After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
Federal prosecutors in the Eastern District of Texas recently brought criminal charges under the Health Insurance Portability and Accountability Act (“HIPAA”) against a former East Texas hospital employee. The former...more
Employee privacy rights may have received a boost from the U.S. Supreme Court at the end of this year’s term. In Riley v. California, the most recent in a series of criminal search and seizure cases involving technology, the...more
In the waning days of its current term, the U.S. Supreme Court ruled unanimously in California v. Riley that police officers generally violate the Fourth Amendment's prohibition against unreasonable searches by conducting a...more
The Supreme Court of the United States released a unanimous decision last week barring law enforcement from searching the mobile phones of individuals placed under arrest without first obtaining a search warrant or the...more
In a unanimous decision, the U.S. Supreme Court ruled this week in Riley v. California that police generally may not conduct a warrantless search of digital data stored on the cell phone of someone who has been arrested. The...more
One of my favorite movies is Bad Day at Black Rock. It is one of the few movies to combine elements of film noir into something approaching a traditional Western. It also attacks directly the prejudice and hate against...more
In This Issue:
- Whistleblower’s one-two punch: Confidential informant/employee spurs criminal investigation, then successfully sues individual company owner in qui tam action
- Alleged illegal recruiting for...more
A terminated employee was convicted of “Mischief to Data” and “Unauthorized use of a Computer” contrary to the Criminal Code after he remotely accessed a former co-worker’s e-mail without her authorization and forwarded...more
Earlier this month, a federal judge in San Francisco sentenced David Nosal to a year in prison, three years’ supervised release, 400 hours of community service, and $60,000 in fines. His crime? Nosal violated the Computer...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
The Justice Department announced that Johnson & Johnson will pay $1.273 billion to the federal government and most states to settle a civil False Claims Act investigation into its off-label marketing of its antipsychotic drug...more
Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is whether you’ve been properly convicted of thievery, you know you’re in trouble. ...more
Any company doing business in China has to wonder whether they might find themselves in the unwelcome spotlight recently turned on certain participants in China’s pharmaceutical market....more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
When is the last time your company reviewed its data protection policies? If your company employs any international employees, it may have obligations under foreign laws to have specific safeguards in place....more
The federal Department of Justice recently filed criminal charges against a 41-year old software programmer and system manager who hacked into his former employer's computer network, causing $90,000 in damage. The complaint...more
On April 24, 2013, a federal jury in the Northern District of California found former Korn/Ferry International corporate executive recruiter, David Nosal, guilty on six counts of conspiracy, stealing trade secrets, and...more
In This Issue:
- Third Circuit Panel Liberalizes “Protected Activity” Immunity for Employees Claiming Whistleblower Status
- Doing Time: A Requirement for White Collar Crime?
- Casting a Smaller Net:...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
This advisory is one of a series prepared by Pillsbury's China Practice on questions frequently asked by our clients doing business in China. In June 2012, we published an advisory on personal data protection in China in...more
On March 12, 2013, the U.S. District Court for the Northern District of California issued a ruling clarifying the reach of the federal Computer Fraud and Abuse Act (CFAA) when employees access computer systems. The decision...more
Find a Science, Computers & Technology Author »
Back to Top