Posts in Computer Fraud and Abuse Act.
Blogs
Clock less than a minute

Thomson Reuters Practical Law published a Practice Note co-authored by Peter A. Steinmeyer and Robert D. GoldsteinMembers of the Firm, “Hiring from a Competitor: Practical Tips to Minimize Litigation Risk.”  This Practice Note discusses potential statutory and common law claims when hiring from a competitor, the need to identify any existing contractual restrictions a potential new hire may have, how to avoid potential issues during the recruitment process, ensuring the new hire is a “good leaver” during the resignation process, responding to cease ...

Blogs
Clock 4 minute read

[caption id="attachment_2116" align="alignright" width="113"] James P. Flynn[/caption]

In the recent case of United States v. Nosal, the United States Court of Appeals for the Ninth Circuit confirmed the applicability of both the Computer Fraud and Abuse Act and the Economic Espionage Act as safeguards against theft of trade secrets by departed former employees.  Importantly, Nosal applied such laws to convict a former employee in a case involving domestic businesses and personnel without any alleged overseas connections.  Because of civil enforcement provisions in the CFAA ...

Blogs
Clock 2 minute read

On March 20, 2015, a California federal court rejected an expansive reading of the Computer Fraud and Abuse Act (“CFAA”) urged by two plaintiff corporations that sought to hold a competitor and two of its directors liable under the CFAA, under an agency theory, for the actions of a former employee who allegedly downloaded and stole the corporations’ confidential trade secrets.

The plaintiffs, Koninklijke Philips N.V. and Philips Lumileds Lighting Company (“Lumileds”) are engaged in the business of Light Emitting Diode (“LED”) technology.  They alleged that Dr ...

Blogs
Clock 4 minute read
A recent decision from the District of Massachusetts highlights an ongoing split in the case law concerning the Computer Fraud and Abuse Act.
Blogs
Clock 3 minute read
A California legislator recently introduced two bills in Congress which, if passed, could have profound effects for companies seeking to pursue claims relating to trade secrets and confidential information - one bill would create a new private right of action under federal law for trade secret theft, while the other bill would appear to limit plaintiffs' abilities to pursue existing remedies for computer fraud and abuse.
Blogs
Clock less than a minute
In a recent case, the United States District Court for the District of Massachusetts issued the latest opinion regarding whether former employees violated the Computer Fraud and Abuse Act before they joined a competitor by downloading electronic information without authorized access.
Blogs
Clock 5 minute read
Practitioners in the area of trade secret protection and employee mobility law are still trying to sort out the impact of a federal court jury verdict in San Francisco last month finding former Korn Ferry executive David Nosal guilty of two criminal counts stemming from his alleged misappropriation of the Company's proprietary information after his departure.
Blogs
Clock 3 minute read
Last week, the U.S. Court of Appeals for the Fourth Circuit issued a decision regarding the scope of liability under the Computer Fraud and Abuse Act ("CFAA"), and sided with the Ninth Circuit in adopting a narrow reading of the statute. In affirming dismissal, the Fourth Circuit adopted "a narrow reading of the terms 'without authorization' and 'exceeds authorized access' and held that they apply only when an individual accesses a computer without permission or obtains or alters information on a computer beyond that which is authorized to access." The Fourth Circuit further rejected any CFAA liability grounded on an agency theory, noting that such a theory for liability has far-reaching effects unintended by Congress.
Blogs
Clock 2 minute read
An action pending in federal court in New York demonstrates that the Computer Fraud and Abuse Act ("CFAA") should not simply be added to an employer's complaint against its former employees and a competitor, primarily alleging common law claims sounding in misappropriation of trade secrets and unfair competition, in connection with the alleged poaching of the employer's clients. In a recent decision, the Court dismissed the state law claims, finding that they formed the real body of the case, and retained jurisdiction over the CFAA claim. The CFAA claim is now the subject of defendants' motion to dismiss, on the grounds that the former employees had authorized access to the computer systems of the employer, and therefore the statutory prerequisites to state a claim were not met.
Blogs
Clock 2 minute read
A lawsuit recently filed in the United States District Court for the Eastern District of Virginia could be of interest to employers and attorneys alike who are following the split in the courts across the country as to whether computer access while an employee meets the statutory test for "without authorization" under the Computer Fraud and Abuse Act.
Blogs
Clock less than a minute
This week, in LVRC Holdings LLC v. Brekka, the Ninth Circuit Court of Appeals issued a published opinion rejecting an employer's argument that its former employee violated the Computer Fraud and Abuse Act when he emailed company client lists and financial data to himself for personal use.
Blogs
Clock less than a minute
Employers looking to protect their intellectual property and proprietary information, and wondering whether they can punish the departing employees that ignore demands to return laptops and other transportable electronic devices that hold such data, may now have a newly invigorated weapon at their disposal -- the Computer Fraud and Abuse Act.

Search This Blog

Blog Editors

Recent Updates

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Trade Secrets & Employee Mobility posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.