MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Following earlier plea agreements, “Ben” Pu (“Pu”) and Sahil “Sonny” Uppal (“Uppal”) were sentenced today for stealing trade secrets related to high-frequency trading platforms from Chicago-based hedge fund Citadel. In what...more
Observers following the legal issues surrounding the prosecution of David Nosal will be watching closely in 2015 as the former Korn Ferry executive returns to the Ninth Circuit to appeal his 2013 conviction on three counts of...more
Plant Breeders are Learning the Value of Protecting Their Inventions -
Agricultural espionage: it’s not exactly the stuff of John le Carré novels. But recently a Chinese woman was charged in a plot to steal U.S. corn...more
It's a commonplace occurrence in Silicon Valley for skilled employees to move from one company to another, followed quickly by a civil trade secret lawsuit alleging that the employee stole trade secrets from his prior...more
In our modern, ever-electronic, workplace, it continues to become ever-easier for dishonest employees to help themselves to their employer’s most sensitive and valuable assets through wholesale electronic copying of...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more
As many states and the federal government look towards calling for greater disclosure and regulation of the chemicals used in hydraulic fracturing, state senators in North Carolina appear to be pushing against the tide in...more
Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison.
We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more
The U.S. Justice Department has charged members of the Chinese military with allegedly engaging in economic espionage against American companies. It’s the first time that the United States has leveled such charges against...more
As a Circuit judge recently noted in dissent, the Digital Millennium Copyright Act (DMCA) strives to "achieve a balance between strengthening copyright law and preserving consumer rights, promoting technological innovation,...more
Earlier this month, Walter Liew, his company, USA Performance Technology, Inc., and Robert Maegerle were found guilty of economic espionage and theft of trade secrets, among other crimes, for participating in a scheme to...more
The Italian tax police seized 46 websites streaming videos in breach of the copyright holders, but is also going after entities “supporting” such sites through banners published on them so starting a new approach in the fight...more
A November 2013 ruling from the United States District Court in a bankruptcy case may create an obstacle for a tactic increasingly popular among federal prosecutors – the seizure of a defendant company’s domain name....more
According to a report by the Financial Times, British internet service providers (ISPs) have rejected an attempt by the Gambling Commission to post warning pages on unlicensed gambling websites, alerting the user that the...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
The Criminal Court no. 4 of Castellón (Spain) has recently sentenced a peer-to-peer file sharing webmaster to 18 month imprisonment for a continued offence against IP rights. In addition, the Court has also banned him from...more
January 2012 saw an explosion of controversy over two Internet-related bills that had been progressing through Congress: the Stop Online Piracy Act (SOPA) in the House, and the Preventing Real Online Threats to Economic...more
With Chinese cyber attacks, data security, and industrial espionage occupying more and more space in the headlines, companies are re-evaluating their strategies for guarding sensitive information. There is certain to be more...more
The Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) levies penalties on a person who "intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains... information from any...more
Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is whether you’ve been properly convicted of thievery, you know you’re in trouble. ...more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
Lord Younger, in his capacity as Intellectual Property Minster, has announced that a new IP police unit is to be created by September of this year. ...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
Find a Science, Computers & Technology Author »
Back to Top