On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition of accessing a computer “without authorization” when using someone else’s credentials (with that other user’s permission) after the owner of the computer expressly revoked the … Continue Reading
Earlier this week, the United Parcel Service, Inc. (“UPS”) filed a lawsuit in the Northern District of Georgia, Atlanta Division, against several unidentified UPS pilots, who are referred to in the complaint as “John Does 1-5.” The lawsuit alleges that “[i]n August 2017, certain UPS employees developed strategic plans regarding the Company’s aircraft. These plans were developed for, among other … Continue Reading
As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Jonathan Karchmer, a senior managing consultant at iDiscovery Solutions.
Determining whether programs or malware actually ran on a system is an important goal of seasoned examiners when investigating computer evidence. Generally, there are several artifacts left behind anytime executables are … Continue Reading
The Massachusetts legislature is back at it again. Under new leadership, the Joint Committee on Labor & Workforce Development recently scheduled a hearing for October 31, 2017 on the non-compete reform bills proposed in January of this year. While we know little about the hearing, the bills to be discussed are presumably Senate Bill S.988 and companion House Bill H.2366. … Continue Reading
The Florida Supreme Court ruled last week that referral sources in the home healthcare industry can be protected legitimate business interests under the state law governing non-compete agreements, thus finding enforceable such a restriction on a former marketing employee who left for a competitor.
Although the Florida statute in question (542.335) does not specifically list “referral sources” as one of the five categories of business interests subject to protection, the Court notes that those enumerated categories are prefaced by the phrase “including, but not limited to” thereby finding that the list is not meant to be exhaustive and may necessarily … Continue ReadingContinue Reading…
Social media and related issues in the workplace can be a headache for employers. There is no denying that social media has transformed the way that companies conduct business. In light of the rapid evolution of social media, companies today face significant legal challenges on a variety of issues, ranging from employee privacy and protected activity to data practices, identity … Continue Reading