Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well as one or two that I missed over the past couple of weeks: Trade Secret and Non-Compete Posts and Articles:
  • House Intelligence Committee Chairman Mike Rogers (R-MI) has announced that he will be presenting a bill later this year that will penalize foreign countries that sponsor hackers that attempt to steal trade secrets from U.S. companies. In an article for Main Justice, Katy O’Donnell writes that Rogers will be considering some unconventional remedies such as suspension of visas and other tools.
  • “DuPont Wins Kolon Property In $920M Recovery Effort,” reports Law360.
  • For the latest on the Eagle v. Morgan social media ownership case, see Jessica Mendelson’s post for Seyfarth Shaw’s Trading Secrets Blog. As Jessica details, the trial court found that Dr. Eagle’s former employer misappropriated her LinkedIn profile but that Dr. Eagle failed to prove her damages.
  • “Live Events Agency Sues Former Employees And Independent Contractor For Breach Of Non-Solicitation Agreements,” advises John Paul Nefflen for Burr & Forman’s Non-Compete Trade Secrets Blog.
  • “Patterson Atty Gained Secrets Through Ruse, Doc Says,” reports Law360. According to the article, the attorney approached a Pennsylvania physician to advise him and then extracted information from the inventor of surgical stapling technologies in order to give a client a leg up in licensing negotiations.
  • “Cease and Desist Letters Enjoy an Absolute Privilege from Libel Claims,” advises Kara Maciel for Epstein Becker’s Trade Secrets & Non-Compete Blog.
  • “MGA’s Trade Secrets Claim On Brink In Bratz Case,” reports Law360, as MGA fights upstream to revive its trade secrets claim.
  • “Restaurant Industry Giant Landry’s Sues Former Employee & Rival Restaurant Company,” advises Jonathan Pollard in the non-compete blog.
  • “Many U.S. Businesses in China Cite Data Theft,” reports Carlos Tejada for The Wall Street Journal’s Corruption Currents Blog. According to the survey, 26% of companies with a presence in China have had their trade secrets stolen and 40% see the risks rising.
  • “How New Trade Secret Legislation Impacts Pharma Compliance Programs,” reports Fish & Richardson’s Jose Sierra for the Pharmaceutical Compliance Monitor.
  • “Practice Tip: Don’t Call Your Liquidated Damages Clause a ‘Penalty In the Contract,” cautions Kenneth Vanko in his Legal Developments in Non-Competition Agreements Blog.
  • For the litigators: “Sanctions For Deleted Facebook Give Employers A Boost,” reports Law360. Epstein Becker has a post about the case as well.
Cybersecurity Posts and Articles:
  • In The Wall Street Journal’s “Weekend Interview” entitled, “Why China is Reading Your Email,” cyber expert Timothy Thomas believes the recent cyber attacks are part of a military strategy and that an offensive strategy may be needed.
  • “Cyberattacks Seem Meant to Destroy, Not Just Disrupt,” notes Nicole Petlroth for The New York Times Bits Blog.
  • “New Hacking Study Shows What Good Guys Are Up Against,” advises The Wall Street Journal’s Digits Blog.
Computer Fraud and Abuse Act Posts and Cases:
  • “Aaron Swartz’s Prosecutors Were Threatened and Hacked, DOJ Says,” reports David Kravets for Wired.
  • “Is the Computer Fraud and Abuse Act a Failed Experiment?” asks Brian Bialas in Foley & Hoag’s Massachusetts Noncompete Law Blog, in a rejoinder to Eric Goldman’s post on the CFAA last week.

Anheuser-Busch InBev’s lawsuit against a former operations director turned lawyer turned whistle blower illustrates many of the special challenges in a whistle blower trade secret case.  The former employee, James Clark, claims that AB InBev has watered down its beer and he has garnered generally favorable media treatment this week by filing a motion to dismiss the case against him under California’s whistle blower statute.  (Full disclosure:  I represented Anheuser-Busch in a litigation about 10 years ago).
 
According to Bloomberg, AB InBev sued Clark, a former director of operations support, one week after the company was accused of overstating the alcohol content in several of its beers. Clark worked at Anheuser-Busch from 1998 until June, when he resigned to become (gasp) a lawyer.  Clark held several quality-assurance positions before rising to director of operations support.

Consumers have filed at least eight lawsuits accusing AB InBev of adding water to beers including Bud Ice, Budweiser, Busch Ice and Michelob.  AB InBev asserts Clark has improperly divulged or misrepresented confidential information to the lawyers for those plaintiffs.  In February, Clark apparently refused AB InBev’s demand that he testify under oath about whether he had divulged any confidential information in connection with those lawsuits.

