Trade Secret Law and the Computer Fraud and Abuse Act

Trade Secret Law and the Computer Fraud and Abuse Act
Author: Kyle Wesley Brenton
Publisher:
Total Pages: 54
Release: 2014
Genre:
ISBN:

Download Trade Secret Law and the Computer Fraud and Abuse Act Book in PDF, Epub and Kindle

As businesses move their confidential information onto computers, sensitive data gains the protection not only of state trade secret law, but also potentially of federal computer misuse statutes. The interaction between those two bodies of law, however, is more problematic than any commentator has yet realized. The Computer Fraud and Abuse Act, 18 U.S.C. § 1030, is a federal criminal statute with a private right of action allowing those who suffer information theft via computer to maintain a civil action against the thief. More and more in recent years, however, employers whose faithless employees misappropriate purported trade secrets have used the CFAA as a basis for employee liability, as well as a way to bootstrap their claims into federal court. Using the CFAA in this manner creates two problems. First, substantively, since a CFAA claim is much easier to prove than a traditional state-law trade secret misappropriation claim, plaintiffs will be more likely to plead the former. But because the CFAA lacks virtually all of the policy-based protections built into trade secret law, this upsets the delicate balance between employers and employees that trade secret law strikes. Second, jurisdictionally, using the CFAA to establish federal question jurisdiction, then bringing trade secret claims into federal court under supplemental jurisdiction, contravenes the intent of Congress in passing the CFAA and damages core notions of federalism and the relationship between federal and state law.This Article proposes two solutions to the two problems that arise at the intersection of trade secret law and the Computer Fraud and Abuse Act. First, Congress should act to remove the CFAA's substantive crime that most closely approximates trade secret misappropriation from the Act's private right of action, thus removing the threat that the CFAA will disrupt the values underlying substantive trade secret law. Second, judges ruling on motions to dismiss CFAA claims should carefully examine the parties' contentions and use the discretion granted in 28 U.S.C. § 1367(c) to dismiss state-law trade secret claims. Thus claims in which the CFAA is merely, in the words of one judge, “a federal tail” wagging “a state dog” can be returned where they belong: state court.

Intellectual Property and Computer Crimes

Intellectual Property and Computer Crimes
Author: Peter Toren
Publisher: Law Journal Press
Total Pages: 916
Release: 2003
Genre: Law
ISBN: 9781588521187

Download Intellectual Property and Computer Crimes Book in PDF, Epub and Kindle

Intellectual Property and Computer Crimes examines criminal infringement, the expanded scope of computer hacking laws, and the important legal issues that arise when these crimes are prosecuted.

Cybercrime

Cybercrime
Author: Charles Doyle
Publisher: DIANE Publishing
Total Pages: 97
Release: 2011-04
Genre: Law
ISBN: 1437944981

Download Cybercrime Book in PDF, Epub and Kindle

The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law which protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This report provides a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326. Extensive appendices. This is a print on demand publication.

Software and Internet Law

Software and Internet Law
Author: Mark A. Lemley
Publisher: Aspen Publishing
Total Pages: 1724
Release: 2014-12-09
Genre: Law
ISBN: 145485989X

Download Software and Internet Law Book in PDF, Epub and Kindle

Among the first casebooks in the field, Software and Internet Law presents clear and incisive writing, milestone cases and legislation, and questions and problems that reflect the authors' extensive knowledge and classroom experience. Technical terms are defined in context to make the text accessible for students and professors with minimal background in technology, the software industry, or the Internet. Always ahead of the curve, the Fourth Edition adds coverage and commentary on developing law, such as the Digital Millennium Copyright Act's Safe Harbor, the Electronic Communications Privacy Act, and the Stored Communications Act. Hard-wired features of Software and Internet Law include: consistent focus on how lawyers service the software industry and the Internet broad coverage of all aspects of U.S. software and internet law;with a focus on intellectual property, licensing, and cyberlaw The Fourth Edition responds to this fast-changing field with coverage of : the Digital Millennium Copyright Act's Safe Harbor the Electronic Communications Privacy Act the Stored Communications Act Hot News; Misappropriation Civil Uses of the Computer Fraud and Abuse Act

Computer Crime, Information Warfare, and Economic Espionage

Computer Crime, Information Warfare, and Economic Espionage
Author: David J. Loundy
Publisher:
Total Pages: 878
Release: 2003
Genre: Business & Economics
ISBN:

Download Computer Crime, Information Warfare, and Economic Espionage Book in PDF, Epub and Kindle

This book presents a broad overview of computer and information crime. It first provides some technical background to allow an understanding of information protection law in a broader context. Then, presenting material on information protection policy, the book covers such topics as computer intrusions and attacks; computer viruses and other forms of "malicious code;" interception of electronic communications and search and seizure; online fraud; identity theft; infrastructure security; "hacktivism;" national security issues; economic espionage; and many more. With comments and questions that accompany each topic, Loundy uses a case-based approach. Articles discussing relevant technology are interspersed, and a detailed appendix includes relevant federal statutes and sample state statutes. A teacher's manual is also available.

Trade Secrets

Trade Secrets
Author: David W. Quinto
Publisher: OUP USA
Total Pages: 0
Release: 2012-05-24
Genre: Law
ISBN: 9780199767571

Download Trade Secrets Book in PDF, Epub and Kindle

This book assembles case law analysis and strategic advice on prosecuting and defending trade secret misappropriation actions, maintaining legally sufficient trade secret protection measures, and supervising outside attorneys in the course of litigation. This book is an invaluable resource for both firm-based litigators and in-house attorneys, and it sets a new standard for the insightful analysis of U.S. trade secret law and practice.

