The category of “computer crime” includes many disparate offenses, from child pornography to transmission of computer viruses to identity theft. This raises a problem.

One set of complaints involves a very common scenario. A suspect, usually an employee of the victim, accesses data from the victim’s computer without or exceeding authorization, and then copies, deletes or erases the data (by “erases” meaning that the data is not only removed from the user’s active files, but completely wiped from memory and so unrecoverable even with forensic tools), or damages the computer. Very often, the suspect acquires the victim’s proprietary information, and the victim suspects (and sometimes can show) the suspect had either conveyed that information to a competitor or used it to start his own competitive business. Usually there are no contractual covenants (not to compete, solicit clients or disseminate proprietary information) in place prohibiting such conduct.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]