We invite you to watch our recent webinar, where Seyfarth Shaw LLP’s trade secret, computer fraud, and non-compete attorneys navigated the ever-evolving business landscape, safeguarding trade secrets has become a critical priority for organizations seeking resilience and success.

In this webinar, our trade secret presenters, Justin Beyer, Joshua Salinas, and Dallin Wilson, delved deeper into the intricacies of building a

Continue Reading Webinar Recap! Employee Training Programs: Building a Culture of Confidentiality

Wednesday, March 27, 2024
2:00 p.m. to 3:00 p.m. Eastern
1:00 p.m. to 2:00 p.m. Central
12:00 p.m. to 1:00 p.m. Mountain
11:00 a.m. to 12:00 p.m. Pacific

REGISTER HERE

About the Program

As we navigate the ever-evolving business landscape, safeguarding trade secrets has become a critical priority for organizations seeking resilience and success. In this pursuit, Seyfarth is thrilled

Continue Reading Upcoming Webinar! Employee Training Programs: Building a Culture of Confidentiality

In the final 2022 webinar, Seyfarth attorneys Kate Perrelli, Dan Hart, and Dallin Wilson discussed new and pending legislation and enforcement issues for non-competes.

As a conclusion to this webinar, we compiled a summary of takeaways:

  • State law on restrictive covenant agreements continues to evolve, with more states imposing compensation thresholds, notice requirements, penalties, and other obligations on employers that
Continue Reading Webinar Recap! Overview of Non-Compete Legislation and Enforcement Issues from 2022
non-compete update for 2022

Wednesday, December 21, 2022
1:00 p.m. to 2:00 p.m. Eastern
12:00 p.m. to 1:00 p.m. Central
11:00 a.m. to 12:00 p.m. Mountain
10:00 a.m. to 11:00 a.m. Pacific

REGISTER HERE

In the final installment of our 2022 Trade Secrets Webinar Series, our team will focus on new legislation and the enforcement of non-competes. Any company that seeks to use non-compete

Continue Reading Upcoming Webinar! Overview of Non-Compete Legislation and Enforcement Issues from 2022

The Department of Justice recently announced a revision of its policy concerning charging violations of the Computer Fraud and Abuse Act (the “CFAA”). Following recent decision from the Supreme Court and appellate courts that seemingly narrow the scope of civil liability under the CFAA, the DOJ’s new policy may likewise limit criminal prosecutions under the law.

As regular readers of this blog are well aware, the CFAA provides that “[w]hoever … intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains … information from any protected computer … shall be punished” by fine or imprisonment.” The DOJ’s announced policy, however, now directs that “good-faith security research” should not be charged. “Good faith security research” means “accessing a computer solely for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability, where such activity is carried out in a manner designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.”
Continue Reading DOJ Announces It Will Not Charge CFAA Violations for Good-Faith Security Research

In September 2019, the Ninth Circuit held that hiQ Labs, Inc.’s (“hiQ”) collection and use of information that LinkedIn users shared on their public profiles did not violate the Computer Fraud and Abuse Act (“CFAA”) because the data was publicly available and therefore did not fall within the scope of the CFAA. Following the Ninth Circuit’s order, the Supreme Court issued a decision in Van Buren v. United States, wherein the Supreme Court held, in a 6-3 ruling, that a former Georgia police officer did not “exceed authorized access” within the meaning of the CFAA by accessing a state law enforcement computer database containing license plate information to determine whether an individual was an undercover officer. The Supreme Court concluded that an individual “exceeds authorized access” when he accesses a computer with authorization but then obtains information located in particular areas of that computer—such as files, folders, or databases—that are off-limits to him.
Continue Reading Ninth Circuit Reaffirms that Data Scraping from Public Websites Does Not Violate the Computer Fraud and Abuse Act

Company Alleges Waffles Featured on Oprah’s Annual “Favorite Things” List Were Made From Stolen Recipe

A Massachusetts waffle manufacturer, The Burgundian, recently filed a lawsuit alleging that a potential co-venturer, Eastern Standard Provisions, submitted its Liege waffles for inclusion on Oprah Winfrey’s annual “Favorite Things” list without giving credit to Burgundian. Then, after Burgundian refused to sell its secret waffle recipe, Eastern Standard employed a “bait and switch” by selling Liege waffles from a different company while touting Oprah’s endorsement of the Liege waffles made by Burgundian and enjoying the spoils of landing a spot on the coveted list.
Continue Reading One of Our “Favorite Things” Are Lawsuits About Stolen Secret Recipes

In-house attorneys often wear multiple hats when performing work for private companies. Some of their work clearly falls under the provision of legal services, while others can be less clear quasi-business roles. And when those in-house lawyers who perform non-legal work are asked to sign a non-compete agreement in connection with their employment, questions can arise both as to the enforceability of those agreements and whether an attorney violates the rules of professional conduct by signing such an agreement as we have previously discussed.
Continue Reading Another Decision Addressing Non-Competes for In-House Counsel

As we previously covered, a group of 18 state attorneys general in July filed comments with the Federal Trade Commission (“FTC”), asking the FTC to incorporate labor concerns when reviewing corporate mergers and to use its enforcement powers under the Sherman Act to stop the use of non-compete, non-solicit, and no-poach agreements in many situations. Many of those same attorneys general recently sent another letter to the FTC, this time urging it to use its rulemaking authority “to bring an end to the abusive use of non-compete clauses in employment contracts.”

In the most recent letter, the attorneys general endorsed the arguments presented in a March 20, 2019, petition submitted to the FTC by various labor unions, public interest groups, and legal advocates, requesting that the FTC initiate rulemaking to classify abusive worker non-compete clauses as an unfair method of competition and per se illegal under the FTC Act for low wage workers or where the clause is not explicitly negotiated. As they did in their previous letter, the attorneys general contend that non-competes “deprive workers of the right to pursue their ambitions and can lock them into hostile or unsafe working environments.” The attorneys general also argue that the arguments in support of non-compete clauses are unpersuasive and that employers can use other “less draconian” ways to recoup their investment in job training, methods of business, and other intangibles. The attorneys general further argued that non-competes burden businesses seeking to hire new employees, which in turn inhibits innovation and drives up consumer costs by suppressing competition.
Continue Reading State Attorneys General Keep Pressure on FTC to Regulate Non-Competes

Courts have long lamented that “computing damages in a trade secret case is not cut and dry,” Am. Sales Corp. v. Adventure Travel, Inc., 862 F. Supp. 1476, 1479 (E.D. Va. 1994), meaning that “every [trade secret] case requires a flexible and imaginative approach to the problem of damages,” Univ. Computing Co. v. Lykes-Youngstown Corp., 504 F.2d 518, 538 (5th Cir. 1974).

The federal Defend Trade Secrets Act (“DTSA”) and virtually every state’s version of the Uniform Trade Secrets Act (“UTSA”) (only New York has not adopted the UTSA) permits recovery of damages for (1) actual loss caused by the misappropriation; (2) unjust enrichment that is not addressed in computing damages for actual loss; or (3) a reasonable royalty for the misappropriator’s unauthorized disclosure or use of the trade secret. There has been little guidance from the courts, however, as to how to calculate these different, and sometimes competing damages calculations, many relying on the “flexible and imaginative approach” set forth in the Fifth Circuit’s 1974 pre-UTSA University Computing decision. Even more difficult is the case where a plaintiff’s damages are based on the defendant’s anticipated future use of the trade secret, given that those damages necessarily will involve speculation about the revenues the defendant will generate from its use of the trade secret.
Continue Reading Can a Party Recover Damages for the Anticipated Future Use of Trade Secrets?