Science, Computers & Technology Intellectual Property Labor & Employment

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Employment Law This Week: Break Pay, Misclassification of Franchisees, California Computer Professional Exemption, Non-Compete... [Video]

We invite you to view Employment Law This Week® - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Fifth Circuit Affirms $15 Million Trade Secret Award

On September 7, 2016, the Fifth Circuit in GlobeRanger Corp. v. Software AG affirmed a $15 million judgment in a trade secret case. Although much of the opinion focused on jurisdictional issues, the portion of the opinion on...more

Ownership of Copyright in Software

Can an employee claim to own the employer’s software? An “author” of a work is the first owner of copyright. To determine ownership, it’s necessary to determine which contributions will be considered “authorship” for...more

Paying for software development? Make sure you own it!

In a digital society dominated by the saying, “there’s an app for that,” copyright protection is essential. Paying to have a work created does not automatically vest ownership of the copyright in the paying party. When making...more

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Employment Law This Week®: Executive Incentive Pay Rule, Race Discrimination, Pokémon Go, Commercial Non-Competes [Video]

We invite you to view Employment Law This Week® - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Your Confidential Employment Information Is Safe Under Tennessee's Uniform Fiduciary Access to Digital Assets Act

On July 1, 2016, Tennessee’s Revised Uniform Fiduciary Access to Digital Assets Act went into effect.  The Act grants fiduciaries authority to access a decedent’s digital assets.  As a result, executors, trustees, powers of...more

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

Recent Decision Widens “Narrow” Door for Use of the Computer Fraud and Abuse Act against Corporate Insiders

Information security threats come from a variety of sources, including outside hackers and disloyal corporate insiders. One federal statute that may provide a powerful remedy when a company’s defenses are breached and data is...more

Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield [Video]

We invite you to view Employment Law This Week - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and...

This past week, the Ninth Circuit released two important decisions that clarify the scope of liability under the federal Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. The Act was originally designed to target...more

The Defend Trade Secrets Act: Significant Recent Changes to Intellectual Property Law May Provide New Avenues for Protecting...

On May 11, 2016, President Obama signed into law the Defend Trade Secrets Act (“DTSA”), marking one of largest changes to intellectual property law since the America Invents Act of 2011. This legislation will allow companies...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

How to Prepare for Theft of Company Information

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

Client Alert: Brexit – What Silicon Valley Needs to Know

The vote of the UK Electorate to leave the EU has politicians, economists, lawyers and commentators from all sectors speculating on what will happen next and over exactly what period. While it is unlikely that there will be a...more

Quirky Question #283: They Stole Our Stuff, Can We Sue?

Question: My company recently terminated an employee, and we are very worried she accessed her email inappropriately in the days before she was fired. The timing of it all is … well, quirky. Here’s what happened: The...more

Unprecedented High Court Decision Orders the Destruction of Confidential Information on the Defendants’ Computers

The High Court in Arthur J. Gallagher Services (UK) Limited and others v Skriptchenkov and others [2016] EWHC 603, granted 11 February a mandatory injunction ordering the inspection and imaging of electronic devices and...more

How employers can stop departing employees taking client lists with them

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

Five Steps to Guarding Your Trade Secrets

Have you ever wondered what makes your Coke and KFC wings taste so marvelous? While many do wonder, the true recipes have never been revealed. The Coca Cola formula and KFC recipe are two of the most valuable, closely-guarded...more

Employment Law Navigator – Week in Review: May 2016 #3

Last week, news broke that Nicola Thorp, a UK temp worker assigned to PwC, was sent home for violating her temp agency’s dress code by failing to wear high heels. Portico, the agency, explained that the policy requiring...more

New Defend Trade Secrets Act Brings Need to Adjust Employment Contracts, Policies and Handbooks

Trade secret theft, much of it cyber-theft, annually costs American businesses roughly $320 billion, the value of all U.S. exports to Asia each year. The “Defend Trade Secrets Act” became effective Thursday, May 12, 2016. ...more

Here’s Another Fine Mess You’ve Gotten Me Into: Best Practices for Employee, Contractor and Consulting Agreements.

In This Presentation: Overview of Messes to Avoid: • Split Ownership • Agreements to Agree • Agreements with Unclear/Improper: – relation to prior agreements – term – royalty rate –...more

Get Off My Cloud: “BYOC” Workplaces Pose Trade Secrets Risks

There’s been a lot of talk in recent years about “BYOD” (“Bring Your Own Device”) policies, which are becoming increasingly common in the workplace. Employees want the flexibility and ease that comes with being able to use a...more

215 Results
|
View per page
Page: of 9

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×