Criminal Law Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Your Mom and the Courts Agree: Naked Online Pix are Not OK

Since the 1990s and the rise of the Internet and social media, each one of us has become increasingly aware of the risks and dangers of unwanted posts and how fast a “discreet” image can go viral....more

New York Proposes Tough New Anti-Money Laundering and Cybersecurity Measures on Financial Services Companies

Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more

International Fraud & Asset Tracing (3rd Edition), France

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption Legislation -...more

Week in Review - February 2015 #3

Pay Raises/Ebola Funding - Reacting to the firestorm over the Governor’s recent salary increases for his Commissioners, the House had inserted language to cut the funding for one year for the Departments of Health, HHS...more

MoFo Global Procurement Quarterly: Winter 2015

In This Issue: - Protection of Security Relevant Information vs. Enhancement of Global Competition – Germany's "No Spy Decree" for Public Tenders under Continuous Scrutiny - RWIND Tenderer Test: Objective or...more

California May Limit Law Enforcement’s Warrantless Data Collection

Eager to retain its spot among the principal laboratories for domestic privacy legislation, California’s legislature is set to debate Senate Bill 178, legislation restricting state law enforcement agencies from requesting...more

Connected cars are privacy and security threats?

The recent report from the US Senator Ed Markey raises issues on the future of connected cars because of the privacy issues and the potential cybercrimes that might affect the security of vehicles.  ...more

Kight vs. CashCall – raising the bar for certification in call recording class actions

The California Invasion of Privacy Act, Penal Code sections 630 et seq. (CIPA) is only a credible threat if plaintiffs can achieve class certification. Otherwise, the case is nearly valueless, and will fall to the curb in no...more

An Attempt For ECPA Reform

Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more

HIPAA' s Criminal Charges Pack a Heavy Punch

Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more

A Winnable Fight Against Crimes In Cyberspace

California boldly made an example out of a felonious website owner who operated a website dedicated to shaming, embarrassing and harassing complete strangers. Following the first ever prosecution of the operator of a “revenge...more

FinCrimes Update - January 2015, Volumn 2, Issue 1

In This Issue: - BSA/AML & OFAC | FCPA & Anti-Corruption | Criminal Enforcement ...more

Illinois Amends Eavesdropping Statute in Response to Recent Court Decisions

On March 20, 2014, the Illinois Supreme Court held that significant portions of the Illinois eavesdropping statute, 720 ILCS 5/14-1 et seq., (the Statute) violated the First Amendment. In People v. Clark, 2014 IL 115776, and...more

Cullen & Dykman Sees Colleges Calling for Title IX Help v [Video]

Jan. 27, 2015 (Mimesis Law) -- Jim Ryan talks with Lee Pacchia about how the rise in reported on-campus sexual assaults and the pressures on colleges and universities to do something about the problem has translated into a...more

Recorded Conversations with In-House Counsel Permitted as Evidence in FCPA Trial

Earlier this month, a federal judge in New Jersey held that a secretly recorded conversation between a former chief executive officer and his general counsel may be used by prosecutors as evidence against the former executive...more

Two-Factor Authentication Is a Necessity for Companies

It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

Cybersecurity Risks Are Higher than Ever and Are Proving Costly

Cybersecurity is an increasing concern for companies. Last April, the UK Department for Business, Innovation & Skills (BIS) published the 2014 information security breaches survey: technical report. The report comprises the...more

Alert: Pro-ISIS Hackers Targeting Media Outlets

Recent widely publicized cyberattacks have made clear that nation-state hackers are now hacking companies for political purposes and they appear to be focused on broadcasters and other media companies....more

FBI Director James Comey To The Private Sector: “You need protection. You need guidance. I need information.”

FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more

FinCrimes Update - December 2014, Volumn 1, Issue 10

In this Issue: BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement...more

Status Updates - January 2015

Fake-out stakeout. For several months now, we’ve been covering the increasingly prevalent use of social media by law enforcement agencies conducting criminal investigations. In one such instance, the FBI sent a link to a...more

Can the NSA Legally Collect Telephone Metadata?

Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata....more

Drone on Drones: New Court Decision Reflects Shifting Views on Privacy in Public

Whenever drone policy is raised as a topic, privacy concerns follow close behind it as a discussion point. The idea of aerial surveillance that is cheaper, less time-intensive and requires fewer man hours to get off the...more

605 Results
|
View per page
Page: of 25

Follow Criminal Law Updates on: