Criminal Law Labor & Employment Science, Computers & Technology

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

DEA Rejects Petitions Seeking to Reschedule Marijuana

The long-awaited decision maintains the illegal status of marijuana under federal law. On August 12, the US Drug Enforcement Agency (DEA), despite much speculation to the contrary, published in the Federal Register its...more

Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act

When we last left David Nosal, he had escaped liability under the Computer Fraud and Abuse Act after convincing some of his former colleagues at executive search firm Korn/Ferry to use their log-in credentials to download...more

Taking a Walk Back to a Kinder, Gentler Interpretation of the Computer Fraud and Abuse Act

We don’t usually talk about four-year-old court decisions in the first instance here. But the Ninth Circuit has issued a pair of noteworthy opinions interpreting the Computer Fraud and Abuse Act in the last few weeks. And...more

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and...

This past week, the Ninth Circuit released two important decisions that clarify the scope of liability under the federal Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. The Act was originally designed to target...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

How employers can stop departing employees taking client lists with them

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

In Case You Missed It: Launch Links - April 2016 #4

Some interesting links we found across the web this week: - House of Representatives approves bill requiring warrants for email searches - It was a productive week on the Hill, as the House passed the Email...more

Employment Law This Week: FTC on Big Data, DOJ/DOL on Safety Violations, External Whistleblowers, NRF Fights Scheduling [Video]

We invite you to view Employment Law This Week - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Employment Law Navigator – Week in Review: December 22, 2015 #3

Last week, a federal judge in the Central District of California made big news when he found that “claims of sexual orientation discrimination are gender stereotype or sex discrimination” prohibited by Title VII of the Civil...more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

The “Cannibal Cop” and Protection of Computerized Data

In an unusual criminal case, the Second Circuit Court of Appeals recently weighed in on an important question at the intersection of employment law and data security. The decision will likely have implications wherever...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Disgruntled Former Tribune Company Employee Who Aided Hacking Convicted; Could Face Jail Time

On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more

Beware the Feds: Emerging Risks to Health Care Executives Under the Yates Memo

Last month’s “Yates Memo” from the Department of Justice (DOJ) promises to be a game-changer in the world of government investigations and enforcement activity. While several U.S. Attorney Offices had been applying many of...more

Blog: BEWARE: DOJ Announces New Policy to Increase Prosecutions of Individuals Involved in Corporate Fraud

Earlier this week, Deputy Attorney General (AG) Sally Quillian Yates issued a memorandum to Department of Justice (DOJ) attorneys discussing the need to hold individuals accountable for corporate wrongdoing in both civil and...more

Business E-mail Compromise Scam v2.0

In March, we reported on the Business E-mail Compromise (BEC) scam where criminals target employees responsible for wiring company money, and trick them into wiring money under false pretenses to fraudulent accounts...more

Massachusetts Appeals Court Set to Consider Scope of Employer Liability for Employee Data Breaches

Many of the highest-profile and headline-catching data breaches involve external breaches of a company’s electronic systems. But the reality that these headlines obscure is the fact that internal data breaches are generally...more

Caught Stealing More Than Bases, St. Louis Cardinals Teach Trade Secret Safety to All Employers

The recent hacking attack against the Houston Astros is a wake-up call for all employers: no organization is safe from its adversaries’ attempts to steal proprietary information to gain a leg up in the competition. The...more

Update Regarding Office of Personnel Management Cyber Attack

More details continue to emerge about the cyber attack and data breach disclosed last week of the U.S. federal government’s Office of Personnel Management (OPM), and those details continue to get worse. While original reports...more

New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strength­en the country’s response to...more

HIPAA' s Criminal Charges Pack a Heavy Punch

Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more

Fourth Circuit Upholds Federal Criminal Conviction for Accessing Former Employer's Database

The federal Computer Fraud and Abuse Act (CFAA) was primarily intended to deter and punish database hacking by third parties. Employers involved in disputes with former employees have attempted to use CFAA in response to...more

ICO Issues Warning over Misuse of Personal Data

The warning follows the recent Magistrate's Court decision which saw the ICO use its enforcement powers to bring criminal proceedings against a paralegal at a law firm, for unlawfully obtaining personal data. The paralegal...more

To Catch an E-Thief — Under Federal Property Law

As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition. The fundamental shift for busi­nesses in the past 15 years from paper documents to computer data has forced the courts...more

118 Results
|
View per page
Page: of 5

Follow Criminal Law Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×