We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 116

Security Interest v. License Agreement: Low Tech Precautions for the High Tech Investment
  • Dorsey & Whitney LLP
  • USA
  • July 19 2016

In this exciting age of startups, the market is brimming with opportunities for individuals and entities alike to invest in emerging companies


Accenture employee faked medical leave to work for a competitor while stealing data from Accenture computers
  • Dorsey & Whitney LLP
  • USA
  • November 29 2010

The recent case of Accenture, LLP v. Sidhu, 2010 WL 4691944 (N.D. Ca. Nov. 9, 2010) is a classic example of how the 9th Circuit’s holding in LVRC Holdings, LLC v. Brekka, 581 F.3d 1127, 1130-31 (9th Cir. 2009) has led to the dismissal of Computer Fraud and Abuse Act (“CFAA”) claims (or criminal counts) in circumstances in which an employee is clearly not authorized to access the company computers


A weapon against hackers on the home front
  • Dorsey & Whitney LLP
  • USA
  • January 14 2014

Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to nation-state hackers like


Message from New York court: rely on CGL policy coverage for data breaches at your own peril
  • Dorsey & Whitney LLP
  • USA
  • March 3 2014

A New York trial court announced a decision on February 21, 2014, that may be a harbinger of wide-reaching limitations on insurance coverage for data


California court holds that an employee can be sued under the CFAA for deleting company files
  • Dorsey & Whitney LLP
  • USA
  • June 17 2010

Without referring to its Circuit's controlling decision of LVRC Holdings LLC v. Brekka, 581 F.3d 1127, (9th Cir. 2009) , a federal district court in San Jose, California permitted a Computer Fraud and Abuse (“CFAA”) claim to proceed against an ex-employee for deleting files from her former employer’s computer


How to prove “loss” for Computer Fraud and Abuse Act
  • Dorsey & Whitney LLP
  • USA
  • May 11 2010

To bring a civil action based on the federal Computer Fraud and Abuse Act ("CFAA") a plaintiff must show that the alleged violation "caused . . . loss . . . aggregating at least $5,000 in value.”


How do you sue an unknown hacker?
  • Dorsey & Whitney LLP
  • USA
  • May 19 2010

The question was answered this week by a federal district court in Connecticut in the case of GWA, LLC v. Cox Communications, Inc. and John Doe


Electronic data security after Riley v. California
  • Dorsey & Whitney LLP
  • USA
  • August 12 2014

It's 10 p.m. Do you know where your company's data is? One of your administrative employees' cell phone may be sitting on his nightstand. Another


Sarah Palin hacker’s conviction stands for accessing her Yahoo email account
  • Dorsey & Whitney LLP
  • USA
  • October 20 2010

The college student David C. Kernell who was convicted by a Chattanooga, Tennessee jury of various federal crimes including a violation of the Computer Fraud and Abuse Act (“CFAA”) for accessing Alaska Governor Sarah Palin’s Yahoo email account will be sentenced on October 29, 2010


Suing employees for computer fraud gets easier
  • Dorsey & Whitney LLP
  • USA
  • November 7 2011

Four recent decisions handed down by four different federal courts of appeals during the past year have, in combination, greatly enhanced the ability of businesses to use the Computer Fraud and Abuse Act (CFAA) as a tool to protect competitively sensitive data and personal information stored in company computers