The Streisand Effect:  Clark has not hesitated to seize the bully pulpit.  In moving to dismiss the case because he believes California law bars using strategic lawsuits against public participation (SLAPP) as a means of intimidation, Clark argues that the lawsuit is intended to silence and punish him for standing up for consumers.  (PDF copies of the Complaint and Motion to Strike can be found below). 

AB InBev’s lawsuit did not generate much publicity when it was filed on March 1, 2013.  In contrast, Clark’s claims and motion have generated a fair amount of media coverage since their filing on March 29, 2013.  In this respect, AB InBev’s case, like many cases against self-styled whistle blowers, may have led to the dreaded Streisand Effect — that in attempting to fight unwanted or unfavorable publicity, a company ends up unintentionally creating even more media attention.

The Collision Between The First Amendment and Trade Secret Law:  I have written before about the special challenges of prosecuting a trade secrets case against the whistle blower.  There is a long tradition in our country generally supportive of whistle blowers.  Think Ida Tarbell and Standard Oil, Upton Sinclair and the meat packing industry, Ralph Nader and the Corvair, Daniel Ellsberg and the Pentagon Papers — the list goes on and on.  Courts are not immune to the romance of the narrative of the heroic employee trying to protect the public and reveal the alleged misdeeds of his former employer.

Not surprisingly, former employees making these claims can effectively cloak themselves within the protections of the First Amendment and federal courts in particular have been receptive to that defense, especially in areas of public health and safety.  While states such as California and Ohio may allow trade secret protection to trump First Amendment concerns in certain situations, federal courts have generally found that such efforts to squelch this speech qualify as a forbidden prior restraint.   (For more on this issue, see my earlier post on the Julius Baer v. WikiLeaks case).

The Takeaway:  Suing a whistle blower is always a high-wire act.  Unfavorable media attention and the thicket presented by the First Amendment are frequently a part of the fabric of these disputes.  A trade secret claimant needs to tread carefully and have a thick skin. 

I will continue to monitor the case and provide an update when the court rules on Clark’s Motion to Strike.

AB Complaint (2).pdf (720.10 kb)

Clark Motion to Dismiss.pdf (1.21 mb)

Kenneth Vanko, Russell Beck and I have just completed our fifth Fairly Competing Podcast, “The Lessons of Amazon.com v. Powers.” 

In this episode, we look at the recent non-compete case of Amazon.com v. Daniel Powers. In 2012, Powers was terminated from Amazon where he had previously headed its Web Services division, a unit of Amazon focused on cloud computing solutions for businesses. Powers later joined Google in a similar capacity. This podcast discusses the lawsuit that followed, the favorable result Powers and Google achieved, and the host of non-compete and trade secret issues that arose in this high-profile case.

The case is great template for non-compete and trade secret law, and we discuss the court’s view of the reasonableness of Powers’ contract with Amazon, tactical decisions made by the parties in litigating the case, and the steps taken by Google and Powers to wall off Amazon’s efforts at litigation. 

You can listen to the podcast by visiting the Fairly Competing website or clicking the link below. Or subscribe to the podcast on iTunes. We’d appreciate your feedback.

If you are looking for more on the decision, see our posts here, here and here.

Our next podcast will address practical steps when considering TROs or preliminary injunctions in a trade secret or non-compete dispute.

