Posts by: Editorial Board

Think Before You Tack CFAA Claims on to Your Trade Secret Misappropriation Case

Before you include a Computer Fraud and Abuse Act (“CFAA”) claim in a trade secret case, consider carefully: was the data acquired through “unauthorized access” or was it just misused by the defendants? If it was properly accessed (but later misused), your CFAA claim, and the federal question jurisdiction that comes with it, is in jeopardy. In SunPower Corp. v. SunEdison, Inc., Judge Orrick of the Northern District of California recently dismissed the plaintiff’s CFAA claim because the plaintiff failed to allege that the data was accessed without authorization, only that it was later misused.  Because the CFAA claim provided the basis for federal jurisdiction, Judge Orrick indicated that he would dismiss the entire case and not exercise pendent jurisdiction over the remaining thirteen state claims if the CFAA claim could not be properly amended. READ MORE

Orrick Launches New Cybersecurity Blog

We’re excited to announce Orrick’s new sister blog, Trust Anchor!

Trust Anchor highlights current topics in cybersecurity and data privacy, such as recent cases, legislative and regulatory developments, emerging standards, risk management strategies, and insurance coverage.  It’s not just news.  Instead, it aims to review new developments and offer actionable privacy and cybersecurity intel and strategies. READ MORE

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest threat might still be a pair of quick hands.  For instance, in the restaurant industry, opening the kitchen doors to a new employee creates real risks.  As we’ve discussed, sometimes the decision whether to print or download can have major legal ramifications.  And with computer forensics technology growing in leaps and bounds, sometimes an old-school paper trail might be more enticing to would-be perps than a digital one.  That said, the FBI has a track record of turning up bags of shredded documents in grocery store dumpsters. READ MORE

Once More, With Feeling! Congress Swings for the Fences with the Defend Trade Secrets Act of 2015

On July 28, broad bipartisan support ushered the “Defend Trade Secrets Act of 2015” onto the floor of both the House and Senate. This DTSA treads the well-worn path of many similar (and, to date, hapless) bills that fruitlessly preceded it. TSW has exhaustively covered prior attempts, aptly titling our first post “Pols Gone Wild: Congress Discovers Trade Secret Theft and Cybersecurity Are Problems; We Sort Through the Explosion of Legislation”—chart and all. READ MORE

One Step Closer: European Parliament Legal Affairs Committee Approves Trade Secret Directive

As Trade Secrets Watch has previously reported, new rules regarding the protection of trade secrets are on the horizon for the European Union. In November 2013, the European Commission announced a proposed Directive on trade secrets and confidential information. Around six months later, in May 2014, the Council of the European Union agreed on a revised draft Directive. Reception of the Trade Secrets Directive has been mixed. READ MORE

Fighting Back: Identifying Risks Posed by an Angry Current or Former Employee

Something lost is always in the last place you look (by definition).  It can also sometimes be in the first.

Although technology has made it possible for outsiders to manipulate and infiltrate your company’s systems and obtain confidential and trade secret information in novel and subtle ways, a lingering, persistent threat to a company’s confidential information and trade secret comes from unhappy employees, both during the time of their employ and after separation. READ MORE

Snowden Strikes Back: Mass Collection of Telephony Metadata Struck Down By the Second Circuit

As post-Snowden America well knows, for some years now the National Security Agency (NSA) has been collecting bulk telephone metadata under the authority of Section 215 of the PATRIOT Act and aggregating it into data banks subject to government query. Under the “business records” provision of this law, the NSA has been collecting all kinds of information about the numbers you dial, how often you dial them, and how long your conversations are—and it’s been doing so for years. READ MORE

POTUS Declares Cybercrime a National Emergency, Announces New Penalties for Trade Secrets Theft

Declaring cybercrime a “national emergency,” President Obama today empowered Treasury to freeze assets that are the fruits of cybercrime, according to an Executive Order issued this afternoon. The agency can block money or property in the United States or in the control of any United States person determined to have engaged in “cyber-enabled activities” originating or directed from outside the United States. Targeted activities include harming computer networks in critical infrastructure sectors; significantly disrupting a computer network; or causing significant misappropriation of trade secrets and other protected information. The EO also enables seizure of money or property of any persons involved in misappropriating trade secrets by “cyber-enabled means” that impact the national security, foreign policy, or economic health or financial stability of the United States.

TSW is tracking the EO and will report further developments.

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year.  Among other things, the newly adopted regulations require foreign technology companies that sell computer equipment to Chinese banks to submit to obtrusive audits, set up research and development centers in the country, build “back doors” into their hardware and software, and, perhaps most disconcerting, disclose intellectual property to the Chinese government, including proprietary source code. READ MORE