News & Analysis as of

Criminal Law Privacy Science, Computers & Technology

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:

Pennsylvania District Court Agrees That Google Must Give Up Foreign Server Data

by Bracewell LLP on

On August 17, 2017, a Pennsylvania district court upheld a magistrate judge’s order that Google comply with warrants issued pursuant to the Stored Communications Act (“SCA”) and produce to the FBI data that was stored, in...more

Massachusetts Lawmakers Turn Attention to Cybersecurity

by Mintz Levin on

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure....more

European Court to France: DNA Database Violates Fundamental Rights

by Hogan Lovells on

The European Court of Human Rights decided on June 22, 2017 that France’s DNA database for convicted criminals disproportionately interferes with individuals’ privacy rights because of its one-size-fits-all retention period...more

“Not so fast, my friend*” — Judge Orders DreamHost Comply with DOJ’s Disruptj20 Search Warrant, with Caveats

by Moore & Van Allen PLLC on

Can the government force the hosting service of an activist website company to turn over vast amounts of user data in order to track down political protesters? According to a federal court ruling, the answer — Yes, but...more

Phishing in Flood Waters: Avoiding Hurricane Harvey Cyber Risks

by Jackson Walker on

Unfortunately, it is common for cyber criminals to capitalize on natural disasters. The Department of Homeland Security (“DHS”) warns users to exercise caution in handling any email with subject line, attachments, or...more

IRS Issues Urgent Warning to Beware IRS FBI Themed Ransomware Scam

The Internal Revenue Service today warned people to avoid a new phishing scheme that impersonates the IRS and the FBI as part of a ransomware scam to take computer data hostage....more

China’s Cyberspace Administration announces first state level investigations under Cybersecurity Law

by Dechert LLP on

China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more

Contraband Drone Crashes Near Prison in Washington State

Recently, a drone carrying 16 individual bags of marijuana, cell phones and chargers, two bags of tobacco, and 31 oxycodone pills crashed into the ground near the Washington State Prison yard....more

Another Rematch Between Tech Companies and the Government over the Territorial Reach of the Stored Communications Act

Lawyers for the tech community are gearing up for argument next month in the U.S. District Court in San Francisco, seeking to overturn another magistrate’s order that requires digital information stored outside of the U.S. to...more

The Fourth Amendment Implications of Sharing Server Space

The prosecution of Martin Shkreli, whom the BBC has called “the most hated man in America,” reveals some important lessons about the Fourth Amendment protections against search and seizure in the digital corporate context:...more

DOJ Asks SCOTUS to Take on Microsoft Case and Verizon Suffers its own Data Breach: eDiscovery Trends

by CloudNine on

A rare two-topic day, but both are notable… Remember the Microsoft Ireland Warrant case, where the Second Circuit reversed earlier rulings and denied the government’s efforts to compel Microsoft to provide emails in that...more

Conviction for Economic Espionage, Sale of Trade Secrets to China

by McDermott Will & Emery on

The US Court of Appeals for the Ninth Circuit upheld the first federal jury criminal conviction for economic espionage and theft of trade secrets under the Economic Espionage Act of 1996 (EEA), even though the owner of the...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

Stolen Tax Returns? Virginia Seeks a Solution.

Did someone steal your tax return? You are not alone. Indeed, the rise in tax-related identity theft has been well documented. In 2015, the FTC reported a 50% increase in identity theft complaints. A primary cause for...more

The Office of the National Coordinator Releases Guidance on Recent International Ransomware Campaign

by Foley & Lardner LLP on

With the news of the newest international ransomware campaign that is currently affecting some organizations within the Health Care sector, it is important to not only educate staff on necessary precautions, but also be aware...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

Hacker Sentenced To Nearly Five Years In Prison For Phishing Scheme

by King & Spalding on

On Monday, June 5, 2017, the United States Department of Justice (“DOJ”) announced that a Cameroonian citizen, Eric Donys Simeu, had been sentenced to four years and ten months in prison for phishing campaigns targeting...more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

DOJ Reports on Drones Flying Contraband to Prisons

While drone delivery services are certainly on the agendas are large retailers like Amazon, inmates in jails across the U.S. are already using drones to receive their own aerial contraband shipments. Through a Freedom of...more

Senate Considers Potential Changes to ECPA to Ease Access to Electronic Data Across Borders

Terrorist attacks, most recently in London and Manchester, England, have raised the pressure on law enforcement and lawmakers in countries like the U.K. and the U.S., to proactively intercept and interrupt terrorist...more

Murder Arrest Warrant Weaves Web of Data Evidence in – Fitbit, Facebook, Alarm Systems and More

The warrant that led to the arrest of a husband for the alleged murder of his wife weaves a web of electronic evidence. Based in large part on Fitbit fitness tracker data, Connecticut authorities have charged Richard Debate...more

WannaCry: What to Know and What to Do

by Snell & Wilmer on

On Friday, May 12, 2017, a malicious ransomware program known as WannaCry was discovered infecting computer systems all over the world. It set off alarms globally, and so far has infected over 200,000 computers across more...more

WannaCry Malware and Medical Device Security

by Knobbe Martens on

The WannaCry virus has infected and frozen computers in many industries around the world. According to a news source report, the virus has extorted doctors and hospital administrators for the keys to unlock and regain access...more

Ransomware Attacks: Why They're Growing, Who They Target, and What You Can Do

by JD Supra Perspectives on

In the world of cyber-espionage, ransomware is playing a huge and growing role....more

WannaCry: The Global Ransomware Attack

by Jones Day on

A new and widespread ransomware attack is affecting institutions around the world, with reports of hundreds of thousands of infections in nearly 150 countries, including the United States, United Kingdom, Spain, Russia,...more

402 Results
|
View per page
Page: of 17
Cybersecurity

Follow Criminal Law Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.