Nick Akerman

Nick Akerman

Dorsey & Whitney LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

How to Prepare for Theft of Company Information

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

7/11/2016 - Asset Seizure Confidential Information Confidentiality Agreements Data Protection Defend Trade Secrets Act (DTSA) Economic Espionage Act Ex Parte Intellectual Property Protection Misappropriation Private Right of Action RICO Trade Secrets

Dorsey Anti-Corruption Digest - April 2016

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. In this digest, we draw together news of enforcement activity throughout the world and aim to reduce your information overload. Our London, Minneapolis, New York...more

4/28/2016 - Alstom Anti-Corruption Avon Brazil Bribery Compliance Cooperation Deferred Prosecution Agreements DOJ Egypt Enforcement Actions FCPA Federal Pilot Programs Federal Sentencing Guidelines Kuwait Novartis Remediation SEC Self-Reporting Serbia Serious Fraud Office Turkey UK Voluntary Disclosure Wells Fargo White Collar Crimes

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

4/21/2016 - Board of Directors CEOs Chief Information Officers (CIO) CISO Cyber Threats Cybersecurity

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

4/21/2016 - Collaboration Cybersecurity Data Breach Data Protection Employee Training Employment Contract FINRA Hiring & Firing Personally Identifiable Information Popular Risk Management SEC Third-Party Service Provider

‘Cannibal Cop’ Decision Restrains Employers

Second Circuit ruling on data theft creates more inconsistency regarding federal law’s reach. In December, a divided panel of the U.S. Court of Appeals for the Second Circuit in U.S. v. Valle interpreted the Computer...more

1/13/2016 - Computer Fraud and Abuse Act (CFAA) Data Theft Policies and Procedures Popular Split of Authority Unauthorized Access

Dorsey Anti-Corruption Digest - October 2015

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. In this digest, we draw together news of enforcement activity throughout the world and aim to reduce your information overload. Our London, Minneapolis, New York...more

11/2/2015 - Bribery Bristol-Myers Squibb Broken Windows China Corporate Officers Corruption DOJ Enforcement Actions FCPA Government Investigations Hitachi Ireland SEC Siemens Whistleblower Protection Policies Yates Memorandum

Time Is Precious with Computer-Hacking Claims

A recent ruling shows that plaintiffs must act fast when using a federal criminal statute for a civil suit. The U.S. Court of Appeals for the Second Circuit in August addressed the proper application of the statute of...more

10/29/2015 - Appeals Compensatory Damages Computer Fraud and Abuse Act (CFAA) Data Breach Email Facebook Hackers Injunctive Relief Statute of Limitations

The Yates Memo: A New DOJ Investigative Approach - Update

Since at least the market crisis there has been a clamor to convict senior corporate officials of federal felonies – or at least name them in a civil law enforcement action by the SEC or another agency. For years the...more

10/7/2015 - C-Suite Executives Cooperation Corporate Management Corporate Misconduct Corporate Officers Criminal Prosecution DOJ Government Investigations Law Enforcement White Collar Crimes Yates Memorandum

How To Make Computer Fraud Claims Stick

Employers need clear policies in order to use a federal criminal law as a civil remedy against workers. The recent decision in Allied Portables v. Youmans from the U.S. District Court for the Middle District of Florida...more

8/4/2015 - Computer Fraud and Abuse Act (CFAA) Data Privacy Employment Policies Former Employee Litigation Strategies Security and Privacy Controls

New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strength­en the country’s response to...more

3/24/2015 - Barack Obama Computer Fraud and Abuse Act (CFAA) Cyber Crimes Cybersecurity Proposed Legislation RICO

To Catch an E-Thief — Under Federal Property Law

As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition. The fundamental shift for busi­nesses in the past 15 years from paper documents to computer data has forced the courts...more

10/29/2014 - Data Theft Electronic Records Electronically Stored Information Intangible Property Property Theft Tangible Property

SEC Playing Bigger Role in Cybersecurity

Besides clarifying disclosure requirements,the agency is prompting companies to take proactive steps. Cybersecurity threats have reached a point where they cannot go ignored by any government agency, even the U.S....more

7/14/2014 - Cybersecurity Data Protection HITECH Popular SEC

Common Flaws in Computer Fraud Class Actions: Lawsuits claiming unauthorized use of smartphone tracking technology are lacking key...

A number of class actions have recently been filed in federal district courts, predicated, in part, on alleged violations of the federal computer crime statute, the Computer Fraud and Abuse Act, complaining of tracking...more

5/8/2014 - Android Apple Class Action Computer Crimes Act Computer Fraud and Abuse Act (CFAA) Google GPS iPhone Jurisdiction Mobile Apps Text Messages Web Tracking

Anti-Corruption Digest - April 2014

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. Anti-corruption enforcement crosses boundaries like no other, so keeping up to date is more important than ever. In this digest, we draw together news of...more

4/18/2014 - Anti-Corruption Chief Compliance Officers Compliance Corruption Enforcement Enforcement Actions

Anti-Corruption Digest - March 2014

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. Anti-corruption enforcement crosses boundaries like no other, so keeping up to date is more important than ever. In this digest, we draw together news of...more

3/28/2014 - Anti-Corruption Chief Compliance Officers Compliance Corporate Counsel Corruption FCPA

Anti-Corruption Digest - February 2014

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. Anti-corruption enforcement crosses boundaries like no other, so keeping up to date is more important than ever. In this digest, we draw together news of...more

2/27/2014 - Anti-Corruption Corporate Counsel Enforcement FCPA Rolls-Royce UK

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

1/15/2014 - Computer Fraud and Abuse Act (CFAA) Cyber Attacks Cybersecurity Data Protection Hackers

The Conflicting Rulings on Employee Data Theft

Employers should include access restrictions in agreements, limit access with technology and consider the jurisdiction. In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime...more

7/13/2013 - Computer Fraud and Abuse Act (CFAA) Data Protection Data Theft Employment Contract Trade Secrets US v Nosal

The 9th Circuit: Employees Are Free to Steal from the Company Computers

Yesterday the 9th Circuit Court of Appeals issued an opinion holding that limiting an employee’s access to the company computers solely for business purposes, i.e. not stealing the data for a competitor, cannot be the...more

4/11/2012 - Computer Fraud and Abuse Act (CFAA) Data Theft US v Nosal

19 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×