News & Analysis as of

Work Computer Confidential Information

Orrick - Employment Law and Litigation

Court Orders Employee To Hand Over Personal Computer

It is increasingly common that there are disputes with employees at the end of employment about whether or not they have taken or retained an employer’s confidential information. Most employers have a provision relating to...more

FordHarrison

Non-Compete News: Using Defend Trade Secrets Act, California Court Stops Deletion of Misappropriated Confidential Information

FordHarrison on

Having just celebrated its one-year anniversary, the Defend Trade Secrets Act (DTSA) triggered an uptick in federal litigation concerning the fight to protect corporate trade secrets. Though no court has issued the elusive ex...more

Orrick, Herrington & Sutcliffe LLP

When Employees Leave With Your Secrets

Recently I shared the podium with an FBI agent who was asked what frustrated him the most when trying to help businesses with trade secret theft. His answer was a surprise: they fire the guy too fast! He explained that when...more

Seyfarth Shaw LLP

Computer Fraud and Abuse Act Ruling: Did the Ninth Circuit Just Criminalize Password Sharing?

Seyfarth Shaw LLP on

Not exactly. A divided Ninth Circuit panel recently affirmed the conviction of a former employee under the Computer Fraud and Abuse Act (“CFAA”), holding that “[u]nequivocal revocation of computer access closes both the front...more

Seyfarth Shaw LLP

Recent Decision Highlights Important Pleading Requirements for Computer Fraud and Abuse Act Claims

Seyfarth Shaw LLP on

Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more

Fisher Phillips

Sanctions for Bringing a Computer Fraud and Abuse Act Claim?

Fisher Phillips on

Federal courts have continued to disagree on whether the Computer Fraud & Abuse Act ("CFAA") applies to employees who misuse confidential information or trade secrets obtained from an employer's computer system that the...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide