NEXT

Nick Akerman

Nick Akerman

February 03, 2010 | Legaltech News

Time to Review Corporate Computer Policies

Three recent rulings offer implications for creating effective computer policies that protect companies against the theft of their data. Employers should ensure employees have no expectation of privacy in using company computers and delineate the scope of their permissible access.

By Nick Akerman

7 minute read

May 01, 2009 | Legaltech News

Protecting Privacy

Three states' new laws reach beyond their borders.

By Nick Akerman & Melissa Krasnow

7 minute read

March 19, 2004 | Law.com

Civil RICO Actions for Trade Secret Theft

The traditional corporate litigation response to an ex-employee or competitor stealing confidential business information is to file a lawsuit using the standard array of state causes of action -- misappropriation of trade secrets, breach of fiduciary duty, breach of contract or tortious interference with contract. Nick Akerman introduces a potent federal cause of action that is rarely used and should be considered: the civil RICO action.

By Nick Akerman

9 minute read

October 19, 2004 | Law.com

CFAA's $5,000 Threshold

In a federal suit, Nexans Wires alleged a competitor induced individuals to engage in economic espionage, based on classic Computer Fraud and Abuse Act violations: theft of and damage to computer data. Though the allegations fit neatly into causes of action under the CFAA, a judge granted summary judgment to the defendant because Nexans Wires couldn't establish the statutory threshold that it had suffered $5,000 in "loss." The case shows how an unfamiliarity with CFAA can be a trap for the unwary.

By Nick Akerman

9 minute read

April 10, 2006 | National Law Journal

CFAA and Data Destruction

Last month, the 7th Circuit issued an important decision that provides added vitality to the federal CFAA for companies whose computer data may be destroyed by an insider. This article will review its significance to companies that are serious about protecting their computer data.

By Nick Akerman

9 minute read