S. Litigation (Strategic Preparations and Statistics)

U.S. Litigation (Strategic Preparations and Statistics) U.S. Litigation (Strategic Preparations and Statistics) Thomas K. Scherer Federal and State Court, ITC actions Considerations of speed and remedies involved Eastern District of Texas Considerations of

More information

OCS Student / Parent Laptop Agreement

OCS Student / Parent Laptop Agreement OCS Student / Parent Laptop Agreement Terms and Conditions of Use By signing this form, the student and the student s parent/guardian certify that they have thoroughly read, understand, and accept the

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK Whitepaper 2 Secure File Sharing and Collaboration: The Path to Increased Productivity and Reduced Risk Executive

More information

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Information Security Incident Response Part 1. Purpose. This guideline establishes the minimum requirements for Information

More information

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox ([email protected]) Peter D. Hardy ([email protected]) Robert Brandfass ([email protected]) (Mr. Brandfass

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

A Guide To Conducting IP Due Diligence In M&A

A Guide To Conducting IP Due Diligence In M&A Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] A Guide To Conducting IP Due Diligence In M&A Law360,

More information

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer

More information

Entrepreneur-in-Residence Programs Key Legal Issues

Entrepreneur-in-Residence Programs Key Legal Issues Entrepreneur-in-Residence Programs Key Legal Issues July 2004 2486113 Introduction Informal entrepreneur-in-residence ("EIR") programs are a traditional feature of the private equity industry Recently,

More information

DERMATOLOGY ASSOCIATES, LLC 50 Sewall Street Portland, Maine 04102 (207) 775-3526 NOTICE OF PRIVACY PRACTICES

DERMATOLOGY ASSOCIATES, LLC 50 Sewall Street Portland, Maine 04102 (207) 775-3526 NOTICE OF PRIVACY PRACTICES DERMATOLOGY ASSOCIATES, LLC 50 Sewall Street Portland, Maine 04102 (207) 775-3526 NOTICE OF PRIVACY PRACTICES THIS NOTICE OF PRIVACY PRACTICES DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

A buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business:

A buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business: Buying a business This briefing highlights the main legal risks to consider when buying another business or enterprise. A buyer should always take legal advice at the outset of any acquisition. Structuring

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

CUBIC ENERGY, INC. Code of Business Conduct and Ethics

CUBIC ENERGY, INC. Code of Business Conduct and Ethics CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

STATE OF NEW JERSEY Security Controls Assessment Checklist

STATE OF NEW JERSEY Security Controls Assessment Checklist STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response

More information

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT

FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is made and entered into to be effective as of, 20 (the Effective Date ), by and between ( Covered Entity ) and

More information

Labor and Employment 2015 Conference

Labor and Employment 2015 Conference Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ

More information

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00

Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00 Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,

More information

CCH Small Firm Services 2008 License Agreement for Online Applications Terms and Conditions

CCH Small Firm Services 2008 License Agreement for Online Applications Terms and Conditions CCH Small Firm Services 2008 License Agreement for Online Applications Terms and Conditions Universal Tax Systems, Inc. d/b/a CCH Small Firm Services, its successors, and assigns ( CCH SFS ) licenses all

More information

WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015

WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015 WEBSITE HOSTING SERVICES AGREEMENT Effective Date: 1/1/2015 1) Scope of Services. Company will provide Client a shared or dedicated virtual machine, an Internet address for storage and access to Content,

More information

NPSA GENERAL PROVISIONS

NPSA GENERAL PROVISIONS NPSA GENERAL PROVISIONS 1. Independent Contractor. A. It is understood and agreed that CONTRACTOR (including CONTRACTOR s employees) is an independent contractor and that no relationship of employer-employee

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

Sycamore Leaf Solutions LLC

Sycamore Leaf Solutions LLC Sycamore Leaf Solutions LLC Terms of Service Terms of Service The Terms of Service for Sycamore Leaf Solutions ("Terms of Service") are effective immediately upon the User's acceptance of the Terms of

More information

AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT

AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT Participation Agreement (this Agreement ) made as of the day of, 20, by and among Hewitt Financial Services LLC ( HFS ) and ( Fund Manager

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr. Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches Gerard M. Stegmaier [email protected] @1sand0slawyer Data Breach Trends 2011 Average Loss to Organization = $5.5 million

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information