E-Commerce Law

E-Commerce Law
Author: Tom James
Publisher:
Total Pages: 762
Release: 2020-02
Genre:
ISBN: 9781946397065

Download E-Commerce Law Book in PDF, Epub and Kindle

A guide to e-commerce law, explaining the Digital Millennium Copyright Act, the Children's Online Privacy Protection Act, the Communications Decency Act, the Computer Fraud and Abuse Act, and Copyright Act, the Lanham Act, and relevant portions of the FTC Act and regulations, state laws, EU regulations, treaties, the U.C.C., and more. Topics covered include: (1) Starting and managing a business; (2) Hiring, firing and managing employees; (3) Securities regulations; (4) Contract and sales law; (5) E-contracts and e-signatures; (6) Electronic credit, debit and ETF transactions; (7) Chargebacks; (8) Sales and use taxes; (9) Data security; (10) trade secret; (11) Patents; (12) Proprietary information; (13) Unfair competition; (14) Unfair and deceptive trade practices; (15) Trade disparagement; (16) Defamation; (17) Advertising; (18) Publicity rights; (19) Trademarks; (20) Keywords and meta-tags; (21) Domain names; (22) Cybersquatting; (23) UDRP proceedings; (24) Liability for user-provided content; (25) Children and child-directed advertising and websites; (26) Adult (sexually explicit) content; (27) Privacy rights; (28) Copyrights; (29) Fair use doctrine; (30) The public domain; (31) Licensing intellectual property rights; (32) Jurisdiction in cyberspace; (33) Dispute resolution. Includes notes, table of statutes and cases; bibliography; index.

Top Tens in 2012

Top Tens in 2012
Author: Stephen M. McJohn
Publisher:
Total Pages: 0
Release: 2012
Genre:
ISBN:

Download Top Tens in 2012 Book in PDF, Epub and Kindle

This paper discusses notable intellectual property law cases in the United States in 2012. The Supreme Court cut back on the scope of patent subject matter in Prometheus, while according Congress great latitude in extending copyright protection in Golan. Prometheus was one of a number of cases in which the concept of functionality cut across the various areas of intellectual property. Prometheus cut back on patents on innovations that were not sufficiently functional, because they effectively claimed a law of nature. The Federal Circuit, in Myriad Genetics, by contrast, held isolated genes patentable (and the Supreme Court has decided to hear that case). The strongest rationale may be that isolated genes play different functions than their counterpart in nature. CLS Bank International held a computer-implemented invention patentable because its abstractness was not “manifestly evident”: a presumption of functionality that the court soon decided to revisit en banc. Design patents have become more prominent, giving protection to ornamental aspects of functional products. By contrast, in copyright, the copyright in the code that implements the programming language Java was held not to extend to the code's functional interfaces with other software, such as the Android operating system. Courts also recognize that software can vary in its mix of functionality and creative expression. Video games were compared to dramatic works and received a higher level of protection than more utilitarian software. In trademark, the distinction between functional aspects and symbolic ones arose in litigation involving such diverse stuff as traction hoists, keyword searching, red-soled shoes and orange feeding tubes. Courts also looked at the related issues of what constituted use of a trademark, and what uses are constitutionally protected. Several cases explored the boundaries of trade secret protection. Courts read two federal statutes, the Computer Fraud and Abuse Act and the National Stolen Property Act, to provide less protection for trade secrets than earlier cases have, possibly setting the issue for Supreme Court review. Nondisclosure agreements were likewise held to provide less protection for claimed trade secrets than some precedent would suggest. The potential information covered by trade secrets, by contrast, was held broad enough to cover information not used by a business and public information that had been compiled and widely distributed. Courts also explored the requirement of use for liability, requiring a substantial showing of use, beyond access.

Computer Fraud and Abuse Laws

Computer Fraud and Abuse Laws
Author: Charles Doyle
Publisher: Nova Publishers
Total Pages: 112
Release: 2002
Genre: Computers
ISBN: 9781590333457

Download Computer Fraud and Abuse Laws Book in PDF, Epub and Kindle

Computer Fraud & Abuse Laws An Overview Of Federal Criminal Laws

Infocrime

Infocrime
Author: Eli Lederman
Publisher: Edward Elgar Publishing
Total Pages: 481
Release: 2016-03-25
Genre: Computers
ISBN: 1785361260

Download Infocrime Book in PDF, Epub and Kindle

It has often been said that information is power. This is more true in the information age than ever. The book profiles the tools used by criminal law to protect confidential information. It deals with the essence of information, the varieties of confidential information, and the basic models for its protection within the context of the Internet and social networks. Eli Lederman examines the key prohibitions against collecting protected information, and against using, disclosing, and disseminating it without authorization. The investigation cuts across a broad subject matter to discuss and analyze key topics such as trespassing and peeping, the human body as a source of information, computer trespassing, tracking and collecting personal information in the public space, surveillance, privileged communications, espionage and state secrets, trade secrets, personal information held by others, and profiling and sexting. Infocrime will appeal to graduate and undergraduate scholars and academics in the legal arena, in law schools and schools of communication, and to practicing lawyers with an interest in legal theory and a concern for the protection of the personal realm in a world of increasingly invasive technologies.