Header graphic for print
Trading Secrets A Law Blog on Trade Secrets, Non-Competes, and Computer Fraud

Category Archives: Cybersecurity

Subscribe to Cybersecurity RSS Feed

Upcoming Webinar: Data Security and Trade Secret Protection for Lawyers

Posted in Cybersecurity, Data Theft, Trade Secrets

On Thursday, February 25, 2016 at 12:00 p.m. Central, Seyfarth attorneys, Richard D. Lutkus and James S. Yu, will be joined by Joseph Martinez, Chief Technology Officer and Vice President of Forensics at Innovative Discovery to present the second installment of the 2016 Trade Secrets Webinar series. This program will cover considerations that attorneys should take into account when … Continue Reading

What does the Trans Pacific Partnership mean for IP in Australia?

Posted in Cybersecurity, Data Theft, International, Trade Secrets

The Trans Pacific Partnership Agreement (“TPP) between twelve Pacific Rim counties, including Australia and the United States, was finally made public on 5 November.

The text of the Agreement will now be reviewed by various parliamentary committees before Parliament votes on legislation to implement the Agreement in Australia, likely to be in February or March next year. If the implementing … Continue Reading

Untrusted Advisor: How Your Law Firm May Fail to Protect Your Data

Posted in Cybersecurity, Data Theft, Trade Secrets

In recent years, the prevalence of data and information security breaches at major corporations have become increasingly more commonplace.  While general awareness may be increasing, many companies are still neglecting to address serious information security issues.

Breached data can include proprietary or confidential information, trade secrets, personally identifiable information, health-related data, privileged communications, and regulatory data.  Such data is often … Continue Reading

Michigan Federal Court Rejects As Dicta Sixth Circuit’s Broad Computer Fraud and Abuse Act Interpretation

Posted in Computer Fraud, Computer Fraud and Abuse Act, Cybersecurity, Data Theft

While employee Lehman was employed by Experian and allegedly subject to various employment covenants, he incorporated Thorium, a competitor.  After Experian laid him off, he operated Thorium.  Experian sued Lehman and Thorium in a Michigan federal court, accusing them of wrongdoing including violations of the federal Computer Fraud and Abuse Act.  Holding that the CFAA is intended to criminalize hacking … Continue Reading

Daily Trade Secret Theft for Daily Fantasy Sports?

Posted in Cybersecurity, Data Theft, Trade Secrets

While season-long fantasy sports leagues have long been in existence, the emergence of daily fantasy sports (“DFS”) has been relatively recent.  DFS allows participants to enter daily contests for money where a salary cap is used to “draft” a team and compete against anywhere from one to hundreds of thousands of other participants.  Points are allocated based on each player’s … Continue Reading

Information Security Policies and Data Breach Response Plans Webinar Now Available!

Posted in Cybersecurity, Data Theft, Privacy

We are pleased to announce the webinar “Information Security Policies and Data Breach Response Plans” is now available as a podcast and webinar recording.

With the recent uptick of high-profile data breaches and lawsuits being filed as a result by both employees and consumers as a result, every business should take a fresh look at its information security policies … Continue Reading

When E-Filing Goes Wrong: How to Protect Your Trade Secrets in the Event of Inadvertent Online Disclosure

Posted in Cybersecurity, Data Theft, Trade Secrets

It is frightening to think that valuable corporate trade secrets could be lost with the click of a mouse. But as electronic court filing becomes increasingly prevalent, the risk of inadvertent disclosure of sensitive information online—and the resulting loss of trade secret protection—is becoming more and more real.

A litigant in New York recently learned this lesson firsthand, narrowly escaping … Continue Reading

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks Answered

Posted in Computer Fraud and Abuse Act, Cybersecurity, Data Theft, Espionage, International

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks.

 Could you provide a brief snapshot of current trends in trade secret disputes? Do companies need to be more aware of the potential risks in this area?

Milligan: Data theft of valuable company trade secrets … Continue Reading

California Federal Courts Reiterate: Unless Computer Hacked, Computer Fraud and Abuse Act Permits Misuse Of Electronic Information

Posted in Computer Fraud, Computer Fraud and Abuse Act, Cybersecurity, Data Theft

In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized information.  Although that holding represents a minority position, two recent opinions — one in a Ninth Circuit criminal case and one … Continue Reading

Trade Secret Protection: What are Reasonable Steps?

Posted in Cybersecurity, Data Theft, Practice & Procedure, Trade Secrets

As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry by Pamela Passman, President and CEO for the Center for Responsible Enterprise and Trade (CREATe.org)

-Robert Milligan, Editor of Trading Secrets

By Pamela Passman

Regional and national laws are increasingly focusing on the specific steps that companies … Continue Reading

Corporate Espionage: Not Your Typical Sports-“Gate”

Posted in Computer Fraud and Abuse Act, Cybersecurity, Data Theft, Espionage, Trade Secrets

Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams.  And usually when the talking heads on sports radio and television are discussing legal issues, they relate to domestic violence or other crimes, concussions, illicit and performance enhancing drugs, or labor disputes (sometimes even … Continue Reading

Unsecured Networks More Susceptible to Data Theft

Posted in Cybersecurity, Data Theft, Trade Secrets

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still open a user’s computer to security issues.

