Robert B. Milligan, Partner and Co-Chair of Seyfarth’s National Trade Secret, Computer Fraud, and Non-Compete practice group, just finished co-editing and co-authoring a prominent new California trade secret treatise.

This Supplement to the Third Edition practice guide addresses the Defend Trade Secrets Act (DTSA ), which was enacted in 2016.  This Supplement includes additional practical tips and strategies related to
Continue Reading Seyfarth’s Robert Milligan Co-Edits and Co-Authors New Treatise on Defend Trade Secrets Act

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition of accessing a computer “without authorization” when using someone else’s credentials (with that other user’s permission) after the owner of the computer expressly revoked the first person’s own access rights. In denying certiorari, the Court effectively killed the petitioner’s legal challenge to his conviction in a long-running case that we have extensively covered here, here, here, here, here, here, and here (among other places). The denial of certiorari leaves further development of the scope of the CFAA in the hands of the lower courts.
Continue Reading Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act Unclear

shutterstock_533123590Continuing our annual tradition, we present the top developments/headlines for 2016 in trade secret, computer fraud, and non-compete law. Please join us for our first webinar of the New Year on February 2, 2017, at 12:00 p.m. Central, where we will discuss these new developments, their potential implications, and our predictions for 2017.

1. Defend Trade Secrets Act

One of
Continue Reading Top Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2016

shutterstock_361749602The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds authorized access” is defined as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is
Continue Reading What Underlying Facts are Required to Assert a Valid CFAA Claim Based on “Exceeds Authorized Access” in Georgia?

shutterstock_236620168On July 12, 2016, the Ninth Circuit filed its published opinion in Facebook, Inc. v. Power Ventures, Inc., et al., Case No. 13-17154 (“Power Ventures”).  Power Ventures is the latest in a series of decisions from the Ninth Circuit relating to the type of activities potentially giving rise to liability under the Computer Fraud and Abuse Act
Continue Reading Facebook, Inc. v. Power Ventures, Inc.: Shotgun-Toting Borrowers of Jewelry From Bank Safe Deposit Boxes and the CFAA. Wait. What?

shutterstock_414545476Not exactly. A divided Ninth Circuit panel recently affirmed the conviction of a former employee under the Computer Fraud and Abuse Act (“CFAA”), holding that “[u]nequivocal revocation of computer access closes both the front door and the back door” to protected computers, and that using a password shared by an authorized system user to circumvent the revocation of the former
Continue Reading Computer Fraud and Abuse Act Ruling: Did the Ninth Circuit Just Criminalize Password Sharing?

shutterstock_142248280The defendants in a case pending in Chicago federal court were accused of contravening Facebook’s terms of use by accessing its computers in order to create a phony page and then using it to ridicule someone. In Bittman v. Fox, Case No. 14 C 8191 (N.D.Ill., June 1, 2015) (Holderman, J.), the court held that those allegations do not
Continue Reading CFAA and SCA Do Not Prohibit Creation Of A Fake Facebook Page

The scope of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, remains unsettled in the First Circuit after two decisions issued just weeks apart adopted differing approaches to the treatment of such claims.

The CFAA prohibits the intentional access of a computer without authorization or exceeding a party’s authorization to obtain information from a protected computer.  As
Continue Reading Computer Fraud and Abuse Act Claims in the First Circuit – Will the Narrow Approach Prevail?

District courts are divided as to whether there is a private right of action under the Computer Fraud and Abuse Act (CFAA) for persons whose computer service is not interrupted but who nevertheless incur costs (a) responding to a CFAA offense, (b) conducting a damage assessment, or (c) restoring computerized data or programs as they were prior to the offense.
Continue Reading Courts Disagree on Meaning of “Interruption of Service” When Determining Loss Under the Computer Fraud And Abuse Act

By Robert Milligan and Joshua Salinas

As part of our annual tradition, we are pleased to present our discussion of the top 10 developments/headlines in trade secret, computer fraud, and non-compete law for 2013. Please join us for our complimentary webinar on March 6, 2014, at 10:00 a.m. P.S.T., where we will discuss them in greater detail. As with all
Continue Reading Top 10 Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law in 2013