News & Analysis as of

Misappropriation Computer Fraud and Abuse Act (CFAA) Former Employee

Epstein Becker & Green

Update On Knicks/Raptors Trade Secrets Case and Other NBA Intellectual Property News

As we all await rulings on the lawsuits challenging the FTC’s Noncompete Rule (one of which may be decided later today), we provide an update on the Knicks/Raptors trade secret case that we previously discussed on EBG’s...more

Fisher Phillips

Foul on the Play: 6 Takeaways for Employers as NY Knicks Sue Toronto Raptors for Trade Secret Misappropriation

Fisher Phillips on

The New York Knicks just sued their former employee and his new employer, the Toronto Raptors, in a case that can teach employers a lot about trade secret misappropriation. The August 21 lawsuit accuses their Eastern...more

Holland & Knight LLP

Authorized Access of Proprietary Information and Impact on CFAA Claim

Holland & Knight LLP on

Employers continuously face a key employee or consultant leaving or separating from the company to join or start a competing business. In these inevitable scenarios, the loss – potential or actual – of the company's...more

Fox Rothschild LLP

Tennessee District Court Deepens The “Without Authorization” Divide Under The Computer Fraud And Abuse Act

Fox Rothschild LLP on

A Tennessee District Court recently ruled in Wachter Inc. v. Cabling Innovations, LLC, 3:18-cv-00488 (W.D. Tenn. May 7, 2019) that two former employees with permitted access to company computers were not liable under the...more

Jackson Lewis P.C.

District Court Finds No CFAA Violation Where Employee Shares Confidential Company Information With Competitor

Jackson Lewis P.C. on

A district court in Tennessee recently concluded in Wachter Inc. v. Cabling Innovations LLC that two former employees who allegedly shared confidential company information found on the company’s computer system with a...more

Patterson Belknap Webb & Tyler LLP

The Supreme Court Punts on Clarifying the Computer Fraud and Abuse Act

The federal Computer Fraud and Abuse Act of 1986 (“CFAA”) has generated controversy and disagreement among courts and commentators regarding the scope of its application. The statute, 18 U.S.C. § 1030, which provides for...more

Seyfarth Shaw LLP

What Underlying Facts are Required to Assert a Valid CFAA Claim Based on “Exceeds Authorized Access” in Georgia?

Seyfarth Shaw LLP on

The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more

Brooks Pierce

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

Brooks Pierce on

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Ballard Spahr LLP

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

Ballard Spahr LLP on

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

Proskauer - California Employment Law

California Employment Law Notes - July 2016

Employer Is Entitled To Recover $4 Million In Attorney's Fees From EEOC - CRST Van Expedited, Inc. v. EEOC, 578 U.S. ___, 136 S. Ct. 1642 (2016) - The EEOC filed suit against CRST (a trucking company) alleging...more

King & Spalding

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

King & Spalding on

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Morgan Lewis

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Morrison & Foerster LLP - Social Media

Ownership of Business-Related Social Media Accounts

Social media platforms have become an increasingly important means for companies to build and manage their brands and to interact with their customers, in many cases eclipsing companies’ traditional “.com” websites. Social...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide