It’s a fact pattern that repeatedly arises in trade secret cases: a company hires someone who has a confidentiality agreement with their former employer. Just before (or shortly after) being hired, the individual emails...more
Throughout 2021, our dedicated Trade Secrets, Computer Fraud & Non-Competes Practice Group hosted a series of CLE webinars that addressed significant trade secret and restrictive covenant issues facing clients today. This...more
A decade ago, the Georgia legislature enacted a new restrictive covenant statute, O.C.G.A. § 13-8-51 et al. (the “Georgia RCA”). Among other things, the Georgia RCA permitted Georgia courts to blue-pencil or “modify a...more
The Computer Fraud and Abuse Act (“CFAA”) gives rise to an actionable claim if someone “knowingly access[es] a computer without authorization or exceed[s] authorized access.” 18 U.S.C. § 1030(a)(1). The term “exceeds...more