There are plenty of laws protecting computer and other electronically stored information from unauthorized computer access. These laws not only apply to hackers outside the company, but to people who are no longer employed by companies but continue to access proprietary computer systems and network services.
Unfortunately, laws on the books don’t stop the bad guys. To better protect themselves, companies should establish, maintain, and monitor employee access to databases and other company assets, and ensure that at termination of employment all access credentials are revoked.
Further, employment agreements should specifically identify post-employment restrictions to any company-related, electronically stored information.