Computer Fraud and Abuse Act

Legal analytics powerhouse Lex Machina recently released its 2020 Trade Secret Litigation Report, which highlights federal litigation trends in the last decade, as well as the last year specifically. While it’s very much an open question whether these trends will continue in light of the COVID-19 pandemic (more on that in our next  post), the report identifies some interesting data. In addition to some of the highlights contained in the official report, a deep dive of Lex Machina’s case repository reveals even more granular trends, demonstrating the wealth of information that can be gleaned and theories that can be tested from the data compiled from the more than 1.7 million federal cases in Lex Machina’s database. In fact, we have to admit that many of our own assumptions were turned upside down upon digging into the voluminous data available on the Lex Machina website! Expect to see a guest post from Lex Machina soon explaining how this data is sourced and what subscribers can do with it.

Some of the key findings in the report and/or associated data:
Continue Reading A Decade of Data Whets the Appetite for Data Nerds: Lex Machina Releases 2020 Report on Trade Secret Litigation

While it can be hard to remember in a world dominated by COVID-19 headlines, the wheels of justice have not stopped turning at the Supreme Court—even if Justices are now hearing argument remotely. On Monday, April 20, SCOTUS granted a petition for certiorari in a case that may finally provide clarity to a question that has troubled defense attorneys and trade secrets practitioners alike for many years: what does it mean to “exceed authorized access” under the Computer Fraud and Abuse Act?
Continue Reading CFAA Battle Heading to the Supreme Court

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. Doing so will identify and ensure preservation of evidence supporting any claims, and is critical to the ability to demonstrate the need for emergency injunctive relief, especially at a time when courts are taking a rigorous approach to what constitutes a “litigation emergency.” Conducting a prompt investigation also helps to avoid any potential defenses of delay, bad faith, or a failure to investigate.
Continue Reading Conducting Trade Secret and Restrictive Covenant Investigations Remotely

In an a recently published opinion, the Ninth Circuit answered the question whether “LinkedIn, the professional networking website, [may] prevent a competitor, hiQ, from collecting and using information that LinkedIn users have shared on their public profiles, available for viewing by anyone with a web browser?” In affirming the trial court’s injunction enjoining LinkedIn from blocking hiQ’s access to its users’ public profiles, the Ninth Circuit held, among other things, that hiQ’s scraping did not amount to accessing LinkedIn’s users’ data “without authorization,” in violation of the Computer Fraud and Abuse Act (“CFAA”), because the data hiQ was accessing was publicly available and therefore did not fall within the scope of the CFAA.
Continue Reading 9th Circuit Takes Narrow View of the Computer Fraud and Abuse Act in LinkedIn Data Scraping Case

The 2018 Trading Secrets Year in Review is a compilation of our significant blog posts from throughout the year and is categorized by specific topics such as: Trade Secrets, Computer Fraud and Abuse Act, Non-Compete & Restrictive Covenants, Legislation, International, and Social Media and Privacy. As demonstrated by our specific blog entries, including our Top

In what appears to be a first under the Defend Trade Secrets Act (“DTSA”), a United States District Judge has thrown out claims against an alleged trade secret thief on the basis of the DTSA’s immunity for confidential disclosures to attorneys in the course of investigating a suspected violation of the law. Christian v. Lannett Co., Inc., No. 16-cv-00963-CDJ, 2018 WL 1532849 (E.D. Pa. Mar. 29, 2018).

Certain Trade Secret Disclosures to Attorneys or the Government Are Protected

The DTSA exempts from both criminal and civil liability any trade secret disclosure made in confidence to a federal, state, or local official or to an attorney if the disclosure is made “solely for the purpose of reporting or investigating a suspected violation of law.” 18 U.S.C. § 1833(b)(1).
Continue Reading Defend Trade Secrets Act First: Claim Tossed Based on Whistleblower Immunity

Continuing our annual tradition, we present the top developments/headlines for 2017/2018 in trade secret, computer fraud, and non-compete law.

1. Notable Defend Trade Secrets Act Developments

Just two years after its enactment, the Defend Trade Secrets Act (“DTSA”) continues to be one of the most significant and closely followed developments in trade secret law. The statute provides for a federal civil cause of action for trade secret theft, protections for whistleblowers, and new remedies (e.g., ex parte seizure of property), that were not previously available under state trade secret laws.
Continue Reading Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2017/2018

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition of accessing a computer “without authorization” when using someone else’s credentials (with that other user’s permission) after the owner of the computer expressly revoked the first person’s own access rights. In denying certiorari, the Court effectively killed the petitioner’s legal challenge to his conviction in a long-running case that we have extensively covered here, here, here, here, here, here, and here (among other places). The denial of certiorari leaves further development of the scope of the CFAA in the hands of the lower courts.
Continue Reading Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act Unclear

shutterstock_361749602The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds authorized access” is defined as “to access a computer with authorization and to use such access to obtain or alter information in the

OverviewIn Seyfarth’s eighth installment in the 2016 Trade Secrets Webinar Series, attorneys Andrew Boutros, Katherine Perrelli and Michael Wexler focused on criminal liability for trade secret misappropriation. Trade secret misappropriation is increasingly garnering the attention of federal law enforcement authorities. This reality creates different dynamics and risks depending on whether the company at issue is