News & Analysis as of

Unauthorized Access

Supreme Court Denies Appeals of Notable Data Scraping, Computer Fraud Decisions from Ninth Circuit

This past week, the Supreme Court denied the petitions for certiorari in two noteworthy Ninth Circuit decisions that had interpreted the scope of liability under the federal Computer Fraud and Abuse Act (CFAA) in the context...more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

The Supreme Court Punts on Clarifying the Computer Fraud and Abuse Act

The federal Computer Fraud and Abuse Act of 1986 (“CFAA”) has generated controversy and disagreement among courts and commentators regarding the scope of its application. The statute, 18 U.S.C. § 1030, which provides for...more

Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act...

by Seyfarth Shaw LLP on

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more

Nosal Reply Brief Sets Stage For SCOTUS Cert Decision

The U.S. Supreme Court, which just began a new term on Monday with a full complement of nine justices, is expected to soon decide whether it will hear the appeal of David Nosal, the former Korn Ferry executive whose...more

LinkedIn Takes the Role of Protector of its Users’ Privacy

by Dorsey & Whitney LLP on

In a recent case brought in a California court, the professional networking service LinkedIn asserted its right to protect its users’ privacy expectations against a third party interloper that claims the right to collect...more

Chris Lazarini Examines Unconscionability Claims in Arbitration Clause

by Bass, Berry & Sims PLC on

Bass, Berry & Sims attorney Chris Lazarini examined a case in which a plaintiff filed a breach of fiduciary duty claim in federal court and opposed defendants' efforts to move the claims to arbitration. The plaintiff claimed...more

hiQ Labs, Inc. v. LinkedIn Corp.: A Federal Court Weighs in on Web Scraping, Free Speech Rights, and the Computer Fraud and Abuse...

by Ropes & Gray LLP on

In recent years, a number of firms in a variety of industries have utilized automated research methods, including web scraping tools and certain forms of artificial intelligence such as bots, to gather information from a...more

District Court Issues Injunction in hiQ v. LinkedIn Scraping Case

On August 14, 2017, the U.S. District Court for the Northern District of California issued a preliminary injunction that prohibits LinkedIn from implementing legal or technological restrictions on hiQ's access, copying, and...more

A Green Light for Screen Scraping? Proceed With Caution…

by Proskauer Rose LLP on

Court Issues Injunction Barring Blocking of Scraping and Holds CFAA Likely Doesn’t Apply - Websites make information available to clients, users, customers and subscribers. Data aggregators, investors, competitors and...more

The Ninth Circuit Holds that California’s Anti-Hacking Law, Penal Code Section 502, does not Proscribe Unauthorized “Access” to a...

by Nossaman LLP on

California’s Computer Data Access And Fraud Act, Cal. Pen. Code, § 502 (“CDAFA”) is a state law analog to the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq. (“CFAA”). Both are aimed at fighting unauthorized...more

Non-Compete News: Using Defend Trade Secrets Act, California Court Stops Deletion of Misappropriated Confidential Information

by FordHarrison on

Having just celebrated its one-year anniversary, the Defend Trade Secrets Act (DTSA) triggered an uptick in federal litigation concerning the fight to protect corporate trade secrets. Though no court has issued the elusive ex...more

Governor Signs Amendment to Tennessee Data Breach Notification Law

by Bass, Berry & Sims PLC on

During the recent 110th Regular Session of the Tennessee General Assembly, Governor Bill Haslam signed into law an amendment to the Tennessee Identity Theft Deterrence Act of 1999....more

The Computer Fraud and Abuse Act Will Need To Wait Another Day In The Commercial Division

Justice Shirley Kornreich recently issued one of the few New York state court decisions that address the Computer Fraud and Abuse Act (“CFAA”). Spec Simple, Inc. v. Designer Pages Online LLC, No. 651860/2015, 2017 BL...more

Update: Case Involving Sharing Of Passwords May Be Headed To The Supreme Court

by Jackson Lewis P.C. on

Last August, we reported on a Ninth Circuit case in which a former employee was convicted of a crime under the Computer Fraud and Abuse Act (“CFAA”) for accessing and downloading information from his former company’s database...more

Company Awarded Damages After Former Employee Hacks Its Systems And Hijacks Its Website

by Jackson Lewis P.C. on

A company can recover damages from its former employee in connection with his hacking into its payroll system to inflate his pay, accessing its proprietary files without authorization and hijacking its website, a federal...more

OCR Settlement Lessons - Failing to Perform an Electronic Access Risk Analysis Before an Unauthorized Access Occurs

by Ruder Ware on

Failure to conduct a risk assessment before a hacking incident occurred resulted in a $400,000 settlement between the Office of Civil Rights (OCR) and a Federally Qualified Health Clinic (FQHC). The FQHC filed a breach...more

Federal Court of Appeal upholds interlocutory injunction directed at retailers of set-top boxes loaded with copyright-infringing...

by Smart & Biggar on

As reported previously, the Federal Court issued an interlocutory injunction on June 1, 2016 directed at retailers of set-top boxes that are configured, or “pre-loaded”, with various applications that provide their users with...more

Federal Computer Hacking Laws Apply to Executive's Unauthorized Access to Coworkers' Emails

The federal Computer Fraud and Abuse Act (CFAA) and the Stored Communications Act (SCA) were enacted to protect U.S. businesses and individuals from computer hacking and industrial espionage. In recent years, employers and...more

Eleventh Circuit Upholds Company Claims Against Former Executive For Unlawful Access to Email

by Jackson Lewis P.C. on

A terminated executive who accessed co-worker emails in the process of reporting possible company wrongdoing lost his appeal on several grounds. In Brown Jordan Intl, Inc. v. Carmicle, the Eleventh Circuit found that the...more

Bounty or Bug Programs: A How-To Guide

by Bryan Cave on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

NC Business Court: What Is Intrusion Into Seclusion?

by Brooks Pierce on

I had never heard before of a "privacy tort" claim for "intrusion into seclusion." But it exists in North Carolina per Judge Gale's Opinion in Dishner v. Goneau, 2017 NCBC 7, decided in the NC Business Court this week....more

Unauthorized Computer Access, Without Service Interruption, May Be Cause for Action

by Taylor English Duma LLP on

In a case of first impression, the Eleventh Circuit has held that an employer need not show an interruption of service to prove actionable harm under the Computer Fraud and Abuse Act (CFAA) and other federal laws. This is...more

Keeping Section 5 Alive: The FTC Brings Suit Against D-Link

The U.S. Federal Trade Commission (“FTC”) has filed suit against Taiwan-based D-Link Corporation and D-Link Systems, Inc. (collectively, “D-Link”), manufacturers and sellers of home networking devices including routers,...more

It’s Easier for Employers to Sue for Data Theft

by Dorsey & Whitney LLP on

Why a Ninth Circuit decision and an amendment to the Economic Espionage Act change the landscape. Two new developments this past year have made it easier for employers to sue employees in federal court for stealing data...more

89 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.