Science, Computers & Technology Intellectual Property Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

BIA Ruling May Have Pushed 'Moral Turpitude' Too Far

Priya Sopori was quoted in a Law360 article on October 3, 2016, discussing a recent ruling by The Board of Immigration (BIA) stating that criminal copyright infringement is a “crime involving moral turpitude” and can lead to...more

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Compilation of Public Data Can be Trade Secret

A recent 9th Circuit Court of Appeals decision confirmed that data derived from a compilation of publicly available information can constitute a protectable trade secret, particularly when a proprietary process is used to...more

Sparks Fly in Ninth Circuit’s Nosal II Opinion

As many loyal TSW readers know, we’ve been watching the ongoing saga involving ex-Korn Ferry recruiter David Nosal wind its way through the courts since the early days of this blog. And last month, the highly anticipated...more

Baseball Hacking Scandal Leads To 4-Year Sentence And MLB Investigation

On Monday, July 18, 2016, the U.S. District Court for the Southern District of Texas sentenced former St. Louis Cardinals scouting director Chris Correa to nearly four years in prison for the hacking of the Houston Astros’...more

Ninth Circuit Provides Clarification Concerning the Definition of Trade Secret

On July 5, 2016, in United States v. Nosal, the Ninth Circuit Court of Appeals clarified the definition of “trade secret,” finding that data derived from a compilation of publicly available information can constitute a...more

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

When Stealing in Baseball Can Land You in Jail: Computer Fraud Sentencing Announced in MLB Case

Although stealing bases, and even signs, in baseball may be part of the game, stealing another team’s trade secrets can land you in federal prison, as one executive recently learned the hard way. As we previously...more

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and...

This past week, the Ninth Circuit released two important decisions that clarify the scope of liability under the federal Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. The Act was originally designed to target...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

How employers can stop departing employees taking client lists with them

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

Happy Times, High Crimes and Misdemeanors (Silicon Valley – Episode 25)

In this week’s episode of Silicon Valley, Richard enjoyed an unprecedented run of success, culminating with the official launch of Pied Piper’s platform. Richard has suffered so many setbacks, it’s little wonder he is...more

Also In the News - Data, Privacy, & Security Practice Report - May 2016 #2

K&S Client Alert: Third Try Is A Charm: Defend Trade Secrets Act Of 2015 Enacted Into Law—For the third consecutive year, Congress introduced legislation to create a federal civil cause of action for trade secret...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

The Supreme Court - May 2016

The Supreme Court of the United States issued one decision on May 2, 2016: Ocasio v. United States, No. 14-361: Petitioner Samuel Ocasio, a former police officer, was tried and convicted under the Hobbs Act for...more

Feds Open The Gates and Seize the Domain Names

Does the federal government have the right to seize a domain name without notice? With growing frequency, the feds have seized the domain names of thousands of websites for alleged criminal wrongdoing. The latest example is...more

Proving “Loss” Under the Economic Espionage Act – Not Always Straightforward

The Obama Administration’s focus on criminal trade secret prosecutions under the Economic Espionage Act (EEA) highlights the legal complexities at the murky intersection between criminal and civil jurisprudence in trade...more

7th Circuit Grants Partial Reprieve to Trade Secret Thief Who Couldn’t Shoot Straight

Crime Does Not Pay - You have to feel a little sorry for Yihao Pu. Pu was a finance engineer who worked for two companies with proprietary systems for executing high frequency stock trading (HTF). Pu illegally...more

Backdooring Investment Security (On the Apple Case)

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

Government Charges Five, Including Two Scientists, With Stealing Trade Secrets And Confidential Information From GlaxoSmithKline

On January 20, 2016, the United States Attorney’s Office for the Eastern District of Pennsylvania announced the indictment of five people, including two research scientists at GlaxoSmithKline (“GSK”), on charges of stealing...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

Stealing Bases Okay; Stealing Data Not So Much

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

Update on recent cyber prosecutions/stings

The feds keep chipping away at those thieves and hackers and we are pleased to showcase the recent results of their hard work. Computer Hacking and Sexual Extortion - On December 9, 2015, the U.S. Attorney’s Office...more

The “Cannibal Cop” and Protection of Computerized Data

In an unusual criminal case, the Second Circuit Court of Appeals recently weighed in on an important question at the intersection of employment law and data security. The decision will likely have implications wherever...more

123 Results
|
View per page
Page: of 5

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×