News & Analysis as of

Data Theft

Protecting Intellectual Property from Employee Theft

by Revision Legal on

Business owners who, after an employee dispute or after terminating an employee, have been the victims of intellectual property theft often contact us. Often, the solutions to this problem can be incredibly costly. Here are...more

What To Do When You Hire A Thief

by Foley & Lardner LLP on

Employers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same...more

Real Answers to Common Questions on Cybersecurity

by NAVEX Global on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

President Trump Signs Executive Order Calling for Omnibus Report on Significant Trade Deficits

by White & Case LLP on

On March 31, 2017, President Trump signed an Executive Order directing the Secretary of Commerce and the United States Trade Representative (USTR) to prepare an "Omnibus Report on Significant Trade Deficits". The report will...more

Data Theft And What’s “Tangible”: New York Appellate Division Reinstates Conviction Of Former Goldman Sachs Programmer Sergey...

The law often lags behind developments in the tech world. One problem for employers seeking to protect their data is that some anti-theft and trade secret protection laws drafted long ago refer to “goods” and “tangible”...more

Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2016

by Seyfarth Shaw LLP on

Continuing our annual tradition, we present the top developments/headlines for 2016 in trade secret, computer fraud, and non-compete law. Please join us for our first webinar of the New Year on February 2, 2017, at 12:00 p.m....more

Hack Attacks!

by FordHarrison on

Lately, the news has lead with stories about the alleged Russian hacking of various American political organizations, ostensibly for the purpose of influencing the 2016 elections. U.S. law enforcement has surmised that the...more

Yahoo Announces Hackers Stole More Than 1 Billion User Records

by Selman Breitman LLP on

Yesterday, Yahoo, Inc. announced that it has detected a new data breach that occurred in August 2013 and involved data associated with more than one billion user accounts. Yahoo said that names, contact information,...more

It’s Easier for Employers to Sue for Data Theft

by Dorsey & Whitney LLP on

Why a Ninth Circuit decision and an amendment to the Economic Espionage Act change the landscape. Two new developments this past year have made it easier for employers to sue employees in federal court for stealing data...more

Aftermath of the Yahoo Breach: M&A Risk and Cybersecurity

In the midst of its acquisition by Verizon Communications Inc., Yahoo Inc. disclosed what looks like one of the largest reported thefts of user information in U.S. history. Yahoo has confirmed that a “state-sponsored”...more

LinkedIn Has Beef With Data Scraping Bots

Linkedin has filed a lawsuit to prevent unauthorized use of “bots” that register fake profiles on the social network and steal data about actual users. According to the suit, these acts constitute a breach of Linkedin’s terms...more

On the Move and At Risk: Safeguards for Mitigating Mobile Device Vulnerabilities While Traveling Overseas

Employees use their smartphones as a key tool for accessing information during a work day – especially when outside the office and traveling on business. While smartphones, tablets, laptops and other devices may increase...more

Credit Card Theft Plaintiffs Discover Warm Home After 7th Circuit Rulings

One of the great scourges for retail companies in the digital age has been the ever-present threat of massive data breaches by hackers attempting to steal millions of consumers ’debit and credit card information. In...more

Chinese national hacker pleads guilty to sending U.S. military data to China

The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information...more

[Webinar] Protecting Confidential Information and Client Relationships in the Financial Services Industry - April 14th, 1pm EST,...

by Seyfarth Shaw LLP on

In Seyfarth's fourth installment in its series of 2016 Trade Secret Webinars, Seyfarth attorneys will focus on trade secret and client relationship considerations in the banking and finance industry, with a particular focus...more

Until Death Do Us Part – Divorce and HIPAA Violations: A Lesson in Safeguarding Protected Health Information

The Office of Civil Rights (“OCR”), a division of the Department of Health and Human Services, recently took the rare step of imposing civil monetary penalties against a large home health provider for violating the Health...more

Business Litigation Alert: "Will There Be a Jump in Cyber Attacks in 2016? Survey Says... Yes"

by Porter Hedges LLP on

Last year, we saw some major cyber breaches affect millions of Americans (remember the June 2015 hack of the federal Office of Personal Management that impacted over 20 million Americans?). Unfortunately, cyber-attacks do not...more

‘Cannibal Cop’ Decision Restrains Employers

by Dorsey & Whitney LLP on

Second Circuit ruling on data theft creates more inconsistency regarding federal law’s reach. In December, a divided panel of the U.S. Court of Appeals for the Second Circuit in U.S. v. Valle interpreted the Computer...more

Stealing Bases Okay; Stealing Data Not So Much

by McGuireWoods LLP on

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

by Bond Schoeneck & King PLLC on

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

Hacker arrests and prosecutions update

We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more

OPM admits 5.6 million fingerprints stolen during breach

The Office of Personnel Management (OPM) reported yesterday that fingerprint data stolen during the breach of almost 22 million Americans’ data is estimated to be 5.6 million instead of the original estimate of 1.1 million....more

Federal Court Dismisses Computer Fraud and Abuse Act Claim That Was Filed Against Our Clients

Here’s a recent victory we obtained on behalf of our clients SunEdison, Inc., et al. The individual defendants (then-current employees of SunPower, Inc.) were alleged to have violated the federal Computer Fraud and Abuse Act...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

by Seyfarth Shaw LLP on

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

China Promulgates Tougher Criminal Provisions Governing Data Privacy

by Morrison & Foerster LLP on

One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more

56 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.