Labor & Employment Intellectual Property Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on Labor & Employment issues written by leading professionals.
News & Analysis as of

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Employment Law This Week®: Executive Incentive Pay Rule, Race Discrimination, Pokémon Go, Commercial Non-Competes [Video]

We invite you to view Employment Law This Week® - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Your Confidential Employment Information Is Safe Under Tennessee's Uniform Fiduciary Access to Digital Assets Act

On July 1, 2016, Tennessee’s Revised Uniform Fiduciary Access to Digital Assets Act went into effect.  The Act grants fiduciaries authority to access a decedent’s digital assets.  As a result, executors, trustees, powers of...more

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

Recent Decision Widens “Narrow” Door for Use of the Computer Fraud and Abuse Act against Corporate Insiders

Information security threats come from a variety of sources, including outside hackers and disloyal corporate insiders. One federal statute that may provide a powerful remedy when a company’s defenses are breached and data is...more

Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield [Video]

We invite you to view Employment Law This Week - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and...

This past week, the Ninth Circuit released two important decisions that clarify the scope of liability under the federal Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. The Act was originally designed to target...more

The Defend Trade Secrets Act: Significant Recent Changes to Intellectual Property Law May Provide New Avenues for Protecting...

On May 11, 2016, President Obama signed into law the Defend Trade Secrets Act (“DTSA”), marking one of largest changes to intellectual property law since the America Invents Act of 2011. This legislation will allow companies...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

How to Prepare for Theft of Company Information

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

Client Alert: Brexit – What Silicon Valley Needs to Know

The vote of the UK Electorate to leave the EU has politicians, economists, lawyers and commentators from all sectors speculating on what will happen next and over exactly what period. While it is unlikely that there will be a...more

Quirky Question #283: They Stole Our Stuff, Can We Sue?

Question: My company recently terminated an employee, and we are very worried she accessed her email inappropriately in the days before she was fired. The timing of it all is … well, quirky. Here’s what happened: The...more

Unprecedented High Court Decision Orders the Destruction of Confidential Information on the Defendants’ Computers

The High Court in Arthur J. Gallagher Services (UK) Limited and others v Skriptchenkov and others [2016] EWHC 603, granted 11 February a mandatory injunction ordering the inspection and imaging of electronic devices and...more

How employers can stop departing employees taking client lists with them

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

Five Steps to Guarding Your Trade Secrets

Have you ever wondered what makes your Coke and KFC wings taste so marvelous? While many do wonder, the true recipes have never been revealed. The Coca Cola formula and KFC recipe are two of the most valuable, closely-guarded...more

Employment Law Navigator – Week in Review: May 2016 #3

Last week, news broke that Nicola Thorp, a UK temp worker assigned to PwC, was sent home for violating her temp agency’s dress code by failing to wear high heels. Portico, the agency, explained that the policy requiring...more

New Defend Trade Secrets Act Brings Need to Adjust Employment Contracts, Policies and Handbooks

Trade secret theft, much of it cyber-theft, annually costs American businesses roughly $320 billion, the value of all U.S. exports to Asia each year. The “Defend Trade Secrets Act” became effective Thursday, May 12, 2016. ...more

Here’s Another Fine Mess You’ve Gotten Me Into: Best Practices for Employee, Contractor and Consulting Agreements.

In This Presentation: Overview of Messes to Avoid: • Split Ownership • Agreements to Agree • Agreements with Unclear/Improper: – relation to prior agreements – term – royalty rate –...more

Get Off My Cloud: “BYOC” Workplaces Pose Trade Secrets Risks

There’s been a lot of talk in recent years about “BYOD” (“Bring Your Own Device”) policies, which are becoming increasingly common in the workplace. Employees want the flexibility and ease that comes with being able to use a...more

Five tips for London's startup community in 2016

London's Tech City has grown enormously from its birth in 2010 to now become the sixth most significant area for Tech startups globally and the first in the EU. Figures out early January from Companies House have shown that...more

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Protecting Trade Secrets From Theft By Ex-Employees

In late 2015, Atlantic Marine Construction Company, a Virginia Beach construction company, filed a lawsuit against a former Vice President of Construction and his new employer, alleging various causes of action arising out of...more

Federal Court Rejects Employer’s Trade Secret and Computer Fraud and Abuse Act Claims

An ex-employee’s former employer sued him for alleged violations of the Kansas Uniform Trade Secrets Act (KUTSA) and the federal Computer Fraud and Abuse Act (CFAA). The first claim was based on the company’s hunch that he...more

212 Results
|
View per page
Page: of 9

Follow Labor & Employment Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×