Publications | Book
What is a Trade Secret
This 60-minute presentation will include discussions regarding the scope of practices and policies that courts have examined to settle the question of whether a plaintiff in a theft of trade secrets lawsuit has taken reasonable measures to protect its confidential information. Similarly, this webinar will cover the policies and practices that have been dispositive in litigation involving data breach incidents to evaluate whether a defendant has taken reasonable measures to protect confidential information and prevent intrusions.
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Available for credit
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
Substantive Law
Status:
Available for credit
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
12/31/2024
1.00 total credit hours including
General
Status:
Available for credit
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2027
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
12/31/2024
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.20 total credit hours including
General
Status:
Available for credit
1.20 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
12/31/2025
1.00 total credit hours including
General
Status:
Available for credit
1.00 credit hours
Available until:
07/19/2025
1.20 total credit hours including
General
Status:
Reciprocity
1.20 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2027
1.00 total credit hours including
Areas of Professional Practice
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
Substantive
Status:
Available for credit
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Available for credit
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Applied for
1.00 credit hours
Available until:
07/19/2025
1.00 total credit hours including
General
Status:
Approved
1.00 credit hours
Available until:
07/19/2025
1.20 total credit hours including
General
Status:
Approved
1.20 credit hours
Available until:
07/19/2025
1.00 total credit hours including
Law & Legal Procedure
Status:
Approved
1.00 credit hours
Available until:
07/19/2027
1.20 total credit hours including
General
Status:
Applied for
1.20 credit hours
Available until:
07/19/2025
Log In to view your rate
Unlock the discounted member rate
Join first as a member, and then purchase this product at special member pricing
Closed Captioned.
In the context of data breaches and theft of intellectual property, courts look to litigants to establish what measures parties have taken to protect confidential information. There is no rigid definition of reasonable measures. The appropriate definition of reasonable is dependent on factors such as the technological sophistication of the organization's primary business, as well as the level of sensitivity of information the organization comes to possess.
This presentation will explore the scope of practices and policies that courts have examined to settle the question of whether a plaintiff in a theft of trade secrets lawsuit has taken reasonable measures to protect its confidential information, and whether a defendant in a data breach incident has taken reasonable measures to protect confidential information and prevent intrusions.
When defendants face litigation arising out of data breaches, an important line of defense is establishing that reasonable measures were taken to prevent unauthorized access to an organizations data and to address and contain a cyber-attack. Because of the nearly limitless possibilities in which companies can be attacked, determining whether a company had reasonable cybersecurity measures cannot be based solely on whether the company prevents an incident as incidents can and will happen to any company. Instead, to determine whether a company used reasonable cybersecurity measures, one must look at all four aspects of cybersecurity programs: prevention, detection, containment, and remediation.
Cybersecurity programs must focus as much effort on detection, containment, and remediation as they do on prevention, all while maintaining the confidentiality, integrity, and availability of data and the proper functioning of the product itself.
Balancing these requirements within the context of changing threats and technologies requires a risk-based strategy. A risk-based approach dictates that companies allocate resources to cybersecurity based on risk levels and balance security with business functionality. To this end, a company should consider the respective risks and impacts of threats based on the likelihood and potential harm of the threats being exploited.
Risk-based programs are designed to review how a company's people, processes and technologies are integrated to manage the risk of various threats and their associated likelihood and impact. Risks generally do not fit into binary categories of simply low and high; they fall within a spectrum. Based on considerations such as the potential for significant harm to individuals, the availability and likelihood of success of remediation efforts, legal requirements, budget, corporate strategy, and personnel resources, a company should develop a risk-based strategy to best protect the business, its customers, and any other potentially impacted third parties.
In theft of trade secret matters, plaintiffs pursuing claims of data exfiltration by an insider must establish that reasonable measures were taken to protect the data, which may include restrictions on physical access to the confidential information, utilization of information security measures, training of employees regarding confidentiality, use of non-disclosure agreements, the labeling of documents, onboarding and offboarding employees, and many others.
Attendees will learn the proper framework to proactively institute reasonable measures, as well as a checklist of policies, practices, and governing principles which can reduce the chance of data risk from threat actors inside and outside client organizations.
American Bar Association
CE2207KROOLC
60
7/20/2022 12:00:00 AM
Publications | Book
What is a Trade Secret
Publications | Book
Biosimilars Litigation and Client Counseling
Publications | Book
A Lawyer's Guide to Section 337 Investigations Before the U.S. International Trade Commission, Fifth Edition
Nov
18
ERISA Basics National Institute 2024
ETHICS 60 min
Are you new to ERISA? A practitioner who addresses issues related to employee benefit plans and would like a review? This program is for you! We welcome you to join us for this opportunity to brush u…
Nov
13
Events | In-Person
18th Annual Labor and Employment Law Conference
ETHICS 60 min
The Annual Labor and Employment Law Conference is the Section of Labor and Employment Law’s signature event of the year, which will offer cutting-edge and in-depth programs covering developments acro…
Oct
24
Events | Webinar
The Role of Consumer Surveys in IP Litigation [CC]
CLE 60 min
The Role of Consumer Surveys in IP Litigation [CC]