Site Search
Professionals 60 results
Capabilities 19 results
Practice Area
Trade Secrets, Non Competes & Restrictive Covenants
Theft of trade secrets and other confidential information occurs all too frequently in today’s global, highly mobile, and competitive marketplace. In the course of advising clients, we have developed comprehensive, yet scalable, strategies for both mitigating against and responding to issues along the trade secrets protection spectrum, including helping position clients proactively before trade secrets theft occurs.
Practice Area
Winston takes a strategic approach to privacy and data security, integrating our extensive capabilities across practices to provide our clients with cutting-edge privacy and data security counseling, crisis management, security incident investigation and notification management, defense of data security class action litigation and regulatory inquiries, and international data protection. Our Global Privacy & Data Security Practice features a core team of privacy professionals and is bolstered by more than 40 attorneys from a variety of other disciplines firmwide. Our team combines compliance counselors, transactional lawyers, former government regulators and federal prosecutors, seasoned investigators, and experienced litigators. Few firms can rival our in-depth, sophisticated, and integrated experience in this area.
Practice Area
As society and business become even more digitalized, technology and intellectual property (IP) have become key focal points for businesses. Our Technology Antitrust Group combines the cross-practice and cross-office experience of our lawyers to assist clients in successfully navigating the dynamic convergence of technology, antitrust, and IP law. We understand the challenges presented by the ever-changing digital landscape and are committed to providing our clients with tailored solutions to address their specific needs.
Experience 3 results
Experience
|November 7, 2023
Insights & News 347 results
Client Alert
|June 24, 2025
|10+ Min Read
Receiving notice of an SEC investigation is not only a stressful moment for any public company—it is one that requires prompt and diligent action. This guide provides an overview of the stages of an SEC investigation and some key considerations along the way, including best practices to avoid regulatory scrutiny in the first instance.
In the Media
|June 20, 2025
|1 Min Read
Mike Blankenship Discusses IPO Market Rebound with Venture Capital Journal
Winston & Strawn partner Mike Blankenship was quoted in a Venture Capital Journal article discussing his perspective on the rebound in the IPO market. According to Venture Capital Journal, at the end of May, US IPO volume was double where it was in the previous two years, with 141 IPOs completed on US exchanges in the first five months of the year, up from 77 in the same period in 2024 and 68 in the first five months of 2023.
Client Alert
|May 22, 2025
|8 Min Read
EcoFactor, Inc. v. Google LLC, Case No. 2023-1101 (Fed. Cir. May 21, 2025) (en banc)
Other Results 24 results
Law Glossary
What Is Theft of Confidential Information Law?
Theft of confidential information law is a legal area that covers both business information and customer data stolen from a company. When confidential data is stolen from a computer or a network, a company has the right to file a lawsuit against the responsible party under the Computer Fraud and Abuse Act. This law is also violated when hackers steal the personally identifiable information of consumers through unauthorized access to a network.
Law Glossary
Cloud computing law deals with the legal issues, such as data confidentiality, that occur when business and personal assets are placed on a cloud computing service. Because the IT infrastructure used in the cloud is owned by someone other than the organization collecting the information, issues arise. Cloud computing allows companies to use fewer resources and may involve public, private, and hybrid versions of cloud processing and storage.
Law Glossary
Colloquially referred to as the “patent dance,” the BPCIA provides a framework that includes certain steps and a schedule during which the applicant and reference product sponsor exchange confidential information disclosed in the aBLA. During the patent dance, the applicant and sponsor identify the patents that could be litigated in the future during two potential phases of litigation. In the first phase, the sponsor can allege infringement of a subset of the patents identified during the patent dance. The second phase begins after the sponsor receives the Notice of Commercial Marketing from the applicant. During this second phase, the sponsor can assert any remaining patents that were not asserted in the first phase.