Misappropriation Computer Fraud and Abuse Act

News & Analysis as of

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Federal Court Dismisses Computer Fraud and Abuse Act Claim That Was Filed Against Our Clients

Here’s a recent victory we obtained on behalf of our clients SunEdison, Inc., et al. The individual defendants (then-current employees of SunPower, Inc.) were alleged to have violated the federal Computer Fraud and Abuse Act...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

The Defend Trade Secrets Act of 2015: Proposed Legislation Would Open the Federal Courthouse Door for Trade Secret...

In an era where bipartisanship is rarely on display, a group of Senators and members of the House of Representatives from both parties recently joined together to propose the Defend Trade Secrets Act of 2015 (S. 1890, H.R....more

Inside Job – Judge Labson Freeman Applies the CFAA Restrictively

Koninklijke Phillips N.V., et. al. v. Elec-Tech Int’l Co., Ltd., et al.,, Case No. 14-cv-02737 (BLF) (March 20, 2015) - Plaintiff Koninklijke Phillips N.V. (Phillips) and its subsidiary Phillips Lumileds Lighting...more

Can Violating Social Media Terms of Use Make You Guilty of Violating the CFAA?

LinkedIn has filed a suit against John Does in response to a spate of “data scraping” perpetrated by unknown individuals, in violation of the website’s terms and conditions.This is the latest federal case in the Northern...more

Give And Take: Lofgren’s Twin Trade Secret Bills Would Curtail Actions Under One Law, Expand Them Under Another

When Rep. Zoe Lofgren, the Silicon Valley Democrat, introduced a pair of bills last month on trade secret misappropriation, we puzzled over her purpose. ...more

Recent Developments In Information Technology Law – Second Quarter 2013

In This Issue: - I. U.S. Supreme Court - A. Trademarks 3 - II. U.S. Courts of Appeal - A. Patents - B. Copyrights - C. Copyrights/Criminal - D. Trademarks - E. Trademarks/Unfair Trade...more

Decisions Highlight Split In Application Of Computer Fraud And Abuse Act

Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more

Who Owns a LinkedIn Account? An Update to Eagle v. Edcomm, Inc.

In October 2012, we told you about the case of Eagle v. Edcomm, Inc. pertaining to whether an employee’s LinkedIn account belongs to the employee (Linda Eagle) or to her employer (Edcomm). At that time, the United States...more

Recent Developments In Information Technology Law - First Quarter 2013

Table of Contents: *I. U.S. Supreme Court - A. Trademarks *II. U.S. Courts of Appeal - A. Patents - B. Copyrights - C. Copyrights/Criminal - D. Trademarks - E. Trademarks/Unfair...more

The Rising Threat Of Trade Secrets Theft

One of the drawbacks of a global economy is the rise in trade secret theft. In the absence of a seamless global enforcement infrastructure foreign actors have had little fear of being caught and suffering any consequences. ...more

Recent Cases Address Employer Efforts to Protect Confidential Information

Originally published in SC Bar's Employment and Labor Law Newsletter: Winter 2013 on February 15, 2013 In recent months, both the Fourth Circuit Court of Appeals, which has jurisdiction over federal cases in North and...more

Ninth Circuit Scales Back CFAA Application to Data Misappropriation Cases

Aggrieved employers have often turned to the Computer Fraud and Abuse Act (the "CFAA") in suing former employees that allegedly absconded with information from company computers. Such suits face bleak prospects in the Ninth...more

4th Circuit Issues Employee Friendly CFAA Opinion

As readers of this blog know, we have been following the diverse and seemingly irreconciliable decisions from federal courts regarding the scope of the federal Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030. Last...more

Fourth Circuit Blunts CFAA As A Remedy Against A Rogue Employee

Let's say a client calls telling you that a valued former employee has left to work for a competitor. Just before leaving, the employee emailed himself a substantial number of your client's confidential documents. He's now...more

17 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.