Listen to this episode

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well as one or two that I missed over the past couple of weeks: Trade Secret and Non-Compete Posts and Articles:
  • “Always be the good guy.” That is the title of an excellent post by Brian Bialas for Foley & Hoag’s Massachusetts Noncompete Law Blog that should serve as an important reminder to lawyers that in injunctive proceedings, which are so dependent on the exercise of equity, that your client (employer or employee) have the moral high ground.
  • “House Dems Push For China Trade Secret Theft Designation” reports Law360.  Congressmen Sander Levin ( D-Mich.) and Charles Rangel, (D-N.Y.) asked acting U.S.Trade Representative (USTR) Demetrios Marantis  to consider designating China as a “priority foreign country” under Section 182 of the Trade Act of 1974.  According to Law360, the law requires the USTR to identify countries that have inadequate protection of intellectual property rights, and those with the most egregious IP protection records can be targeted as priority. Once the USTR designates a priority foreign country, the trade agency is required under Section 301 of the act to complete an investigation, the results of which may lead to President Obama imposing import duties or taking other action. The Congressmen said that, “as evidence mounts” that the Chinese government is engaging in cybertheft, China may deserve the special designation.
  • Liu Sixing was sentenced to five years by a New Jersey federal judge for stealing defense trade secrets from L-3 Communications, reports the BBC. The trade secrets included information on U.S. missile, rocket and drone technology.
  • New blogger Erik Ostroff advises “Federal Circuit Addresses Uniform Trade Secrets Act Discovery Rule” in his Trade Secrets Law Blog.
  • “Worker stole trade secrets to ‘lure away’ clients, tobacco company says” reports Ken Bradley for the Knowledge Effect Blog for Thomson-Reuters.
  • “Enviros Can’t Make Wyo. Reveal Halliburton Fracking Formula” advises Law360.
  • For those in New York, Neal Dlausnera and David Fisher ask “Are Restrictive Covenants Enforceable Against Employees Terminated Without Cause? ‘Hyde’ indicates the answer may be yes.” In their fine article for The New York Journal, Neal and David consider the recent case of Hyde v. KLS, which may have eroded New York’s longstanding ban on non-competes against terminated employees. (For more on the Hyde case, see my post last year).
  • “Protecting Company Information When Employees Bail: California Alternatives to Employee Non-Compete Agreements” advise Robert Milligan and Jessica Mendelson for Seyfarth Shaw’s Trading Secrets Blog.
  • “Plaintiffs’ Attorneys, Rest Easy: Cease and Desist Letters Likely Aren’t Defamatory,” reports Kenneth Vanko in his Legal Developments in Non-Competition Agreements Blog.
  • “Litigating Theft of Trade Secrets before the International Trade Commission,” details Peter Toren.
  • “7 Steps to Enhance Post-Employment Restrictive Covenants,” reports Jeffrey Boxer for Corporate Counsel.
  • At last, something they can agree on: the latest on “Apple Inc. (AAPL), Samsung And Their Trade Secrets,” and their appeal to the Federal Circuit reports Michelle Jones for ValueWalk.
  • “The non-compete that didn’t happen,” advises Rob Radcliff for his Smooth Transitions Blog.
Cybersecurity Posts and Articles:
  • “New U.S. law says government agencies will need OK before buying Chinese IT equipment” reports Danielle Walker for SC Magazine.
  • “How to Avoid Getting Duped By A Hacker,” advises The Wall Street Journal’s Digits Technology Blog.
  • “The Question of ‘International Law of Cyberwar,” posits Stewart Baker for Steptoe’s Cyberblog.
Computer Fraud and Abuse Act Posts and Cases:
  • “The Computer Fraud and Abuse Statute is a Failed Experiment,” laments Eric Goldman in a guest post for Forbes.
  • “Another Court Construes the CFAA Narrowly and More of My Thoughts on the Statute,” ponders Kenneth Vanko in his Legal Developments in Non-Competition Agreements Blog. Ravindra Shaw provides her take on the same case out of New York, in her post for Jackson Lewis’ Non-Compete & Trade Secrets Report Blog.

Whether a former employee’s use of social media may violate a restrictive covenant remains a special area of concern for many employers.  Two recent cases suggest that courts will treat social media communications no differently than they would any other and will focus on the substance and manner of the communication and evaluate it using the agreement before them. 

In Invidia LLC v Difonzlo, 2012 WL 5576406 (Middlesex [Mass.] County Super. Court, Oct. 22, 2012), a Massachusetts court concluded that a former employee’s announcement on her Facebook page that that she was leaving to join a competitor did not amount to a violation of her non-competition and non-solicitation agreement with her former employer.

The stylist, Maren DiFonzo, worked at the Invidia salon for two years and had signed a non-competition covenant that had two-year and ten-mile restrictions.  When she resigned from Invidia, she immediately began working for a competitor less than two miles away and she posted information about her new position on her Facebook page.  Although Invidia said her departure precipitated an “unprecedented . . . wave of no-shows, cancellations or non responses,” the salon could not demonstrate that she was responsible.

After Invidia’s attorney threatened to sue both DiFonzo and the competitor, she was laid off.  In a conversation with the competitor’s owner, Invidia’s majority owner, Patzleiner, alleged that Invidia simply “intended to send a message” to its employees and “did not care” whether DiFonzo solicited Invidia’s customers.

