We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 121

Accenture employee faked medical leave to work for a competitor while stealing data from Accenture computers
  • Dorsey & Whitney LLP
  • USA
  • November 29 2010

The recent case of Accenture, LLP v. Sidhu, 2010 WL 4691944 (N.D. Ca. Nov. 9, 2010) is a classic example of how the 9th Circuit’s holding in LVRC Holdings, LLC v. Brekka, 581 F.3d 1127, 1130-31 (9th Cir. 2009) has led to the dismissal of Computer Fraud and Abuse Act (“CFAA”) claims (or criminal counts) in circumstances in which an employee is clearly not authorized to access the company computers


Security Interest v. License Agreement: Low Tech Precautions for the High Tech Investment
  • Dorsey & Whitney LLP
  • USA
  • July 19 2016

In this exciting age of startups, the market is brimming with opportunities for individuals and entities alike to invest in emerging companies


Hulk-Sized Damages in Sex Tape Privacy and Publicity Case
  • Dorsey & Whitney LLP
  • USA
  • March 24 2016

In 2006, Terry Gene Bollea, better known as "Hulk Hogan," had sex with his best friend's wife, Heather Clem. Apparently unbeknownst to either of them


The conflicting rulings on employee data theft
  • Dorsey & Whitney LLP
  • USA
  • July 13 2013

Employers should include access restrictions in agreements, limit access with technology and consider the jurisdiction. In all jurisdictions the


California court permits company to subpoena Yahoo, Google and ISPs to identify anonymous computer hacker
  • Dorsey & Whitney LLP
  • USA
  • September 6 2010

A federal court in San Jose California last week permitted SolarBridge Technologies, Inc. (“SolarBridge”) to serve subpoenas on Yahoo, Google and various Internet Service Providers to identify the sender of an email containing SolarBridge’s confidential and trade secret protected data including schematics and other product designs of current and future products


How do you sue an unknown hacker?
  • Dorsey & Whitney LLP
  • USA
  • May 19 2010

The question was answered this week by a federal district court in Connecticut in the case of GWA, LLC v. Cox Communications, Inc. and John Doe


Suing employees for computer fraud gets easier
  • Dorsey & Whitney LLP
  • USA
  • November 7 2011

Four recent decisions handed down by four different federal courts of appeals during the past year have, in combination, greatly enhanced the ability of businesses to use the Computer Fraud and Abuse Act (CFAA) as a tool to protect competitively sensitive data and personal information stored in company computers


Holding passwords hostage international extortion foiled
  • Dorsey & Whitney LLP
  • USA
  • January 19 2012

In a case recently filed by a Swiss company in federal court in Florida, the company alleged in its complaint that Jerome Westrick, its former computer programmer and minority shareholder, stole a company laptop, hacked into the company’s computer system, changed access codes and passwords, and locked out the company and its customers from getting into its enterprise content management software


SEC wins freeze order over “cloud computing” pyramid scheme
  • Dorsey & Whitney LLP
  • USA
  • March 30 2014

The "cloud" is a current focus for investors. There is cloud computing, cloud storage and new firms with cloud services. And the Commission discovered


Important changes under MN Data Practices Act for publicprivate contracts for government functions
  • Dorsey & Whitney LLP
  • USA
  • June 18 2014

On May 29, 2014, the Minnesota governor signed into law Senate File 1770, which makes a company's or private individual's records subject to