We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 61

Accenture employee faked medical leave to work for a competitor while stealing data from Accenture computers
  • Dorsey & Whitney LLP
  • USA
  • November 29 2010

The recent case of Accenture, LLP v. Sidhu, 2010 WL 4691944 (N.D. Ca. Nov. 9, 2010) is a classic example of how the 9th Circuit’s holding in LVRC Holdings, LLC v. Brekka, 581 F.3d 1127, 1130-31 (9th Cir. 2009) has led to the dismissal of Computer Fraud and Abuse Act (“CFAA”) claims (or criminal counts) in circumstances in which an employee is clearly not authorized to access the company computers


SEC wins freeze order over “cloud computing” pyramid scheme
  • Dorsey & Whitney LLP
  • USA
  • March 30 2014

The "cloud" is a current focus for investors. There is cloud computing, cloud storage and new firms with cloud services. And the Commission discovered


Reviewing employees' email
  • Dorsey & Whitney LLP
  • USA
  • May 3 2010

I'm confused: I thought we could review our employee's email communications when sent out on our company's equipment


How to prove “loss” for Computer Fraud and Abuse Act
  • Dorsey & Whitney LLP
  • USA
  • May 11 2010

To bring a civil action based on the federal Computer Fraud and Abuse Act ("CFAA") a plaintiff must show that the alleged violation "caused . . . loss . . . aggregating at least $5,000 in value.”


California court permits company to subpoena Yahoo, Google and ISPs to identify anonymous computer hacker
  • Dorsey & Whitney LLP
  • USA
  • September 6 2010

A federal court in San Jose California last week permitted SolarBridge Technologies, Inc. (“SolarBridge”) to serve subpoenas on Yahoo, Google and various Internet Service Providers to identify the sender of an email containing SolarBridge’s confidential and trade secret protected data including schematics and other product designs of current and future products


9th Circuit clarifies Brekka: employees can be criminally prosecuted for violating their employer’s computer policies
  • Dorsey & Whitney LLP
  • USA
  • April 29 2011

In California, Washington, Oregon, Alaska, Montana, Arizona, Nevada and Idaho - states covered by the 9th Circuit Court of Appeals the answer as of yesterday is an emphatic "YES."


Message from New York court: rely on CGL policy coverage for data breaches at your own peril
  • Dorsey & Whitney LLP
  • USA
  • March 3 2014

A New York trial court announced a decision on February 21, 2014, that may be a harbinger of wide-reaching limitations on insurance coverage for data


Legal headhunter sued for stealing confidential data about the portability of partners’ law practices
  • Dorsey & Whitney LLP
  • USA
  • November 15 2010

The legal recruiting business is not immune from Computer Fraud and Abuse Act lawsuits


Recognizing risks arising from invasion of privacy claims in the workplace
  • Dorsey & Whitney LLP
  • USA
  • February 13 2013

One of the most significant liabilities that a company in California faces relates to claims that it has invaded an individual's privacy rights


A weapon against hackers on the home front
  • Dorsey & Whitney LLP
  • USA
  • January 14 2014

Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to nation-state hackers like