Intellectual Property Labor & Employment Science, Computers & Technology

Read Intellectual Property Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Brave New World or California Dreaming? Governor Patrick Proposes Legislation Banning Non-Compete Agreements

At an economic development summit earlier today in Newton, Massachusetts, Governor Patrick stated that he will propose an economic growth bill that includes a prohibition on non-competition agreements that discourage workers...more

Federal Court Ruling in Pa. Narrows Computer Fraud and Abuse Act

A Pennsylvania federal magistrate judge has tossed an employer’s claims under the Computer Fraud and Abuse Act (CFAA), holding that the CFAA does not extend to punish employees for the misuse of information that was accessed...more

Business News Digest – March 2014

In this issue: - Cybersecurity: Coming Soon to a Government Contract Near You - Recent National Defense Authorization Act Presents Opportunities for Small Business Contractors - Iran Sanctions Deal Does...more

Access Of Computer System With Log-In Credentials Is Not Unlawful “Hacking”

A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

BREAKING: David Nosal Sentenced To Prison On CFAA Computer Intrusion And Trade Secret Charges

Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more

Trade Secrets Trend To Watch In 2014: Government Regulations Requiring Public Disclosure Of Proprietary Information

In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more

Court Requires Employer To Pay Legal Fees Of Ex-Employee Charged With Trade Secret Theft

On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more

Employment Law Commentary -- Volume 25, Issue 11 -- November 2013: Trade Secret Protection From the Silicon Valley to the Silicon...

For the two million Californians who have left the state in the past decade, Texas has been the most popular destination. Further, 254 California companies moved some or all of their work and jobs out of state— frequently to...more

The “I Was Just Trying To Land A New Job” Defense To Criminal Trade Secret Theft Charges

On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more

Risks of Bring Your Own Device

Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more

What Chinese Businesses Need to Know About Establishing an R&D Center in the United States

There is increasing interest from Chinese businesses in establishing an R&D center in the Silicon Valley and other technology centers in the United States. For example, the world’s largest mobile phone operator, China Mobile,...more

Bring-Your-Own-Device: Are Employers Opening the Door to Security and Legal Risks?

According to a recent press release by Gartner, Inc., a global technology research and advisory company, half of all employers are expected to require their employees to supply their own devices for work by 2017. A...more

Former Employee Allegedly Coughs Up Cold Remedy Formula: Broad Non-Disclosure Agreement Largely Ineffective

A New Jersey appellate court’s decision last week in UCB Mfg., Inc. v. Tris Pharma, Inc., serves as a cautionary tale for employers when drafting confidentiality agreements to protect their trade secrets and confidential...more

Three Steps That Allow Companies to Use the Computer Fraud and Abuse Act for Misuse of Computers and Information – Even in the...

Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more

Life Sciences Spotlight | Issue 3, 2013

IN THIS ISSUE: - FEATURES: - A new wave of regulatory enforcement actions in China – Are we witnessing a prolonged enforcement cycle? - Update on recent decisions - Australia’s innovation patent – The...more

Employer Issues: Trade Secrets & Class Action Lawsuits – Interview with David Barmak, Member, Mintz Levin [Video]

Attorney David Barmak, Chair of Mintz Levin's Employment, Labor & Benefits Practice, discusses two serious issues facing employers: class action lawsuits and the loss of trade secrets....more

Computer Fraud and Abuse Act Limitations Accrued With Awareness of Unauthorized Access–Not Identity of Perpetrator

SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the...more

Kate Gosselin Sues Jon Gosselin for Violating the Computer Fraud and Abuse Act–Did She Adequately Plead a “Loss”?

When I do presentations on the Computer Fraud and Abuse Act, one of the issues I speak about is how we see CFAA issues arise in many unexpected cases such as those in the family law context. We now have another great example...more

Printing Hard Copies Of Stolen Source Code: The Difference Between Freedom And Incarceration In The Second Circuit

Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is whether you’ve been properly convicted of thievery, you know you’re in trouble. ...more

Social Networking: New Risks & Opportunities at Work [Video]

The Ethics Resource Center’s National Business Ethics Survey "Social Networkers: New Risks and Opportunities at Work” is now available. Sponsored by NAVEX Global and PwC, the survey provides a first-of-its-kind look at social...more

Bernstein Shur Business and Commercial Litigation Newsletter #30

We are pleased to present the 30th edition of the Bernstein Shur Business and Commercial Litigation Newsletter. This month we highlight cases discussing federal pleading standards, the intersection of patent law and antitrust...more

Smoking Gun Or Blowing Smoke? Five Tips To Make Sure That Computer Forensic Evidence Of Trade Secret Theft Is What You Think It Is

Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more

The Conflicting Rules on Employee Data Theft

In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more

LEGISLATIVE UPDATE: Rep. Zoe Lofgren Proposes New Legislation, Including A Civil Cause Of Action For Trade Secret Misappropriation

We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more

144 Results
|
View per page
Page: of 6

Follow Intellectual Property Updates on: