Obama administration proposal would reduce legal ambiguities and allow civil RICO claims.
On January 2015, the Obama administration announced a series of proposals to strengthen the country’s response to...more
Security experts recently discovered that about 50 different consumer PC models sold by Lenovo since September 2014 were shipped with adware known as Superfish Visual Discovery that could be exploited by hackers to spoof...more
Observers following the legal issues surrounding the prosecution of David Nosal will be watching closely in 2015 as the former Korn Ferry executive returns to the Ninth Circuit to appeal his 2013 conviction on three counts of...more
As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
In This Issue:
- Data for the Taking: Using the Computer Fraud and Abuse Act to Combat Web Scraping
- Google Glass Into Europe: A Small Step or a Giant Leap?
- Drugs and the Internet: FDA Distributes New...more
“Web scraping” or “web harvesting”—the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders”—accounted for 18% of site visitors and 23% of all Internet traffic in...more
A number of class actions have recently been filed in federal district courts, predicated, in part, on alleged violations of the federal computer crime statute, the Computer Fraud and Abuse Act, complaining of tracking...more
According to a February 21, 2014, news release, Facebook has made two updates to its policies regarding the accounts of deceased users.
Previously, Facebook allowed one of two options for a deceased user’s account. ...more
One hot area of data privacy litigation over the past several years has been data breach class actions brought under the California Confidentiality of Medical Information Act (“CMIA”), which provides that a person may recover...more
Social media platforms have become an increasingly important means for companies to build and manage their brands and to interact with their customers, in many cases eclipsing companies’ traditional “.com” websites. Social...more
In a decisive victory for Google and several co-defendants, a Delaware federal court dismissed the claims of a putative class of individuals who alleged that they were injured by Google’s practice of circumventing certain...more
Imagine a poker player who played an extraordinary amount of video poker and in doing so discovered a software bug that would allow him to achieve significant payouts through a series of unusual moves. These moves would...more
Employers should include access restrictions in agreements, limit access with technology and consider the jurisdiction. In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
Yesterday the 9th Circuit Court of Appeals issued an opinion holding that limiting an employee’s access to the company computers solely for business purposes, i.e. not stealing the data for a competitor, cannot be the...more
Back to Top