Science, Computers & Technology Criminal Law Intellectual Property

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Also In the News - Data, Privacy, & Security Practice Report - May 2016 #2

K&S Client Alert: Third Try Is A Charm: Defend Trade Secrets Act Of 2015 Enacted Into Law—For the third consecutive year, Congress introduced legislation to create a federal civil cause of action for trade secret...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

The Supreme Court - May 2016

The Supreme Court of the United States issued one decision on May 2, 2016: Ocasio v. United States, No. 14-361: Petitioner Samuel Ocasio, a former police officer, was tried and convicted under the Hobbs Act for...more

Feds Open The Gates and Seize the Domain Names

Does the federal government have the right to seize a domain name without notice? With growing frequency, the feds have seized the domain names of thousands of websites for alleged criminal wrongdoing. The latest example is...more

Proving “Loss” Under the Economic Espionage Act – Not Always Straightforward

The Obama Administration’s focus on criminal trade secret prosecutions under the Economic Espionage Act (EEA) highlights the legal complexities at the murky intersection between criminal and civil jurisprudence in trade...more

7th Circuit Grants Partial Reprieve to Trade Secret Thief Who Couldn’t Shoot Straight

Crime Does Not Pay - You have to feel a little sorry for Yihao Pu. Pu was a finance engineer who worked for two companies with proprietary systems for executing high frequency stock trading (HTF). Pu illegally...more

Backdooring Investment Security (On the Apple Case)

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

Government Charges Five, Including Two Scientists, With Stealing Trade Secrets And Confidential Information From GlaxoSmithKline

On January 20, 2016, the United States Attorney’s Office for the Eastern District of Pennsylvania announced the indictment of five people, including two research scientists at GlaxoSmithKline (“GSK”), on charges of stealing...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

Stealing Bases Okay; Stealing Data Not So Much

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

Update on recent cyber prosecutions/stings

The feds keep chipping away at those thieves and hackers and we are pleased to showcase the recent results of their hard work. Computer Hacking and Sexual Extortion - On December 9, 2015, the U.S. Attorney’s Office...more

The “Cannibal Cop” and Protection of Computerized Data

In an unusual criminal case, the Second Circuit Court of Appeals recently weighed in on an important question at the intersection of employment law and data security. The decision will likely have implications wherever...more

Nosal Update: Ninth Circuit Hears Oral Arguments on Password Sharing and Scope of Computer Fraud and Abuse Act

On October 20, 2015, a Ninth Circuit panel consisting of Chief Judge Sidney Thomas and Judges M. Margaret McKeown and Stephen Reinhardt heard oral argument from the U.S. Department of Justice and counsel for David Nosal on...more

Motion to Quash Service Is Not a Collateral Order and Therefore Not Appealable - United States v. Sinovel Wind Grp. Co.

The U.S. Court of Appeals for the Seventh Circuit concluded that the district court’s denial of defendant Sinovel’s motion to quash service of process is not an appealable order under the collateral order doctrine. The Court...more

New York v. Aleynikov: New York State’s Penal Code (Like Federal Criminal Law) Does Not Cover Electronic Reproduction of Source...

In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more

Landmark Case for Abuse of Personal Data

In the September 9th landmark decision, the Hong Kong Magistrates' Court convicted Hong Kong Broadband Network ("HKBN") of a criminal offence for failing to comply with the direct marketing provisions of the Personal Data...more

500,000 Lines of Source Code: The New “Intangible Property”

Sergey Aleynikov’s six-year trade secret odyssey through all possible configurations of litigation, civil and criminal, federal and state, may at long last have come to an end after the New York Supreme Court recently...more

Another Aleynikov Trade Secrets Case Ends with Narrower Statute

In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more

Flash Boy’s Conviction Thrown Out—Again

In a stunning victory for the former Goldman Sachs programmer, New York State Justice Daniel Conviser threw out Sergey Aleynikov’s jury conviction on state law charges that he stole intellectual property from Goldman. Trade...more

Corporate Espionage: Not Your Typical Sports-“Gate”

Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams. And usually when the talking heads on sports radio and television...more

Caught Stealing More Than Bases, St. Louis Cardinals Teach Trade Secret Safety to All Employers

The recent hacking attack against the Houston Astros is a wake-up call for all employers: no organization is safe from its adversaries’ attempts to steal proprietary information to gain a leg up in the competition. The...more

Kolon Finally Served With Criminal Summons in Korea, Subsequently Settles for $360 Million

On April 30, 2015, Kolon Industries finally resolved two long-standing disputes regarding its alleged misappropriation of trade secrets related to DuPont Co.’s bullet-proof Kevlar Material.  The settlement resolved a six-year...more

DOJ Guidance for Victims of Cybercrime: The Dos and Do Nots of Cyber Preparedness

On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more

First Foreign Hacker Is Convicted In The United States Of Hacking Crimes Involving Theft Of Trade Secrets From American Companies

A 22-year-old Canadian hacker has been sentenced to federal prison by a Delaware court for engaging in a conspiracy to break into the computer networks of several large gaming companies, to steal trade secret and other...more

Back in a Flash: Sergey “Flash Boy” Aleynikov Returns to Court for New Trial

Sergey Aleynikov’s six-year odyssey through the U.S. judicial systems—both federal and state—continues.  Last week, Aleynikov stepped into a New York State courtroom to defend himself at trial against a pair of criminal...more

110 Results
|
View per page
Page: of 5

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×