The U.S. Supreme Court decided two cases recently that left untouched Section 230 of the Communications Decency Act, which provides online platforms immunity from claims based on content that their users create and share on...more
Since its inception in 1996, Section 230 of the Communications Decency Act has protected internet platforms from liability for third-party content posted on the platform. However, changes to Section 230’s protections are...more
On Monday, April 20th, the Supreme Court accepted cert in Van Burien v. United States to (hopefully) resolve a longstanding circuit split regarding the Computer Fraud and Abuse Act (or CFAA): Does an individual exceed...more
COVID-19 has presented countless challenges, among them, the extraordinary need—and conversely, extreme shortages—of basic protective gear, ventilators, and personal protective equipment (“PPEs”) for healthcare professionals...more
Consider this: a former employee has just left his or her employer and may have taken trade secrets to a competitor. ...more
3/25/2019
/ Confidential Information ,
Employee Mobility ,
Employee Monitoring ,
Employer Liability Issues ,
Employment Litigation ,
Facebook ,
Former Employee ,
Intellectual Property Protection ,
Misappropriation ,
Social Media ,
Trade Secrets
In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more
10/28/2016
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Mining ,
Department of Justice (DOJ) ,
FBI ,
Hackers ,
Phishing Scams ,
Rule 41 ,
Search Warrant
To qualify as a trade secret under either the UTSA or the DTSA, the information in question must not be “readily ascertainable” through “proper means.” But what does “readily ascertainable” mean? If information is...more
(Editorial Note: This is our first of a two-part series exploring recent litigation under the newly-enacted Defend Trade Secrets Act.)
In late May 2016, Magic Leap, Inc. became a pioneer in trade secrets litigation...more
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more
9/8/2015
/ China ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Security ,
Department of Homeland Security (DHS) ,
Espionage ,
Hackers ,
Misappropriation ,
Obama Administration ,
Popular ,
Sanctions ,
Trade Secrets
This past summer, we reported on an emergency petition to Justice Clarence Thomas of the United States Supreme Court to stay a Florida Supreme Court’s decision permitting disclosure of documents submitted under seal during a...more
Yihao “Ben” Pu is probably coming to grips with the phrases “crime doesn’t pay…” and “don’t do the crime unless you’re willing to do the time….” In federal court in Chicago, on Thursday, August 7, 2014, Pu, a former...more
In the Brady Bunch episode “Stop Tattling,” Mike Brady (the father) gives Cindy (youngest of the clan) a stern warning after her tattling lands Alice (the Brady caretaker) in hot water with Sam (the Brady’s butcher and...more