We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 1-10 of 17

State AGs in the news

  • Dickstein Shapiro LLP
  • -
  • USA
  • -
  • June 5 2014

Incumbent AG Luther Strange (R) and Joe Hubbard (D) received their respective party's nomination after both ran unopposed in the primary. California

State AGs in the news

  • Dickstein Shapiro LLP
  • -
  • USA
  • -
  • May 15 2014

Bernard Nash and Milton A. Marquis Hot News Blog Post: Think You're Not a Holder of Unclaimed Property? Think Again! All 50 states have unclaimed

MoFo Tech - SpringSummer 2014

  • Morrison & Foerster LLP
  • -
  • USA
  • -
  • April 30 2014

America's shale gas revolution is making waves in transportation technology. Currently, only 1 percent of all natural-gas-fueled vehicles worldwide

Can your company's computer use policy form the basis for a civil claim?

  • Quarles & Brady LLP
  • -
  • USA
  • -
  • October 29 2013

Can your company's computer use policy form the basis for a civil claim under the Computer Fraud and Abuse Act? In a recent opinion, the Southern

Financial services report, fall 2013

  • Morrison & Foerster LLP
  • -
  • USA
  • -
  • September 16 2013

On July 31, 2013, the U.S. District Court For the District of Columbia issued a Sharply worded opinion holding the Federal

An employee is stealing company documentsthat can’t be protected activity, right?

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • July 3 2013

A supervisor discovers that an employee has recently downloaded thousands of pages of confidential Company billing and financial information, and

Different strokes: interpreting Computer Fraud and Abuse Act

  • Morvillo Abramowitz Grand Iason & Anello PC
  • -
  • USA
  • -
  • September 4 2012

Originally enacted in 1984 to address the growing problem of computer hacking, the Computer Fraud and Abuse Act has been used to prosecute a wide variety of behavior, such as the violation of a non-compete agreement by a former employee, the leak of classified government materials, and cyber-bullying

Second Circuit reverses convictions in data-theft prosecution and narrowly interprets federal criminal statutes with important intellectual property implications

  • Foley Hoag LLP
  • -
  • USA
  • -
  • April 21 2012

In February 2012, following oral argument, the U.S. Court of Appeals for the Second Circuit issued a brief order reversing Sergey Aleynikov’s convictions for violating the National Stolen Property Act, 18 U.S.C. 2314 (“NSPA”), and the Economic Espionage Act, 18 U.S.C. 1832(b) (“EEA”), and stating a longer opinion would follow

Employees may have committed a crime by violating employer’s computer use policy

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • May 11 2011

In this criminal proceeding brought under the Computer Fraud and Abuse Act (“CFAA”), the United States government filed a 20-count indictment against David Nosal (a former employee of KornFerry International) and his accomplices (also from KornFerry) as a result of their obtaining information from their employer’s computer system for the purpose of defrauding KornFerry and helping Nosal set up a competing business

Employee violation of employer computer use policy can support CFAA criminal charge

  • Proskauer Rose LLP
  • -
  • USA
  • -
  • May 5 2011

An employee's violation of an employer's computer use policy can support a criminal charge of exceeding authorized access under the Computer Fraud and Abuse Act, a district court ruled