Close

Articles Posted in Computer Crime

Updated:

Mass Resignation to Form Competing Business Leads to Litigation

No employer likes to see a large number of its employees band together and leave en masse to form a competing business. A large number of employees leaving at once can lead to a loss of institutional knowledge and experience, not to mention customers and revenues. Mass departures hurt morale…

Updated:

Project Manager Sabotages Employer, Ordered to Pay Triple Damages

About a year ago, a disgruntled systems engineer for government contractor Federated IT was sentenced to two years in prison for illegally accessing his former employer’s network systems, stealing critical servers and information, and causing a loss valued at over $1.1 million. In a civil lawsuit against his girlfriend and…

Updated:

Under SCA, Cloud-Based Emails Remain in “Electronic Storage” Even After They’ve Been Read

The Stored Communications Act (“SCA”) establishes a criminal offense for whoever “intentionally accesses without authorization a facility through which an electronic communication service is provided” or “intentionally exceeds an authorization to access that facility,” and by doing so “obtains, alters, or prevents authorized access to a wire or electronic communication…

Updated:

You Can Sue If Someone Intentionally Hacks Into Your Email

Unauthorized access to another’s email account can give rise to a variety of claims. The Computer Fraud and Abuse Act (“CFAA”), for example, prohibits a wide variety of improper computer activity, including unauthorized access to another’s email account. Specifically, it makes it illegal to intentionally access a computer without authorization…

Updated:

Accessing Former Employer’s Google Account May Violate CFAA

Suppose your employer asks you to create a Google account for the company. So you do. You set up everything yourself: Google Drive, Google+, Gmail–the works. You even set the password to your dog’s name. All of Google’s terms and conditions are accepted by you personally when creating the account.…

Updated:

Employers Cannot Access Their Employees’ Private Email Accounts Without Permission

The Stored Communications Act (“SCA”), found at 18 U.S.C. §§ 2701-2712, establishes both a criminal offense and a civil cause of action against anyone who “intentionally accesses without authorization a facility through which an electronic communication service is provided” or “intentionally exceeds an authorization to access that facility,” and by…

Updated:

Computer Fraud and Abuse Act Claim Supportable Without Cash Loss

What kind of expense amounts to a “loss” under the Computer Fraud and Abuse Act (CFAA), and did a Virginia litigation-support company incur the required minimum of $5,000 in losses when it investigated an alleged breach of its computer systems, retaining the services of both an attorney and a computer…

Updated:

Proving Loss Under the Computer Fraud and Abuse Act

Too often, disgruntled departing employees will abuse their employer’s computer system on their way out, snooping into coworkers’ email accounts, erasing important files, downloading trade secrets or other confidential commercial information, or intentionally infecting computers with viruses. In recent years, the Computer Fraud and Abuse Act (CFAA) has become an…

Contact Us