Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it…
Category: Trade Secrets
What You Need to Know About Protecting Trade Secrets Under State and Federal Law
A few years ago Texas joined most other states and enacted its version of the Uniform Trade Secrets Act (UTSA, or Texas’ TUTSA). Recently, the federal Defend Trade Secrets Act (DTSA) became law. While there are quite a few similarities between these laws, there are also some substantial differences that you need to know to protect your…
Can Parties be Excluded from the Courtroom in Trade Secrets Cases?
The Texas Supreme Court recently addressed the question of when a competitor’s corporate representative can be excluded from the courtroom in a trade secrets case.
Can a Company Remotely Wipe an Ex-Employee’s Device?
Note: this article was previously posted on Norse’s DarkMatters. One of my favorite sayings about cyber risk is “an ounce of prevention is cheaper than the very first day of litigation.” A recent case provides a nice example of exactly what I mean. In this case, an effective BYOD policy could have saved this company…
Law Firm Cybersecurity: I Hate to Say I Told You So But …
Hey! Any chance you’ve heard anything in the news lately about law firms being under cyber attack? If not, first, crawl out from under that rock; second, take a look at these articles. Wow. Can you believe it? Law firms? Under cyber attack? What is this world coming to?
Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)
Wow, this article seriously just made my day. I will apologize in advance to my friend and CSO writer and Michael Santarcangelo (@catalyst), but this may very well be my favorite article — anywhere — of all time! And, thank you, Tom Hulsey (@TomHulsey), for sharing it with me! As for you, Ms. Kacy Zurkus (@KSZ714), all I can…
Business Guide: Identifying and Protecting Trade Secrets Under the Texas Uniform Trade Secrets Act
Trade secrets are the lifeblood of a company but it can be a difficult issue to understand. Here is a free guide to help you identify and protect your company’s trade secrets. DOWNLOAD: Texas Business Guide for Identifying and Protecting Trade Secrets Yes, Your Business Has Trade Secrets Whether they realize it or not, virtually…
Yes, an Employee Really Can Steal Your Data and Then SLAPP You for It?
Yes, in California it just happened! The fact that this happened in California should be of no comfort to Texas businesses, however, because the Texas Anti-SLAPP law comes from California and, therefore, California jurisprudence is considered persuasive authority in Texas. This means that in the not so distant future Texas employees could steal their employers’ data…
Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF
This morning I have the privilege of speaking at the Collin County Bench Bar Conference and talking with a tremendous group of Collin County Judges and Lawyers about the risks that lawyers, their clients, and their law practices face from data insecurity issues. Here is the Prezi presentation that I will be using – take…
Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???
I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association’s Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies’ data and intellectual property, especially trade secrets. Here…
You must be logged in to post a comment.