Confidential Information Computer Fraud and Abuse Act

News & Analysis as of

Employees and “Authorized Access”: A Threat from Within?

Workplace privacy has become an increasingly challenging issue for employees and employers alike. With technological advancements, employers have enhanced visibility into employee behavior including their use of company...more

What is a Federal Computer Crime? It depends where you are

When an employee has access to data for work, but the employee uses it for non-work purposes, is that a federal crime under the Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030)? The answer depends on where you are....more

Data privacy in the Americas - At a glance

As multinational employers are aware, data privacy laws can vary greatly from jurisdiction to jurisdiction. Ensuring compliance with the different requirements can be challenging, and the penalties for noncompliance can be...more

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco. So we figured it may be a good time to review both sides’ arguments related to the...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Fourth Circuit Upholds Federal Criminal Conviction for Accessing Former Employer's Database

The federal Computer Fraud and Abuse Act (CFAA) was primarily intended to deter and punish database hacking by third parties. Employers involved in disputes with former employees have attempted to use CFAA in response to...more

Consent is Key for BYOD

With Black Friday behind us and holiday shopping still heating up, ‘tis the season when many of us will acquire new gadgets and technology to power our digitally-enhanced lives. For businesses, this time of year also means...more

A Weapon Against Hackers on Home Front

Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to nation-state hackers like China, which have reportedly accessed and stolen highly con­fidential data by...more

Recent Cases Address Employer Efforts to Protect Confidential Information

Originally published in SC Bar's Employment and Labor Law Newsletter: Winter 2013 on February 15, 2013 In recent months, both the Fourth Circuit Court of Appeals, which has jurisdiction over federal cases in North and...more

12 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.