In rejecting the employer’s request for an injunction, the Superior Court of Middlesex County sidestepped the issue of enforceability of the agreement and instead found that irreparable injury was lacking because Invidia had demonstrated its ability to calculate with reasonable certainty the monetary loss it would sustain for each client DiFonzo took.  The court also found no evidence that DiFonzo breached her confidentiality covenant or solicited any Invidia customers.  The court noted that a few customers had contacted her but “[s]o long as they reached out to [her] and not vice versa, there could be no violation of the non-solicitation provision.” 

In the second, more recent case, Pre-Paid Legal Service, Inc. v. Cahill, Case No. CIV-12-346-JHP (D. Okla., Jan. 21, 2013), an Oklahoma federal court refused to find that a post on a Facebook page amounted to a solicitation (although the court did find evidence of other improper solicitations and enforced the agreement in light of those violations).

Todd Cahill was a top salesman for Pre-Paid Legal.  Prior to leaving and joining Nerium, another multi-level marketing company that sold skin care products, Cahill met with one of his colleagues and solicited him to join him at Nerium.   Cahill then called a meeting of “Elite Leaders” (his team of high performing associates) to tell them he was leaving. Although he did not mention by name the name of his new employer, he told his colleagues that he had lost faith in Pre-Paid Legal and that anyone who was interested should email him.

After that meeting, he left Pre-Paid Legal. There was no evidence that Cahill misappropriated any confidential associate or account information, but he did post information about his new company on several semi-private Pre-Paid Legal Facebook pages (pages Cahill had created to mentor his associates at Pre-Paid Legal). He did not post further to these pages, but he had been posting information about Nerium on his personal Facebook page.

After Pre-Paid Legal sued Cahill for misappropriating its trade secrets and violations of his non-solicitation agreement, the Magistrate assigned to the case found that while Cahill had violated his non-solicitation agreement by approaching his colleagues, he had not solicited them through the use of the Facebook pages.  Relying on the Invidia LLC case above, the Magistrate found that the posts were less explicit in inviting colleagues to join him.

The Takeaway:  These decisions, taken together, are noteworthy because they illustrate that a court will apply the same principles for social media communications that it will apply for other types of communications.  An announcement on a Facebook post that merely informs readers of an employee’s new job is simply not the same as an active solicitation.  Expect more common sense decisions like this one that look at the substance of the communication in question.

Kenneth Vanko, Russell Beck and I have just completed our fourth Fairly Competing Podcast, “Mistakes Employers Make With Their Non-Compete Agreements.”

In this episode, we discuss discuss common errors companies make in drafting non-compete agreements and in enforcing covenants through litigation. Topics include the proper scope of non-compete agreements for various types of employees, damages, and poor decision-making under the pressures of emergency litigation.

You can listen to the podcast at the website here or by clicking the link below. Or subscribe to the podcast on iTunes. We’d appreciate your feedback.

Our next podcast will cover the recent Amazon v. Google non-compete case.

Listen to this episode

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well as one or two that I missed over the past couple of weeks: Trade Secret and Non-Compete Posts and Articles:
  • Does a law firm have to reveal its client’s non-compete to the client’s business partners? In “Texas Firm Beats Fraud Suit For Keeping Mum On Noncompete,” Law360 reports that the answer is “no.” The Texas Court of Appeals held that there was no duty to disclose the client’s non-compete by the law firm and its attorney when they negotiated legal documents with those third parties.
  • “Non-Compete Fight in the World of Surgical Robotics: MAKO Surgical Sues Competitor, Former Employee,” advises Jonathan Pollard for the non-compete blog.
  • “FBI arrests NASA contractor employee trying to flee to China,” reports The Washington Examiner.
  • “Stryker Exec Who Jumped Ship Must Hand Over Trade Secrets,” reports Law360.
  • “Protecting Trade Secrets with a Mobile Workforce and Telecommuters,” reports Cliff Atlas for Jackson & Lewis’ Non-Compete & Trade Secrets Report.
  • Even The Economist is writing about the importance of trade secrets, asking, “Can you keep a secret? To patent an idea, you must publish it. Many firms prefer secrecy.”
  • “Mediating Non-Competes in the Medical Device Industry,” explains Michael Greco for Fisher & Phillips’ Non-Compete and Trade Secrets Blog.
  • Will the ability to preserve an invention as a trade secret lead patentholders to withhold the best mode of that invention in their patent applications? In “Patent law’s ‘best mode’ requirement a conundrum for attorneys,” Erin Geiger Smith warns that could be the case for Bloomberg.
  • “5 ways in-house lawyers can support innovation at their companies: Inside counsel have a duty to help drive innovation to success, within the limits of existing law and policy,” advises Eric Esperne in Inside Counsel.
  • Want to enforce a non-compete against a Chinese employee? You need to read, “China Employee Non-Competes. Do Not Try This At Home,” by Dan Harris for his China Law Blog.
Cybersecurity Posts and Articles:
  • “After a Data Breach, Do You Need an Investigator or a Lawyer?” asks Catherine Dunn for Corporate Counsel.
  • “Take Chinese Hacking to the WTO,” urges James P. Farwell for The National Interest.
  • “Infographic: How Criminals Guess Your PIN,” warns Gina Smith for Tech Page One.
Computer Fraud and Abuse Act Posts and Cases:
  • “U.S. v. Nosal: Back In the District Court, the Defendant Isn’t as Fortunate,” reports Kenneth Vanko in his Legal Developments in Non-Competition Agreements Blog.
  • “The Split in the Circuit Courts Over the Proper Interpretation of the Computer Fraud and Abuse Act Actually Goes Three Ways,” updates Brian Bialas for Foley & Hoag’s Massachusetts Noncompete Law Blog.
  • Is journalist Matthew Keys the latest Aaron Swartz? asks Garance Burke in his article for The Huffington Post entitled, “Matthew Keys’ LA Times Hack: Security Breach Or Harmless Prank?”
  • And in another high profile CFAA prosecution, Orin Kerr writes, “United States v. Auernheimer, and Why I Am Representing Auernheimer Pro Bono on Appeal Before the Third Circuit,” for The Volokh Conspiracy.

