Establishing jurisdiction over a defendant is critical in every lawsuit. Trade secret cases are certainly no different. A recent appellate decision from Texas underscored this important point by dismissing a plaintiff’s...more
Everyone generally agrees that people and organizations should be able to protect their proprietary and valuable information. But one area where we’ve seen legislative fretting is when that principle potentially impedes...more
Throughout 2021, our dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant trade secret and restrictive covenant issues facing clients today. This...more
In Seyfarth’s fourth installment in its 2019 Trade Secrets Webinar Series, Seyfarth attorneys Kristine Argentine, Eric Barton, and Katelyn Miller focused on the enforcement of non-competes and how the difficulty of...more
On Friday, May 18, Eric Barton participated in a panel discussion at the 2018 ITechLaw World Technology Conference, updating attorneys from around the globe on the latest developments in cyber vulnerabilities and crime. In...more
5/23/2018
/ Confidential Information ,
Cybersecurity ,
Data-Sharing ,
Foreign Nationals ,
Innovation ,
Intellectual Property Protection ,
Legal Ethics ,
National Security ,
Popular ,
Risk Management ,
Technology ,
Trade Secrets
Earlier this week, the United Parcel Service, Inc. (“UPS”) filed a lawsuit in the Northern District of Georgia, Atlanta Division, against several unidentified UPS pilots, who are referred to in the complaint as “John Does...more
It is well known that 18 U.S.C. § 1836, et seq. (the Defend Trade Secrets Act or “DTSA”) finally provides a mechanism for pursing trade secret claims in federal court. A recent decision, however, serves as an excellent...more
A lawyer’s favorite phrase might be “it depends.” And when an employer asks whether its customer lists qualify as a trade secret, “it depends” is often the answer. But even if it’s difficult to definitively state whether...more
The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more
Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more
On June 11, 2015, Alabama’s Governor signed into law legislation that revises the state’s non-compete statute, which is found in Section 8-1-1 of the Code of Alabama. The effective date for these changes is January 1, 2016. ...more