Sentences with phrase «protected as trade secrets»

That's in part because the identity of the chemicals used by the gas industry for drilling and fracturing are protected as trade secrets, and because the EPA, based on an exemption passed under the 2005 Energy Policy Act, does not have authority to investigate the fracturing process under the Safe Drinking Water Act.
THE OUTCOME: PepsiCo says the documents detailing the Pepsi formula are company property and should be protected as trade secrets, while the Ritchies argue it's their First Amendment right to disclose their father's papers.

Not exact matches

The former employer sued, but the court ruled that the information did not count as protected trade secrets because the company didn't take reasonable security measures to protect the information.
Be aware of rules that protect employees» freedom of speech as well as the firm's ability to safeguard trade secrets and confidential business information.
From a legal perspective, you will need to consider whether it is better to protect a product under a patent or as a trade secret.
If you choose to protect your invention as a trade secret, the law will only protect your innovation against unlawful discovery.
Consistent with the Hoover Report's recommendations that the United States had to reconsider «long - standing American concepts of fair play» and «learn to subvert, sabotage and destroy our enemies,» the shadow government built alliances between U.S. government officials, the Mafia, and international drug cartels; assassinated many thousands of civilians in Southeast Asia; carried out or attempted assassination of foreign leaders; trained death squads and secret police forces; worked to shore up unpopular dictators like the Shah of Iran and the Somoza dictatorship in prerevolutionary Nicaragua; worked to destabilize «unfriendly» governments such as Allende in Chile and the Sandinistas in Nicaragua; cooperated with the Colombian drug cartel to plot the assassination of the former U.S. ambassador to Costa Rica, Lewis Tambs, with the intention of justifying a U.S. invasion of Nicaragua by blaming his death on the Sandinistas; contracted with the Reagan administration and the National Security Council to find ways of circumventing a congressional ban prohibiting aid to the contras, including the trading of arms to Iran in exchange for hostages and money for the contras; illegally shipped weapons from the United States to the contras and allowed returning planes to use the same protected flight paths to transport drugs into the United States; 11 targeted the U.S. people for disinformation campaigns; and helped prepare contingency plans for declaring a form of martial law in the United States that would have formally suspended constitutional freedoms.
By submitting User Materials to or using the Site, you represent that you have the full legal right to provide the User Materials, that such User Materials will not: (a) divulge any protected health information or infringe any intellectual property rights of any person or entity or any rights of publicity, personality, or privacy of any person or entity, including without limitation as a result of your failure to obtain consent to post personally identifying or otherwise private information about a person or which impersonates another person; (b) violate any law, statute, ordinance, or regulation; (c) be defamatory, libelous or trade libelous, unlawfully threatening, or unlawfully harassing or embarrassing; (d) be obscene, child pornographic, or indecent; (e) violate any community or Internet standard; (f) contain any viruses, Trojan horses, worms, time bombs, cancelbots, or other computer programming routines that damage, detrimentally interfere with, surreptitiously intercept, or expropriate any system, data or personal information, or that facilitate or enable such or that are intended to do any of the foregoing; (g) result in product liability, tort, breach of contract, personal injury, death, or property damage; (h) constitute misappropriation of any trade secret or know - how; or (i) constitute disclosure of any confidential information owned by any third party.
In the United States, cosmetics companies producing skin care, perfumes, and candles are legally permitted to list «fragrance» on the list of ingredients without explaining what that means, because the FDA protects it as «trade secrets
Film Review by Kam Williams Headline: More Chemistry than Coherency in Confusing Cat - and - Mouse Caper Ray Koval (Clive Owen) enjoyed a 12 - year tenure with MI6 as a spy for the British government before taking a job in the private sector to help protect the trade secrets of a corporate giant called Equikrom.
Except as otherwise indicated, our Websites and Content, and all rights thereto, are the property of AWP USA Inc. and / or our affiliated companies and are protected under U.S. copyright, trade secret, trademark and patent law as well as international treaty provisions, with all rights reserved.
Blue Buffalo Content is protected by copyright, trademark, patent, trade secret and other laws, and, as between you and Blue Buffalo, Blue Buffalo owns and retains all rights in all Blue Buffalo Content and the Services.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
