News & Analysis as of

Criminal Law Intellectual Property Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:

North Carolina Public Records Law 101 - A primer for economic development professionals

by Nexsen Pruet, PLLC on

At the North Carolina Economic Development Association 2016 Annual Conference, I participated on a panel discussion and presentation regarding public records law requirements in North Carolina and how they affect economic...more

Sharing of Passwords Under Certain Circumstances Unlawful

by Jackson Lewis P.C. on

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Baseball Hacking Scandal Leads To 4-Year Sentence And MLB Investigation

by King & Spalding on

On Monday, July 18, 2016, the U.S. District Court for the Southern District of Texas sentenced former St. Louis Cardinals scouting director Chris Correa to nearly four years in prison for the hacking of the Houston Astros’...more

When Stealing in Baseball Can Land You in Jail: Computer Fraud Sentencing Announced in MLB Case

by Seyfarth Shaw LLP on

Although stealing bases, and even signs, in baseball may be part of the game, stealing another team’s trade secrets can land you in federal prison, as one executive recently learned the hard way. As we previously...more

The Ninth Circuit Addresses the Scope of the Computer Fraud and Abuse Act

by Fenwick & West LLP on

This week, the Ninth Circuit clarified the scope of the Computer Fraud and Abuse Act (CFAA) in upholding the defendant’s criminal conviction in United States v. David Nosal....more

How employers can stop departing employees taking client lists with them

by White & Case LLP on

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

Happy Times, High Crimes and Misdemeanors (Silicon Valley – Episode 25)

In this week’s episode of Silicon Valley, Richard enjoyed an unprecedented run of success, culminating with the official launch of Pied Piper’s platform. Richard has suffered so many setbacks, it’s little wonder he is...more

Also In the News - Data, Privacy, & Security Practice Report - May 2016 #2

by King & Spalding on

K&S Client Alert: Third Try Is A Charm: Defend Trade Secrets Act Of 2015 Enacted Into Law—For the third consecutive year, Congress introduced legislation to create a federal civil cause of action for trade secret...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

Backdooring Investment Security (On the Apple Case)

by Clark Hill PLC on

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

by Wiggin and Dana LLP on

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

Update on recent cyber prosecutions/stings

The feds keep chipping away at those thieves and hackers and we are pleased to showcase the recent results of their hard work. Computer Hacking and Sexual Extortion - On December 9, 2015, the U.S. Attorney’s Office...more

DOJ Guidance for Victims of Cybercrime: The Dos and Do Nots of Cyber Preparedness

by McDermott Will & Emery on

On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

by Cozen O'Connor on

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

Matthew Chan v Linda Ellis

Court of Appeals of the State of Georgia OrderGeorgia

by Timothy McCormack on

Matthew Chan filed this appeal from a stalking permanent protective order entered against him. He now asks that we transfer the case to the Supreme Court because one of the issues on appeal will be whether the trial court’s...more

Matthew Chan v Linda Ellis

Brief of Amicus Curiae Timothy B. McCormackGeorgia

by Timothy McCormack on

Pursuant to Rule 26, Mr. Timothy B. McCormack hereby submits this Brief of Amicus Curiae in support of Appellee Linda Ellis (“Ellis”). Mr. McCormack is an attorney licensed in the State of Washington and other state and...more

Matthew Chan v Linda Ellis

Brief of Appellee Linda EllisGeorgia

by Timothy McCormack on

Appellee Linda Ellis (hereafter, “Appellee”, “Linda Ellis”, or “Ms. Ellis”) respectfully responds to the Brief of Appellant (hereafter, “Appellant” or “Chan”) appealing the Stalking Permanent Protective Order issued pursuant...more

Pols Gone Wild: Congress Discovers Trade Secret Theft And Cybersecurity Are Problems; We Sort Through The Explosion Of Legislation

Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more

The Real Lesson of Chinese Cyberhacking

There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more

Obama Administration Trade Secret Report Raises Important IP, Business, and Securities Issues

by Miller Canfield on

The Obama Administration’s recent “Strategy on Mitigating the Theft of U.S. Trade Secrets” makes clear the importance for businesses to be aware of and understand the international threats to their intellectual property, the...more

The Storm Has Arrived: Cybersecurity, Risks And Response

by Michael Volkov on

Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more

APT Threat Report Shows Cybersecurity Risks Not Limited to Identity Theft

by BakerHostetler on

We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more

Cloud Computing Law: Balancing Privacy and Investigation

by Field Law on

Megaupload Ltd. is alleged to have disseminated copyright protected movies and music and US prosecutors now have the task of gaining access to the company’s servers in a bid to prove their case....more

Facebook needs a "probable cause" button.

by Thomas Valkenet on

Are you proud to have lots of Facebook "friends?" Well, any one of them can give strangers, including the U.S. Government, access to your account. Your privacy settings won't completely bar access by strangers. In an August...more

Can Employees Be Criminally Prosecuted for Violating Their Employer's Computer Policies?

by Nick Akerman on

In California, Washington, Oregon, Alaska, Montana, Arizona, Nevada and Idaho – states covered by the 9th Circuit Court of Appeals -- the answer as of yesterday is an emphatic “YES.” In U.S. v. Nosal, 2011...more

30 Results
|
View per page
Page: of 2
Cybersecurity

Follow Criminal Law Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!