We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 70

It's ten o'clock. Does the FBI know where you (or at least your cell phone) are?
  • Proskauer Rose LLP
  • USA
  • February 11 2010

If the FBI wants to know where an individual is, and if the Department of Justice prevails in a case rescheduled for argument tomorrow in snowy Philadelphia, the FBI (or other law enforcement authorities) will be able to obtain that individual's cell site data from the individual's cellular carrier on a showing of "reasonable grounds" to believe that the data is "relevant and material to an ongoing investigation."


Applying 9th Circuit LVRC v. Brekka ruling, district court dismisses most CFAA criminal charges in United States v. Nosal
  • Proskauer Rose LLP
  • USA
  • January 29 2010

The debate over the applicability of the Computer Fraud and Abuse Act in cases of alleged employee disloyalty has yielded quite a few rulings over the last several years, and generated a circuit split last September with the Ninth Circuit decision in LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009


Novell prevails in jury trial on ownership of UNIX copyrights
  • Proskauer Rose LLP
  • USA
  • March 30 2010

The jury in The SCO Group v. Novell, Inc. litigation over ownership of the copyrights in UNIX source code has ruled in favor of Novell, the company announced on its blog this afternoon


Computer file extension functional, therefore not protectable as trademark
  • Proskauer Rose LLP
  • USA
  • April 14 2010

A computer file extension is inherently functional, therefore a software company that utilizes a particular file extension to designate files that are accessed by its proprietary software may not protect the letters comprising the file extension as a trademark, a district court ruled


In assessing employee status in copyright ownership disputes, technology start-ups are a special case, says the Ninth Circuit
  • Proskauer Rose LLP
  • USA
  • April 8 2010

A technology start-up company can be an informal environment - both Apple Computer and Hewlett-Packard famously started out in garages, and Yahoo!, Google and Facebook were developed, initially at least, in college dorm rooms


U.S. Supreme Court grants petition for certiorari in Quon v. Arch Wireless case involving employee communications claim under Stored Communications Act
  • Proskauer Rose LLP
  • USA
  • April 14 2010

The U.S. Supreme Court granted the petition for certiorari filed by the employer in a case involving the privacy of employee communications under the Stored Communications Act provisions of the Electronic Communications Privacy Act


Expectation of privacy in computer files negated by P2P user's failure to engage program privacy feature
  • Proskauer Rose LLP
  • USA
  • April 14 2010

A federal agent's access to a user's computer via a peer-to-peer file-sharing program did not violate the Fourth Amendment, because the user's expectation of privacy in the contents of his computer was negated by his failure properly to engage the privacy features in the program, the U.S. Court of Appeals for the Ninth Circuit ruled


Rule of lenity limits criminal prosecution under Computer Fraud and Abuse Act for acts of employee disloyalty
  • Proskauer Rose LLP
  • USA
  • April 14 2010

The rule of lenity limits prosecution of an allegedly disloyal former employee on the theory that his access to his employer's computer network was "without authorization" or "exceeded authorized access" within the meaning of the Computer Fraud and Abuse Act, a district court ruled


Actual damages for copyright infringement of software code supported by monetary value of work by contributors to open source project
  • Proskauer Rose LLP
  • USA
  • April 14 2010

A claim for actual damages for infringement of open source software code is not precluded because the code was distributed without charge, a district court ruled


Employee access to computer network in furtherance of criminal fraud “exceeds authorized access” under CFAA
  • Proskauer Rose LLP
  • USA
  • April 14 2010

An employee who accessed financial data on her employer's computer network in violation of official policy in order to perpetrate a criminal scheme exceeded her authorized access to the network within the meaning of the Computer Fraud and Abuse Act, the U.S. Court of Appeals for the Fifth Circuit ruled