Unauthorized Access

News & Analysis as of

Sanctions for Bringing a Computer Fraud and Abuse Act Claim?

Federal courts have continued to disagree on whether the Computer Fraud & Abuse Act ("CFAA") applies to employees who misuse confidential information or trade secrets obtained from an employer's computer system that the...more

UVA notifies employees of illegal access to human resources information through phishing scheme

The University of Virginia (UVA) has notified approximately 1,400 of its employees that unauthorized individuals were able to access its HR system and the personal information of 1,400 employees of the Academic Division. The...more

SCOTUS upholds Computer Fraud and Abuse Act conviction

The Supreme Court of the United States held on January 25, 2016, that an executive of a shipping company who hacked into his former employer’s computer system after he left the company was guilty under the Computer Fraud and...more

Breaking News: Hacker’s Conviction Affirmed Despite Lower Court’s Error

This week, the United States Supreme Court upheld a conviction under the Computer Fraud and Abuse Act despite the Court’s acknowledgement that the jury had been wrongfully instructed on the elements of the crime charged. ...more

Supreme Court Issues CFAA decision in Michael Musacchio v. United States

On Monday, January 25th, the Supreme Court issued the most recent Computer Fraud and Abuse Act decision in Michael Musacchio v. United States. After leaving his employer to start his own company, the defendant (a former...more

Recent Georgia Court of Appeals Case Highlights Alternative Theories of Relief in Unfair Competition Case

Beginning in law school, attorneys are trained to learn from reported appellate cases, and that education never stops. In a recent Georgia Court of Appeals case involving claims of unfair competition, Lyman v. Cellchem Int’l...more

Feds focus on damage to computers as basis for Computer Fraud and Abuse Act prosecution

Last week, a federal judge sentenced Yijia Zhang, a computer systems manager, to 31 months in federal prison for transferring thousands of his employer’s electronic files to European storage sites. The case highlights the...more

Ninth Circuit Poised to Address the “Without Authorization” Debate under the Computer Fraud and Abuse Action Again

Imagine if you could manage all of your social media platforms on one app. Believe it or not, there was an app for that (or, at least a website), created by a company named Power Ventures (“Power”). Back in 2008, Power...more

‘Cannibal Cop’ Decision Restrains Employers

Second Circuit ruling on data theft creates more inconsistency regarding federal law’s reach. In December, a divided panel of the U.S. Court of Appeals for the Second Circuit in U.S. v. Valle interpreted the Computer...more

Former Cardinals Scouting Director pleads guilty to hacking the Astros’ database

Last Friday, Chris Correa, the former scouting director of the St. Louis Cardinals, pleaded guilty in federal court in Texas for unlawfully accessing the Houston Astros’ database, which included scouting and draft...more

Stealing Bases Okay; Stealing Data Not So Much

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

Former Cardinals Scouting Director Pleads Guilty to Hacking Astros’ Computer Systems

Economic espionage and computer hacking can touch all industries and business types. Computer hacking is a federal crime, and federal prosecutors are aggressively targeting cases involving the unauthorized access of a...more

Former Morgan Stanley financial advisor sentenced

Just before Christmas, a New York federal judge sentenced Galen Marsh, the former Morgan Stanley financial advisor who downloaded client data to his home computer without permission, to three years of probation. He pled...more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

The “Cannibal Cop” and Protection of Computerized Data

In an unusual criminal case, the Second Circuit Court of Appeals recently weighed in on an important question at the intersection of employment law and data security. The decision will likely have implications wherever...more

“Don’t Go There”: Second Circuit Makes it Harder to Bring Claims against Former Employees who Take Company Information without...

On December 3, the Second Circuit Court of Appeals became the most recent entrant into the circuit conflict on the question of when and under what circumstances an employee’s use of a computer to gain access to unauthorized...more

"Don’t Go There": Second Circuit Makes it Harder to Bring Claims against Former Employees who Take Company Information without...

On December 3, the Second Circuit Court of Appeals became the most recent entrant into the circuit conflict on the question of when and under what circumstances an employee’s use of a computer to gain access to unauthorized...more

The Threat From Within

Even as organizations hunker down for a long and expensive siege against attackers from cyberspace, a determined employee with the right kind of access can be as much of a threat, if not more. ...more

Employment Law Update - November 2015

Coming Changes to Overtime Exemptions Rules Will Have Serious Impact on Employers - The Fair Labor Standards Act ("FLSA") requires that employees be paid minimum wage and overtime pay at a rate of not less than one and...more

HIPAA Lessons from the Warner Chilcott Settlement

Last week, the US Attorney’s Office in Boston announced that drug company Warner Chilcott agreed to plead guilty to health care fraud and pay $125 million to resolve criminal and civil liability arising out of allegations...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Employees and “Authorized Access”: A Threat from Within?

Workplace privacy has become an increasingly challenging issue for employees and employers alike. With technological advancements, employers have enhanced visibility into employee behavior including their use of company...more

Nosal Update: Ninth Circuit Hears Oral Arguments on Password Sharing and Scope of Computer Fraud and Abuse Act

On October 20, 2015, a Ninth Circuit panel consisting of Chief Judge Sidney Thomas and Judges M. Margaret McKeown and Stephen Reinhardt heard oral argument from the U.S. Department of Justice and counsel for David Nosal on...more

Quick Guide to Trade Secrets

An overview of trade secrets, the critical business information that provides companies with a competitive edge. What are Trade Secrets? - Technical Information - Product formulas - Product designs ...more

FTC Sees Disconnect on Proposed Connected Cars Legislation

The Energy & Commerce Committee of the U.S. House of Representatives held a hearing on October 21st titled “Examining Ways to Improve Vehicle and Roadway Safety” to consider (among other matters) Vehicle Data Privacy...more

43 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×