We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 1-10 of 2,330

The State AG Report Weekly Update July 28, 2016
  • Cozen O'Connor
  • USA
  • July 28 2016

17 AGs and the U.S. Department of Justice (“DOJ”) filed two lawsuits in the U.S. District Court for the District of Columbia to prevent Cigna

Lawsuit by Algorithm, the Latest Big Data Rage
  • Mintz Levin Cohn Ferris Glovsky and Popeo PC
  • USA
  • September 13 2016

Algorithms and bots run our lives; we just may not know it. They help choose our music, buy our diapers and tell us when it’s time to change the

Business Law for Startups: Important considerations for startup businesses
  • Pitblado LLP
  • USA
  • August 22 2016

Decided to take the plunge on a new business idea? Or maybe you’ve already got your toes in the water, and you’re thinking about diving off the board

Reflections & Expectations
  • Weil Gotshal & Manges LLP
  • Asia-Pacific, Central & Eastern Europe, European Union, France, Germany, Global, USA
  • April 28 2015

Everyone is talking about cybersecurity. And why not? In the past year, cyberattacks have made headlines as never before. Major companies in a number

Colorado Federal Court rules that former employer stated a claim against former executive and his new employer under the Computer Fraud and Abuse Act regardless of differing circuit interpretations of the act
  • Seyfarth Shaw LLP
  • USA
  • March 9 2012

In its order denying defendants’ motion to dismiss in SBM Site Services, LLC v. Garrett, et al., Case No. 10-cv-00385, a Colorado federal court identified a circuit split over the interpretation of “unauthorized access” under the Computer Fraud and Abuse Act and then found a former employer had stated a CFAA claim against a former executive and his new employer regardless of the different circuit interpretations based upon his post-termination computer activities

Printing hard copies of stolen source code: the difference between freedom and incarceration in the Second Circuit
  • Orrick, Herrington & Sutcliffe LLP
  • USA
  • August 13 2013

Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is

An employer’s guide to implementing EU-compliant whistleblowing hotlines
  • McDermott Will & Emery
  • European Union, USA
  • August 23 2011

Under the Sarbanes-Oxley Act, companies listed on U.S. stock exchanges are required to establish a system, often called a “whistleblowing hotline,” for employees to internally report concerns over questionable auditing or accounting matters

Judge Karas: Mark Papermaster will inevitably disclose IBM trade secrets in working for Apple
  • Seyfarth Shaw LLP
  • USA
  • November 25 2008

On November 21, 2008, Judge Kenneth Karas of the Southern District of New York published his November 7, 2008 Amended Opinion and Order granting IBM's Motion for Preliminary Injunction against former IBM executive Mark Papermaster

Top five technology decisions of the Delaware Court of Chancery for 2010
  • Fish & Richardson PC
  • USA
  • March 3 2011

Long recognized as the nation's leading business court, the Delaware Court of Chancery continues to be a top forum for litigating complex disputes over technology such as trade secret misappropriation or enforcement of noncompete or licensing agreements

How Confidential is Your Information?
  • Barnes & Thornburg LLP
  • USA
  • May 11 2016

As I recently sat in the airport waiting for my flight, I became fascinated by watching and listening to people on their phones. What astonished me