Caregivers in Cybersecurity — Unauthorized Access Podcast
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Ross Is Boss — Unauthorized Access Podcast
Unauthorized Access Returns With "Get to Know Joe" — Unauthorized Access Podcast
Panel Pursuit: The Ins and Outs of Becoming a Preferred Panel Vendor - Unauthorized Access Podcast
Dark Web Monitoring - Unauthorized Access Podcast
Unauthorized Access: An Inside Look at Incident Response
A well-known idiom - widely credited to Ben Franklin in the 1700s - is that an ounce of prevention is worth a pound of cure. Yet, few companies actively train their personnel to recognize the risk of a trade secret...more
With the proliferation of technology and cloud-based computing, employers often struggle to provide employees with the tools to allow access to the information they need to effectively and efficiently do their jobs while...more
In its recent decision in Van Buren v. United States, the U.S. Supreme Court narrowed the scope of the Computer Fraud and Abuse Act (CFAA) and its potential use by employers to ensure computer security and protection for...more
Mere "misuse" of information is not enough. The U.S. Supreme Court decided yesterday that a criminal conviction under the Computer Fraud and Abuse Act cannot be based merely on misusing information obtained through a...more
Loose language in a criminal statute conferring a private cause of action – such as the Computer Fraud and Abuse Act (CFAA) – presents an interpretative dilemma for courts. The CFAA furthers the legitimate public interest in...more
Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more
Confidentiality – Electronically Stored Information – Unauthorized Access - The State Bar of California's Standing Committee on Professional Responsibility and Conduct Formal Opinion Interim 16-0002 - Risk Management...more
In a recent case, with some rather salacious details, the Third Circuit had the opportunity to examine employee liability under the Computer Fraud and Abuse Act (CFAA). Teva received a tip from a competitor’s former employee...more
Just over four years ago, in January 2014, a court sentenced former Korn/Ferry regional director David Nosal to one year and one day in prison for violations of the federal Computer Fraud and Abuse Act and the Espionage Act. ...more
On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more
The federal Computer Fraud and Abuse Act of 1986 (“CFAA”) has generated controversy and disagreement among courts and commentators regarding the scope of its application. The statute, 18 U.S.C. § 1030, which provides for...more
On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more
The U.S. Supreme Court, which just began a new term on Monday with a full complement of nine justices, is expected to soon decide whether it will hear the appeal of David Nosal, the former Korn Ferry executive whose...more
Having just celebrated its one-year anniversary, the Defend Trade Secrets Act (DTSA) triggered an uptick in federal litigation concerning the fight to protect corporate trade secrets. Though no court has issued the elusive ex...more
The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more
Last month, the Ninth Circuit affirmed the criminal conviction of an individual for accessing a computer “without authorization” in violation of the Computer Fraud and Abuse Act (“CFAA”). U.S. v. Nosal (9th Cir., July 5,...more
On July 5, 2016, the Ninth Circuit Court of Appeals issued its highly anticipated decision in the most recent chapter of United States v. Nosal, holding that an individual acts "without authorization" as used in the Computer...more
We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more
In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more
Is password sharing a crime? It can be under the right circumstances, according to last week’s decision in United States v. Nosal. In Nosal, the U.S. Court of Appeals for the Ninth Circuit upheld the conviction of a former...more
Not exactly. A divided Ninth Circuit panel recently affirmed the conviction of a former employee under the Computer Fraud and Abuse Act (“CFAA”), holding that “[u]nequivocal revocation of computer access closes both the front...more
Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more
Inherent in all employment relationships is the fact that employers are privy to all sorts of confidential information about their employees. For example, in order to do something as simple as paying an employee’s wages, an...more
Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more
Federal courts have continued to disagree on whether the Computer Fraud & Abuse Act ("CFAA") applies to employees who misuse confidential information or trade secrets obtained from an employer's computer system that the...more