Cyber Spies Stealing Corporate Secrets & Technology
Client Alert | 1 min read | 04.09.14
With cyber heists plundering $1 trillion in global intellectual property (per President Obama) and driving "the greatest transfer of wealth in human history" (per NSA Director Alexander), corporations face bet-the-company threats when cyber attacks and data breaches empty their intellectual property vaults, torpedo their mergers and business deals, and crush their stock prices. In their recent article, "Pillaging the Digital Treasure Troves: The Technology, Economics, and Law of Cyber Espionage," published in the ABA's The SciTech Lawyer (Winter 2014), C&M attorneys David Bodenheimer and Gordon Griffin explore the methods employed by cyber spies to steal corporate IP and trade secrets, discuss the economic impact of cyber theft at the individual corporate level (i.e., the business case for cybersecurity), and the looming litigation, regulatory, and enforcement risks to corporations suffering technology and IP losses as a result of cyber thefts.
Insights
Client Alert | 2 min read | 12.29.25
FYI – GAO Finds Key Person “Available” Despite Accepting Employment with a Different Company
GAO’s key personnel rule is well-known—and often a source of frustration— amongst government contractors. Proposed key personnel who become “unavailable” prior to contract award—especially where they have accepted employment with a different company—may doom an offeror’s proposal by rendering it noncompliant with solicitation requirements. But GAO’s recent decision in FYI – For Your Information, Inc., B-423774, B-423774.2 (Dec. 19, 2025) provides some potential relief from that rule.
Client Alert | 4 min read | 12.29.25
More Than Math: How Desjardins Recognizes AI Innovations as Patent-Eligible Technology
Client Alert | 10 min read | 12.24.25
Client Alert | 3 min read | 12.24.25
Keeping it Real: FTC Targets Fake Reviews in First Consumer Review Rule
