Criminal Law Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

Also In the News - Data, Privacy, & Security Practice Report - May 2016 #2

K&S Client Alert: Third Try Is A Charm: Defend Trade Secrets Act Of 2015 Enacted Into Law—For the third consecutive year, Congress introduced legislation to create a federal civil cause of action for trade secret...more

Defence & Indemnity - April 2016: IV. PRACTICE ISSUES B.

B. Do police need a warrant to access the data on a vehicle’s airbag control module without the owner or driver’s permission? R. v. Fedan, 2016 BCCA 26, per Smith, J.A. [4176]...more

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

European Commission Publishes Proposal for Signing the EU-U.S. Umbrella Agreement

The EU-U.S. data protection Umbrella Agreement consists of a framework of principles and safeguards for trans-Atlantic transfers of personal data (such as criminal records, names and addresses) in relation to the prevention,...more

Sentencing of Keys, Responsible for 2010 LA Times Data Breach, Should Remind Companies to Fortify Cybersecurity and Plan Response...

A federal judge in California recently sentenced a former employee of KTXL Fox40, a Tribune Company-owned television station, to two years in prison for three felony convictions relating to his assistance to the “hacktivist”...more

Supreme Court Eases Limits On U.S. Government Hacking Authority

On April 28, 2016, the U.S. Supreme Court approved amendments to Rule 41 of the Federal Rules of Criminal Procedure that would allow federal judges to issue search warrants granting remote access to electronic devices outside...more

Georgia couple prosecuted for filing fraudulent tax records

The filing of fraudulent tax returns continues to be a serious problem in this country. Last year alone, the IRS has admitted that up to 720,000 taxpayers were victims. Last week, a Georgia couple pled guilty to filing...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

The Proof Is in the Password!

Consider this scenario: A young couple entrusts you, an experienced real estate attorney, to assist them in the purchase of their first home. Days before closing, your unsecured email account gets hacked and your client...more

English court compels investigators to disclose information on data protection grounds

The High Court has ruled that a company conducting an investigation may be compelled to give effect to requests for information made under data protection legislation. The case serves as a stark reminder that data protection...more

When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues

Are criminal cyberattacks increasing in sophistication and frequency? Yes. Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks?...more

U.S. Supreme Court Proposes Change to Rules Applicable to Searches of Electronic Data

The United States Supreme Court — which establishes rules of civil and criminal procedure, subject to the objection of Congress — has proposed a significant amendment to the rules applicable to searches of electronic data...more

DOL Persuader Regulations Expose Every Employer to Reporting Requirements and Disclosures

All employers should examine their use of labor and employment service providers to mitigate unwanted disclosure of fees paid to such providers. To protect confidentiality and the integrity of the attorney-client...more

Hackers responsible for ruthless SpyEye Trojan sentenced to 24 1/2 years

The Department of Justice has announced that two hackers who built and sold the Trojan called SpyEye, that caused close to $1 billion in banking losses, have been sentenced for a combined 24 1/2 years in federal court in...more

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Florida Law Mandates Police Body Camera Policies—Then Lets Agencies Fend for Themselves

Police body cameras are the hot new item on the procurement “wish lists” of law enforcement agencies at all levels of government. Following well-publicized police encounters with citizens throughout the United States,...more

Expectations of Privacy: Location Matters

Sometimes law enforcement needs a warrant to access cellphone data, sometimes a court order. Sometimes nothing is required. Roaming while you roam. Depending on where you use your cell phone, law enforcement may...more

Are Changes in Store for the Stored Communications Act?

Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations. In Congress, a proposal to reform the SCA...more

Need to Decrypt an iPhone? There’s an “Act” for That

A pair of recent cases pitted the U.S. Department of Justice (DOJ) against Apple, Inc. (Apple) in a Herculean struggle between asserted interests in national security and privacy. In both cases, the DOJ relied on the same...more

Expanding Horizons: Drone Regulations from a Prosecutorial Perspective

BB&K attorney Jordan Ferguson writes about the criminal side of drones for the California District Attorneys Association’s Prosecutor’s Brief. Over the next few years, the skies are likely to get much more crowded....more

Phishing Season Opens for 2016 Tax Filings – Beware of “W-2 Phishing Scams”

Tax season brings many headaches, but none as miserable as sophisticated scammer efforts to steal employee W-2 information. Using social engineering and modest technological tools, a “spear phishing” attack seeks to trick...more

Chinese national hacker pleads guilty to sending U.S. military data to China

The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information...more

The Panama Papers & The Tempo of International Corruption Cases  [Video]

An interview on CNBC Powerlunch (April 4th, 2016) where I discuss the implications of the recent Panama Papers leaks. What does this mean for the future of tax havens? Also, will be the appetite for local enforcement in those...more

Practical Tips to Avoid Being Caught in an IRS Phishing Trap

As a follow-up to our recent discussion of IRS-related phishing attempts, here are a few quick tips to stay out of the phishing traps: ..In general, the IRS does not communicate with taxpayers via e-mail, so any time...more

755 Results
|
View per page
Page: of 31

Follow Criminal Law Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×