Latest Publications

Share:

Uber Hits a Bump in the Road with Its Self-Driving Technology with Alleged Trade Secret and Patent Violations

In February, Waymo LLC, formerly Google’s self-driving car development company, sued Uber Technologies, Inc. and others in federal court in San Francisco for, among other things, violations of the Defend Trade Secrets Act of...more

It’s Easier for Employers to Sue for Data Theft

Why a Ninth Circuit decision and an amendment to the Economic Espionage Act change the landscape. Two new developments this past year have made it easier for employers to sue employees in federal court for stealing data...more

China Adopts Tough and Sweeping Cybersecurity Law

On November 7, 2016, the Standing Committee of China’s National People’s Congress promulgated the Cybersecurity Law of the People’s Republic of China, a law James Zimmerman, chairman of the American Chamber of Commerce in...more

China’s New Cybersecurity Law

On November 7, 2016, the Standing Committee of China’s National People’s Congress promulgated the Cybersecurity Law of the People’s Republic of China (hereinafter referred to as the “CSL”) to become effective on June 1, 2017....more

11/16/2016  /  China , Cybersecurity , New Regulations

Ransomware: To Pay or Not to Pay

Ransomware poses one of information security’s biggest threats, right alongside infamous data breaches and high-profile Distributed Denial of Service (DDoS) attacks. Ransomware. It’s a data security buzzword that has...more

How to Prepare for Theft of Company Information

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

Dorsey Anti-Corruption Digest - April 2016

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. In this digest, we draw together news of enforcement activity throughout the world and aim to reduce your information overload. Our London, Minneapolis, New York...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

‘Cannibal Cop’ Decision Restrains Employers

Second Circuit ruling on data theft creates more inconsistency regarding federal law’s reach. In December, a divided panel of the U.S. Court of Appeals for the Second Circuit in U.S. v. Valle interpreted the Computer...more

Dorsey Anti-Corruption Digest - October 2015

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. In this digest, we draw together news of enforcement activity throughout the world and aim to reduce your information overload. Our London, Minneapolis, New York...more

Time Is Precious with Computer-Hacking Claims

A recent ruling shows that plaintiffs must act fast when using a federal criminal statute for a civil suit. The U.S. Court of Appeals for the Second Circuit in August addressed the proper application of the statute of...more

The Yates Memo: A New DOJ Investigative Approach - Update

Since at least the market crisis there has been a clamor to convict senior corporate officials of federal felonies – or at least name them in a civil law enforcement action by the SEC or another agency. For years the...more

How To Make Computer Fraud Claims Stick

Employers need clear policies in order to use a federal criminal law as a civil remedy against workers. The recent decision in Allied Portables v. Youmans from the U.S. District Court for the Middle District of Florida...more

New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strength­en the country’s response to...more

To Catch an E-Thief — Under Federal Property Law

As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition. The fundamental shift for busi­nesses in the past 15 years from paper documents to computer data has forced the courts...more

SEC Playing Bigger Role in Cybersecurity

Besides clarifying disclosure requirements,the agency is prompting companies to take proactive steps. Cybersecurity threats have reached a point where they cannot go ignored by any government agency, even the U.S....more

Common Flaws in Computer Fraud Class Actions: Lawsuits claiming unauthorized use of smartphone tracking technology are lacking key...

A number of class actions have recently been filed in federal district courts, predicated, in part, on alleged violations of the federal computer crime statute, the Computer Fraud and Abuse Act, complaining of tracking...more

Anti-Corruption Digest - April 2014

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. Anti-corruption enforcement crosses boundaries like no other, so keeping up to date is more important than ever. In this digest, we draw together news of...more

Anti-Corruption Digest - March 2014

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. Anti-corruption enforcement crosses boundaries like no other, so keeping up to date is more important than ever. In this digest, we draw together news of...more

Anti-Corruption Digest - February 2014

Welcome to Dorsey & Whitney’s monthly Anti-Corruption Digest. Anti-corruption enforcement crosses boundaries like no other, so keeping up to date is more important than ever. In this digest, we draw together news of...more

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

The Conflicting Rulings on Employee Data Theft

Employers should include access restrictions in agreements, limit access with technology and consider the jurisdiction. In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime...more

The 9th Circuit: Employees Are Free to Steal from the Company Computers

Yesterday the 9th Circuit Court of Appeals issued an opinion holding that limiting an employee’s access to the company computers solely for business purposes, i.e. not stealing the data for a competitor, cannot be the...more

24 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.