We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 1-10 of 46

An employee is stealing company documentsthat can’t be protected activity, right?

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • July 3 2013

A supervisor discovers that an employee has recently downloaded thousands of pages of confidential Company billing and financial information, and

Top 10 developmentsheadlines in trade secret, computer fraud, and non-compete law in 2014

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • January 6 2015

As part of our annual tradition, we are pleased to present our discussion of the top 10 developmentsheadlines in trade secret, computer fraud, and

Top 10 developmentsheadlines in trade secret, computer fraud, and non-compete law in 2012

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • December 31 2012

As part of our annual tradition, here is our list of the top 10 developmentsheadlines in trade secret, computer fraud, and non-compete law for 2012

Computer Fraud and Abuse Act circuit split remains unresolved: United States Supreme Court challenge dismissed

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • January 7 2013

The parties in the WEC Carolina Energy Solutions LLC v. Miller matter recently agreed to dismiss the petition for writ of certiorari filed with the United

The Computer Fraud and Abuse Act and disloyal employees: a narrow bridge to nowhere?

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • April 15 2013

An old folk melody describes the world as "a very narrow bridge," where one misstep can bring disaster. The song seeks to inspire, calling on people

Electronic agreement to arbitrate bytes employer

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • January 5 2015

Since the California Civil Code was amended in 1999 to state that an electronic signature has the same legal effect as a handwritten signature, many

First Apple, now Dell: IBM pursues a departing executive

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • July 13 2009

In the wake of its ultimately successful efforts to obtain an injunction against former executive Mark Papermaster following Papermaster’s move to Apple, IBM recently sought to enjoin David Johnson from joining Dell

Attorney-Client Privilege and Waiver in Employee Email on Company Systems

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • May 27 2011

In this issue of Seyfarth eDIGital, Seyfarth Shaw's eDiscovery and Information Governance practice group newsletter, we will continue the discussion of employee privacy in communications transmitted on company servers

Michigan federal court adopts narrow interpretation of civil liability under Computer Fraud and Abuse Act

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • May 30 2012

The U.S. Circuit Courts of Appeals are currently split over the interpretation of the Computer Fraud and Abuse Act’s (“CFAA”) “unauthorized use” statute, and how narrowly this prong should be interpreted

No damages? Illinois federal court tosses Computer Fraud and Abuse Act claim alleging hacking of law firm network

  • Seyfarth Shaw LLP
  • -
  • USA
  • -
  • May 13 2013

An Illinois federal court recently found in the favor of the defendant on a plaintiff's Computer Fraud and Abuse Act claim because the plaintiff