We have discussed before the importance of maintaining internal policies and procedures to protect the security and integrity of cloud-based repositories. A recent case in the U.S. District Court for the District of Maryland illustrates that this continues to be an important issue—particularly for companies who store their crown jewels on the cloud.
On April 20, 2017, the New York Court of Appeals issued a brief order continuing former Goldman Sachs programmer Sergey Aleynikov’s eight-year voyage through the state’s and country’s legal systems. Here’s the issue: does making a digital copy of misappropriated source code instead of physical copy constitute a “tangible reproduction or representation” of the source code? READ MORE
What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin.
Take email marketing and cybersecurity, for example: What exactly distinguishes a successful high-volume email marketer from a spammer? And how can we distinguish a well-intentioned security analyst exposing vulnerabilities from a nefarious hacker? (Those familiar with techspeak will surely recall the familiar “white hat” and “black hat” dichotomy, but even that, as Wired has observed, is subject to gray areas of its own.) READ MORE
Since the early days of this blog, we’ve been covering the ongoing legal battle involving ex-Korn Ferry recruiter David Nosal as it winds its way through the courts. The latest chapter in this saga came on December 8, 2016, when a Ninth Circuit panel clarified that the Computer Fraud and Abuse Act (CFAA) does not criminalize innocent password sharing, in a published opinion denying Nosal’s request for a rehearing en banc. READ MORE
To the surprise of many and the dismay of more than sixteen million United Kingdom voters, the previously unthinkable has occurred, the UK has voted to leave the European Union. In a tightly contested referendum, voters have chosen to end UK’s time as an EU member. Though the referendum is not technically legally binding, most expect the government to heed the voice of the people. READ MORE
Much attention, including here at Trade Secrets Watch, has been focused in recent weeks on the Defend Trade Secret Act (“DTSA”), which overwhelmingly passed both houses of Congress in April and was signed into law by President Obama on May 11th. The DTSA gives companies new tools for combatting alleged trade secret theft, including a direct path to federal court via the addition of a private right of action to the Economic Espionage Act (EEA) and the ability to apply for ex parte seizure orders to prevent propagation or dissemination of stolen trade secrets. READ MORE
This afternoon, as anticipated, President Barack Obama signed the Defend Trade Secrets Act into law, wrapping up a lengthy bipartisan effort to bring trade secrets under federal system law. Some observed that the fact that President Obama chose to sign the bill into law publicly indicates the importance of the new law to the administration. READ MORE
Germany is not only known as one of the best countries for enjoying beer and bratwurst, but it is also known as a country with some of the strictest data privacy laws on the planet. Within this environment, should companies doing business in Germany even consider using cloud services for trade secrets? They should! READ MORE
Yesterday Congress passed federal trade secrets legislation (the “Defend Trade Secrets Act” or “DTSA”) by an overwhelming 410-2 vote.
The Wall Street Journal notes that the DTSA has been called the “most significant expansion” of federal intellectual property law in 70 years (since the Lanham Act was passed in 1946 to provide federal protection to trademarks). House Judiciary Chair Bob Goodlatte said the measure “will help American innovators protect their intellectual property from criminal theft by foreign agents and those engaging in economic espionage.” READ MORE
There’s been a lot of talk in recent years about “BYOD” (“Bring Your Own Device”) policies, which are becoming increasingly common in the workplace. Employees want the flexibility and ease that comes with being able to use a personal device for work purposes, but employers have long been warned about risks to information security and other perils that come with the territory. Employers take on a separate and distinct set of risks when employees use personal cloud storage services at work—an increasing trend that’s been dubbed “Bring Your Own Cloud” or “BYOC.” READ MORE