computer fraud and abuse act

Data mining LinkedIn profilesA Federal Judge recently blocked LinkedIn from restricting another company from using data from LinkedIn’s website. The suit involves Linkedin and hiQ Labs, Inc. The suit also has significant ramifications for job-seekers and employers. See LinkedIn Profiles Used to Alert Employers Which Employees are Job-Hunting.

hiQ Labs Business Depends Upon Access to LinkedIn Profiles

hiQ

Data BreachA former employee’s accessing a Google Drive he set up for his employer may result in a violation of the federal Computer Fraud and Abuse Act (CFAA). This case also serves as a reminder to carefully evaluate how your company uses any third-party services like Dropbox, Google Drive, etc.

Computer Fraud and Abuse Act Background

While it is far from settled, the trend under the Federal Computer Fraud and Abuse Act continues towards narrowing the application of the CFAA in the context of the employer/employee relationship.

Specifically, a federal district court in Colorado concluded that the federal computer fraud statute was not violated by departing employees and contractors who, during

Trade Secret MisappropriationUber and Lyft are both internet and mobile application based technology companies offering a peer-to-peer ridesharing platform. Or for less tech-speak, they are involved in what is generally described as the “sharing economy.” However, a recent lawsuit makes clear that sharing has its limits.

Specifically, Lyft is suing a former executive (Lyft v Uber (PDF)), Travis VanderZanden, for breaching his confidentiality agreement and fiduciary duty and after he jumped ship to join Lyft’s chief rival, Uber. According to the complaint filed in the lawsuit, the former executive copied vast amounts of confidential information on his way out the door. Uber has denied that Mr. VanderZanden has “shared” any of this information with Uber. 

These claims and allegations are by no means extraordinary. But they do provide a perfect roadmap for both employers and employees to follow when it comes ending one employment relationship in order to join a competitor. But instead of taking an all-out road trip to address all of those issues, two points stand-out.

How to Get Guarantee Your Former Employer Will Sue You

As to the firs issue, a little background for what not to do if you are an employee about to join a competitor: Lyft’s lawsuit alleges that VanderZanden informed the company’s founders of his plans to resign on August 12 and agreed to meet with the founders on August 15. But VanderZanden cancelled that meeting and suggested they speak after the weekend.

According to the complaint, it was a busy weekend for Mr. VanderZanden. Lyft alleges that he backed up a number of emails and confidential documents to his personal home computer and mobile phone before handing his company computer back. These actions were discovered after Lyft conducted a forensics analysis of VanderZanden’s company-issued laptop. The analysis further revealed that months prior to the departure, Mr. VanderZanden synchronized his personal Dropbox account with his Lyft laptop, copying a “significant number of Lyft’s most sensitive documents” in the process.

So the first issue for both employers and employees is really two sides of the same coin. From an employee’s perspective, assume your digital fingerprints will point to every piece of digital information you touched, e.g., every file, every email, every document, etc. And if those fingerprints suggest you took you former employer’s information to your new employer, be prepared to be sued.

And because these digital fingerprints provide valuable insight, employers need to have a plan in place to preserve this likely treasure trove of digital evidence. This is because the absence of such evidence may eliminate an expensive Don Quixote-like endeavor against the former employee. There is nothing worse than spending A+ resources on a C- employee or situation.

Conversely, the presence of such evidence will be needed to convince a judge that injunctive relief is appropriate and to otherwise support claims against the former employee. As part of your company’s plan, you’ll need to address how to preserve, analyze, and use the digital evidence.

Play a Strong Hand; Bluffing in Litigation Can Be Costly
Continue Reading An Uber Example of Getting Caught with Your Hand In Your Employer’s Cookie Jar

Computer Crime HandcuffsOne of the more noteworthy employer/employee trade-secret misappropriation and Computer Fraud and Abuse Act  (CFAA) cases came to an end earlier this week. Specifically, Mr. David Nosal wa sentenced on January 8, 2014 to one year and one day in prison. He was convicted for misappropriating his former employer’s trade secrets and improperly accessing the

Security Padlock.jpgThe California based law firm Littler Mendelson’s Unfair Competition and Trade Secrets Practice Group discussed a recent dismissal of a Computer Fraud and Abuse Act claim brought by a company against its former employee.

The case, Ajuba International, L.L.C. v. Saharia (PDF), involved the U.S. federal court for the Eastern District of Michigan rejecting

Security_Computer_Laptop in Chain.jpegPreviously this blog outlined the various approaches Courts have taken to applying the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. 1030, to workplace misuse of employer provided computer resources.

A recent opinion from the Ninth Circuit Court of Appeals, however, seriously limits the applicability of the CFAA to the employer/employee relationship and challenges other

Business Headlock.jpgFestivus – as introduced by Seinfeld – is a holiday celebration that included the “Airing of Grievances,” i.e., public criticism and pronouncements as to how a particular person has been a disappointment in the past year. 

The timing of holiday and year-end bonuses also often mark the beginning of a similar airing of

Fingerprint shackle.jpgA recent article in the Wall Street Journal, As Criminal Laws Proliferate, More Ensnared (Gary Fields and John Emshwiller), details the increasing number of federal criminal statutes and federal prosecutions – a threefold increase over the last 30 years. The article attributes – in part – this upward spiral to the criminalization of issues generally