Computer Fraud and Abuse Act

In an a recently published opinion, the Ninth Circuit answered the question whether “LinkedIn, the professional networking website, [may] prevent a competitor, hiQ, from collecting and using information that LinkedIn users have shared on their public profiles, available for viewing by anyone with a web browser?” In affirming the trial court’s injunction enjoining LinkedIn from blocking hiQ’s access to its users’ public profiles, the Ninth Circuit held, among other things, that hiQ’s scraping did not amount to accessing LinkedIn’s users’ data “without authorization,” in violation of the Computer Fraud and Abuse Act (“CFAA”), because the data hiQ was accessing was publicly available and therefore did not fall within the scope of the CFAA.
Continue Reading 9th Circuit Takes Narrow View of the Computer Fraud and Abuse Act in LinkedIn Data Scraping Case

The 2018 Trading Secrets Year in Review is a compilation of our significant blog posts from throughout the year and is categorized by specific topics such as: Trade Secrets, Computer Fraud and Abuse Act, Non-Compete & Restrictive Covenants, Legislation, International, and Social Media and Privacy. As demonstrated by our specific blog entries, including our Top 10 Developments and Headlines,
Continue Reading Seyfarth Shaw is pleased to announce the publication of the 2018 Trading Secrets Year in Review!

In what appears to be a first under the Defend Trade Secrets Act (“DTSA”), a United States District Judge has thrown out claims against an alleged trade secret thief on the basis of the DTSA’s immunity for confidential disclosures to attorneys in the course of investigating a suspected violation of the law. Christian v. Lannett Co., Inc., No. 16-cv-00963-CDJ, 2018 WL 1532849 (E.D. Pa. Mar. 29, 2018).

Certain Trade Secret Disclosures to Attorneys or the Government Are Protected

The DTSA exempts from both criminal and civil liability any trade secret disclosure made in confidence to a federal, state, or local official or to an attorney if the disclosure is made “solely for the purpose of reporting or investigating a suspected violation of law.” 18 U.S.C. § 1833(b)(1).
Continue Reading Defend Trade Secrets Act First: Claim Tossed Based on Whistleblower Immunity

Continuing our annual tradition, we present the top developments/headlines for 2017/2018 in trade secret, computer fraud, and non-compete law.

1. Notable Defend Trade Secrets Act Developments

Just two years after its enactment, the Defend Trade Secrets Act (“DTSA”) continues to be one of the most significant and closely followed developments in trade secret law. The statute provides for a federal civil cause of action for trade secret theft, protections for whistleblowers, and new remedies (e.g., ex parte seizure of property), that were not previously available under state trade secret laws.
Continue Reading Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2017/2018

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition of accessing a computer “without authorization” when using someone else’s credentials (with that other user’s permission) after the owner of the computer expressly revoked the first person’s own access rights. In denying certiorari, the Court effectively killed the petitioner’s legal challenge to his conviction in a long-running case that we have extensively covered here, here, here, here, here, here, and here (among other places). The denial of certiorari leaves further development of the scope of the CFAA in the hands of the lower courts.
Continue Reading Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act Unclear

shutterstock_361749602The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds authorized access” is defined as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is
Continue Reading What Underlying Facts are Required to Assert a Valid CFAA Claim Based on “Exceeds Authorized Access” in Georgia?

OverviewIn Seyfarth’s eighth installment in the 2016 Trade Secrets Webinar Series, attorneys Andrew Boutros, Katherine Perrelli and Michael Wexler focused on criminal liability for trade secret misappropriation. Trade secret misappropriation is increasingly garnering the attention of federal law enforcement authorities. This reality creates different dynamics and risks depending on whether the company at issue is being accused of wrongdoing or
Continue Reading Webinar Recap! The Intersection of Trade Secrets Violations and the Criminal Law

Tank Connection, LLC v. HaightThe stakes are getting higher: Trade secret misappropriation is increasingly garnering the attention of federal law enforcement authorities. This reality creates different dynamics and risks depending on whether the company at issue is being accused of wrongdoing or is the victim of such conduct.

On Tuesday, October 4, at 12:00 p.m. Central, Seyfarth attorneys Katherine E. Perrelli, Andrew S. Boutros
Continue Reading Upcoming Webinar: The Intersection of Trade Secrets Violations and the Criminal Law

shutterstock_236620168On July 12, 2016, the Ninth Circuit filed its published opinion in Facebook, Inc. v. Power Ventures, Inc., et al., Case No. 13-17154 (“Power Ventures”).  Power Ventures is the latest in a series of decisions from the Ninth Circuit relating to the type of activities potentially giving rise to liability under the Computer Fraud and Abuse Act
Continue Reading Facebook, Inc. v. Power Ventures, Inc.: Shotgun-Toting Borrowers of Jewelry From Bank Safe Deposit Boxes and the CFAA. Wait. What?

shutterstock_414545476Not exactly. A divided Ninth Circuit panel recently affirmed the conviction of a former employee under the Computer Fraud and Abuse Act (“CFAA”), holding that “[u]nequivocal revocation of computer access closes both the front door and the back door” to protected computers, and that using a password shared by an authorized system user to circumvent the revocation of the former
Continue Reading Computer Fraud and Abuse Act Ruling: Did the Ninth Circuit Just Criminalize Password Sharing?