Departing employees sometimes access workplace computer systems to obtain information for purposes of using it in competition with their employer. Employers should exercise caution when undertaking such investigations to ensure they do not violate the Electronic Communications Privacy Act or the Stored Communications Act.
Protecting a company's non-compete and trade secret interests can be a daunting task. There are so many things to consider. Here's a list of ten things to keep in mind and some resources to help you take action.
The criminal prosecution recently began of Sergey Aleynikov, a former Goldman Sachs computer programmer accused of stealing the computer code underlying Goldman’s high-frequency trading programs. When Aleynikov was taken into custody by the FBI, he reportedly said he did not intend to take any proprietary code. Rather, he intended to take only open source code. What’s the difference and what indispensible lesson should companies take away?