However, in assessing this situation, corporate security experts have concluded that the security breach (1) compromised IT infrastructure; (2) disseminated unflattering/contentious emails; and (c) resulted in losses of proprietary information
related to new film projects, scripts, contracts, marketing plans and copies of unreleased films (Mamiit, 2014).
The Chinese wall is composed of a clean environment demonstrably uncontaminated by any proprietary information
or knowledge of such through a discipline of multidimensional separation.
Accordingly, Part IV concludes that although proprietary information
might require legal recognition in certain circumstances, courts should take two steps to limit overenforcement.
Surprisingly, many companies do not appreciate their right to protect their trade secrets and proprietary information
from misuse by their employees and further do not fully appreciate their employees' duty of loyalty on general legal principles, under employment agreements and under the law, even without such agreements.
In a signed Consent Order filed with the Superior Court on January 10, 2005, Landers admitted removing NPT's confidential and proprietary information
, including: annual and projected budgetary information; production costs; employee salary and anticipated business information; a "booking report;" and advertising information, including revenue data and NPT's list of potential and existing advertisers and contact information.
In this Internet age, your proprietary information
can be electronically distributed to thousands of recipients by a single perpetrator, which makes complete retrieval of the information nearly impossible.
citizens, payroll and financial transactions, proprietary information
, agricultural production and marketing estimates, and mission critical data"--at risk of undetected disclosure, modification, or loss.
For now, Crosby's main focus is the investigation into whether Boeing got a sweet-heart deal on the tankers, including, allegedly, access to proprietary information
that EADS submitted to the Air Force.
NASA says it now has contractors watchdogging other contractors, so the agency is proposing a new rule governing how one company must protect another company's proprietary information
I believe the publishing industry has missed opportunities to do this, because of its obsession with preventing subscribers from sharing proprietary information
. Designing systems to encourage sharing gives a very different perspective.
By utilizing these databases, attorneys can monitor their cases and keep track of all related deadlines, such as those that follow publishing a notice of investigation, filing an application for release of proprietary information
under protective order, filing a petition for reconsideration, and service of the initial determination of the Administrative Law Judge.
This decision was made shortly after Boeing disclosed to the government that employees of its EKV team had obtained and misused proprietary information
developed by the other EKV competitor, Raytheon.