Search for: "Share Trade Secrets" Results 1201 - 1220 of 3,427
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 May 2022, 4:39 am by Matt Grimshaw
Non-disclosure agreements versus non-compete agreements The premise of an NDA is so that former employees or anyone with information regarding trade secrets does not release or share these secrets, particularly with another company. [read post]
10 Mar 2010, 6:03 pm by ITC 337 Law Blog
  Section 337 is known as a patent statute, even though its older provisions are much broader and encompass a broad array of unfair acts, such as trade secret misappropriation and antitrust violations. [read post]
21 Dec 2010, 11:04 pm by Michael Geist
The Guardian has posted two Wikileaks cables that focus on the Anti-Counterfeiting Trade Agreement. [read post]
25 Oct 2018, 6:00 am by Guest Blogger
In Texas, trade secrets are defined by the Texas Uniform Trade Secrets Act, or TUTSA, which is codified within Civ. [read post]
15 Jul 2023, 12:32 pm by Kim Krawiec
Each week, we share exciting discoveries, rigorous debates, and new knowledge, with ever-curious host Sarah McConnell guiding the conversation. [read post]
23 Jan 2011, 10:41 am
Mattel's lawyers say that in so far as the information MGA shared was shared at toy fairs, this information does not constitute a trade secret and therefore MGA is not entitled to their claimed $475 million in damages. [read post]
2 Mar 2007, 6:46 am
She was notified of the alleged dept and the secret arbitration proceeding 3 months after the award was granted to the dept collector. [read post]
4 Feb 2015, 3:04 pm by Maira Sutton
It is the fueling source of our shared culture, and it recognizes that we are always “building on the past”. [read post]
17 Mar 2015, 4:16 pm
 Various forms of intellectual property protection are explored: copyrights, patents, trade marks, geographical indications and trade secrets, as well as traditional and informal mechanisms of knowledge governance. [read post]
21 Dec 2012, 3:39 am by Florian Mueller
Patents are meant to be an exclusionary right, but the "causal nexus" requirement establishes a compulsory-licensing regime.If you'd like to be updated on the smartphone patent disputes and other intellectual property matters I cover, please subscribe to my RSS feed (in the right-hand column) and/or follow me on Twitter @FOSSpatents and Google+.Follow @FOSSpatents Share with other professionals via LinkedIn: Share| [read post]
4 Jul 2018, 12:53 pm by Florian Mueller
Also, the United States' federal government might support Qualcomm on this one in case the Trump Administration feels that companies secretly raising national security concerns should not have to fear shareholder lawsuits.Follow @FOSSpatents Share with other professionals via LinkedIn: Share| [read post]
23 Apr 2018, 8:27 am
 The new act is a very literal implementation of the EU Trade Secrets Directive ("Directive"). [read post]
9 May 2012, 6:35 am by Beth Taylor
Beloff tells how everything had to be hush-hush in the early stages:  "Under [London Stock Exchange] rules, if information concerning the proposed transaction became public, trading in Justice's shares would have been suspended," Beloff explained. [read post]
5 Jan 2017, 9:59 am by Eric Goldman
As an expert on trade secret law, I am the first person to recommend NDAs, particularly since a written agreement of confidentiality is routinely cited by courts as key evidence of “reasonable efforts to maintain secrecy,” a necessary requirement for trade secret protection in the first place. [read post]
30 Jun 2012, 2:47 pm by joel
Trade Secrets             Phonedog also alleges that Twitter followers are trade secrets, which Mr. [read post]
11 Oct 2019, 9:23 am by Unknown
 o    Trade Secrets and knowhow – keep your methodologies and the secret sauce, secret and it could well last forever as knowhow protection. [read post]
16 Jan 2014, 12:09 am by Kevin LaCroix
As highlighted in a recent discovery ruling in a trade secrets lawsuit between Miller U.K. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
  What makes ransomware attacks so devastating is that many variants do not simply target individual endpoints, but rather establish a foothold on one device and then fan out across a corporate network, encrypting everything from shared drives and email servers to website platforms and backup servers. [read post]