Remove Confidentiality Remove Document Remove Litigation Remove Privacy
article thumbnail

Legal Tug-Of-War: Protecting Privilege in Privacy Breach Disputes

IPilogue

Privacy breaches are becoming commonplace in today’s business landscape and cybersecurity is top of mind for many organizations— and for good reason. This situation is exacerbated by the risk of litigation, as lawsuits are a legitimate consequence of a privacy breach.

Privacy 106
article thumbnail

Precedential No. 25: TTAB Rejects Proposed Modification of Standard Protective Order, Refuses to Apply EU Privacy Regulation

The TTABlog

Modification of the SPO: Under the SPO, which is automatically entered in all inter partes proceedings, only outside counsel have access to confidential material and information that is designated as AEO. In short, the Board has an interest in "protecting confidential information and protecting against its inappropriate release."

Privacy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Signed, Sealed, Delivered? Fifth Circuit Finds Sealing of Sensitive Information Requires Far More Than a Protective Order

LexBlog IP

Trade secret litigation presents a variety of procedural and practical complexities at every stage of the proceeding. The issue is further exacerbated because adverse litigants in trade secret cases are frequently industry competitors. After all, both parties likely want their sensitive documents protected from disclosure.

article thumbnail

Kerala High Court on Publishing Judgments and Right to be Forgotten: Some Points to Ponder Upon

SpicyIP

And within this binary of – to be known/remembered and to be forgotten, a lot can come, including what public documents can be published and what cannot be. And Other Connected Cases while deciding on a litany of 9 litigations. Privacy and Anonymity. Union of India & Anr. In such cases, the (artificial?)

article thumbnail

Minnesota’s Attempt to Copy California’s Constitutionally Defective Age Appropriate Design Code is an Utter Fail (Guest Blog Post)

Technology & Marketing Law Blog

The DPIAs must: “document any risk of material detriment to children that arises from the data management practices of the business identified in the data protection impact assessment.” Plus, DPIAs pose potential security risks due to the sensitive and confidential nature of the information contained within the reports.

Copying 127
article thumbnail

Georgia jury says "no trade secrets" in Boeing wing-component dispute

The IPKat

Before she hangs up her litigation gloves, her goal is to work on a case involving airplanes. Those who needed to know then had to sign a separate confidentiality agreement. This Kat loves airplanes. If that case involved trade secrets, even better.

article thumbnail

2023 Quick Links: Leftovers

Technology & Marketing Law Blog

Rivals * MIT Technology Review : This new data poisoning tool lets artists fight back against generative AI (regarding “Nightshade”) Privacy * FTC v. Although this distinction does not eliminate all the privacy concerns voiced by the FTC in this lawsuit, it does lessen the severity of the alleged privacy injury.