Home > RIPL > Vol. 8 > Iss. 1 (2008)
UIC Review of Intellectual Property Law
Citations to This Work
- Jonathan Mayer, Cybercrime Litigation, 164 U. Pa. L. Rev. 1453 (2016)
- Lisa Andrukonis, Stephen Damato & Robert Wilson, Intellectual Property Crimes, 53 Am. Crim. L. Rev. 1459 (2016)
- Jenna M. Andrews, An Inside Job: The Intersection of Federal Computer Law and Trade Secret Law in Cases of Insider Misappropriation, 18 J. High Tech. L. 161 (2017)
- Kevin Ryan, Destiny Howell, Melissa Keech, Yushan Luo, Brian Sperry, Brittany & Yantis, Intellectual Property Crimes, 54 Am. Crim. L. Rev. 1509 (2017)
Abstract
Federal jurisdictions are split on the reach of the Computer Fraud and Abuse Act (“CFAA”) in situations where computer-stored trade secrets are stolen by former employees who possessed authorization to access and use the trade secret information. This comment explores both the broad and narrow interpretations of the CFAA. It proposes that courts adopt the broad interpretation, which includes principles of agency law, in order to determine when an employee is “without authorization” under the CFAA. Courts should also adopt the broad interpretation in situations where trade secrets are stolen because an employee is only granted a “limited license” to use and access a trade secret, which defines the parameters of the employee’s authorization. This comment also identifies three different perspectives regarding the inclusion of trade secret misappropriation within the CFAA definition of “damage.” Ultimately, trade secret misappropriation should be included within the statutory definition of “damage” because the secrecy of trade secret information, and its “integrity,” is impaired with every disclosure.
Recommended Citation
Graham M. Liccardi, The Computer Fraud and Abuse Act: A Vehicle for Litigating Trade Secrets in Federal Court, 8 J. Marshall Rev. Intell. Prop. L. 155 (2008)