• Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Attorney Cloud Computing for Technology Clients: A Patent and Trade Secret Perspective

    By: Eric M. Dobrusin, Kristen L. Pursley, and Daniel P. Aleksynas , The Dobrusin Law Firm. A broad range of attorneys represent technology companies in some capacity, and therefore, potentially handle and store sensitive information related to patents...
  • Vinayak Kohli
    Vinayak Kohli
    • over 7 years ago
    • Practical Guidance Journal
    • pa

    Cyber Risks in the Workplace: Guidance for Employers on Managing Insider Threats

    By: Lindsay Burke and Moriah Daugherty Covington & Burling LLP Today, among the most critical risks a company can face are the cyber risks associated with its own employees or contractors. Companies are confronting an increasingly complex series...
  • Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Planning & Managing a Data Breach

    By: Elizabeth C. Rogers , Greenberg Traurig, LLP. A data breach occurs when sensitive, protected, and/or confidential information is stolen, accessed, or used without authorization. The information may include an individual’s personally identifiable...
  • Sherica Celine
    Sherica Celine
    • over 3 years ago
    • Practical Guidance Journal
    • pa

    Defending Trade Secrets Under the Economic Espionage Act

    By: Eric E. Bensen. The Defend Trade Secrets Act (DTSA) 1 creates for the first time a federal private cause of action for trade secret misappropriation. 2 Prior to the DTSA’s enactment, private causes of action for trade secret misappropriation...
  • Sherica Celine
    Sherica Celine
    • over 3 years ago
    • Practical Guidance Journal
    • pa

    Life Sciences: Strategies for Overcoming Early Litigation Challenges to Patent Eligibility

    By: Michael Furrow and Shannon Clark , Fitzpatrick, Cella, Harper & Scinto                                            ...
<>