We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 11-20 of 66

Warrant required for delayed search of laptop seized at border

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • July 29 2010

While the search of a laptop computer at a border crossing did not require a search warrant, one of two subsequent warrantless searches of the laptop after it was seized by law enforcement officials violated the Fourth Amendment, a district court ruled

Damage, impairment or interruption of service required to show compensable loss under CFAA

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • July 29 2010

A compensable "loss" under the Computer Fraud and Abuse Act is not established by an allegation that a company spent in excess of $5,000 to investigate unauthorized access to its computerized data, where the company failed to show any underlying damage, impairment or interruption of service to a computer or a computer system, a district court held

No Fourth Amendment violation in ISP scanning of user e-mail, and reporting of suspected child pornography in compliance with law

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • July 29 2010

An Internet service provider that scanned user e-mail in order to screen out images containing child pornography, and reported suspected images in compliance with federal law, was not acting as an agent of law enforcement for Fourth Amendment purposes, the U.S. Court of Appeals for the Fourth Circuit ruled

Register of copyrights says "who knows?" on ownership of computer program copies

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • August 5 2010

Who owns the firmware on a smartphone, the device manufacturer or the purchaser?

Novell prevails in jury trial on ownership of UNIX copyrights

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • March 30 2010

The jury in The SCO Group v. Novell, Inc. litigation over ownership of the copyrights in UNIX source code has ruled in favor of Novell, the company announced on its blog this afternoon

Computer file extension functional, therefore not protectable as trademark

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • April 14 2010

A computer file extension is inherently functional, therefore a software company that utilizes a particular file extension to designate files that are accessed by its proprietary software may not protect the letters comprising the file extension as a trademark, a district court ruled

U.S. Supreme Court grants petition for certiorari in Quon v. Arch Wireless case involving employee communications claim under Stored Communications Act

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • April 14 2010

The U.S. Supreme Court granted the petition for certiorari filed by the employer in a case involving the privacy of employee communications under the Stored Communications Act provisions of the Electronic Communications Privacy Act

Rule of lenity limits criminal prosecution under Computer Fraud and Abuse Act for acts of employee disloyalty

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • April 14 2010

The rule of lenity limits prosecution of an allegedly disloyal former employee on the theory that his access to his employer's computer network was "without authorization" or "exceeded authorized access" within the meaning of the Computer Fraud and Abuse Act, a district court ruled

In assessing employee status in copyright ownership disputes, technology start-ups are a special case, says the Ninth Circuit

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • April 8 2010

A technology start-up company can be an informal environment - both Apple Computer and Hewlett-Packard famously started out in garages, and Yahoo!, Google and Facebook were developed, initially at least, in college dorm rooms

Expectation of privacy in computer files negated by P2P user's failure to engage program privacy feature

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • April 14 2010

A federal agent's access to a user's computer via a peer-to-peer file-sharing program did not violate the Fourth Amendment, because the user's expectation of privacy in the contents of his computer was negated by his failure properly to engage the privacy features in the program, the U.S. Court of Appeals for the Ninth Circuit ruled