ARTICLE
9 March 2026

Key Takeaways And Access To Webinar Recording – The Modern Insider Threat: Shadow IT, BYOD, And Trade Secrets

SS
Seyfarth Shaw LLP

Contributor

With approximately 1,000 lawyers across 17 offices, Seyfarth Shaw LLP provides advisory, litigation, and transactional legal services to clients worldwide. Our high-caliber legal representation and advanced delivery capabilities allow us to take on our clients’ unique challenges and opportunities-no matter the scale or complexity. Whether navigating complex litigation, negotiating transformational deals, or advising on cross-border projects, our attorneys achieve exceptional legal outcomes. Our drive for excellence leads us to seek out better ways to work with our clients and each other. We have been first-to-market on many legal service delivery innovations-and we continue to break new ground with our clients every day. This long history of excellence and innovation has created a culture with a sense of purpose and belonging for all. In turn, our culture drives our commitment to the growth of our clients, the diversity of our people, and the resilience of our workforce.
As part of Seyfarth's 2026 Trade Secrets Webinar Series, our panel presented The Modern Insider Threat: Shadow IT, BYOD, and Trade Secrets, examining how evolving workplace technology is reshaping trade secret risk...
United States California Intellectual Property
Matthew Catalano’s articles from Seyfarth Shaw LLP are most popular:
  • within Intellectual Property topic(s)
  • in European Union
  • in European Union
  • in European Union
  • in European Union
  • in European Union
  • with readers working within the Banking & Credit, Healthcare and Media & Information industries
Seyfarth Shaw LLP are most popular:
  • within Compliance and Consumer Protection topic(s)

As part of Seyfarth's 2026 Trade Secrets Webinar Series, our panel presented The Modern Insider Threat: Shadow IT, BYOD, and Trade Secrets, examining how evolving workplace technology is reshaping trade secret risk, discovery obligations, and governance strategy.

Matthew Catalano, Peter Tsai, and Danny Riley led a practical discussion for general counsel, employment counsel, IP counsel, technology and cybersecurity teams, and HR professionals. With remote and hybrid work arrangements, employees increasingly rely on personal devices, unsanctioned apps, collaboration platforms, and generative AI tools — creating significant exposure when data moves beyond corporate control.

The program focused on identifying risks and actionable strategies for aligning Legal, HR, IT, and Security amid rapidly changing technology and regulatory scrutiny.

View the Recording – CLE credit for this recording expires on February 18, 2027. See description for jurisdictions and details.

Key Takeaways

Shadow IT and BYOD Are Trade Secret and Litigation Risks

Employees adopt personal devices and unsanctioned tools faster than policy can respond, creating invisible data flows outside corporate oversight. These blind spots raise trade secret, discovery, and regulatory concerns.

AI Has Accelerated Exposure

Generative AI tools are accessible and easy to use, they multiply risk: source code in chatbots, trade secrets submitted as prompts, and AI notetakers capturing privileged discussions. Courts applying the DTSA's "reasonable measures" standard will scrutinize gaps between policy and enforcement. AI agents generate logs, parameters, and decision paths that may themselves become relevant evidence.

Discovery Extends Beyond Corporate Systems

Data on personal devices, messaging apps, cloud drives, and AI chat platforms may all be discoverable, creating preservation risks and discovery blind spots.

Control under Rule 34 depends on policy and practice:

  • In re Pork Antitrust Litigation — remote wipe tools or the employer–employee relationship alone do not give a right to compel access to personal devices.
  • Westin— a specific agreement allowing searches of personal devices created an enforceable legal right; work-related text messages on personal devices were within company "control."

Generative AI further complicates discovery:

  • United States v. Heppner — AI Terms of Service can determine whether confidentiality is reasonable; generally no reasonable expectation of confidentiality for public AI chat platforms; a public AI chatbot is not an attorney.
  • Preservation may require capturing the prompt, the exact document version, and AI outputs.
  • AI Agent actions, logs, and decision pathways may also be discoverable, and automated alterations can create spoliation risk.

Privacy Laws Add Complexity — But Not Immunity

Monitoring for trade secret protection intersects with privacy laws such as California's CCPA and the EU's GDPR. Privacy does not remove governance obligations; it requires thoughtful balancing and documentation.

"Shadow contracts" — employees accepting SaaS terms without review — can bind the company to unfavorable data use or AI-training provisions.

Security Blind Spots Are Costly

Shadow IT operates outside logging, monitoring, and audit controls. Most incidents are unintentional, yet once sensitive information leaves controlled systems, corporate exposure to threat actors, plaintiffs, and regulators can follow.

Protection Requires Cross-Functional Alignment

Technology alone is insufficient; policies without enforcement lack defensibility. Effective management requires Legal, HR, IT, and Security coordination, with measurable standards such as auditability, preservation readiness, and compliance posture.

Looking Ahead

Shadow IT, BYOD, and AI are embedded in daily workflows. Courts are adapting discovery standards, and regulators scrutinize information governance practices. Organizations that assess high-risk roles, enforce approved tool frameworks, and align cross-functional stakeholders are best positioned to protect trade secrets while meeting discovery and compliance obligations.

To ensure you don't miss future sessions, subscribe to our Litigation – Trade Secrets & Non-Competes mailing list. For tailored programs, our attorneys are available to present customized sessions for your organization. Subscribe to our Trading Secrets blog for ongoing insights on trade secrets, employee mobility, and information governance.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More