Tuesday, February 22, 2011

Traverse Internet Law Federal Court Report: February 2011 - Hacking Lawsuits

The facts are unproven allegations of the Plaintiff and all commentary is based upon the allegations, the truthfulness and accuracy of which are likely in dispute.


YARDI SYSTEMS, INC. v. REALPAGE, INC. and DC CONSULTING, INC.
CENTRAL DISTRICT OF CALIFORNIA (LOS ANGELES)
2:11-CV-00690
FILED: 1/24/2011

If you are going to hire employees from a competitor make sure you conduct appropriate due diligence, make sure that they understand that no trade secret information or passwords of any kind can be brought with them to their new job, and have them sign a contract promising that they are not bringing with them any trade secret, confidential or proprietary information. It is also important that you find out if they have signed a non-disclosure or confidentiality agreement with their previous employer so you can assess the risk. And remember, using passwords acquired during a previous employment to now compete against a business is most likely going to be considered “hacking”.

Yardi and the Defendants compete in the sale of property management software and related services. RealPage acquired a consulting group, today known as “DC Consulting, Inc.”, which was a consulting company providing technology and software support services almost exclusively for Plaintiff’s users. Defendants have allegedly continued to access the Plaintiff’s “client central” software using stolen credentials acquired by the consulting company when it was providing services to Plaintiff’s clients.

Plaintiff alleges violation of the Federal Computer Fraud and Abuse Act, violation of the Comprehensive Computer Data Access and Fraud Act, violation of the Digital Millennium Copyright Act, copyright infringement, trade secret misappropriation, and unfair competition. The prayer for relief includes requests for preliminary and permanent injunctive relief, actual damages, statutory damages, punitive damages, prejudgment interest, and attorneys’ fees and costs. Traverse Internet Law Cross-Reference Number 1468.

Wednesday, February 2, 2011

Traverse Internet Law Federal Court Report: November 2010 - Hacking Lawsuits


The facts are unproven allegations of the Plaintiff and all commentary is based upon the allegations, the truthfulness and accuracy of which are likely in dispute.


VITAL SOUNDS, INC. and THERAPEUTIC RESOURCES, INC. v. VISION AUDIO, INC. and WILLIAM P. MUELLER
WESTERN DSITRICT OF WISCONSIN (MADISON)
3:10-CV-00602
FILED: 10/13/2010

If you are buying email lists make sure that you understand the source of the email addresses. While CAN-SPAM does not require “opt-in” addresses, it is certainly advisable to conduct some reasonable degree of due diligence so that you are not purchasing a stolen email list.

Vital Sounds is in the business of selling audio CDs, headphones, books and other tools to teachers, therapists, and families for use in providing counseling and rehabilitative services. The Defendant is alleged to have sent emails selling audio CDs to the Plaintiffs’ confidential and proprietary mailing list. The Defendant is alleged to have hacked into Plaintiffs’ computers to obtain the list.

Plaintiff alleges trademark infringement, fraud in connection with computers, offense against computer data under Wisconsin law, and misappropriation of trade secrets. The lawsuit requests preliminary and permanent injunctive relief as well as actual damages, compensatory damages, pre-judgment and post-judgment interest, and attorneys’ fees and costs. Traverse Internet Law Cross-Reference Number 1453.