Skip to content

Menu

LexBlog, Inc. logo
NetworkSub-MenuBrowse by SubjectBrowse by PublisherBrowse by ChannelAbout the NetworkJoin the NetworkProductsSub-MenuProducts OverviewBlog ProBlog PlusBlog PremierMicrositeSyndication PortalsAbout UsContactSubscribeSupport
Book a Demo
Search
Close

AIPLA Conference on Trade Secret Litigation Recap: Part 2 – Forensics

By Thomas Hubert, Joseph Lavigne & PJ Kee on May 2, 2025
Email this postTweet this postLike this postShare this post on LinkedIn
Vector data security background
Vector blue data cyber security concept background. Circuit board padlock

Our team attended the recent AIPLA Trade Secret Summit, one of the nation’s premier conferences on trade secret law. Critical issues surrounding the protection of confidential business information took center stage and we were reminded just how important it is for companies to stay ahead of the curve to safeguard against unfair competition and trade secret theft. 

Several topics were key takeaways for us. We last wrote on the nuances of joint representation of an onboarding employee and the hiring company. Another key topic that should be a key consideration for companies protecting trade secrets is the theft of company information and forensics.

Theft of Company Information and Forensics

Theft of company information has become a technological artform. A study referenced during the AIPLA was performed by the Ponemon Institute. The study found that over 60 percent of companies polled had experienced attempts to steal proprietary information. With this as a backdrop, there does not appear to be any question that companies large and small should be taking action to protect their valuable information from theft. Based on experience, the low hanging fruit for finding evidence of information migration outside of the organization is email, removable media, printed materials, remote network access, file transfer, downloads to laptops, and now a fan favorite, screen shots from an alternative device (which can be very difficult to detect without obtaining the device used). When an employee is offboarding, it is crucial to take inventory of all electronic equipment to be left behind inclusive of external storage devices. There is no better time than at the exit interview to discuss every device utilized by the employee and the return of those devices. It is also crucial to obtain credentials to any company device being returned and passwords to any cloud-based accounts used the by the exiting employee.

These steps may seem self-evident and, in some cases, may seem to come across as accusatory, but gathering this information once the individual is off at another place of employment is very difficult if not impossible to accomplish. If there is any inkling of suspicion: 

  1. A company should engage in a multi month look back at email traffic to determine if there is any suspicious activity. 
     
  2. If suspicious activity is found, calling upon forensic experts to run full evaluations of all returned devices typically provides a picture that leads to a full throttle approach to retrieving stolen information or to a level of comfort that the exited employee has left all proprietary information behind. 

In any trade secret investigation, there is little question that utilizing third party forensic experts will provide a court with a level of confidence necessary to justify entry of restraining orders and ultimately injunctive relief intended to retrieve, prevent use of propriety information, and to cease any potential damage coming to fruition.  

The foregoing was a common theme amongst many presenters at the conference and excellent guidance for practitioners and their clients. 

Photo of Thomas Hubert Thomas Hubert

Thomas Hubert is an Editor and Founder of the Trade Secret Insider and is a senior partner for Jones Walker’s Trade Secret and Non-Compete Team. Mr. Hubert has extensive trial experience in trade secret, non-compete, and unfair competition cases — where he has …

Thomas Hubert is an Editor and Founder of the Trade Secret Insider and is a senior partner for Jones Walker’s Trade Secret and Non-Compete Team. Mr. Hubert has extensive trial experience in trade secret, non-compete, and unfair competition cases — where he has not only obtained and fended off injunctions but also won on the merits at trial. He also counsels clients on best practices for protecting trade secret information and for avoiding liability when hiring talent from a competitor. Mr. Hubert can be reached at thubert@joneswalker.com or 504.582.8384.

Read more about Thomas HubertEmail
Show more Show less
Photo of Joseph Lavigne Joseph Lavigne

Joseph Lavigne is a founder and editor of the Trade Secret Insider and is a lead partner for Jones Walker’s Trade Secret Non-Compete Team. He has years of experience litigating trade secret, non-compete, computer fraud, and unfair competition cases — in both federal…

Joseph Lavigne is a founder and editor of the Trade Secret Insider and is a lead partner for Jones Walker’s Trade Secret Non-Compete Team. He has years of experience litigating trade secret, non-compete, computer fraud, and unfair competition cases — in both federal and state courts. Several of these cases established Louisiana’s law on trade secrets and non-competes. He also actively advises clients on how to protect their trade secrets and retain key personnel, as well as ways to avoid liability when hiring key personnel from a competitor. Mr. Lavigne can be reached at jlavigne@joneswalker.com or 504.582.8610.

Read more about Joseph LavigneEmail
Show more Show less
Photo of PJ Kee PJ Kee

PJ Kee is an Editor and Founder of the Trade Secret Insider and a member of Jones Walker’s Trade Secret and Non-Compete Team. He regularly litigates cases involving trade secret theft, non-competes, computer fraud, conspiracies, and unfair competition, and counsels clients on strategies…

PJ Kee is an Editor and Founder of the Trade Secret Insider and a member of Jones Walker’s Trade Secret and Non-Compete Team. He regularly litigates cases involving trade secret theft, non-competes, computer fraud, conspiracies, and unfair competition, and counsels clients on strategies to protect their trade secrets. Mr. Kee also represents clients in criminal proceedings and litigates complex commercial and employment matters involving various breach-of-contract claims, business torts, invasion of privacy claims, defamation, and wage and hour disputes. He can be reached at pkee@joneswalker.com or 504.582.8230.

Read more about PJ KeeEmail
Show more Show less
  • Posted in:
    Intellectual Property
  • Blog:
    Trade Secret Insider
  • Organization:
    Jones Walker LLP
  • Article: View Original Source

LexBlog, Inc. logo
Facebook LinkedIn Twitter RSS
Real Lawyers
99 Park Row
  • About LexBlog
  • Careers
  • Press
  • Contact LexBlog
  • Privacy Policy
  • Editorial Policy
  • Disclaimer
  • Terms of Service
  • RSS Terms of Service
  • Products
  • Blog Pro
  • Blog Plus
  • Blog Premier
  • Microsite
  • Syndication Portals
  • LexBlog Community
  • Resource Center
  • 1-800-913-0988
  • Submit a Request
  • Support Center
  • System Status
  • Resource Center
  • Blogging 101

New to the Network

  • Tennessee Insurance Litigation Blog
  • Claims & Sustains
  • New Jersey Restraining Order Lawyers
  • New Jersey Gun Lawyers
  • Blog of Reason
Copyright © 2025, LexBlog, Inc. All Rights Reserved.
Law blog design & platform by LexBlog LexBlog Logo