Search for: "Trade Secret Inc." Results 3821 - 3840 of 4,056
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Dec 2018, 6:23 am by Corynne McSherry
  If unauthorized access amounts to circumvention of a TPM and is therefore prohibited, the manufacturer can use the DMCA to assert exclusive control over the market for those goods and accessories far beyond what any copyright or trade secret law had ever allowed before. [read post]
28 Jan 2013, 2:38 pm by Paralegal Mentor
I am a Senior Corporate and Securities Paralegal working in the Silicon Valley for Infoblox Inc., a tech company based in Santa Clara, California, that provides Automated Network Control solutions, and that became a publicly traded company in early 2012 (NYSE: BLOX).I have been in the legal profession for nearly 25 years, having served in the Corporate Legal departments of several leading public companies such as Starbucks Coffee Company, Expedia.com, Infospace.com, Clearwire… [read post]
22 Feb 2016, 11:47 am by Lloyd J. Jassin
Similarly, works such as databases may be protected under trade secret or contract law in the U.S. and abroad. [read post]
14 Jan 2019, 3:08 pm by Kevin LaCroix
Ruby’s former employer, alleging theft and misuse of trade secrets. [read post]
12 Dec 2017, 1:27 pm by Cynthia Marcotte Stamer
She supports her clients both on a real-time, “on demand” basis and with longer term basis to deal with all aspects for workforce and human resources management, including, recruitment, hiring, firing, compensation and benefits, promotion, discipline, compliance, trade secret and confidentiality, noncompetition, privacy and data security, safety, daily performance and operations management, emerging crises, strategic planning, process improvement and change management,… [read post]
26 May 2016, 12:05 pm by Cynthia Marcotte Stamer
Health plans and health insurers, health care providers, healthcare clearinghouses (Covered Entities) and their business associates should verify that their copying charges and other policies and practices for responding to requests of individuals for copies and other access to protected health information (PHI) comply with the Privacy and Security Rules (Privacy Rule) of the Health Insurance Portability & Accountability Act of 1996 (HIPAA) as construed in a new Frequently Asked Question (FAQ… [read post]
10 Nov 2016, 4:00 am by Administrator
Simek is the Vice President of Sensei Enterprises, Inc.. [read post]
11 Oct 2021, 7:59 pm by Cynthia Marcotte Stamer
  As implemented by the Federal Trade Commission regulations, entities with covered accounts must develop and implement written identity theft prevention programs designed to help identify, detect, and respond to patterns, practices, or specific activities – known as “red flags” – that could indicate identity theft. [read post]
24 Oct 2014, 1:11 pm by Rebecca Tushnet
  Tarnishment if a new association is negative and somehow gets attached to the senior brand: if Victor’s Little Secret causes consumers to associate Victoria’s Secret with pornography. [read post]
2 Apr 2019, 6:50 am by Barry Sookman
Equustek Solutions Inc., [2017] 1 SCR 82, arose from a lower court decision that ordered Google to block websites that were selling goods that violated the trade secrets of the plaintiffs. [read post]
13 Jul 2018, 10:37 pm by Cynthia Marcotte Stamer
A flurry of activity in the House Ways & Means Committee and other Congressional committees over the past few weeks signals the advisability of keeping a close eye on health care and health benefit reform proposals this Summer in anticipation of both the Fall health benefit enrollment and renewal season and the mid-term November Congressional elections. [read post]
15 Dec 2018, 7:41 am by Cynthia Marcotte Stamer
Stamer has worked closely with these and other clients on the design, development, administration, defense, and breach and data recovery of health care, workforce, insurance and financial services, trade secret and other information technology, data and related process and systems development, policy and operations throughout her career. [read post]
8 Jan 2019, 12:38 pm by Cynthia Marcotte Stamer
Interoperability will be a key priority for the Office of the National Coordinator for Health Information Technology (“ONC”) going forward. [read post]
18 Nov 2018, 8:30 pm by Cynthia Marcotte Stamer
Self-insured employer and union sponsored health plans, health insurers and other health care payers, health care providers, managed care and practice management service providers and others structuring or working with preferred provider or other managed health care contracts should weigh the potential implications on their health plan provider agreements and managed care practices of the antitrust lawsuit  jointly brought by the U.S. [read post]
23 Jan 2023, 4:15 am by Allan Blutstein
We mentioned the district court opinion on our list of top cases from the second half of 2020, but we expected the appeals court to delve into the Trade Secrets Act and the question of whether Exemption 4 is a “discretionary” privilege. [read post]
18 Sep 2019, 6:38 am by MBettman
At the conclusion of the second trial, the jury returned a verdict against DCO, finding that DCO had tortiously interfered with Phoenix’s business relationships and had misappropriated Phoenix’s trade secrets. [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
Compliance with the Privacy and Security Rules of the Health Insurance Portability & Accountability Act (HIPAA) is a living process that requires employer and other health plans, health insurers, health care providers and healthcare clearinghouses to recurrently reevaluate their HIPAA enterprise risk and timely act to mitigate security threats to electronic (ePHI) and other  protected health information and other HIPAA compliance concerns on an ongoing basis. [read post]