While companies are often focused on outsider risks such as breach of their systems through a stolen laptop or hacking, often the biggest risk is from insiders themselves. Such problems of access management with existing employees, independent contractors and other persons are as much a threat to proprietary information as threats from outside sources.

In

Computer programs are protected under the U.S. Copyright Act. The owner of the copyright holds the right to exclude others from copying their software, making works derivative of it, and from distributing or using it.

To prove a claim of copyright infringement a plaintiff must demonstrate:

– Ownership of a valid copyright;

– Copying the

An issue that often arises is an employee, upon terminating his or her employment, attempting to solicit his former employer’s customers. An employee can plan to go into competition with his employer and may even take active steps to do so while still employed. However, an employee may not use his employer’s confidential information to

no_copyright.pngIt is no secret that U.S. Copyright law prohibits copying a copyrighted work such as a movie, tv show or music album without the permission of the owner of the copyright. Recently a number of lawsuits have targeted users who have downloaded copyrighted works via torrents.

How is a person identified as having illegally downloaded