We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance

Results: 11-20 of 1,622

Printing hard copies of stolen source code: the difference between freedom and incarceration in the Second Circuit
  • Orrick, Herrington & Sutcliffe LLP
  • USA
  • August 13 2013

Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is

Customer list not secret enough
  • Sherman & Howard LLC
  • USA
  • May 9 2013

An employer was unable to protect the confidentiality of its customer list, because it failed to present any evidence that the list was worthy of

5 privacy and data security measures that can protect your company against trade secret theft
  • Covington & Burling LLP
  • USA
  • April 5 2013

At a recent forum in New York, a team of Covington lawyers addressed the growing concern among companies that their most valuable assets could leave

Protecting trade secrets with a mobile workforce and telecommuters
  • Jackson Lewis PC
  • USA
  • March 18 2013

Regardless of where one stands philosophically on the merits of working from a physical office where greater collegiality can be fostered, versus

Hurricane Sandy and crisis management
  • Ogletree Deakins
  • USA
  • October 30 2012

Hurricane Sandy is leaving a wake of destruction in major cities across the East Coast that can have a devastating effect on your business, management, employees, and customers

Employers beware: Fourth Circuit adopts narrow interpretation of Computer Fraud and Abuse Act
  • Seyfarth Shaw LLP
  • USA
  • August 6 2012

On July 26, 2012, the Fourth Circuit Court of Appeals decided WEC Carolina Energy Solutions LLC v. Miller, holding that departing employees are not liable under the Computer Fraud and Abuse Act (“CFAA”) for mere violations of a company computer use policy

Virginia Supreme Court overturns multi-million dollar "goodwill" damages award in trade secrets conspiracy case
  • Epstein Becker Green
  • USA
  • June 13 2012

One of the most elusive forms of damage that a company may suffer when its trade secrets are misappropriated or its former employees breach their post-employment restrictive covenants is the loss of goodwill

Michigan Federal Court limits use of Computer Fraud and Abuse Act to prosecute disloyal employee
  • Littler Mendelson
  • USA
  • June 12 2012

The Computer Fraud and Abuse Act prohibits (among other things) an employee from accessing an employer’s computers “without authorization” or in a manner that “exceeds authorized access.”

Don’t let BYOD become LFYO (liability for your organization)
  • Miller Canfield PLC
  • USA
  • June 11 2012

"BYOD" stands for "bring your own device," the practice of allowing employees and contractors to use personal devices, such as laptops, smartphones, home computers and tablets, to conduct the organization's business

Federal courts address question of employer-employee ownership of business-related social media accounts
  • Fenwick & West LLP
  • USA
  • June 5 2012

The question of whether an employer is entitled to trade secret protection over social media accounts used for business purposes is unfolding in several well-publicized cases currently pending in federal courts throughout the country