Computer Abuse and Use: How Protected Are You?

more+
less-

If your company policies don’t adequately define employee parameters of computer access as well as usage, then your company may find itself losing to disgruntled employees who take or misuse company data.

Several cases this year exemplify how important it is for employers to continually update and monitor their computer policies.

Earlier this year, the Fourth Circuit limited the criminal and civil protections afforded under the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. In WEC Carolina Energy Solutions v. Miller, Mr. Miller, the project director for WEC Carolina Energy Solutions, Inc., resigned his post. Before leaving—but while still employed by WEC—the company claims Mr. Miller downloaded WEC’s proprietary information and used it to pitch a presentation and secure a potential WEC client for his new employer and competing company, Arc Energy Services, Inc. So, WEC sued Mr. Miller, his administrative assistant, and Arc under the CFAA.

Please see full article below for more information.

LOADING PDF: If there are any problems, click here to download the file.


DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Sands Anderson PC | Attorney Advertising

Written by:

more+
less-

Sands Anderson PC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×
Loading...
×
×