We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 11-20 of 66

Oracle v. Google judge writes the book on software programming copyright for now, anyway

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • June 6 2012

The trial in the dispute between Oracle and Google over the use of Java technology in the Android operating system is over, and the greatly anticipated ruling on copyright in the Java Application Programming Interface (API) has issued

Ninth Circuit panel says employee violation of employer computer use policy can support CFAA criminal charge

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • April 29 2011

A panel of the U.S. Court of Appeals for the Ninth Circuit has ruled that an employee’s violation of an employer's computer use policy can support a criminal charge of exceeding authorized access under the Computer Fraud and Abuse Act

Register of copyrights says "who knows?" on ownership of computer program copies

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • August 5 2010

Who owns the firmware on a smartphone, the device manufacturer or the purchaser?

Use of e-mail client rule to acquire copies of e-mail messages violates Wiretap Act

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • January 11 2011

An employee who accessed the rule function on his supervisor's e-mail account in order to have copies of the supervisor's e-mail messages forwarded to him violated the provisions of the Wiretap Act that prohibit intentional interception of an electronic communication, the U.S. Court of Appeals for the Seventh Circuit ruled

No Fourth Amendment violation in transfer of laptop seized at border for forensic examination

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • May 5 2011

The transfer of a laptop seized at a border crossing to a facility 170 miles away for forensic examination was justified under the border search doctrine, the U.S. Court of Appeals for the Ninth Circuit ruled

Law enforcement may obtain historical cell site data without warrant

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • January 11 2011

Law enforcement officials are not ordinarily required under the Stored Communications Act, 18 U.S.C. 2701 et seq., to obtain a warrant in order to obtain historical cell site data of an individual from a wireless telecommunications provider, the U.S. Court of Appeals for the Third Circuit ruled

Under New York law, vendor’s specific representations of software functionality support claim for fraudulent inducement

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • July 29 2010

Specific representations made by a salesman concerning the functionality of a software system which the purchaser alleges was inadequate for its purposes support the purchaser's claim for fraudulent inducement, a district court ruled

Novell prevails in jury trial on ownership of UNIX copyrights

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • March 30 2010

The jury in The SCO Group v. Novell, Inc. litigation over ownership of the copyrights in UNIX source code has ruled in favor of Novell, the company announced on its blog this afternoon

Programmer's computer access to steal employer's stock trading code not "unauthorized" under CFAA

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • January 11 2011

A programmer charged with stealing computer source code for a high-speed stock trading platform from his employer in order to benefit one of its competitors did not access the firm's computer network without authorization, or in excess of his authorization, within the meaning of the Computer Fraud and Abuse Act, a district court ruled

Forwarding of allegedly defamatory e-mail protected by Communications Decency Act section 230

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • January 11 2011

An individual who forwarded an allegedly defamatory e-mail received from another party is protected from liability under Section 230 of the Communications Decency Act, which provides that a user of an interactive computer service cannot be treated as the publisher or speaker of information provided by another information content provider, a district court ruled