Criminal Law Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

U.S. Regulators Disagree On Government Access To Encrypted Information

On January 25, 2016, at the State of the Net Internet Policy Conference in Washington, D.C., Assistant Attorney General Leslie Caldwell from the Department of Justice and Commissioner Terrell McSweeny from the Federal Trade...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

SCOTUS upholds Computer Fraud and Abuse Act conviction

The Supreme Court of the United States held on January 25, 2016, that an executive of a shipping company who hacked into his former employer’s computer system after he left the company was guilty under the Computer Fraud and...more

Breaking News: Hacker’s Conviction Affirmed Despite Lower Court’s Error

This week, the United States Supreme Court upheld a conviction under the Computer Fraud and Abuse Act despite the Court’s acknowledgement that the jury had been wrongfully instructed on the elements of the crime charged. ...more

Spies, Hacking & Civil Liberties in the UK

In late 2015, Theresa May, the UK Home Secretary introduced the Investigatory Powers Bill (the “Bill”). Mrs May stated that the Bill was introduced to ensure that surveillance laws are “modern, fit for purpose and can...more

Employment Law This Week: FTC on Big Data, DOJ/DOL on Safety Violations, External Whistleblowers, NRF Fights Scheduling [Video]

We invite you to view Employment Law This Week - a weekly rundown of the latest news in the field, brought to you by Epstein Becker Green. We look at the latest trends, important court decisions, and new developments that...more

Evidence and Social Media: Notes from the Canadian Twitter Trial

On Friday, January 22, 2016, the Ontario Court of Justice released reasons in R. v. Elliott, 2016 ONCJ 35. The case involved allegations that the accused engaged in criminal harassment of two women by repeatedly communicating...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

Not So Fast, Not So Much – Data Protection for Cell Tower Traffic Data

In the context of criminal investigations police in Canada may obtain “tower dump” production orders. These are orders requiring the applicable cellular telecommunications providers to disclose all records of cellular traffic...more

HIPAA Modified in Tandem with Executive Action on Gun Control: Much Ado About Narrow Permissive Reporting Requirements

On January 6, 2016, the Office for Civil Rights (“OCR”) within the federal Department of Health and Human Services (“HHS”) issued a final rule to modify the Health Insurance Portability and Accountability Act of 1996...more

New HIPAA Privacy Rule Permits Disclosures to Background Check System

On January 6, 2016, the U.S. Department of Health and Human Services (HHS) issued a final rule amending the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule to strengthen the current background check...more

Former Cardinals Scouting Director pleads guilty to hacking the Astros’ database

Last Friday, Chris Correa, the former scouting director of the St. Louis Cardinals, pleaded guilty in federal court in Texas for unlawfully accessing the Houston Astros’ database, which included scouting and draft...more

FinCrimes Update: December 2015 Summary, Volume 2, Issue 10

AML/BSA & OFAC: OFAC PUBLISHES CYBER-RELATED SANCTIONS REGULATIONS - On December 31, OFAC issued regulations to implement Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in...more

Former Cardinals Scouting Director Pleads Guilty to Hacking Astros’ Computer Systems

Economic espionage and computer hacking can touch all industries and business types. Computer hacking is a federal crime, and federal prosecutors are aggressively targeting cases involving the unauthorized access of a...more

Online Terrorism Reporting Act Revived In Light Of San Bernardino Shootings

Within hours after a pair of shooters killed fourteen people in San Bernardino, California, reports emerged that one of the perpetrators had sworn allegiance to ISIS immediately before the attack. In the week following,...more

The California Electronic Communications Privacy Act – California Takes the Lead on Digital Privacy in the U.S.

California, home of many of the world’s largest technology companies, has long been at the forefront of protecting personal electronic information in the United States. California adopted the nation’s first data breach...more

Employment Law Navigator – Week in Review: December 22, 2015 #3

Last week, a federal judge in the Central District of California made big news when he found that “claims of sexual orientation discrimination are gender stereotype or sex discrimination” prohibited by Title VII of the Civil...more

Update on recent cyber prosecutions/stings

The feds keep chipping away at those thieves and hackers and we are pleased to showcase the recent results of their hard work. Computer Hacking and Sexual Extortion - On December 9, 2015, the U.S. Attorney’s Office...more

Alleged VTech hacker arrested

We previously reported that VTech suffered a data breach exposing millions of children’s and their parents’ personal information. The South East Regional Organised Crime Unit in the UK has announced that it has arrested a 21...more

Back-Door Access to Encrypted Communications: Weakening Security to Improve Security?

Last month’s terror attacks in Paris have re-ignited the long-standing debate between national security and privacy advocates over whether technology companies should be required to provide the government special access to...more

Irresponsible to Criticize Judge Who Ruled Correctly

As lawyers, we frequently disagree with the decisions of judges. The federal and state constitutions protect our right to express our disagreement and provide a mechanism to appeal decisions. Judges have no control over which...more

State Attorneys General Offer Perspectives on Data Breaches

Recently, Republican attorneys general from across the nation gathered in Scottsdale, Arizona, for their association’s annual fall conference. The purpose of the conference was to discuss a variety of issues facing the state...more

Global Anti-Corruption Perspective: Conducting Investigations in the Middle East: 10 Key Considerations

It is now commonplace for corporate entities to conduct investigations or risk assessments in multiple territories and jurisdictions at the same time. This type of work is, in part, a direct consequence of increasingly global...more

UK Investigatory Powers Bill: Big Brother 2.0?

On 4 November an Investigatory Powers Bill (‘Bill’) which could overhaul internet surveillance in the UK was introduced to the House of Commons....more

714 Results
|
View per page
Page: of 29

Follow Criminal Law Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×