Misappropriation Unauthorized Access

News & Analysis as of

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Employees and “Authorized Access”: A Threat from Within?

Workplace privacy has become an increasingly challenging issue for employees and employers alike. With technological advancements, employers have enhanced visibility into employee behavior including their use of company...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Ownership of Business-Related Social Media Accounts

Social media platforms have become an increasingly important means for companies to build and manage their brands and to interact with their customers, in many cases eclipsing companies’ traditional “.com” websites. Social...more

Recent Cases Address Employer Efforts to Protect Confidential Information

Originally published in SC Bar's Employment and Labor Law Newsletter: Winter 2013 on February 15, 2013 In recent months, both the Fourth Circuit Court of Appeals, which has jurisdiction over federal cases in North and...more

Second Circuit Rules U.S. Court Has Personal Jurisdiction over Foreign Employee Who Allegedly Misappropriated Trade Secrets...

Last month, a federal appeals court issued a ruling permitting an employer in Connecticut to pursue a claim against a former employee who allegedly misappropriated the employer's confidential information from outside the...more

Effective Data-Use Policies Can Have “Far-Reaching” Benefits in Cracking Down on Employee Cyber Theft

In a decision that could make it easier for U.S. companies to enforce claims against employees who commit cyber theft from remote locations, including from beyond U.S. borders, the Second Circuit breathed life into a...more

7 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.