SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
© 2013 Armstrong Teasdale LLP
Trade Secrets and Computer Tampering:
           The Convergence of Two Ways to Protect Important
           Company Assets and Information

           Presented by:
           Michael B. Kass




© 2013 Armstrong Teasdale LLP
The ways employees can steal from you . . .

                                INTRODUCTION




© 2013 Armstrong Teasdale LLP
What is computer tampering?
  Sophisticated espionage not needed.
         • Ease of copying/transferring large amounts of data more
             common among departing employees.
                 − Email, thumb-drives, hand-held devices, laptops . . .
         • Computer tampering statutes may make a lot that type of
           activity unlawful.
         • You may be able to protect your information as trade secrets
         • But . . . depends upon your policies and procedures.
                 − These laws are important whether or not your company
                   restricts employees with non-compete agreements.



© 2013 Armstrong Teasdale LLP
Why is this important to me?

  Encourages steps to prevent theft in the first place and adds
     to your “menu” of potential weapons to use in your fight
     against the bad-acting departing employee.




© 2013 Armstrong Teasdale LLP
Why is this important to me?




© 2013 Armstrong Teasdale LLP
The Laws

  Computer Fraud and Abuse Act


  Missouri Computer Tampering Act


  Uniform Trade Secrets Act




© 2013 Armstrong Teasdale LLP
Computer Fraud and Abuse Act (“CFAA”)
 18 U.S.C. § 1030
  Conduct prohibited by CFAA
         • Statute not “elegantly” drafted
         • Most commonly relevant provision prohibits: Intentionally accessing a
           computer without authorization or by exceeding authorized access and
           thereby obtaining information from a protected computer.
         • Knowingly causing the transmission of a program, information, code or
           command, and in doing so intentionally causing damages to a protected
           computer.
         • Requirement for Civil Action: Economic damages > $5,000
                 − May include cost of forensic investigation (depending on jurisdiction)


         • Key Issue: When does an employee “exceed authorized access”?




© 2013 Armstrong Teasdale LLP
Missouri Computer Tampering Act

  Tampering with Computer Data (§ 569.095 RSMo.)
  Tampering with Computer Equipment (§ 569.097 RSMo.)
  Tampering with Computer Users (§ 569.099 RSMo.)
  It’s “tampering” if done either:
         • Knowingly (i.e. knowing it is unauthorized); or
         • Without reasonable grounds to believe one has authorization
         • (Slightly broader than CFAA “authorization” requirement)




© 2013 Armstrong Teasdale LLP
Remedies

  CFAA – Economic Loss, plus attorneys’ fees
  MCTA – Costs associated with uncovering the breach and
     fixing any damage done to CPU systems, plus attorneys’ fees.




© 2013 Armstrong Teasdale LLP
Trade secrets defined*
  Information, data, technique, etc. that:
         • Derives independent economic value, actual or potential,
           from not being generally known to, and not being readily
           ascertainable by proper means by other persons who can
           obtain economic value from its disclosure or use
         • Reasonable efforts under the circumstances are taken to
           maintain its secrecy

                                           *Source: Missouri Statute (RSMo. § 417.453(4))




© 2013 Armstrong Teasdale LLP
Trade secrets defined*
  Factors used to determine if information is a trade secret
         • Extent to which the information is known outside the business
         • Extent to which it is known by employees and others involved in that
             business
         •   Extent of measures taken to guard the secrecy of the information
         •   Value of information to the one claiming the trade secret and its
             competitors
         •   Amount of effort and/or money expended in developing that information
         •   Ease or difficulty with which the information could be acquired or
             duplicated by others

                                *Source: Baxter International, Inc. v. Morris, 976 F.2d 1189, 1194 (8th Cir. 1992)




© 2013 Armstrong Teasdale LLP
Convergence of computer tampering and
 trade secret protection
  Steps to prevent data theft before it happens
  Steps to help establish liability in the event of a breach




© 2013 Armstrong Teasdale LLP
Convergence of computer tampering and
 trade secret protection
  Safeguard your computer systems and electronic files.
  Password access only
         • Additional password access for most sensitive documents for
       those who need to know
  Computer and email usage policies
     • Be clear about extent of “authorization”
                 − Employee access to files on system for authorized business
                   purposes only
                 − Not for employee’s personal benefit



© 2013 Armstrong Teasdale LLP
Convergence of computer tampering and
 trade secret protection
  Confidentiality policies and agreements
         • Policy
                – Employee acknowledgement of receipt
                – Periodic reminders.
         • Policies and agreements
                – general language
                – specific language referencing greatest concerns
  Mark confidential documents “CONFIDENTIAL”
  Secure “confidential” documents (e.g., locked file cabinet)




© 2013 Armstrong Teasdale LLP
Side Bar: You should be “atwitter” about your
 confidential information losing its trade secret status
 on social media sites.
  Use of Twitter and LinkedIn by your employees
         • Restrictions on information they can post?
             − Visiting “ABC Customer about XYZ today . . .”?
  Who does your employee “follow” and with whom is she
   “Linked”?
     • Veritable customer list?
     • De-Linking
  Consider addressing in policies and agreements.




