Since the early days of this blog, we’ve been covering the ongoing legal battle involving ex-Korn Ferry recruiter David Nosal as it winds its way through the courts. The latest chapter in this saga came on December 8, 2016, when a Ninth Circuit panel clarified that the Computer Fraud and Abuse Act (CFAA) does not criminalize innocent password sharing, in a published opinion denying Nosal’s request for a rehearing en banc. READ MORE
Cybersecurity
Brexit’s Potential Impact for Trade Secrets in the UK
To the surprise of many and the dismay of more than sixteen million United Kingdom voters, the previously unthinkable has occurred, the UK has voted to leave the European Union. In a tightly contested referendum, voters have chosen to end UK’s time as an EU member. Though the referendum is not technically legally binding, most expect the government to heed the voice of the people. READ MORE
Amendment to Federal Criminal Procedural Rule Could Impact Trade Secret Cases
Much attention, including here at Trade Secrets Watch, has been focused in recent weeks on the Defend Trade Secret Act (“DTSA”), which overwhelmingly passed both houses of Congress in April and was signed into law by President Obama on May 11th. The DTSA gives companies new tools for combatting alleged trade secret theft, including a direct path to federal court via the addition of a private right of action to the Economic Espionage Act (EEA) and the ability to apply for ex parte seizure orders to prevent propagation or dissemination of stolen trade secrets. READ MORE
Trade Secrets and Cloud Services: Is the Sky the Limit?
Germany is not only known as one of the best countries for enjoying beer and bratwurst, but it is also known as a country with some of the strictest data privacy laws on the planet. Within this environment, should companies doing business in Germany even consider using cloud services for trade secrets? They should! READ MORE
Federal Law or Another False Alarm? Senate Passes the Defend Trade Secrets Act of 2016 87-0.
Relief may soon be coming for trade secrets plaintiffs longing for federal court. Last year we covered the introduction of the Defend Trade Secrets Act (DTSA), compared it to the Uniform Trade Secrets Act (UTSA), and questioned whether federal court under this new law would be a preferable venue to plaintiffs. Since then, the bill, like the many that came before it, died in Congress. READ MORE
Orrick Launches New Cybersecurity Blog
We’re excited to announce Orrick’s new sister blog, Trust Anchor!
Trust Anchor highlights current topics in cybersecurity and data privacy, such as recent cases, legislative and regulatory developments, emerging standards, risk management strategies, and insurance coverage. It’s not just news. Instead, it aims to review new developments and offer actionable privacy and cybersecurity intel and strategies. READ MORE
U.S. Considers Sanctions Against China For Cyber Hacking And Trade Secret Misappropriation
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade secrets. The Washington Post, quoting unidentified officials, states the “unprecedented” package of sanctions is part of a larger strategy to expand the “administration’s public response to the rising wave of cyber-economic espionage initiated by Chinese hackers” and to confront malicious cyber actors. READ MORE
The New and Improved Defend Trade Secrets Act of 2015! Now Featuring a Lockbox
On July 31, 2015, TSW continued our reporting of the continuing saga of Congress’ attempts to establish a federal right of civil action for trade secrets misappropriation by covering the introduction of the “Defend Trade Secrets Act of 2015” (“2015 DTSA”). The 2015 DTSA was introduced in identical form in the House (H.R. 3326) by Rep. Doug Collins (R-GA) and in the Senate (S. 1890) by Sen. Orrin Hatch (R-UT). In prior posts, we covered the introduction of the Defend Trade Secrets Act of 2014 in both the House (the “2014 House Bill”) and the Senate and outlined the differences between the two, noting that the 2014 House Bill was much more protective of defendants facing ex parte seizure orders. READ MORE
A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?
Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco. So we figured it may be a good time to review both sides’ arguments related to the Computer Fraud and Abuse Act. After doing so, it seems to us that one topic not given any consideration in the briefs, but that may play a role during oral argument is the phenomenon known as phishing schemes, and how such schemes might be compared and contrasted with the scheme alleged in this case. READ MORE
Hacking Your Rivals – Corporate Espionage in Major League Baseball
As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it appears these hijinks have evolved in today’s electronic world. As the New York Times first reported, the FBI and Department of Justice prosecutors are investigating front-office personnel for the St. Louis Cardinals, one of Major League Baseball’s most beloved franchises, for allegedly infiltrating the internal network of the Houston Astros. READ MORE