As we previously reported, the FBI has been investigating the St. Louis Cardinals for hacking into the Houston Astros’ internal computer network and stealing proprietary information, … Continue Reading
Milligan: Data theft of valuable company trade secrets … Continue Reading
Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams. And usually when the talking heads on sports radio and television are discussing legal issues, they relate to domestic violence or other crimes, concussions, illicit and performance enhancing drugs, or labor disputes (sometimes even … Continue Reading
On October 1, 2014, Michael D. Wexler and Robert B. Milligan, partners and co-chairs of Seyfarth Shaw’s Trade Secrets, Computer Fraud & Non-Competes practice group participated in a Q&A mini-roundtable from Corporate Disputes Magazine on current trends in trade secret disputes and the steps companies can take to reduce these disputes. Below are fielded questions from the Seyfarth Shaw Reprint … Continue Reading
We are pleased to let you know that the webinar “Protecting Trade Secrets: The Current Landscape, Top Threats, Best Practices for Assessing and Protecting Trade Secrets, Proposed Legislation and Future Scenarios” is now available as a podcast and webinar recording.
As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog post by digital forensics expert Trent Livingston, a Director of iDiscovery Solutions.
Do you recall the early days of the spy movie genre? Many of these movies depicted cloaked secret agents slinking around dark offices snapping pictures … Continue Reading
In U.S. v. Liew, Judge White of the U.S. District Court for the Northern District of California sentenced defendant Walter Liew to 15 years in prison for misappropriating trade secrets from chemical giant DuPont and selling them to … Continue Reading
The commercial and personal use of drones are becoming increasingly more prevalent. Indeed, there were allegations during the ongoing World Cup that a drone was purportedly used to spy on a team’s practices by an opponent who was looking to gain a competitive advantage. Josh Salinas weighs in on the potential threat drones may pose to the protection of trade … Continue Reading
A significant new bill was recently introduced in Congress seeking to add a federal civil cause of action for trade secret theft.
On Tuesday, April 29, 2014, in a bipartisan effort, Senators Christopher Coons (D-Del) and Orrin Hatch (R-Utah), both members of the Senate Judiciary Committee, introduced the bill.
Senators Coons and Hatch’s bill, … Continue Reading
On April 11th, the Third Circuit Court of Appeals reversed the conviction and 41-month prison sentence of a Computer Fraud and Abuse Act (CFAA) defendant, holding that he was tried and convicted in an improper venue. U.S. v. Auernheimer, No. 13-1816 (3rd Cir. Apr. 11, 2014). Though we usually do not post on procedural issues like these, we certainly post … Continue Reading
With the ever-increasing need to maintain communications with customers and your employees, mobile phones have become a requirement for business people. Spanish telecommunications company Geeksphone is targeting the business market with Blackphone, the first mobile phone that encrypts data transmissions. No one would argue against the value of increased wireless data security, but do CIA-style cellular phones really provide enough … Continue Reading
Why spend millions of dollars employing a bunch of bright, talented employees to develop your business when you can just hire a worker from your rival to steal all their research? As on every test you took in school, isn’t getting the right answer more important than figuring out how to solve the problem?
Competition for business is fierce. Small … Continue Reading
Spell check features in word processing programs sent correction fluid the way of the buggy whip. Walter Liew and Robert Maegerle, however, saw a $28 million dollar payout to sell the secrets to, among other things, typewriter correction fluid. It is doubtful that they can “white out” the bars of their new prison cells, though.
Liew, a California engineering consultant, … Continue Reading
As part of our annual tradition, we are pleased to present our discussion of the top 10 developments/headlines in trade secret, computer fraud, and non-compete law for 2013. Please join us for our complimentary webinar on March 6, 2014, at 10:00 a.m. P.S.T., where we will discuss them in greater detail. As with all … Continue Reading
On Thursday, March 6, 2014 at 12:00 p.m. Central, Michael Wexler, Jim McNairy and Josh Salinas will present Seyfarth’s first installment of its 2014 Trade Secrets Webinar series. They will review noteworthy cases and other legal developments from across the nation this past year in the areas of trade secret and data theft, non-compete enforceability, computer fraud, and the … Continue Reading
On Tuesday, December 11, 2013 at 12:00 p.m. Central, Seyfarth attorneys Michael D. Wexler, Molly M. Joyce and Justin K. Beyer will present the twelfth and final installment in our 2013 Trade Secrets webinar series, focusing on criminal liability for trade secret misappropriation.
The topics they will cover includeTrade secret misappropriation: what it is and how does it happen… Continue Reading
In a year in which the United States has brought and prosecuted a series of high-profile criminal cases under the Economic Espionage Act (“EEA”), another one was recently added to the roll call in the Southern District of Indiana, this time against two former high-level scientists with pharmaceutical giant, Eli Lilly.
On August 14, 2013, a grand jury in the … Continue Reading
In a story that Hollywood would love to script, the U.S. Government charged Sinovel and its executives with soliciting the then-head of the Automation Engineering Department of AMSC’s Austrian subsidiary, AMSC Windtec GmbH, to steal AMSC’s source code in order that Sinovel might bypass a commercial relationship with AMSC and utilize AMSC’s trade secrets without paying for ongoing software licenses. … Continue Reading
In Parts I and II of this post, we looked at the Court’s ruling on Nosal’s motion for acquittal and new trial following his conviction of three CFAA counts, two EEA counts and one count of conspiracy. In this final part, we look at what may lie ahead for Nosal and lessons employers may learn from this case.
What’s Next … Continue Reading
In Part I of this post, we reviewed the Court’s ruling on Nosal’s conviction on the CFAA counts. Here in Part II, we turn to the Court’s ruling on the EEA counts, and the exclusion of evidence regarding Nosal’s non-compete provision.
B. Nosal’s Conviction on the EEA Counts:
Nosal was convicted of two counts under the EEA for downloading, … Continue Reading
The Obama Administration recently issued its 2013 Joint Strategic Plan on Intellectual Property Enforcement, building on the Joint Strategic Plan issued three years ago. In its 88 pages, the 2013 Plan outlines steps for federal agencies to take over the next three years to combat “[IP] infringement that has a significant impact on the economy, the global economic … Continue Reading
Representative Zoe Lofgren (D- CA) has been very active in the technology and innovation legislation space of late. Last week, Representative Lofgren and Senator Ron Wyden (D-OR) formally introduced companion bills, nicknamed “Aaron’s Law,” in the House and Senate seeking to amend the Computer Fraud and Abuse Act. Almost unnoticed was the fact … Continue Reading
The U.S. Attorney’s Office in New Jersey recently charged a former employee with stealing trade secrets from a New Jersey medical technology company.
The former employee, an Indian national, worked in a group at his former employer responsible for the manufacture of pen injectors and pre-fillable syringes. He resigned from the company last month, and in the weeks leading up … Continue Reading
Cybersecurity has become a growing concern in the United States. Legislation impacting this topic covers a variety of fields, including national security and defense, trade and international relations, intellectual property, and even privacy and civil liberties. As technology is constantly changing, so too are the types of restrictions in place.