We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 116

An employee is stealing company documentsthat can’t be protected activity, right?
  • Seyfarth Shaw LLP
  • USA
  • July 3 2013

A supervisor discovers that an employee has recently downloaded thousands of pages of confidential Company billing and financial information, and


Top 10 developmentsheadlines in trade secret, computer fraud, and non-compete law in 2012
  • Seyfarth Shaw LLP
  • USA
  • December 31 2012

As part of our annual tradition, here is our list of the top 10 developmentsheadlines in trade secret, computer fraud, and non-compete law for 2012


Top 10 developmentsheadlines in trade secret, computer fraud, and non-compete law in 2014
  • Seyfarth Shaw LLP
  • USA
  • January 6 2015

As part of our annual tradition, we are pleased to present our discussion of the top 10 developmentsheadlines in trade secret, computer fraud, and


Attorney-Client Privilege and Waiver in Employee Email on Company Systems
  • Seyfarth Shaw LLP
  • USA
  • May 27 2011

In this issue of Seyfarth eDIGital, Seyfarth Shaw's eDiscovery and Information Governance practice group newsletter, we will continue the discussion of employee privacy in communications transmitted on company servers


The Computer Fraud and Abuse Act and disloyal employees: a narrow bridge to nowhere?
  • Seyfarth Shaw LLP
  • USA
  • April 15 2013

An old folk melody describes the world as "a very narrow bridge," where one misstep can bring disaster. The song seeks to inspire, calling on people


Top 10 2011 developmentsheadlines in trade secret, computer fraud, and non-compete law
  • Seyfarth Shaw LLP
  • USA
  • January 17 2012

We have compiled a list of the top 2011 developmentsheadlines in trade secret, computer fraud, and non-compete law


The use of digital forensics in trade secret matters (Part 2 of 3)
  • Seyfarth Shaw LLP
  • USA
  • May 23 2012

This post is designed to build on Part 1 of this three part series on digital forensics


Illinois Appellate Court finds non-injured plaintiffs lack standing to pursue claims for technical violations of state consumer protection statutes
  • Seyfarth Shaw LLP
  • USA
  • June 15 2015

In Maglio v. Advocate Health and Hosps. Corp., 2015 IL App (2d) 140782-U (Ill. App. Ct. June 2, 2015), the Illinois Appellate Court was asked to


Electronic agreement to arbitrate bytes employer
  • Seyfarth Shaw LLP
  • USA
  • January 5 2015

Since the California Civil Code was amended in 1999 to state that an electronic signature has the same legal effect as a handwritten signature, many


Dead again? Use of computer fraud and abuse act by employers to combat employee data theft limited by Ninth Circuit's latest ruling
  • Seyfarth Shaw LLP
  • USA
  • October 29 2011

The Ninth Circuit Court of Appeals ordered that U.S. v. Nosal be reheard en banc by all of the Appeals Court judges and that the “three-judge panel opinion in U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011) shall not be cited as precedent by or to any court of the Ninth Circuit.”