Delaware has an interesting section in its "Labor Code", 19 Delaware Statutes Section 805, related to ownership of employee inventions made off the job. Watch out for the "escape clause." SECTION 18-805. Employee's Right to Certain Inventions. Any provision in an employment agreement which provides that the employee shall assign or offer to assign any of his rights in an invention to his employer shall not apply to an invention that they employee developed entirely on his own time without using the employer's equipment, supplies, facility or trade secret information, except for those inventions that; (i) relate to the employer's business or actual or demonstrably anticipated research or development, or (ii) result from any work performed by the employer for the employer. /* Folks, there is a huge exception here. It seems that all inventions which relate to the business (what is that, computers???? or computer telecommunications???) can be required to be assigned. The key question here is how broadly will the term "relate to the employer's business" be construed. If it is broadly construed, this section becomes meaningless. */ To the extent a provision in an employment agreement purports to apply to the type of invention described, it is against the public policy of this State and is unenforceable. An employer may not require a provision of an employment agreement made unenforceable under this section as a condition of employment or continued employment. /* Here's Delaware's Computer Crimes Law, Title 11, Section 931, adopted in */ SECTION 931. Definitions. As used in this subpart: (1) "Access" means to instruct, communicate with, store data in or retrieve data from, a computer, computer system or computer network. (2) "Computer" means a programmable, electronic device capable of accepting and processing data. (3) "Computer network" means: a. A set of related devices connected to a computer by communications facilities; b. A complex of two or more computers, including related devices, connected by communications facilities; or c. The communications transmission facilities and devices used to interconnect computational equipment, along with control mechanisms associated thereto. (4) "Computer program" means a set of instructions, statements or related data that, in actual or modified form, is capable of causing a computer or computer system to perform specified functions. (5) "Computer services" includes, but is not limited to, computer access, data processing and data storage. (6) "Computer software" means 1 or more computer programs, existing in any form, or any associated operational procedures, manuals or other documentation, (7) "Computer system" means a computer, its software, related equipment and communications facilities, if any, and includes computer networks. (8) "Data" means information of any kind in any form, including computer software. (9) "Person" means a natural person, corporation, trust, partnership, incorporated or unincorporated association and any other legal or governmental entity, including any state or municipal entity or public official. /* This means that if the State of Delaware copies a copyright program without authority, it is guilty of computer crime. Compare this with the result discussed in the tutorial on state's current general immunity from copyright infringement claims. */ (10) "Private personal data" means data concerning a natural person which a reasonable person would want to keep private and which is protectable under law. /* This is the OBJECTIVE standard for personal data. In other words, no matter how much you may subjectively want to keep something private, it is not private unless the community as a whole, a reasonable person, would agree that it is something that someone would want to keep private. */. SECTION 932 Unauthorized access. A person is guilty of the computer crime of unauthorized access to a computer system when, knowing that he is not authorized to do so, he accesses or causes to be accessed any computer system without authorization. SECTION 933 Theft of computer services A person is guilty of the computer crime of theft of computer services when he accesses or causes to be accessed or otherwise uses or causes to be used a computer system with the intent to obtain unauthorized computer services, computer software or data. SECTION 934 Interruption of computer services A person is guilty of the computer crime of interruption of computer services when that person, without authorization, intentionally or recklessly disrupts or degrades or causes the disruption or degradation of computer services or denies or causes the denial of computer services to an authorized user of the computer system. SECTION 935 Misuse of computer system information A person is guilty of the computer crime of misuse of computer system information when: (1) As a result of his accessing or causing to be accessed a computer system, he intentionally makes or causes to be made an unauthorized display, use, disclosure or copy, in any form, of data residing in, communicated by a computer system; (2) That person intentionally or recklessly and without authorization: a. Alters, deletes, tampers with, damages, destroys or takes data intended for use by a computer system, whether residing or external to a computer system; or b. Interrupts or adds data to data residing within a computer system; (3) That person knowingly receives or retains data obtained in violation of subdivision (1) or (2) of this section; or (4) that person uses or discloses any data which that person knows or believes was obtained in violation of subdivision (1) or (2) of this section. SECTION 936 Destruction of computer equipment A person is guilty of the computer crime of destruction of computer equipment when that person, without authorization, intentionally or recklessly tampers with, takes, transfers, conceals, alters, damages or destroys any equipment used in a computer system or recklessly causes any of the foregoing to occur. SECTION 937 Penalties (a) A person committing any of the crimes described in sections 932-936 of this title is guilty in the first degree when the damage to or the value of the property of computer services affected exceeds $ 10,000.00. Computer crime in the first degree is a class B felony. (b) A person committing any of the crimes described in sections 932-936 of this title is guilty in the second degree when the damage to or the value of the property or computer services affected exceeds $ 5,000.00. (c) A person committing any of the crimes described in sections 932-936 of this title