Remove Business Remove Confidentiality Remove Contracts Remove Privacy
article thumbnail

Legal Tug-Of-War: Protecting Privilege in Privacy Breach Disputes

IPilogue

Privacy breaches are becoming commonplace in today’s business landscape and cybersecurity is top of mind for many organizations— and for good reason. This situation is exacerbated by the risk of litigation, as lawsuits are a legitimate consequence of a privacy breach. Kaplan v Casino Rama Services Inc.

Privacy 106
article thumbnail

Learning About the Business of Healthcare and Innovation: My Internship Experience at AstraZeneca Canada

IPilogue

I worked within the legal team, under the supervision of Denise Lacombe, Head of Legal and collaborated with Lynne Sweeney, Legal Counsel and Cristina Aguirre, Privacy Officer as well. AstraZeneca is a global company, some contracts can require engaging in services in other countries.

Business 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mind Your Audience: Disclosure of Confidential Information to AI Programs Can Give Rise to Trade Secret Misappropriation Claims

LexBlog IP

AI tools such as Chat GPT and Otter are becoming common programs that employees use to help streamline business tasks. The use of an AI tool to, for example, record a meeting that discusses company confidential information, can give rise to claims of trade secret misappropriation. For example, in a recently filed complaint in the U.S.

article thumbnail

Ping® January 2022 – Reminder To Review Your Contracts

LexBlog IP

Review Your Contracts Every Year. One of the most important tools to protect your business – your ideas (copyrights, trademarks, trade secrets, confidential and proprietary information), customer relationships and talent pool – is your written contract. Franken-contracts can ruin your business.

article thumbnail

A Comprehensive Look at Data Privacy

LexBlog IP

data privacy : what businesses NEED TO know. Keeping pace with the state of data privacy and data privacy regulations is becoming a pressing responsibility for businesses in the digital age. Jump to a Section: What is Data Privacy? Data Privacy versus Data Security? Common Threats to Data Privacy.

Privacy 52
article thumbnail

NDA: An Effective Way to Protect Confidential Information

LexBlog IP

Shi then left Elation to start a business marketing “similar, if not identical software” using replicated source code. A settlement agreement was reached where Elation could inspect the software developed by Shi and prevent the use of any trade secrets or confidential information. ’” (Quoting Sweet v.

article thumbnail

UAE Regulations for E-Commerce Businesses: A Comprehensive Overview

LexBlog IP

In this article, we will delve into the key provisions of these laws and their implications for e-commerce businesses in the UAE. Electronic signatures are recognized as equivalent to handwritten signatures, and contracts remain valid and enforceable if made using electronic documents. These contracts are legally valid and enforceable.