Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In February 2014, a quantitative analyst at a New York hedge fund was arrested for using a decompiler program to view his employer's encrypted trading models and then sending them to his personal e-mail. He allegedly planned to take this information to a new employer, apparently for significant financial incentives. The incident is reminiscent of another widely publicized theft at Goldman Sachs. In 2009, a week before quitting his job to join another trading firm, Sergey Aleynikov, a programmer at Goldman Sachs, downloaded 32 megabytes of a proprietary algorithmic trading code from his employer. The code, which some called Goldman's “secret sauce,” was used for a high-frequency trading (HFT) system, whereby traders use computer algorithms to rapidly trade securities, taking advantage of minute price changes to make a profit. Aleynikov had been offered $1.2 million per year to join a startup seeking to develop its own HFT system. He took that offer and was arrested by FBI agents at Newark Airport before making the jump.
Although high-profile, these are not isolated incidents. Former employees escape with valuable information every day, resulting in substantial, sometimes devastating losses to employers. Some employees claim the trade secrets belong to them; others attempt to explain away their conduct. Devices such as the new untraceable Blackphone, developed by Spanish startup Geeksphone, adds another layer of complication as it encrypts e-mails and text messaging, and has anti-tracking services that will make it much more difficult to discover employee misconduct and gain access to data during litigation.
When facing such inside threats, many employers are aware of the standard precautionary measures to take, such as utilizing invention assignment agreements and confidentiality agreements, requiring passwords and limiting access to key databases. Fewer are prepared, however, with a plan and an immediate response team to address an actual breach. Following three key steps can help to make the difference. This article provides a glimpse into what happens on game day when valuable information is compromised and decisions need to be made fast.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.