Computer Fraud and Abuse Act

News & Analysis as of

Chinese National Pleads Guilty To Conspiracy To Commit Cyber Theft Of Export-Controlled Technology

On March 23, 2016, U.S. law enforcement authorities announced that Su Bin, a citizen of the People's Republic of China and a resident of Canada, pleaded guilty to conspiracy to violate the Arms Export Control Act, the...more

Privacy + Estate Planning = Handling Your Digital Assets After You Die

The recently-proposed Revised Uniform Fiduciary Access to Digital Assets Act (“Revised UFADAA”) is a potential solution to a problem that most of us eventually will face: how will our digital assets be accessed and used (or...more

Federal Court Rejects Employer’s Trade Secret and Computer Fraud and Abuse Act Claims

An ex-employee’s former employer sued him for alleged violations of the Kansas Uniform Trade Secrets Act (KUTSA) and the federal Computer Fraud and Abuse Act (CFAA). The first claim was based on the company’s hunch that he...more

Another Cyber Coverage Gap? Some Carriers Resisting Coverage Of Commercial Cyber Fraud

In the fast-developing world of cyber threats and corresponding cyber coverage, at least two insurance carriers are pushing back against covering losses arising out the transfer of funds to cyber fraudsters after employees...more

The FBI’s “Cyber Most Wanted”

We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

‘Cannibal Cop’ Decision Restrains Employers

Second Circuit ruling on data theft creates more inconsistency regarding federal law’s reach. In December, a divided panel of the U.S. Court of Appeals for the Second Circuit in U.S. v. Valle interpreted the Computer...more

Top 10 Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2015

Continuing our tradition of presenting annually our thoughts concerning the top 10 developments/headlines this past year in trade secret, computer fraud, and non-compete law, here—in no particular order—is our listing for...more

Computer Fraud and Abuse Act Update: Second Circuit Sides with a Narrower Reading

The controversy over what is a “computer crime” under the Computer Fraud and Abuse Act (CFAA) is now settled for New York, Connecticut and Vermont. In a case we have been watching on the blog for months, United States v....more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

2015 Trade Secrets Webinar Series Year in Review

Throughout 2015, Seyfarth Shaw’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever-changing...more

What is a Federal Computer Crime? It depends where you are

When an employee has access to data for work, but the employee uses it for non-work purposes, is that a federal crime under the Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030)? The answer depends on where you are....more

Feds continue to prosecute hackers

Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

An Employee Stole Your Trade Secrets but You Cannot Prove It. Now What?

Consider the following, relatively uncommon scenario: an employee stole your trade secrets and went to work for a competitor. You know the employee did it, you just cannot prove it. Even with the best forensic analysis it is...more

California Federal Courts Reiterate: Unless Computer Hacked, Computer Fraud and Abuse Act Permits Misuse Of Electronic Information

In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco. So we figured it may be a good time to review both sides’ arguments related to the...more

How To Make Computer Fraud Claims Stick

Employers need clear policies in order to use a federal criminal law as a civil remedy against workers. The recent decision in Allied Portables v. Youmans from the U.S. District Court for the Middle District of Florida...more

Angie’s List Accuses Amazon of Home Improvement Hijinks

Even freed from bricks and mortar, online retailers and service providers are realizing that market share is not infinite. A complaint recently filed by Angie’s List Inc. against Amazon Local LLC for its newly launched online...more

10 Tips for Minimizing Company Liability for Terminating Employees who Steal Trade Secrets

When your company uncovers evidence that an employee misappropriated trade secrets it must act swiftly. The company may want to fire the employee to protect itself from the potentially devastating consequences. But how can...more

DOJ Deputy Assistant AG Delivers Testimony at Senate Subcommittee Hearing Regarding Cyber Crime

On July 8, the DOJ’s Deputy Assistant AG, David Bitkower, delivered his testimony before the Senate Judiciary Subcommittee on Crime and Terrorism’s hearing entitled, “Cyber Crime: Modernizing Our Legal Framework for the...more

FTC, Florida AG File Action to Stop Alleged Telemarketing Debt Relief Scam Targeting Seniors

The Federal Trade Commission (FTC) and the Florida Attorney General (AG) have jointly filed a complaint in a Florida federal court against several companies and their individual owners alleging that the defendants engaged in...more

The Computer Fraud and Abuse Act and the “Cannibal Cop”: Awaiting the Second Circuit’s Decision

The Computer Fraud and Abuse Act began as a federal criminal statute, but it has turned into an oft-used weapon in civil litigation. See U.S.C. § 1030, et seq. (CFAA). Now, criminal and civil litigants await the Second...more

The Cards Hack the Astros – So What Law Applies? [audio]

In a developing story, The New York Times is reporting that the FBI is investigating the St. Louis Cardinals for hacking into the Houston Astros’ computer networks to steal the Astros’ internal baseball operation intelligence...more

45 Results
|
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×