Recently, Wired reported that security firm Cylance discovered a vulnerability in a specific brand of network routers deployed throughout many hotel chains … Continue Reading

CFAA and SCA Do Not Prohibit Creation Of A Fake Facebook Page

Posted in Computer Fraud and Abuse Act, Cybersecurity, Social Media, Trade Secrets

The defendants in a case pending in Chicago federal court were accused of contravening Facebook’s terms of use by accessing its computers in order to create a phony page and then using it to ridicule someone. In Bittman v. Fox, Case No. 14 C 8191 (N.D.Ill., June 1, 2015) (Holderman, J.), the court held that those allegations do not state … Continue Reading

Satisfying the Computer Fraud and Abuse Act’s Jurisdictional Requirements Can Be Complicated

Posted in Computer Fraud, Computer Fraud and Abuse Act, Cybersecurity, Data Theft

The parties in a Computer Fraud and Abuse Act case moved for partial summary judgment. Among the issues were whether the plaintiff had incurred the requisite $5,000 in qualifying losses, and whether the complaint was time-barred. The motions were denied, but the court had to do a lot of explaining. Quantlab Technologies Ltd. v. Godlevsky, Case No. 4:09-CV-4039 (S.D.Tex., … Continue Reading

Privacy & Security Are Back on the Agenda in DC

Posted in Cybersecurity, Legislation, Privacy

Cross Posted from Global Privacy Watch

The plethora of security incidents in the news have once again put security front and center of the international agenda. Predictably, this has triggered a number of responses from governments around the world. Some of these responses seem to have been ill-considered. However, one of the more comprehensive responses came out of the … Continue Reading

2014 Trade Secrets Webinar Series Year in Review

Posted in Computer Fraud, Cybersecurity, Data Theft, International, Non-Compete Enforceability, Social Media, Trade Secrets

Throughout 2014, Seyfarth Shaw LLP’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever changing area of law. The series consisted of 10 webinars:

2013 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete,… Continue Reading

NLRB “Deletes” Employer Email Rule

Posted in Cybersecurity, Privacy

Until December 11, employers thought that they owned their email systems and could limit their use to company business.  On that day, a divided National Labor Relations Board (“NLRB”) ruled “not so.”  In Purple Communications, 361 NLRB No. 126 (Dec. 11, 2014), the NLRB ruled that employees who have access to an  employer’s email system as part of their job … Continue Reading

Union Files NLRB Complaint Regarding the USPS’ Handling of Security Breach Involving Employee Personal Information

Posted in Cybersecurity, Data Theft, Privacy

A company faced with a security breach has a lengthy “to do” list, things to accomplish with respect to its incident response plan. It must, among other things, determine the root cause of the vulnerability or breach, investigate and eliminate the vulnerability or breach, determine the full nature and extent of the breach, determine who to notify and finalize the … Continue Reading

Seyfarth Attorneys Facilitate Discussion On Cybersecurity and Protecting Valuable Trade Secrets at the 39th Annual Intellectual Property Institute Conference

Posted in Cybersecurity, Practice & Procedure, Privacy, Trade Secrets

Seyfarth Intellectual Property, Trade Secret and Privacy attorneys are participating in the 39th Annual Intellectual Property Institute Conference in Garden Grove, California this week.

The IP Institute brings together preeminent speakers from leading companies and law firms to share tips “from the trenches.” The Institute covers a great array of topics affecting our clients, such as trademarks, copyrights, licensing, litigation, … Continue Reading

Trade Secret Attorneys Discuss Latest Issues in Trade Secret Litigation in Corporate Disputes Magazine

Posted in Cybersecurity, Data Theft, Espionage, International, Legislation, Privacy, Social Media, Trade Secrets

On October 1, 2014, Michael D. Wexler and Robert B. Milligan, partners and co-chairs of Seyfarth Shaw’s Trade Secrets, Computer Fraud & Non-Competes practice group participated in a Q&A mini-roundtable from Corporate Disputes Magazine on current trends in trade secret disputes and the steps companies can take to reduce these disputes.  Below are fielded questions from the Seyfarth Shaw Reprint Continue Reading

Webinar Recap! Protecting Trade Secrets: The Current Landscape, Top Threats, Best Practices for Assessing and Protecting Trade Secrets, Proposed Legislation and Future Scenarios

Posted in Cybersecurity, Data Theft, Espionage, Trade Secrets

We are pleased to let you know that the webinar “Protecting Trade Secrets: The Current Landscape, Top Threats, Best Practices for Assessing and Protecting Trade Secrets, Proposed Legislation and Future Scenarios” is now available as a podcast and webinar recording.

Robert B. Milligan, partner and co-chair of Seyfarth Shaw’s Trade Secrets, Computer Fraud & Non-Competes practice group, Daniel Continue Reading

Security Breach Liability – Its Complicated

Posted in Breach of Fiduciary Duty, Cybersecurity, Data Theft, Trade Secrets

The security breach news cycle continues. There remains a deluge of news stories about point-of-sale terminals being compromised, the ease of magnetic stripes being cloned, and the need for Chip and PIN technology being deployed on credit cards. The legal ramifications of all these events is just starting to become apparent – and it’s complicated. Individual liability is beginning to … Continue Reading