ABN: When we first talked, you mentioned that artists might also need to protect other kinds of rights, such as trade secrets or patents.
All material and services available on the Site, and all material and services provided by or through Squarespace, its affiliates, subsidiaries, employees, agents, licensors or other commercial partners including, but not limited to, software, all informational text, software documentation, design of and «look and feel,» layout, photographs, graphics, audio, video, messages, interactive and instant messaging, design and functions, files, documents, images, or other materials, whether publicly posted or privately transmitted as well as all derivative works thereof (collectively, the «Materials»), are owned by us or other parties that have licensed their material or provided services to us, and are protected by copyright, trademark, trade secret and other intellectual property laws.
To allow an adequate time buffer for clients to scale, it is worthwhile taking a hard look at the relative advantages and disadvantages of protecting intellectual property as a trade secret as opposed to providing public disclosure to competitors by way of a patent filing.
You have a choice of protecting information such as products, inventions, designs, processes, customer lists, pricing, trade secrets, and more.
The UTSA, enacted in almost the entire U.S., except for the states of New York, North Carolina, and Massachusetts, is designed to protect trade secrets from misappropriation by enabling injunctive relief and damages against parties that obtained your idea through improper means, such as espionage or theft.
Mr. Gatto's practice is national and international, and it encompasses a full range of IP and technology issues, including: patent, trademark, copyright and trade secret litigation; counseling and technology transactions; developing and implementing IP strategies to protect and to monetize IP assets; creating and implementing corporate IP programs; conducting IP audits; conducting complex patent prosecution, including patent appeals, interferences, Inter Partes Review (IPRs), reissues and protests; handling patent enforcement issues, including licensing and litigation; negotiating and drafting technology agreements; conducting IP due diligence in and negotiating IP aspects of mergers, acquisitions and financings; rendering opinions concerning the infringement, validity and enforceability of patents; handling trademark prosecution, domain name, copyright and trade secret matters; handling IP aspects of employment issues; advising clients on legal issues associated with open source software including open source patent issues, licensing, open source compatibility issues, indemnity issues and developing and implementing corporate policies on use of open source software; advising clients on the legality of cutting edge Internet business methods and technology; and advising clients on computer law issues such as computer fraud and abuse and SPAM - related issues.
Dr. Adli is well recognized as a premier strategist in patent, trademark, copyright, trade secret and complex commercial disputes and is widely sought after by businesses large and small, seeking effective strategies for protecting their valuable intellectual property assets.
I can talk for another three hours if we go into details of these factors but to make it short, if you would like to condense the above mentioned as key actions tech companies should take when protecting their invention, I would recommend key actions for making information intangible assets, which are documentation, classification, and proper measures to secure confidentiality of information, so as to make information qualified as trade secret and know - how protected by law.
As a result, in addition to posts about recent and noteworthy legal decisions, this blog will also speak to practical litigation issues that frequently accompany trade secret litigation, consider larger societal and technological trends that affect this area, and, finally and perhaps most importantly, speak to administrative and human resources issues that also arise in this context and that need to be considered to protect trade secrets.
The IT acknowledged, however, that for the purposes of s 41, genuine trade secrets or information of a technical nature may still be protected as confidential information since it is information obtained by the public authority from any other person.
Valuable information — both technological and commercial — can be protected and exploited as trade secrets if the appropriate safeguards are followed.
Don't be afraid to talk about the brands you've worked on, as long as the information isn't protected by a confidential NDA or trade secret agreement.
By accessing IResumeCoverLetter.com you acknowledge that all content herein, with any derivative works and proprietary or confidential data included, is protected by trademarks, copyrights, patents, trade secrets, service marks, proprietary rights as well as the other intellectual properties owned and managed by I Resume Cover Letter, its affiliates and other third parties that have licensed their content to IResumeCoverLetter.com and the team managing and operating it.
a b c d e f g h i j k l m n o p q r s t u v w x y z