is guilty in the third degree when: (1) The damage to or value of the property or computer services affected exceeds $ 1,000; or (2) The person engages in conduct which creates a risk of serious physical injury to another person. Computer crime in the third degree is a class D felony. (d) A person committing any of the crimes described in sections 932-936 of this title is guilty in the fourth degree when the damage to or the value of the property or computer services affected exceeds $ 500. Computer crime in the fourth degree is a class B misdemeanor. (e) A person committing any of the crimes described in paragraphs 932-936 of this title is guilty in the fifth degree when the damage to or value of the property or computer services, if any, is $ 500 or less. Computer crime in the fifth degree is a Class B misdemeanor. (f) Any person gaining money, property [,]services, or other consideration through the commission of any offense under this subpart, upon conviction, in lieu of having a fine imposed, may be sentenced by the court to pay an amount, fixed by the court, not to exceed double the amount of the defendant's gain from the commission of such offense. In such case, the court shall make a finding as to the amount of the defendant's gain from the offense and, if the record does not contain sufficient evidence to support such a finding, the court may conduct a hearing upon the issue. For the purpose of this section, "gain" means the amount of money or the value of property or computer services or other consideration derived. (g) Amounts included in violations of this subpart committed pursuant to 1 scheme or course of conduct, whether from the same person or several persons, may be aggregated in determining the degree of the crime. (h) For the purposes of this subpart, the value of the property or computer services shall be: (1) The market value of the property or computer services at the time of the violation; or (2) If the property or computer services are unrecoverable, damaged or destroyed as a result of the violation of this subpart, the cost of reproducing or replacing the property at the time of the violation. When the value of the property or computer services or damage thereto cannot be satisfactorily ascertained, the value shall be deemed to be $250. Section 938. Venue /*venue is the law that determines where cases will be heard. Blowing up a train occurs at a specific geographical point and so like most crimes where it happened and where it should be tried is obvious. It's not so obvious with computer crimes.*/ (a) In any prosecution for any violation of sections 932- 936 of this title, the offense shall be deemed to have been committed in the place at which the act occurred or in which the computer system or part thereof involved in the violation was located. (b) In any prosecution for any violation of sections 932- 936 of this title, based upon more than one act in violation thereof, the offense shall be deemed to have been committed in the place at which the act occurred or in which the computer system or part thereof involved in the violation was located. (c) if any act performed in furtherance of the offenses set out in sections 932-936 of this title occurs in this state or in any computer system or part thereof accessed in violation of sections 932-936 of this title is located in this state , the offense shall be deemed to have occurred in this state. SECTION 939. Remedies of aggrieved persons. (a) Any aggrieved person who has reason to believe that any other person has been engaged, is engaged, or is about to engage in an alleged violation of any provision of sections 932-936 of this title may bring an action against such person and may apply to the court of chancery for: (i) An order temporarily or permanently restraining and enjoining the commencement or continuance of such act or acts; (ii) an order directing restitution; or (iii) an order directing the appointment of a receiver. Subject to making due provisions for the rights of innocent persons, a receiver shall have the power to sue for, collect, receive and take into his possession any property which belongs to the person who is alleged to have violated any provision of this subpart and which may have been derived by, been used in or aided in any manner such alleged violation. Such property shall include goods and chattels, papers, choses in action, bills, notes and property of every description including all computer system equipment and data, and including property with which such property has been commingled if it cannot be identified in kind because of such commingling. The receiver shall also have the power to sell, convey and assign all of the foregoing and hold and dispose of the proceeds thereto under the direction of the Court. Any person who has suffered damages as a result of an alleged violation of any provision of Sections 932- 936 of this title, and submits proof to the satisfaction of the COurt at he has in fact been damaged, may participate with general creditors in the distribution of the assets to the extent that he has sustained out-of-pocket losses. The Court shall have jurisdiction of all questions arising in such proceeding and may make such orders and judgment therein as may be required. (b) The Court may award the relief applied for or such other relief as it may deem appropriate in equity. (c) Independent of or in conjunction with an action under subsection (a) of this section, any person who suffers any injury to person, business or property may bring an action for damages against a person who is alleged to have violated any provisions of Sections 932-936 of this title. The aggrieved person shall recover actual damages and damages for unjust enrichment not taken into account in computing damages for actual loss and treble damages where there has been a showing of willful and malicious conduct. (d) Proof of pecuniary loss is not required to establish actual damages in connection with an alleged violation of Section 935 of this title arising from misuse of private personal data. (e) In any civil action brought under this section, the Court shall award to any aggrieved person who prevails reasonable costs and reasonable attorney's fees. (f) The filing of a criminal action against a person is not a prerequisite to the bringing of a civil action under this section against such person. (g) No civil action under this section may be brought but within 3 years from the date the alleged violation of Sections 932-936 of this title is discovered or should have been discovered by the use of reasonable diligence.