Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Safeguards against Data Security Breaches (Part One)
The Growing Role of Social Media in Litigation and How to Prepare for It
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How Facebook's Lawyers Price Their Services
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Two Key Elements Every Social Media Policy Should Include
Jeff Ifrah on the Historic Legalization of Online Gaming in New Jersey
How to Respond to President Obama's Cybersecurity Executive Order
The "inevitable disclosure" doctrine is one of the most discussed, controversial topics in unfair competition law. The commentary among academics and bloggers reminds me of the ongoing debate over the proper scope of the...more
On April 24, 2013, a federal jury in the Northern District of California found former Korn/Ferry International corporate executive recruiter, David Nosal, guilty on six counts of conspiracy, stealing trade secrets, and...more
In today’s complex global economy, competition is fierce. For many businesses, trade secrets are their single most important and valuable asset, and strong protection of that asset is paramount. In the same regard, trade...more
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
In this presentation:
- Apps! A Mobile Revolution
- But, What Exactly Is an App?
- Apps vs. Websites: A Primer
- Legal Considerations
- Why Does IP Ownership Matter?
- Creation of...more
The Southern District of New York recently joined a number of other jurisdictions in foreclosing one avenue of recovery for employers seeking to recover against employees who steal company information for competitors. In...more
After last year's important Ninth Circuit decision from U.S. v. Nosal, I discussed my take on the ongoing debate within our federal courts over how to interpret the Computer Fraud and Abuse Act - and in particular, whether...more
On March 12, 2013, the U.S. District Court for the Northern District of California issued a ruling clarifying the reach of the federal Computer Fraud and Abuse Act (CFAA) when employees access computer systems. The decision...more
Over half of American respondents to a recent survey thought it would be fine for a software developer to reuse source code they created from one job at their next position. That’s one of a number of alarming figures in a...more
An important federal appeals court has determined that a Connecticut court has jurisdiction over a Canadian citizen whose only act in Connecticut was accessing information on a computer server located in Connecticut. In...more
Last month the Vermont Legislature kicked off its 2013-2014 Legislative Session, and already a couple of bills have our attention here at the IP Stone....more
Originally published in SC Bar's Employment and Labor Law Newsletter: Winter 2013 on February 15, 2013
In recent months, both the Fourth Circuit Court of Appeals, which has jurisdiction over federal cases in North and...more
According to a recent study by the Organization for Economic Cooperation and Development (“OECD”) roughly 25 percent of the 255 million people in the world with a bachelor’s degree currently reside in the U.S., a proportion...more
In December of 2011, Clark Roberts and Sean Howley, two engineers at Wyko Tire Technology, were convicted by a jury for stealing trade secrets, a crime under the federal Economic Espionage Act (EEA). The trade secrets related...more
In this issue of Socially Aware, our Burton Award-winning guide to the law and business of social media, we explore the challenges that arise when employers and employees battle over work-related social media accounts; we...more
In the summer of 2009, in an office at Goldman Sachs, in the waning hours of his last day of employment, a computer programmer named Sergey Aleynikov encrypted more than 500,000 lines of source code from Goldman’s proprietary...more
As January draws to a close, we figured it seemed like a good time to take stock of where things stand in the world of non-competes and trade secrets....more
A weekly wrap up of interesting news about virtual worlds, virtual goods and other social media.
In This Issue:
- USPTO Dives Into Software Patent Debate With New Group
- The Hidden Risks Behind Facebook's...more
Generally speaking, noncompete agreements are often rigidly construed by courts and reviewed in terms of whether they are reasonably limited with respect to time and place. On the other hand, confidentiality agreements and...more
The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more
Last month, a federal appeals court issued a ruling permitting an employer in Connecticut to pursue a claim against a former employee who allegedly misappropriated the employer's confidential information from outside the...more
In a decision that could make it easier for U.S. companies to enforce claims against employees who commit cyber theft from remote locations, including from beyond U.S. borders, the Second Circuit breathed life into a...more
Originally published in the December 2012 issue of The HR Specialist.
With the year-end holidays fast approaching, many businesses are in the midst of assessing their 2012 performance and planning for 2013. If those...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo