Trade Secrets Computer Fraud and Abuse Act

A Trade Secret is any information, not generally known or easily ascertainable, by which an enterprise develops an economic advantage over competitors or customers. In order to maintain trade secrets'... more +
A Trade Secret is any information, not generally known or easily ascertainable, by which an enterprise develops an economic advantage over competitors or customers. In order to maintain trade secrets' protected legal status, enterprises must make reasonable efforts to keep the information secret and prevent unnecessary disclosure.  Trade Secrets may include processes, formulas, methods, designs, patterns, et cetera.   less -
News & Analysis as of

Ninth Circuit Hears Oral Arguments in United States v. Nosal, Part II

On October 20, 2015, a three judge panel of the Ninth Circuit heard oral arguments in Round II of United States v. David Nosal. Both sides generally stuck with arguments from their briefs, with Nosal’s counsel arguing that...more

Employees and “Authorized Access”: A Threat from Within?

Workplace privacy has become an increasingly challenging issue for employees and employers alike. With technological advancements, employers have enhanced visibility into employee behavior including their use of company...more

Nosal Update: Ninth Circuit Hears Oral Arguments on Password Sharing and Scope of Computer Fraud and Abuse Act

On October 20, 2015, a Ninth Circuit panel consisting of Chief Judge Sidney Thomas and Judges M. Margaret McKeown and Stephen Reinhardt heard oral argument from the U.S. Department of Justice and counsel for David Nosal on...more

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

eWorkplace Policies Restricting Employees’ Acceptable Use of Technology, Social Media & The Cloud

I. OVERVIEW – THE MODERN LANDSCAPE - A. Physical Conduct PLUS Digital Activity - Traditional concerns for employers have included: conduct leading to liability to third-parties; “frolic and detour” or other...more

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco. So we figured it may be a good time to review both sides’ arguments related to the...more

The Defend Trade Secrets Act of 2015: Proposed Legislation Would Open the Federal Courthouse Door for Trade Secret...

In an era where bipartisanship is rarely on display, a group of Senators and members of the House of Representatives from both parties recently joined together to propose the Defend Trade Secrets Act of 2015 (S. 1890, H.R....more

Trade Secrets and Removal Based on Copyright Preemption

Jurisdiction and removal may not sound like hot topics, but these considerations are critical and sometimes dispositive. Real talk: Certain state court systems are terrible places to litigate. It’s one thing to litigate a...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Satisfying the Computer Fraud and Abuse Act’s Jurisdictional Requirements Can Be Complicated

The parties in a Computer Fraud and Abuse Act case moved for partial summary judgment. Among the issues were whether the plaintiff had incurred the requisite $5,000 in qualifying losses, and whether the complaint was...more

March 2015 Recap

March 2015—like January and February—saw decisions on a variety of fronts from ND Cal judges. ND Cal judges demonstrated their willingness to apply the Supreme Court’s decisions in Nautilus and Alice to invalidate patents on...more

Inside Job – Judge Labson Freeman Applies the CFAA Restrictively

Koninklijke Phillips N.V., et. al. v. Elec-Tech Int’l Co., Ltd., et al.,, Case No. 14-cv-02737 (BLF) (March 20, 2015) - Plaintiff Koninklijke Phillips N.V. (Phillips) and its subsidiary Phillips Lumileds Lighting...more

Nosal Returns to the Ninth Circuit Posing the Question: Is a Password a Sufficient “Technological Access Barrier” Under the CFAA?

Observers following the legal issues surrounding the prosecution of David Nosal will be watching closely in 2015 as the former Korn Ferry executive returns to the Ninth Circuit to appeal his 2013 conviction on three counts of...more

TRO LLC – GET IT? Sprung From Prison, Hacker Creates Hedge Fund That Shorts Stocks Of Companies With Security Vulnerabilities

Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison. We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more

David Nosal, Employee Data Theft, and Why Employment Lawyers Should Understand Their Clients' IT Infrastructure

Earlier this month, a federal judge in San Francisco sentenced David Nosal to a year in prison, three years’ supervised release, 400 hours of community service, and $60,000 in fines. His crime? Nosal violated the Computer...more

BREAKING: David Nosal Sentenced To Prison On CFAA Computer Intrusion And Trade Secret Charges

Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act. In April, a federal jury in...more

Don’t Do the Crime If You Can’t Do The Time: Top 10 Criminal Trade Secret Sentences

Trade secret theft can expose defendants not only to multi-million dollar civil verdicts but also to multi-year prison sentences. Trade Secrets Watch reviewed federal criminal trade secrets sentences since the Economic...more

Give And Take: Lofgren’s Twin Trade Secret Bills Would Curtail Actions Under One Law, Expand Them Under Another

When Rep. Zoe Lofgren, the Silicon Valley Democrat, introduced a pair of bills last month on trade secret misappropriation, we puzzled over her purpose. ...more

Recent Developments In Information Technology Law – Second Quarter 2013

In This Issue: - I. U.S. Supreme Court - A. Trademarks 3 - II. U.S. Courts of Appeal - A. Patents - B. Copyrights - C. Copyrights/Criminal - D. Trademarks - E. Trademarks/Unfair Trade...more

Historic Patent Act Whets Washington's Appetite

On March 16, the most significant provisions of the America Invents Act (AIA) came into force. The AIA was seen as the most extensive alteration to patent law in half a century, and was hotly debated over nearly a decade. The...more

(Practically) No Comment: White House Plea For Public Input On Trade Secret Theft Draws 13 Responses

When the White House rolled out its new strategy for combating trade secret theft, Attorney General Eric Holder warned ominously of “a significant and steadily increasing threat to America’s economic and national security...more

Federal Jury Finds Executive Recruiter Guilty Stealing Trade Secrets From Former Employer In Order to Start Competing Business

On April 24, 2013, a federal jury in the Northern District of California found former Korn/Ferry International corporate executive recruiter, David Nosal, guilty on six counts of conspiracy, stealing trade secrets, and...more

Decisions Highlight Split In Application Of Computer Fraud And Abuse Act

Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more

34 Results
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.