Criminal Law General Business Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

High Court Permits University’s Contravention of Its Own Privacy Policy

The High Court in Bangura v Loughborough University [2016] EWHC 1503 (QB) ruled 19 May that Loughborough University acted lawfully under the Data Protection Act 1998 (“DPA”) in supplying Leicestershire Police with the...more

Ransomware Update: The FBI Weighs In

The FBI recently released an article discussing the spate of ransomware attacks on a variety of different entities, including hospitals. In the article, the FBI warned that ransomware attacks and the cybercriminals carrying...more

Ransomware: Electronic Extortion for a Digital Era

Last month, the FBI asked the American Bar Association to share a cyberalert with its members warning of an increased risk of ransomware. Ransomware poses significant legal and operational risks to businesses. Personnel at...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

English court compels investigators to disclose information on data protection grounds

The High Court has ruled that a company conducting an investigation may be compelled to give effect to requests for information made under data protection legislation. The case serves as a stark reminder that data protection...more

When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues

Are criminal cyberattacks increasing in sophistication and frequency? Yes. Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks?...more

Phishing Season Opens for 2016 Tax Filings – Beware of “W-2 Phishing Scams”

Tax season brings many headaches, but none as miserable as sophisticated scammer efforts to steal employee W-2 information. Using social engineering and modest technological tools, a “spear phishing” attack seeks to trick...more

The California Electronic Communications Privacy Act – California Takes the Lead on Digital Privacy in the U.S.

California, home of many of the world’s largest technology companies, has long been at the forefront of protecting personal electronic information in the United States. California adopted the nation’s first data breach...more

Appellate Court Notes

Supreme Court Advance Release Opinions: SC19253 - RBC Nice Bearings, Inc. v. SKF USA, Inc. [An important decision on contract waiver but one all attorneys should recall from the UCC or Contracts course we took...more

Insider Trading Hack was Cinematic in Scope

The U.S. Department of Justice announced indictments in Brooklyn and New Jersey last month of 32 people for fraudulently obtaining inside information and then using that knowledge to make millions in the market, in the...more

The Justice Department Has Some Things to Tell You about Cybersecurity

In April the Justice Department’s Computer Crime and Intellectual Property Section issued its Best Practices for Victim Response and Reporting of Cyber Incidents. It is an excellent guide for a business organization to...more

Supreme Court Strikes Down Law That Required Hotels To Comply With Warrantless Police Requests For Guest Registries

On June 22, 2015, in a 5-4 ruling, the U.S. Supreme Court in City of Los Angeles v. Patel struck down a Los Angeles Municipal Code that required hotel operators to provide guest registries to police upon demand, and without a...more

Breaking Down the DOJ Cybersecurity Unit’s Guidance on Responding to Cyberattacks

Another federal agency has weighed in with “guidance” on cybersecurity preparation and breach response. The Department of Justice (DOJ) is the latest to issue guidance on how companies should respond to data breaches. The...more

DOJ Cybersecurity Unit Releases “Best Practices” For Cyber Breaches

Last week, in conjunction with the Criminal Division’s Cybersecurity Industry Roundtable, the U.S. Department of Justice released its “Best Practices” guide for preparing for and responding to a cyber incident....more

Two Regulatory Crises

It strikes me that two civil regulators are facing dire attacks on aspects of their enforcement programs – both in different U.S. Courts of Appeals – at the same time. Both of these attacks arise out of generalized statutes...more

Guard Your Sheep, The Dyre Wolf is Coming

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

International Fraud & Asset Tracing (3rd Edition), France

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption Legislation -...more

Recorded Conversations with In-House Counsel Permitted as Evidence in FCPA Trial

Earlier this month, a federal judge in New Jersey held that a secretly recorded conversation between a former chief executive officer and his general counsel may be used by prosecutors as evidence against the former executive...more

Civil Antitrust Attorneys Receive Wire-Tap Evidence

The Canada Supreme Court ruled earlier this month that civil antitrust plaintiffs may receive wire-tap evidence obtained in the criminal investigation into an alleged price-fixing scheme by several large gas companies. During...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

Secret Service Raises Warning About Backoff POS Malware

The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named “Backoff” that was being used to steal payment card data from point-of-sale (POS) systems. The Alert...more

Recording Calls? Five Things You Can Do to Avoid the Litigation Frenzy

Restaurant chain Applebee’s has joined other businesses such as Overstock.com, Hilton, Capitol One, and Bass Pro Shops as defendants in purported class action lawsuits alleging that they illegally recorded calls to or from...more

Where to Now St. Peter? – Due Diligence Going Forward in China

Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more

55 Results
|
View per page
Page: of 3

Follow Criminal Law Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×