In an interesting trade secret case out of New York Supreme Court, Airvana Network Solutions Inc, a Massachusetts broadband network company, has won a preliminary injunction against Ericsson in a trade secrets lawsuit that seeks more than $330 million from the Swedish telecommunications network equipment maker.  On Tuesday, Manhattan State Supreme Court Judge Barbara Kapnick enjoined Ericsson from using certain hardware based on Airvana’s design unless it secures a software license from Airvana.  (A PDF of the opinion can be found below and Law360 has reported on the case fairly extensively).
 
Airvana, founded in 2000 by former Motorola executives, had supplied Ericsson and predecessor Nortel Networks Inc. with hardware and software used to run large wireless data networks.  Under the terms of its agreement with Nortel, Airvana gave Nortel responsibility over the hardware, so long as Nortel used Airvana’s software and paid royalties on any hardware that might be built based on Airvana’s designs.  Ericsson acquired much of Nortel’s wireless equipment business in North America through Nortel’s bankruptcy in 2009, including Nortel’s obligations under the agreement with Airvana
 
In June 2010, Ericsson began working with a joint venture partner, LG Electronics, to develop software that would run on Ericsson’s version of the hardware.  Several months later, Ericsson told Airvana that it no longer needed Airvana’s software because it was developing an alternative solution that would not be based on Airvana’s hardware designs.
 
Airvana alleged that the hardware developed by both Nortel and Ericsson was based on design documents Airvana had transferred as part of their agreement and that the hardware misappropriated the trade secrets of Airvana.

Overcoming Obstacles to Irreparable Injury:  Most of Judge Kapnick’s opinion addresses the parties’ varying interpretations of the agreement and whether Ericsonn’s software was based on the design of the Airvana software, but her analysis of irreparable injury is the most significant part of the opinion.  As those in New York know, proving irreparable injury in the context of a license agreement is very difficult because of New York’s embrace of the Second Circuit’s flawed opinion in Faiveley Transport Malmo AB v. Wabtec Corporation, 559 F.3d 110 (2d Cir. 2009).   As readers of this blog may remember, Faiveley essentially held that a former licensee could misappropriate trade secrets so long as it did not disclose them, a ruling that has been inexplicably followed by New York courts.

It appears that Airvana was able to avoid the deadly embrace of Faiveley by arguing that it would go out of business in the absence of injunctive relief ordering payment of royalties by Ericsson.  Of course, the loss of a plaintiff’s enterprise is the quintessential example of irreparable injury, since a monetary judgment has little or no value to a company that has been forced out of business.   However, proving irreparable injury still can be difficult since license disputes by their nature have readily calculable damages by virtue of their previous royalty stream.

The Takeaway:  Never underestimate the power of the “going out of business” claim, even in a licensing dispute.  Ericsson attempted to argue that Airvana’s financial predicament was largely of its own “irresponsible” over-leveraging, an argument that seems to have fallen flat.  Surprisingly, it does not appear, at least from the opinion, that Ericsonn argued that the damages were readily calculable by virtue of the $330 million demand in the complaint.