© 2013 Armstrong Teasdale LLP
Closing comments
  Simultaneously prevent theft while bolstering your ability to stop a
     bad-acting employee from harming you.

         • Protect your electronic and confidential documents and
             information with clear policies and agreements.

                 − Computer usage
                 − Email usage
                 − Confidential information

  See departing employee checklist




© 2013 Armstrong Teasdale LLP
Questions
                                      Michael B. Kass
                                mkass@armstrongteasdale.com
                                       314.552.6673




© 2013 Armstrong Teasdale LLP

Más contenido relacionado

La actualidad más candente

Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
Mitigate Against Potential Litigation Threats with Effective Contract Managem...
Mitigate Against Potential Litigation Threats with Effective Contract Managem...Mitigate Against Potential Litigation Threats with Effective Contract Managem...
Mitigate Against Potential Litigation Threats with Effective Contract Managem...sealsoftwaredept
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy PresentationSarah Cortes
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...ARMA International
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Armstrong Teasdale
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality KelbySchwender
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
Information security in public governance
Information security in public governanceInformation security in public governance
Information security in public governanceTemitayo Oladiran
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOAtlantic Training, LLC.
 

La actualidad más candente (20)

Data security
Data securityData security
Data security
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Mitigate Against Potential Litigation Threats with Effective Contract Managem...
Mitigate Against Potential Litigation Threats with Effective Contract Managem...Mitigate Against Potential Litigation Threats with Effective Contract Managem...
Mitigate Against Potential Litigation Threats with Effective Contract Managem...
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy Presentation
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
Information security in public governance
Information security in public governanceInformation security in public governance
Information security in public governance
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 

Similar a Trade Secrets and Computer Tampering

Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Tony Richardson CISSP
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxMeleniaCabatan3
 
Importance of Data Security for Business
Importance of Data Security for BusinessImportance of Data Security for Business
Importance of Data Security for Businessqsstechnosoft1
 
Importance of Data Security for Business
Importance of Data Security for BusinessImportance of Data Security for Business
Importance of Data Security for Businessqsstechnosoft1
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
An insight into information security.pptx
An insight into information security.pptxAn insight into information security.pptx
An insight into information security.pptxSecurityium
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
BA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBealCollegeOnline
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The PhysicsJason Chapman
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 

Similar a Trade Secrets and Computer Tampering (20)

IT Policy
IT PolicyIT Policy
IT Policy
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
The Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptxThe Confidentiality in the Workplace.pptx
The Confidentiality in the Workplace.pptx
 
Importance of Data Security for Business
Importance of Data Security for BusinessImportance of Data Security for Business
Importance of Data Security for Business
 
Importance of Data Security for Business
Importance of Data Security for BusinessImportance of Data Security for Business
Importance of Data Security for Business
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
An insight into information security.pptx
An insight into information security.pptxAn insight into information security.pptx
An insight into information security.pptx
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
BA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_pptBA350 Katz esb 6e_chap016_ppt
BA350 Katz esb 6e_chap016_ppt
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 

Más de Armstrong Teasdale

How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerHow to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerArmstrong Teasdale
 
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonDon't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonArmstrong Teasdale
 
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale
 
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale
 
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Armstrong Teasdale
 
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Armstrong Teasdale
 
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyMultijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyArmstrong Teasdale
 
BUCKLE UP! How the NLRB is Changing the Rules of the Road
BUCKLE UP!  How the NLRB is Changing the Rules of the RoadBUCKLE UP!  How the NLRB is Changing the Rules of the Road
BUCKLE UP! How the NLRB is Changing the Rules of the RoadArmstrong Teasdale
 
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentChina 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentArmstrong Teasdale
 
Employment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityEmployment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityArmstrong Teasdale
 
Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Armstrong Teasdale
 
Employment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisEmployment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisArmstrong Teasdale
 
2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas CityArmstrong Teasdale
 
2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. LouisArmstrong Teasdale
 
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F..."The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...Armstrong Teasdale
 
Fundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesFundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesArmstrong Teasdale
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Armstrong Teasdale
 
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersSuper Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersArmstrong Teasdale
 
How to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessHow to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessArmstrong Teasdale
 

Más de Armstrong Teasdale (20)

How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerHow to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
 
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonDon't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
 
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
 
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
 
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
 
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
 
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyMultijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
 
BUCKLE UP! How the NLRB is Changing the Rules of the Road
BUCKLE UP!  How the NLRB is Changing the Rules of the RoadBUCKLE UP!  How the NLRB is Changing the Rules of the Road
BUCKLE UP! How the NLRB is Changing the Rules of the Road
 
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentChina 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
 
Employment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityEmployment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas City
 
Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web
 
Employment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisEmployment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. Louis
 
2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City
 
2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis
 
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F..."The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
 
Fundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesFundamental Intellectual Property Strategies
Fundamental Intellectual Property Strategies
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
 
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersSuper Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
 
How to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessHow to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance Process
 

Último

Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 

Último (20)

Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 

Trade Secrets and Computer Tampering

  • 1. © 2013 Armstrong Teasdale LLP
  • 2. Trade Secrets and Computer Tampering: The Convergence of Two Ways to Protect Important Company Assets and Information Presented by: Michael B. Kass © 2013 Armstrong Teasdale LLP
  • 3. The ways employees can steal from you . . . INTRODUCTION © 2013 Armstrong Teasdale LLP
  • 4. What is computer tampering?  Sophisticated espionage not needed. • Ease of copying/transferring large amounts of data more common among departing employees. − Email, thumb-drives, hand-held devices, laptops . . . • Computer tampering statutes may make a lot that type of activity unlawful. • You may be able to protect your information as trade secrets • But . . . depends upon your policies and procedures. − These laws are important whether or not your company restricts employees with non-compete agreements. © 2013 Armstrong Teasdale LLP
  • 5. Why is this important to me?  Encourages steps to prevent theft in the first place and adds to your “menu” of potential weapons to use in your fight against the bad-acting departing employee. © 2013 Armstrong Teasdale LLP
  • 6. Why is this important to me? © 2013 Armstrong Teasdale LLP
  • 7. The Laws  Computer Fraud and Abuse Act  Missouri Computer Tampering Act  Uniform Trade Secrets Act © 2013 Armstrong Teasdale LLP
  • 8. Computer Fraud and Abuse Act (“CFAA”) 18 U.S.C. § 1030  Conduct prohibited by CFAA • Statute not “elegantly” drafted • Most commonly relevant provision prohibits: Intentionally accessing a computer without authorization or by exceeding authorized access and thereby obtaining information from a protected computer. • Knowingly causing the transmission of a program, information, code or command, and in doing so intentionally causing damages to a protected computer. • Requirement for Civil Action: Economic damages > $5,000 − May include cost of forensic investigation (depending on jurisdiction) • Key Issue: When does an employee “exceed authorized access”? © 2013 Armstrong Teasdale LLP
  • 9. Missouri Computer Tampering Act  Tampering with Computer Data (§ 569.095 RSMo.)  Tampering with Computer Equipment (§ 569.097 RSMo.)  Tampering with Computer Users (§ 569.099 RSMo.)  It’s “tampering” if done either: • Knowingly (i.e. knowing it is unauthorized); or • Without reasonable grounds to believe one has authorization • (Slightly broader than CFAA “authorization” requirement) © 2013 Armstrong Teasdale LLP
  • 10. Remedies  CFAA – Economic Loss, plus attorneys’ fees  MCTA – Costs associated with uncovering the breach and fixing any damage done to CPU systems, plus attorneys’ fees. © 2013 Armstrong Teasdale LLP
  • 11. Trade secrets defined*  Information, data, technique, etc. that: • Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by other persons who can obtain economic value from its disclosure or use • Reasonable efforts under the circumstances are taken to maintain its secrecy *Source: Missouri Statute (RSMo. § 417.453(4)) © 2013 Armstrong Teasdale LLP
  • 12. Trade secrets defined*  Factors used to determine if information is a trade secret • Extent to which the information is known outside the business • Extent to which it is known by employees and others involved in that business • Extent of measures taken to guard the secrecy of the information • Value of information to the one claiming the trade secret and its competitors • Amount of effort and/or money expended in developing that information • Ease or difficulty with which the information could be acquired or duplicated by others *Source: Baxter International, Inc. v. Morris, 976 F.2d 1189, 1194 (8th Cir. 1992) © 2013 Armstrong Teasdale LLP
  • 13. Convergence of computer tampering and trade secret protection  Steps to prevent data theft before it happens  Steps to help establish liability in the event of a breach © 2013 Armstrong Teasdale LLP
  • 14. Convergence of computer tampering and trade secret protection  Safeguard your computer systems and electronic files.  Password access only • Additional password access for most sensitive documents for those who need to know  Computer and email usage policies • Be clear about extent of “authorization” − Employee access to files on system for authorized business purposes only − Not for employee’s personal benefit © 2013 Armstrong Teasdale LLP
  • 15. Convergence of computer tampering and trade secret protection  Confidentiality policies and agreements • Policy – Employee acknowledgement of receipt – Periodic reminders. • Policies and agreements – general language – specific language referencing greatest concerns  Mark confidential documents “CONFIDENTIAL”  Secure “confidential” documents (e.g., locked file cabinet) © 2013 Armstrong Teasdale LLP
  • 16. Side Bar: You should be “atwitter” about your confidential information losing its trade secret status on social media sites.  Use of Twitter and LinkedIn by your employees • Restrictions on information they can post? − Visiting “ABC Customer about XYZ today . . .”?  Who does your employee “follow” and with whom is she “Linked”? • Veritable customer list? • De-Linking  Consider addressing in policies and agreements. © 2013 Armstrong Teasdale LLP
  • 17. Closing comments  Simultaneously prevent theft while bolstering your ability to stop a bad-acting employee from harming you. • Protect your electronic and confidential documents and information with clear policies and agreements. − Computer usage − Email usage − Confidential information  See departing employee checklist © 2013 Armstrong Teasdale LLP
  • 18. Questions Michael B. Kass mkass@armstrongteasdale.com 314.552.6673 © 2013 Armstrong Teasdale LLP