Site Search
Professionals 66 results
Capabilities 20 results
Practice Area
Trade Secrets, Non Competes & Restrictive Covenants
Theft of trade secrets and other confidential information occurs all too frequently in today’s global, highly mobile, and competitive marketplace. In the course of advising clients, we have developed comprehensive, yet scalable, strategies for both mitigating against and responding to issues along the trade secrets protection spectrum, including helping position clients proactively before trade secrets theft occurs.
Practice Area
Winston takes a strategic approach to privacy and data security, integrating cross-practice capabilities to provide our clients with cutting-edge counseling; trade secret protection and investigations; cybersecurity incident investigations, including breach and ransomware; data-security class action litigation; and international data protection. Our Global Privacy & Data Security Practice features a core team of more than 20 privacy professionals and is bolstered by over 60 attorneys from a variety of other disciplines firmwide. Our team combines compliance counselors, transactional lawyers, former government regulators and federal prosecutors, seasoned investigators, and experienced litigators. Few firms can rival our in-depth, sophisticated, and integrated experience in this area.
Practice Area
As society and business become even more digitalized, technology and intellectual property (IP) have become key focal points for businesses. Our Technology Antitrust Group combines the cross-practice and cross-office experience of our lawyers to assist clients in successfully navigating the dynamic convergence of technology, antitrust, and IP law. We understand the challenges presented by the ever-changing digital landscape and are committed to providing our clients with tailored solutions to address their specific needs.
Experience 3 results
Experience
|November 13, 2023
Insights & News 321 results
Sponsorship
|May 7, 2024
Winston & Strawn Sponsors 2024 IP Counsel Café Meeting
Winston & Strawn is proud to sponsor the IP Counsel Café Annual Meeting in Silicon Valley, California, from May 7-9, 2024. Partners attending include Robert Kang, Mike Rueckheim, and Saranya Raghavan.
Competition Corner
|April 23, 2024
|9 Min Read
FTC Adopts Final Ban on Worker Non-Competes
On April 23, 2024, the U.S. Federal Trade Commission promulgated a final rule banning non-compete clauses in contracts with employees and other workers (the Rule).
In the Media
|March 8, 2024
|1 Min Read
Carl Fornaris Discusses When Bank Regulators Must Close a Bank with Commercial Observer
Winston & Strawn partner Carl Fornaris was quoted in a recent Commercial Observer article discussing the possible failure of New York Community Bank after trading of the bank closed at $3.22. The article discussed how the FDIC receivership process is not tied to any bank’s stock price or even its uninsured depositor ratios, but rather to capital levels that indicate a bank’s ability to withstand depositor outflows. Carl said the FDIC’s licensing authority has a statutory obligation to close any bank after its capital level falls below a certain minimum threshold.
Other Results 22 results
Law Glossary
What Is Theft of Confidential Information Law?
Theft of confidential information law is a legal area that covers both business information and customer data stolen from a company. When confidential data is stolen from a computer or a network, a company has the right to file a lawsuit against the responsible party under the Computer Fraud and Abuse Act. This law is also violated when hackers steal the personally identifiable information of consumers through unauthorized access to a network.
Law Glossary
Cloud computing law deals with the legal issues, such as data confidentiality, that occur when business and personal assets are placed on a cloud computing service. Because the IT infrastructure used in the cloud is owned by someone other than the organization collecting the information, issues arise. Cloud computing allows companies to use fewer resources and may involve public, private, and hybrid versions of cloud processing and storage.
Law Glossary
Colloquially referred to as the “patent dance,” the BPCIA provides a framework that includes certain steps and a schedule during which the applicant and reference product sponsor exchange confidential information disclosed in the aBLA. During the patent dance, the applicant and sponsor identify the patents that could be litigated in the future during two potential phases of litigation. In the first phase, the sponsor can allege infringement of a subset of the patents identified during the patent dance. The second phase begins after the sponsor receives the Notice of Commercial Marketing from the applicant. During this second phase, the sponsor can assert any remaining patents that were not asserted in the first phase.