Airvana v. Ericsonn.pdf (1.68 mb)

Here are the noteworthy trade secret, non-compete and cybersecurity stories from the past week, as well as one or two that I missed over the past couple of weeks: Trade Secret and Non-Compete Posts and Articles:
  • Add Illinois to the list of states considering legislation over their non-compete laws, as Kenneth Vanko advises in “A Brief Commentary on Illinois’ Proposed Noncompete Agreement Act” in his Legal Developments in Non-Competition Agreements Blog. Ken reports that, unlike the legislation in Minnesota, Michigan and Massachusetts which seeks to scale back or limit non-competes, the proposed legislation would tend to benefit employers.
  • “Schwab Says Ex-Advisers Diverted $47M In Accounts To Rival,” reports Law360.  Epstein Becker’s Peter Altieri has a post about the dispute as well.
  • “DuPont Trade-Secret Prosecutors Add Charges Against Liew,” reports Bloomberg.
  • “Recent Non-Compete Case Highlights Pennsylvania’s ‘Worthless Employee Doctrine’ advises Jonathan Pollard for the non-compete blog. This poorly-named doctrine holds that an employer cannot enforce a non-compete against an employee that it just terminated for poor performance.
  • The Unintellectual Property Blog has a post about a recent software trade secret dispute in Delaware against Cisco. In ExpertUniverse v. Cisco, the court applied the California Uniform Trade Secret Act and dismissed ExpertUniverse’s claims because it failed to adequately describe its trade secrets and demonstrate misappropriation.
  • “Want to avoid a prosecution under the Economic Espionage Act? You might want to consult “Economic Espionage Act: Seven Tips to Close a Fast-Growing Compliance Gap” by Lauren M. Papenhausen and Benjamin Franklin of McDermott, Will & Emery, LLP for Bloomberg Law.
  • Looking for a primer on forensic computer examinations?  Then check out “Nuts and Bolts for Terms Commonly Used in Trade Secret Computer Forensic Investigations” by Jonathan Karchmer for Seyfarth Shaw’s Trading Secrets Blog.
  • “It takes a village to protect trade secrets,” advises Naomi Fine of Pro-Tech for Forbes.
  • “Protecting Your Closely Held Business,” recommends Peter Vilmos for Burr & Forman’s Trade Secrets Non-Compete Blog.
  • In “Trade Secrets for Sale,” Douglas Alexander proposes a robust and aggressive trade secret protection program for EBN.
  • In “A Little-Publicized Change in Patent Law on Secret Prior Art,” Paul F. Prestia details changes in the America Invents Act that may permit an inventor to preserve an invention as a trade secret indefinitely for Corporate Counsel.  For more on this issue of the newly revised section §102(a)(1), see my post last fall.
Cybersecurity Posts and Articles:
  • Lots of articles on the Obama Administration upping its calls for China to address the reported cybersecurity attacks.  The New York Times is reporting that “Cyberattacks Prominent in Obama Call With New Chinese President.” Also check out “U.S. Demands That China End Hacking and Set Cyber Rules,” also by The Times, and “Obama Aide Demands China Stop Hacking” by The Wall Street Journal.  The Journal also had an op-ed piece this week by John Wohlsetter entitled “Chinese ‘Hackers’ Is a Misnomer. They’re Spies.”  Finally, Todd Sullivan provides his thoughts and takes the Administration to task for taking so long to single out China.
  • “How to avoid being hacked: Strong passwords and other security tips” recommends Anick Jasdenun for SiliconValley.com
Computer Fraud and Abuse Act Posts and Cases:
  • Looking for an update of recent CFAA cases? Then check out Shaw E. Tuma’s excellent summary here.
  • “When leaving your job, make sure you do this if you really want to violate the Computer Fraud and Abuse Act!”, another fine post by Shawn Tuma.

Kenneth Vanko, Russell Beck and I have just completed our third Fairly Competing Podcast, “The 2013 Legislative Update.” 
 
In this episode, we discuss pending legislative proposals to regulate non-compete and trade secrets law in Massachusetts, Minnesota, Michigan, and Texas. We offer our thoughts on the policy behind the bills and the relative chances each will become law.

You can listen to the podcast by visiting the Fairly Competing website or clicking the link below. Or subscribe to the podcast on iTunes. We’d appreciate your feedback.

Our next podcast will discuss common mistakes that employers make in connection with their covenants not to compete.

Listen to this episode