Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Is Edward Snowden a Whistleblower?
Goldstein: Expect More Litigation in Wake of Myriad Gene Patent Decision
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
Patent Series: Protecting inventions
Trademark Series: Use-based trademark protection
Trademark Series: Protecting your mark from becoming generic
Trademark Series: Matching your commercial strategy
Trademark Series: Building a global brand
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Instapundit: America's IP Laws Need to be "Pruned Back"
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
Imagine a disgruntled employee rummaging through your company’s confidential files and covertly stealing trade secrets to use as he builds a competing business. What recourse would you have against the rogue employee?...more
Did the Ninth Circuit “blow it” when it snubbed other courts and held that “exceeding authorized access” under the Computer Fraud and Abuse Act (CFAA) means nothing less than “hacking?”...more
Aggrieved employers have often turned to the Computer Fraud and Abuse Act (the "CFAA") in suing former employees that allegedly absconded with information from company computers. Such suits face bleak prospects in the Ninth...more
The federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030, (CFAA) is — for most of corporate America — one of the most powerful weapons available to protect trade secrets. Like many state computer crimes laws, CFAA was...more
As readers of this blog know, we have been following the diverse and seemingly irreconciliable decisions from federal courts regarding the scope of the federal Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030. Last...more
The U.S. Court of Appeals for the 4th Circuit has issued a ruling in WEC Carolina Energy Solutions v. Miller, holding that the federal Computer Fraud and Abuse Act (“CFAA”) prohibition on exceeding “authorized access” to a...more
On March 22, 2012, Patton Boggs LLP posted a client alert (available here) on the antihacking Computer Fraud and Abuse Act (CFAA), discussing that different federal courts were split on whether the CFAA imposes liability on...more
Among its various provisions, the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. §1030, subjects a person who “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains …...more
The federal courts are currently split on the question of whether an employee can be held civilly liable under the Computer Fraud and Abuse Act (CFAA) for misappropriating confidential company information that the employee is...more
The monitoring of employees’ electronic communications can be undertaken for various reasons, and is now standard practice among most, if not all, employers. However, when undertaking such monitoring, employers must ensure...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo