Prior to private practice Nick served as a federal prosecutor. He was an Assistant United States Attorney in the Southern District of New York, where he prosecuted a wide array of white collar criminal matters, including bank frauds, bankruptcy frauds, stock frauds, complex financial frauds, environmental and tax crimes. Nick was also an Assistant Special Watergate Prosecutor with the Watergate Special Prosecution Force under Archibald Cox and Leon Jaworski.Nick has over 30 years of experience in helping clients respond to government investigations and prosecutions and assisting corporate clients prevent and respond to internal thefts and outside hackers. He is a nationally recognized expert on computer crime and the protection of competitively sensitive information and computer data. Nick regularly obtains injunctions for his clients under the federal Computer Fraud and Abuse Act in various federal courts around the country requiring computer thieves to return stolen computer data and prohibiting the dissemination of the data to competitors. He also guides clients in developing systems, policies and protocols to protect computer data.Nick speaks and writes regularly on protecting computer data, including in his regular computer data column for the National Law Journal. He has been a featured quoted expert on computer fraud and computer security issues in the New York Times, USA Today, the San Jose Mercury News, the Boston Globe, the St. Louis Dispatch, the Sacramento Bee, Forbes, ComputerWorld, CFO Magazine, CNET, CNET Japan, ZDNet, MSN, Internet Week and the Weekly Homeland Security Newsletter. His blog can be found at http://computerfraud.us.
You may not, as reflected in the recently reported decision of Eagle v. Morgan, 2011 WL 6739448 (E.D. Pa. December 22, 2011) where both the employee and her former employer claim ownership in the employee’s LinkedIn account, the popular social networking site for business professionals. The dispute is starkly drawn in the litigation’s opposing pleadings and provides a strong warning to the hundred million plus LinkedIn users and other users of social media who operate under the assumption that their social media accounts belong solely to them to transfer as they please when they change jobs. Answer→
When Workers Steal Data to Use at New Jobs Despite some negative case law, the Computer Fraud and Abuse Act is an effective tool for employers.
In response to the economic crisis, companies have downsized, resulting in some terminated employees stealing vital data to improve their job opportunities with a new employer. In addition to traditional state remedies such as misappropriation of trade secrets, employers have been “increasingly taking advantage of…[the federal Computer Fraud and Abuse Act’s] civil remedies to sue former employees and their new companies who seek a competitive edge through wrongful use of information from the former employer’s computer system.” Pacific Aerospace & Electronics Inc. v. Taylor, 295 F. Supp. 2d 1188, 1196 (E.D. Wash. 2003). Answer→
Dorsey is a business law firm with more than 550 attorneys across the United States, Canada, Europe and Asia. Our lawyers regularly handle every sort of employment matter, litigated and non-litigated. We have extensive, successful trial experience (including class and collective actions), as well as an outstanding record for obtaining summary judgments. Dorsey also has broad experience in advising, counseling, compliance and development, policy handbook review, training and other measures that can greatly reduce the likelihood of litigation or governmental enforcement actions.