Cross Icon
After negotiations for a purchase of a client by a potential buyer fell apart, the buyer threatened to use the confidential and proprietary information it obtained during the due diligence phase against that client.  Within two weeks of receiving that threat, Lauren negotiated the destruction and/or return of all such information to my client and obtained assurances that it would not be used in the future.

After negotiations for a purchase of a client by a potential buyer fell apart, the buyer threatened to use the confidential and proprietary information it obtained during the due diligence phase against that client. Within two weeks of receiving that threat, Lauren negotiated the destruction and/or return of all such information to my client and obtained assurances that it would not be used in the future.

After negotiations for a purchase of a client by a potential buyer fell apart, the buyer threatened to use the confidential and proprietary information it obtained during the due diligence phase against that client. Within two weeks of receiving that threat, Lauren negotiated the destruction and/or return of all such information to my client and obtained assurances that it would not be used in the future.