computer fraud and abuse act

shutterstock_361749602The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds authorized access” is defined as “to access a computer with authorization and to use such access to obtain or alter information in the

OverviewIn Seyfarth’s eighth installment in the 2016 Trade Secrets Webinar Series, attorneys Andrew Boutros, Katherine Perrelli and Michael Wexler focused on criminal liability for trade secret misappropriation. Trade secret misappropriation is increasingly garnering the attention of federal law enforcement authorities. This reality creates different dynamics and risks depending on whether the company at issue is

Tank Connection, LLC v. HaightThe stakes are getting higher: Trade secret misappropriation is increasingly garnering the attention of federal law enforcement authorities. This reality creates different dynamics and risks depending on whether the company at issue is being accused of wrongdoing or is the victim of such conduct.

On Tuesday, October 4, at 12:00 p.m. Central, Seyfarth attorneys Katherine

By Jessica Mendelson and Robert Milligan

The death of Aaron Swartz, a well-known coder, entrepreneur and political activist, has resulted in increased scrutiny of the federal Computer Fraud and Abuse Act (“CFAA”), a law some condemn as arcane and draconian but supported by others as necessary to combat illegal hacking and data theft.

Mr. Swartz

By Joshua Salinas and Jessica Mendelson

A federal district court for the Northern District of California recently held in a “competitor click fraud” case that a mere assertion of a violation of the Computer Fraud and Abuse Act claim without sufficient factual details regarding any inside or outside “hacking” is insufficient to establish subject matter

By Scott Schaefers

In the age of social media and networking, where employees undoubtedly use their company-issued computers to network with customers, vendors, colleagues, and friends, a legal question presents itself: can employers claim an interest in their employees’ LinkedIn accounts, or other social networking accounts, which the employees use in part to grow and

By Robert Milligan

The Ninth Circuit held oral argument on the key United States v. Nosal case yesterday before an en banc panel.

The Court has made the oral argument available on-line.

At stake is whether the government can maintain criminal charges and an employer can maintain a civil cause of action under the Computer

The Ninth Circuit Court of Appeals ordered that U.S. v. Nosal be reheard en banc by all of the Appeals Court judges and that the “three-judge panel opinion [in U.S. v. Nosal, 642 F.3d 781 (9th Cir. 2011)] shall not be cited as precedent by or to any court of the Ninth Circuit.”

By David Monachino

The Computer Fraud and Abuse Act (“CFAA”) requires, among other things, that a plaintiff demonstrate a “loss” of $5,000 or more. See 18 U.S.C. § 1030(c)(4)(A)(i)(I).

In Animators at Law, Inc. v. Capital Legal Solutions, LLC, et al., Case No. 10-CV-1341 E.D.Va. (May 10, 2011) (unpublished) (TSE) two former employees of 

Throughout 2010, Seyfarth Shaw LLP’s dedicated Trade Secrets, Computer Fraud & Non-Competes practice group hosted a series of webinars that addressed key issues facing clients today in this important and ever changing area of law. The series consisted of five webinars: The Computer Fraud and Abuse Act: What You Need to Know, Protecting the Secrets