Eric Holder

The Eric Holder Fast and Furious Surveilance of the Press Case

The lead Plaintiff was an investigative reporter who sued Eric Holder, acting as the Attorney General of the United States.  In the case, the Plaintiffs claimed that the Department of Justice and the U.S. Postal Service violated their constitutional rights…

VRCompliance LLC v. Homeaway, Inc., 715 F.3d 570 (4th Cir., 2013)

Sometimes Courts spend more time deciding whether to hear a case than actually hearing it.  When multiple jurisdictions are involved, it may get more comical.  Why would litigants allow such a “waste” of attorney’s fees?  Forum shopping for the State…

Othentec Ltd. v. Phelan, 526 F.3d 135 (4th Cir., 2008)

If a court refers to a case alleging violations of the Computer Fraud and Abuse Act and the VCCA as “no evidence outside of selfserving speculation” and adds that “there simply isn’t any evidence here to go forward with the unauthorized use…

United States v. Steele (4th Cir., 2014)

So, what happens when an employee  spends nine months secretly logging in to the email server of his former employer (without permission, obviously), gaining access to confidential and proprietary information related to its government contract bids.  Yes, criminal conviction under…

Tech Sys., Inc. v. Pyles (4th Cir., 2015)

The Computer Fraud and Abuse Act is a criminal statute that also provides a civil remedy.  In cases where employees abuse an employer’s computer systems, there may be a case of action for breach-of-fiduciary-duty. – Domingo Rivera TECH SYSTEMS, INC.,…

United States v. Rich (4th Cir., 2015)

Accused of violating the Computer Fraud and Abuse Act and enter into a plea agreement…. then figure out that perhaps access was not unauthorized because an accused co-conspirator had a password and arguably “authorized access”… Too late! – Domingo Rivera…

WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199 (4th Cir., 2012)

The CFAA prohibits “unauthorized access” to computer systems.  What is unauthorized access has been subject to many interpretations.  The Fourth Circuit adopts a narrow reading of the terms “without authorization” and “exceeds authorized access” and has held that they apply only…