"Damages" in an Injury Lawsuit: An Introduction for Lay People
Trial by Jury: Why It Matters in a Democratic Society
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
What should I do when I receive a letter from a prosecutor?
Two-Pronged Approach to Defending Lawsuits – Interview with Dominic Picca, Member, Mintz Levin
Class Action Litigation Reform – Interview with Dan Pascucci, Member, Mintz Levin
Elmo Sex Scandal: More Accusers May Come Forward, Says Lawyer
Newtown Shootings Could Give Rise to More Litigation, Says Pinsky
Whalen: Go Back To The Future To Fight Fraud With Equity Receivers
Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams. And usually when the talking heads on sports radio and television...more
The Department of Health and Human Services (HHS) Office of Inspector General (HHS-OIG) has released its Fiscal Year (FY) 2014 Annual Report (Report) on the performance of the Medicaid Fraud Control Units (MFCUs)...more
Obama administration proposal would reduce legal ambiguities and allow civil RICO claims.
On January 2015, the Obama administration announced a series of proposals to strengthen the country’s response to...more
Last week, the Civil Division of the U.S. Department of Justice (DOJ) filed an indictment charging Vascular Solutions Inc. (VSI) and its CEO Howard Root with (1) selling medical devices without the approval of the U.S. Food...more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
“Web scraping” or “web harvesting”—the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders”—accounted for 18% of site visitors and 23% of all Internet traffic in...more
In This Issue:
- Whistleblower’s one-two punch: Confidential informant/employee spurs criminal investigation, then successfully sues individual company owner in qui tam action
- Alleged illegal recruiting for...more
Trends and Analysis -
..We have identified 24 health care-related qui tam cases unsealed since last month’s Qui Tam Update. Of those, only 2 were filed in 2013. Nearly half were filed before 2011.
..Among the 24...more
Electronic Notice by Claims Administrator Garden City Group to US Full Tilt Poker Player Victims re Fund Remission Process, Protocols, and Procedure.
On September 16th, 2013 the Full Tilt Poker Claims...more
Trends and Analysis:
..We have identified 20 health care-related qui tam cases unsealed in July 2013. About a quarter of those were filed in 2013.
..Among the cases unsealed in July, the government has declined to...more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
The federal Department of Justice recently filed criminal charges against a 41-year old software programmer and system manager who hacked into his former employer's computer network, causing $90,000 in damage. The complaint...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
In an order surely to reverberate with both the plaintiffs’ and defense bar, on March 20, 2013, Judge D. Brock Hornby of the United States District Court for the District of Maine denied the plaintiffs’ motion to certify a...more
We reported in July on a First Circuit Court of Appeals decision finding that a bank failed to implement commercially reasonable security methods to prevent unauthorized transfers by a criminal that gained the online banking...more
On July 26, the U.S. Court of Appeals for the Fourth Circuit became the first circuit to adopt the Ninth Circuit’s holding in U.S. v. Nosal, 676 F.3d 854 (9th Cir. 2012), that the Computer Fraud and Abuse Act does not...more
Yesterday the 9th Circuit Court of Appeals issued an opinion holding that limiting an employee’s access to the company computers solely for business purposes, i.e. not stealing the data for a competitor, cannot be the...more
Have your client companies’ policies kept pace with changes in the law affecting computer technology? New statutes and court decisions relating to computer technology affect every business. Many companies overlook...more
Major changes are in the works for the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. In the past ten years, the CFAA has moved from obscurity into the limelight as Congressional amendments drastically increased its...more
In a case recently filed by a Swiss company in federal court in Florida, the company alleged in its complaint that Jerome Westrick, its former computer programmer and minority shareholder, stole a company laptop, hacked into...more
On December 15, 2011, the 9th Circuit Court of Appeals heard argument en banc in the case of U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011), reh’g en banc granted (Oct. 27, 2011). As expected, the oral argument focused on the...more
On December 15, 2011, the 9th Circuit Court of Appeals heard argument en banc in the case of U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011), reh’g en banc granted (Oct. 27, 2011). As expected, the oral argument focused on...more
Four recent decisions handed down by four different federal courts of appeals during the past year have, in combination, greatly enhanced the ability of businesses to use the Computer Fraud and Abuse Act (CFAA) as a tool to...more
Bills limiting the use of geolocation information collected from mobile and other devices were introduced in both chambers of Congress in June. The Location Privacy Protection Act of 2011 (S. 1223) and The Geolocation Privacy...more
If anyone deserves a longer sentence, it is a sex offender who victimizes minors. But no one would ever have anticipated that a sex offender would receive extra prison time for using a basic cell phone in the furtherance of...more
Find a Civil Remedies Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top