While season-long fantasy sports leagues have long been in existence, the emergence of daily fantasy sports (“DFS”) has been relatively recent. DFS allows participants to enter daily contests for money where a salary cap is used to “draft” a team and compete against anywhere from one to hundreds of thousands of other participants. Points are allocated based on each player’s … Continue Reading
With the recent uptick of high-profile data breaches and lawsuits being filed as a result by both employees and consumers as a result, every business should take a fresh look at its information security policies … Continue Reading
In a recent ruling, the New Jersey Supreme Court gave employers a great recourse for dealing with former employees who breach their duty of loyalty. In Bruce Kaye v. Alan P. Rosefielde, the Court allowed an employer to recover compensation paid to a disloyal, recently terminated, employee, even where the employer sustained no … Continue Reading
It is frightening to think that valuable corporate trade secrets could be lost with the click of a mouse. But as electronic court filing becomes increasingly prevalent, the risk of inadvertent disclosure of sensitive information online—and the resulting loss of trade secret protection—is becoming more and more real.
A litigant in New York recently learned this lesson firsthand, narrowly escaping … Continue Reading
Milligan: Data theft of valuable company trade secrets … Continue Reading
In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized information. Although that holding represents a minority position, two recent opinions — one in a Ninth Circuit criminal case and one … Continue Reading
On Tuesday, September 22 at 12:00 p.m. Central, Seyfarth attorneys Karla Grossenbacher and John Tomaszewski will present “Information Security Policies and Data Breach Response Plans.” With the recent uptick of high-profile data breaches and lawsuits being filed as a result by both employees and consumers as a result, every business should take a fresh look at its information security policies … Continue Reading
As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry by Pamela Passman, President and CEO for the Center for Responsible Enterprise and Trade (CREATe.org)
-Robert Milligan, Editor of Trading Secrets
Regional and national laws are increasingly focusing on the specific steps that companies … Continue Reading
Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams. And usually when the talking heads on sports radio and television are discussing legal issues, they relate to domestic violence or other crimes, concussions, illicit and performance enhancing drugs, or labor disputes (sometimes even … Continue Reading
Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still open a user’s computer to security issues.
Recently, Wired reported that security firm Cylance discovered a vulnerability in a specific brand of network routers deployed throughout many hotel chains … Continue Reading
The parties in a Computer Fraud and Abuse Act case moved for partial summary judgment. Among the issues were whether the plaintiff had incurred the requisite $5,000 in qualifying losses, and whether the complaint was time-barred. The motions were denied, but the court had to do a lot of explaining. Quantlab Technologies Ltd. v. Godlevsky, Case No. 4:09-CV-4039 (S.D.Tex., … Continue Reading
In Seyfarth’s third installment of its 2015 Trade Secrets Webinar series, Seyfarth attorneys focused on non-compete and trade secret considerations from an international perspective. Specifically, the webinar will involved a discussion of non-compete and trade secret … Continue Reading
The Securities and Exchange Commission (SEC) announced today that it had made good on its prior promises to take a hard look at employment agreements and policies that could be viewed as attempting to keep securities fraud complaints in-house. In KBR, Inc., Exchange Act Release No. 74619 (April 1, 2015), the … Continue Reading
By any measure, the past few weeks have been eventful in Europe. Given the number of challenges facing European lawmakers — from continued hostilities in Ukraine, to last-minute negotiations over Greek debt, to anti-terrorism measures — it’s unlikely that trade secrets protection is at the top of anyone’s agenda in Brussels or Strasbourg. Still — as we have … Continue Reading
Throughout 2014, Seyfarth Shaw LLP’s dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant issues facing clients today in this important and ever changing area of law. The series consisted of 10 webinars:2013 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete,… Continue Reading
A company faced with a security breach has a lengthy “to do” list, things to accomplish with respect to its incident response plan. It must, among other things, determine the root cause of the vulnerability or breach, investigate and eliminate the vulnerability or breach, determine the full nature and extent of the breach, determine who to notify and finalize the … Continue Reading
This week, the Connecticut Supreme Court issued an opinion which upheld a state common law negligence action against a healthcare provider for violation of privacy and confidentiality laws and regulations using as evidence of the standard of care the Health Information Portability and Accountability Act (HIPAA) and its accompanying regulations. The court denied defense arguments that HIPAA, which expressly does … Continue Reading
Way back in the 1980’s, there was a very simple way to keep computer information from being stolen. Every disk containing confidential information was locked in a Sargent and Greenleaf safe.
Of course, even then, there were problems: 22,000 or so 3.5 inch “microfloppy” disks hold the same amount of data as a 32 GB thumb drive can hold today. … Continue Reading
When & Where: This program will be held at three different locations.
November 13th at Seyfarth Shaw’s San Francisco Office (lunch and registration will begin at 11:30 a.m., program will begin at noon and go until 1:30 p.m.).
November 18th at Seyfarth Shaw’s … Continue Reading
ITechLaw is a not-for-profit organization established to inform and educate lawyers about the unique legal issues arising from the evolution, production, marketing, acquisition and use of information and communications technology.
Seyfarth partner Robert Milligan, an ITechLaw Member of the Board … Continue Reading
On October 1, 2014, Michael D. Wexler and Robert B. Milligan, partners and co-chairs of Seyfarth Shaw’s Trade Secrets, Computer Fraud & Non-Competes practice group participated in a Q&A mini-roundtable from Corporate Disputes Magazine on current trends in trade secret disputes and the steps companies can take to reduce these disputes. Below are fielded questions from the Seyfarth Shaw Reprint … Continue Reading
We are pleased to let you know that the webinar “Protecting Trade Secrets: The Current Landscape, Top Threats, Best Practices for Assessing and Protecting Trade Secrets, Proposed Legislation and Future Scenarios” is now available as a podcast and webinar recording.
The security breach news cycle continues. There remains a deluge of news stories about point-of-sale terminals being compromised, the ease of magnetic stripes being cloned, and the need for Chip and PIN technology being deployed on credit cards. The legal ramifications of all these events is just starting to become apparent – and it’s complicated. Individual liability is beginning to … Continue Reading
From organized crime and “hacktivists” to competitors and rouge employees, the threats to companies’ trade secrets are more pronounced today than ever before. A recent report by the Center for Responsible Enterprise And Trade (Create.org) and PricewaterhouseCoopers LLP (PwC) — Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats… Continue Reading