Science, Computers & Technology Labor & Employment Business Torts

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Scientific Fraud: an acute malady - don't be blinded by it

It seems lately that the healthcare industry has had some horrible and ghastly press time in the media. It's unfortunate that there a number of people who seem to partake in questionable activities that flood the industry...more

Massachusetts Federal Court Refuses to Transform Non-Disclosure Agreement into a Non-Competition Agreement

A recent decision from the Massachusetts federal district court serves as a good reminder to Massachusetts employers that courts are unlikely to view the breach of a non-disclosure/confidentiality agreement as justification...more

Good Things Come To Those Who Wait: $26 Million

Trade secret misappropriation cases often are won or lost quickly and early at the preliminary injunction stage of the case. However, today we report on the results of a slow moving, long-running trade secret case that...more

Access Of Computer System With Log-In Credentials Is Not Unlawful “Hacking”

A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more

Hodgson Russ Helps Clients in Largest-Ever False Claims Act Settlement In Risperdal Lawsuits Against Johnson & Johnson

The Justice Department announced that Johnson & Johnson will pay $1.273 billion to the federal government and most states to settle a civil False Claims Act investigation into its off-label marketing of its antipsychotic drug...more

Three Steps That Allow Companies to Use the Computer Fraud and Abuse Act for Misuse of Computers and Information – Even in the...

Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more

Computer Fraud and Abuse Act Limitations Accrued With Awareness of Unauthorized Access–Not Identity of Perpetrator

SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the...more

LEGISLATIVE UPDATE: Rep. Zoe Lofgren Proposes New Legislation, Including A Civil Cause Of Action For Trade Secret Misappropriation

We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more

Right Of Privacy Claim Survives Summary Judgment Based On Oral Disclosure in Workplace

In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more

Decisions Highlight Split In Application Of Computer Fraud And Abuse Act

Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more

Another Court Interprets the CFAA Narrowly

A Southern District of New York judge has joined the growing trend of federal courts that interpret the Computer Fraud and Abuse Act to preclude allow recovery for misappropriation of computer information....more

Jurisdiction for an International Computer Fraud Lawsuit?

The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more

App Helps Determine Valid Trade Secret or Non-Compete

A new informational app for the iPad and iPhone to help employers and employees better understand what is a trade secret or a covenant not to compete has been released by Balough Law Offices, LLC. The Trade Secrets app...more

Dispute over Ownership of Ex-Employee's LinkedIn Account Highlights Significance of Robust Social Media Policies

This case underscores the significance for employers to create and maintain social media policies that address the control and ownership of company-sponsored social media accounts. ...more

Employer Takeover of Employee's LinkedIn Account Does Not Violate Federal Computer Hacking Law, Question of Ownership Remains

Given the popularity of Facebook, Twitter, and LinkedIn, more and more organizations are resorting to social media sites to promote their brands and manage their public profiles. Employers are also encouraging employees to...more

Labor Pains: Computer Hacking By Employees

What if a former employee downloads confidential information (customer lists, pricing information, etc.) from your computer system and uses it to lure your customers away? Among the laws at your disposal is the Computer...more

Courts Give the Computer Fraud and Abuse Act a Narrow Reading Post-Nosal

The Computer Fraud and Abuse Act (CFAA) has become a powerful weapon in the trade secret litigator’s arsenal. An employee who accesses his or her employer’s computer files in the days or weeks before leaving for a competitor...more

The 9th Circuit: Employees Are Free to Steal from the Company Computers

Yesterday the 9th Circuit Court of Appeals issued an opinion holding that limiting an employee’s access to the company computers solely for business purposes, i.e. not stealing the data for a competitor, cannot be the...more

The Rise of the Computer Fraud and Abuse Case

Major changes are in the works for the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. In the past ten years, the CFAA has moved from obscurity into the limelight as Congressional amendments drastically increased its...more

Silicon Handshake or Hangman's Noose: The NDA's Opportunities and Risks

Nondisclosure Agreements ("NDAs") are everywhere: a Silicon Valley Don Juan had an NDA ready for every date. However, NDAs are not created equal -- what is good for the discloser is not good for the recipient. The "Silicon...more

Update: Who Owns a Company's Twitter Account?

On January 5, we posted a blog entry about the case of PhoneDog v. Kravitz, pending in the United States District Court for the Northern District of California.  In short, during his employment with PhoneDog, Kravitz...more

Your business needs a social media policy and this is why

It is foolish to not have one. Having a social media policy is like having a Will for your businesses’ branding and marketing efforts and the cost of getting that policy will likely be less than the bill for the first day in...more

Phonedog LLC v. Noah Kravitz- Who owns business profiles on Twitter ?

Plaintiff's Amended Complaint- Phonedog LLC v. Noah Kravitz

Mobile phone business Phonedog LLC filed suit against former employee Noah Kravitz in the US District Court for the Northern District of California in November 2011, alleging that Mr. Kravitz took 17,000 Twitter followers...more

Ninth Circuit Will Rehear Important Employee Data Theft Case under the Computer Fraud and Abuse Act

On October 27, 2011, the United States Court of Appeals for the Ninth Circuit agreed to rehear the appeal in United States v. Nosal, 642 F.3d 781 (9th Cir. Apr. 28, 2011). Nosal involves a prosecution under the Computer...more

Are LinkedIn Contacts Trade Secrets?

A judge “across the pond” ruled that an employee’s LinkedIn contacts were, in essence, trade secrets of his former employer where those contacts were created during the term of employment and mimicked the employer’s...more

39 Results
|
View per page
Page: of 2

Follow Science, Computers & Technology Updates on: