News & Analysis as of

Confidential Information Unauthorized Access

Axinn, Veltrop & Harkrider LLP

Recognizing Risk: When Pursuing A Competitive Edge Creates Exposure to Trade Secret Claims

A well-known idiom - widely credited to Ben Franklin in the 1700s - is that an ounce of prevention is worth a pound of cure. Yet, few companies actively train their personnel to recognize the risk of a trade secret...more

Foley & Lardner LLP

Lower the Gate – Employers Must Take Steps to Restrict Access to Confidential Information

Foley & Lardner LLP on

With the proliferation of technology and cloud-based computing, employers often struggle to provide employees with the tools to allow access to the information they need to effectively and efficiently do their jobs while...more

Jackson Walker

Supreme Court Restricts Use of Computer Fraud and Abuse Act

Jackson Walker on

In its recent decision in Van Buren v. United States, the U.S. Supreme Court narrowed the scope of the Computer Fraud and Abuse Act (CFAA) and its potential use by employers to ensure computer security and protection for...more

Constangy, Brooks, Smith & Prophete, LLP

CFAA Conviction Requires Some Kind Of A "Hack," Supreme Court Says

Mere "misuse" of information is not enough. The U.S. Supreme Court decided yesterday that a criminal conviction under the Computer Fraud and Abuse Act cannot be based merely on misusing information obtained through a...more

Kilpatrick

Computer Fraud and Abuse Act: Sixth Circuit solidifies circuit split ahead of anticipated Supreme Court ruling

Kilpatrick on

Loose language in a criminal statute conferring a private cause of action – such as the Computer Fraud and Abuse Act (CFAA) – presents an interpretative dilemma for courts. The CFAA furthers the legitimate public interest in...more

Fisher Phillips

Will Supreme Court Enforce Law And Order In The Digital Workplace?

Fisher Phillips on

Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more

Hinshaw & Culbertson - Lawyers' Lawyer...

The Lawyers' Lawyer Newsletter - Recent Developments in Risk Management - June/July 2020

Confidentiality – Electronically Stored Information – Unauthorized Access - The State Bar of California's Standing Committee on Professional Responsibility and Conduct Formal Opinion Interim 16-0002 - Risk Management...more

Sherman & Howard L.L.C.

Loving the Competition

In a recent case, with some rather salacious details, the Third Circuit had the opportunity to examine employee liability under the Computer Fraud and Abuse Act (CFAA). Teva received a tip from a competitor’s former employee...more

Orrick - Trade Secrets Group

David Nosal Raises Unusual Fairness Argument In Yet Another Attempt To Avoid 366-Day Prison Sentence

Just over four years ago, in January 2014, a court sentenced former Korn/Ferry regional director David Nosal to one year and one day in prison for violations of the federal Computer Fraud and Abuse Act and the Espionage Act. ...more

Snell & Wilmer

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

Patterson Belknap Webb & Tyler LLP

The Supreme Court Punts on Clarifying the Computer Fraud and Abuse Act

The federal Computer Fraud and Abuse Act of 1986 (“CFAA”) has generated controversy and disagreement among courts and commentators regarding the scope of its application. The statute, 18 U.S.C. § 1030, which provides for...more

Seyfarth Shaw LLP

Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act...

Seyfarth Shaw LLP on

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more

Orrick - Trade Secrets Group

Nosal Reply Brief Sets Stage For SCOTUS Cert Decision

The U.S. Supreme Court, which just began a new term on Monday with a full complement of nine justices, is expected to soon decide whether it will hear the appeal of David Nosal, the former Korn Ferry executive whose...more

FordHarrison

Non-Compete News: Using Defend Trade Secrets Act, California Court Stops Deletion of Misappropriated Confidential Information

FordHarrison on

Having just celebrated its one-year anniversary, the Defend Trade Secrets Act (DTSA) triggered an uptick in federal litigation concerning the fight to protect corporate trade secrets. Though no court has issued the elusive ex...more

Seyfarth Shaw LLP

What Underlying Facts are Required to Assert a Valid CFAA Claim Based on “Exceeds Authorized Access” in Georgia?

Seyfarth Shaw LLP on

The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more

Nossaman LLP

Ninth Circuit Rules on Meaning of “Without Authorization” under Computer Fraud and Abuse Act

Nossaman LLP on

Last month, the Ninth Circuit affirmed the criminal conviction of an individual for accessing a computer “without authorization” in violation of the Computer Fraud and Abuse Act (“CFAA”). U.S. v. Nosal (9th Cir., July 5,...more

Orrick, Herrington & Sutcliffe LLP

Déjà Vu Not All Over Again: Ninth Circuit Strengthens CFAA In Nosal II

On July 5, 2016, the Ninth Circuit Court of Appeals issued its highly anticipated decision in the most recent chapter of United States v. Nosal, holding that an individual acts "without authorization" as used in the Computer...more

Brooks Pierce

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

Brooks Pierce on

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

Ballard Spahr LLP

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

Ballard Spahr LLP on

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

Constangy, Brooks, Smith & Prophete, LLP

Court Upholds Conviction Of Ex-Employee For Conspiring To Access Company Data Through “Shared” Password

Is password sharing a crime? It can be under the right circumstances, according to last week’s decision in United States v. Nosal. In Nosal, the U.S. Court of Appeals for the Ninth Circuit upheld the conviction of a former...more

Seyfarth Shaw LLP

Computer Fraud and Abuse Act Ruling: Did the Ninth Circuit Just Criminalize Password Sharing?

Seyfarth Shaw LLP on

Not exactly. A divided Ninth Circuit panel recently affirmed the conviction of a former employee under the Computer Fraud and Abuse Act (“CFAA”), holding that “[u]nequivocal revocation of computer access closes both the front...more

BCLP

Data Privacy Considerations for Starting or Evaluating a Bounty Program

BCLP on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

Bond Schoeneck & King PLLC

Preventing Unauthorized Access to and Disclosure of Confidential Employee Information

Inherent in all employment relationships is the fact that employers are privy to all sorts of confidential information about their employees. For example, in order to do something as simple as paying an employee’s wages, an...more

Seyfarth Shaw LLP

Recent Decision Highlights Important Pleading Requirements for Computer Fraud and Abuse Act Claims

Seyfarth Shaw LLP on

Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more

Fisher Phillips

Sanctions for Bringing a Computer Fraud and Abuse Act Claim?

Fisher Phillips on

Federal courts have continued to disagree on whether the Computer Fraud & Abuse Act ("CFAA") applies to employees who misuse confidential information or trade secrets obtained from an employer's computer system that the...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide