Confidential Information Computer Fraud and Abuse Act (CFAA)

News & Analysis as of

What Underlying Facts are Required to Assert a Valid CFAA Claim Based on “Exceeds Authorized Access” in Georgia?

The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more

Ninth Circuit Rules on Meaning of “Without Authorization” under Computer Fraud and Abuse Act

Last month, the Ninth Circuit affirmed the criminal conviction of an individual for accessing a computer “without authorization” in violation of the Computer Fraud and Abuse Act (“CFAA”). U.S. v. Nosal (9th Cir., July 5,...more

Sparks Fly in Ninth Circuit’s Nosal II Opinion

As many loyal TSW readers know, we’ve been watching the ongoing saga involving ex-Korn Ferry recruiter David Nosal wind its way through the courts since the early days of this blog. And last month, the highly anticipated...more

Déjà Vu Not All Over Again: Ninth Circuit Strengthens CFAA In Nosal II

On July 5, 2016, the Ninth Circuit Court of Appeals issued its highly anticipated decision in the most recent chapter of United States v. Nosal, holding that an individual acts "without authorization" as used in the Computer...more

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

Password sharing and “head-slap hacks”: What employers can do

If you have ever wondered why your company’s data is not as secure as it should be, take a look in the mirror. A study by the Ponemon Institute, commissioned by Experian and released in May, found that the majority of...more

Aveta And The Use Of Confidential Info In FCA Cases

In a recent case in the District of Puerto Rico, United States ex rel. Valdez v. Aveta Inc., et al., No. 15-cv-01140-CCC (D.P.R.), the former president of Puerto Rican-based managed health care provider Aveta Inc., Jose...more

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

Court Upholds Conviction Of Ex-Employee For Conspiring To Access Company Data Through “Shared” Password

Is password sharing a crime? It can be under the right circumstances, according to last week’s decision in United States v. Nosal. In Nosal, the U.S. Court of Appeals for the Ninth Circuit upheld the conviction of a former...more

Computer Fraud and Abuse Act Ruling: Did the Ninth Circuit Just Criminalize Password Sharing?

Not exactly. A divided Ninth Circuit panel recently affirmed the conviction of a former employee under the Computer Fraud and Abuse Act (“CFAA”), holding that “[u]nequivocal revocation of computer access closes both the front...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

The Ninth Circuit Addresses the Scope of the Computer Fraud and Abuse Act

This week, the Ninth Circuit clarified the scope of the Computer Fraud and Abuse Act (CFAA) in upholding the defendant’s criminal conviction in United States v. David Nosal....more

Federal Court Rejects Employer’s Trade Secret and Computer Fraud and Abuse Act Claims

An ex-employee’s former employer sued him for alleged violations of the Kansas Uniform Trade Secrets Act (KUTSA) and the federal Computer Fraud and Abuse Act (CFAA). The first claim was based on the company’s hunch that he...more

Recent Decision Highlights Important Pleading Requirements for Computer Fraud and Abuse Act Claims

Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more

Sanctions for Bringing a Computer Fraud and Abuse Act Claim?

Federal courts have continued to disagree on whether the Computer Fraud & Abuse Act ("CFAA") applies to employees who misuse confidential information or trade secrets obtained from an employer's computer system that the...more

SCOTUS upholds Computer Fraud and Abuse Act conviction

The Supreme Court of the United States held on January 25, 2016, that an executive of a shipping company who hacked into his former employer’s computer system after he left the company was guilty under the Computer Fraud and...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

Employees and “Authorized Access”: A Threat from Within?

Workplace privacy has become an increasingly challenging issue for employees and employers alike. With technological advancements, employers have enhanced visibility into employee behavior including their use of company...more

What is a Federal Computer Crime? It depends where you are

When an employee has access to data for work, but the employee uses it for non-work purposes, is that a federal crime under the Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030)? The answer depends on where you are....more

Data privacy in the Americas - At a glance

As multinational employers are aware, data privacy laws can vary greatly from jurisdiction to jurisdiction. Ensuring compliance with the different requirements can be challenging, and the penalties for noncompliance can be...more

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

An Employee Stole Your Trade Secrets but You Cannot Prove It. Now What?

Consider the following, relatively uncommon scenario: an employee stole your trade secrets and went to work for a competitor. You know the employee did it, you just cannot prove it. Even with the best forensic analysis it is...more

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco. So we figured it may be a good time to review both sides’ arguments related to the...more

31 Results
|
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×