March 03, 2005 | Legaltech News
Computer Fraud and Abuse Act as a Civil RemedyAs public Web sites have become businesses' interface with the public, the federal Computer Fraud and Abuse Act has emerged as a potent civil remedy to protect valuable competitive business information that's accessible through these Web sites. Attorney Nick Akerman examines this newly developed legal precedent and the proactive steps businesses should implement to take advantage of the CFAA.
By Nick Akerman
9 minute read
February 01, 2010 | National Law Journal
Time to review corporate computer policiesThree recent court decisions and their implications for creating effective corporate computer policies that protect companies against data theft.
By Nick Akerman
7 minute read
May 30, 2008 | The Recorder
MySpace Case: The Law Fits the CrimeAttorney Nick Akerman says that the federal Computer Fraud and Abuse Act is the right law for charging the woman who allegedly used MySpace to bully a girl who then killed herself.
By Nick Akerman
5 minute read
March 03, 2005 | Law.com
Computer Fraud and Abuse Act as a Civil RemedyAs public Web sites have become businesses' interface with the public, the federal Computer Fraud and Abuse Act has emerged as a potent civil remedy to protect valuable competitive business information that's accessible through these Web sites. Attorney Nick Akerman examines this newly developed legal precedent and the proactive steps businesses should implement to take advantage of the CFAA.
By Nick Akerman
9 minute read
June 26, 2003 | Law.com
New Identity Theft LawA California statute designed to protect the public from identity theft, due to become effective July 1, will profoundly impact how corporations in and out of California protect their computer data and trade secrets. The new law requires any business or person who maintains computerized personal information they do not own to immediately notify the owner of the information of any security breach.
By Nick Akerman and Gabrielle Wirth
9 minute read
July 07, 2009 | Corporate Counsel
When Workers Steal Data to Use at New JobsTerminated employees sometimes steal vital data to improve their job opportunities with a new employer. Employers have been increasingly using the Computer Fraud and Abuse Act's civil remedies to sue such employees, but there has developed a body of district court opinions that refuse to apply the CFAA. Attorney Nick Akerman explains why these opinions are not likely to survive appellate review, and also provides a strategy to avoid the application of these decisions.
By Nick Akerman
8 minute read
May 03, 2011 | Legaltech News
States Take Practical Steps to Respond to Data BreachesWhat does a company do if it is faced with a possible or actual breach of customer, employee, or shareholder personal data? California enacted the first state data-breach notification law in 2003, obligating companies to notify individuals about data breaches. Since then, 45 more states have followed suit as calls for a federal data-breach law remain unanswered.
By Nick Akerman and Melissa Krasnow
8 minute read
July 09, 2004 | Law.com
New Sentencing Guidelines' ImpactThe U.S. Sentencing Commission recently submitted to Congress proposed amendments to the Federal Sentencing Guidelines updating the requirements for an effective corporate compliance program. The proposed guidelines could play a key role in protecting a company's confidential business data and trade secrets. In a presidential election year when corporate wrongdoing is still in the headlines, the proposals could result in increased compliance and ethics programs.
By Nick Akerman
8 minute read
September 08, 2005 | Law.com
Computer Fraud Act Resembles RICOThe federal Computer Fraud and Abuse Act is fast becoming one of the most expansive and potent civil statutes in a litigator's arsenal. Like the civil remedy in the Racketeer Influenced and Corrupt Organizations Act, the CFAA encompasses a panoply of crimes upon which a civil remedy can be predicated. Attorney Nick Akerman examines the breadth of the CFAA and why it should be considered as a cause of action whenever there is evidence relating to the use of computers in perpetrating a wrongful act.
By Nick Akerman
9 minute read
Trending Stories