Posts tagged Confidential Information.
Blogs
Clock 3 minute read

As we all await rulings on the lawsuits challenging the FTC’s Noncompete Rule (one of which may be decided later today), we provide an update on the Knicks/Raptors trade secret case that we previously discussed on EBG’s Spilling Secrets Podcast Series and blogged about here.  Although the Knicks had a successful year on the court, they suffered an in court loss last week to the Toronto Raptors.    

In the March 2024 edition, Bracket-Busting Trade Secret and Non-Compete Disputes in Sports, we discussed the Knicks’ federal court action against the Toronto Raptors for theft of trade secrets.  We noted that the Knicks sought neither a Temporary Restraining Order nor a Preliminary Injunction and that the defendants filed a motion to dismiss or, alternatively, to stay the case pending arbitration before the Commissioner of the NBA.      

In a lawsuit filed in the United States District Court for the Southern District of New York, the Knicks alleged that their former employee and now current Raptors employee, Ikechukwu Azotam, misappropriated the Knicks’ confidential and proprietary information at the behest of the Raptors, in violation of the Defend Trade Secrets Act (“DTSA”), Computer Fraud and Abuse Act (the “CFAA”), as well as various common law claims.  The defendants moved to dismiss or, alternatively, to compel arbitration pursuant to the NBA’s Constitution and By-Laws, which provide that the NBA Commissioner shall have complete and final jurisdiction over any dispute involving two or more members of the NBA. 

Blogs
Clock 2 minute read

A federal judge in Chicago recently taught a painful lesson to an Illinois employer: even if information is sufficiently sensitive and valuable that it could qualify as a “trade secret,” it won’t unless the owner of the information took adequate steps to protect its secrecy.

In a thorough opinion issued in the case, Abrasic 90 Inc., d/b/a CGW Camel Grinding Wheels, USA v. Weldcote Metals, Inc., Joseph O’Mera and Colleen Cervencik, U.S. District Judge John J. Tharp, Jr. of the Northern District of Illinois explained that “there are two basic elements to the analysis” of ...

Blogs
Clock 4 minute read

Consider the following scenario: your organization holds an annual meeting with all Research & Development employees for the purpose of having an open discussion between thought leaders and R&D regarding product-development capabilities. This year’s meeting is scheduled outside the United States and next year’s will be within the U.S. with all non-U.S. R&D employees traveling into the U.S. to attend. For each meeting, your employees may be subject to a search of their electronic devices, including any laptop that may contain your company’s trade secrets. Pursuant to a new ...

Blogs
Clock less than a minute

In a very thorough analysis following a 3 day Preliminary Injunction hearing Judge Jed Rakoff declined to issue injunctive relief to a former employer seeking to enjoin four former employees and their new employer from competing or from soliciting clients or employees. The decision is far ranging in the employee movement context touching upon inadvertent retention of confidential information, the propriety of new employers providing broad indemnifications and large signing bonuses to the recruits,  and the scope of allowable “preparatory conduct” in a one year non-compete ...

Blogs
Clock less than a minute

The Manhattan District Attorney’s office last week prevailed over Sergey Aleynikov, the former Goldman Sachs high frequency trading programmer accused of stealing computer source code from the bank, on just one count of the three of which he was charged.  It is somewhat hard to imagine how one might be found guilty of “unlawful use of secret scientific material” (N.Y. Penal Law § 165.07 as defined in § 155.00(6)), yet not get convicted for “unlawful duplication of computer related material” (N.Y. Penal Law § 156.30).

With Mr. Aleynikov previously avoiding federal charges ...

Blogs
Clock less than a minute
Employers looking to protect their intellectual property and proprietary information, and wondering whether they can punish the departing employees that ignore demands to return laptops and other transportable electronic devices that hold such data, may now have a newly invigorated weapon at their disposal -- the Computer Fraud and Abuse Act.

Search This Blog

Blog Editors

Recent Updates

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Trade Secrets & Employee Mobility posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.