computer fraud (CFAA)

Supreme Court Narrows Scope of the Computer Fraud and Abuse Act

The U.S. Supreme Court recently resolved a circuit split regarding the federal Computer Fraud and Abuse Act (CFAA), specifically weighing in on the “exceeds authorized access” provision of the statute.  The CFAA subjects to criminal liability anyone who “intentionally accesses a computer without authorization or exceeds authorized access.” READ MORE

Ajaxo v. E*Trade: How (Not) to Prove a Reasonable Royalty for Trade Secret Misappropriation

The latest appellate decision in the nearly 20-year legal battle between Ajaxo and E*Trade highlights the importance of expert discovery and a well-developed trial court record for a plaintiff attempting to claim reasonable royalties for trade secret misappropriation.

The saga between Ajaxo and E*Trade began back in the late 1990s, with Ajaxo, a six-person company, approaching E*Trade, seeking to support its wireless access and trading business.  In response, E*Trade asked Ajaxo for a technical paper and live demonstrations, during which E*Trade’s engineers peppered Ajaxo with questions.  One E*Trade senior engineer, Dan Baca, made a copy of Ajaxo’s technical binder.  After E*Trade sent Ajaxo a draft letter of intent—with everything but the dollar amount filled in—E*Trade had a change of heart and told Ajaxo it was simply too small to be an E*Trade partner.  Instead, E*Trade acquired these services a short time later from Everypath, a company that it had been meeting with simultaneously, and where Dan Baca started to work shortly after attending the Ajaxo meetings. READ MORE

Protecting IP in a COVID-19 Remote-Work-World

Even before the COVID-19 pandemic, many employers offered remote work options. Now employers all over the world are encouraging or requiring their employees to work remote from home. This means employees are accessing, maintaining, and sharing proprietary information outside of the office more frequently than ever before, thereby increasing the risk of employee and third-party IP theft. READ MORE