News & Analysis as of

Criminal Law Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:

The Lawyers' Lawyer Newsletter - Recent Developments in Risk Management - August 2017

by Hinshaw & Culbertson LLP on

Advising Clients Regarding Potentially Criminal Conduct – Assisting Clients in Connection with the Medical or Recreational Marijuana Industry - Rhode Island Ethics Advisory Panel Op. 2017-01 - Risk Management Issue: In...more

China’s Cyberspace Administration announces first state level investigations under Cybersecurity Law

by Dechert LLP on

China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more

FBI's Fraud Complaints Indicate Most Damaging Cyber Schemes

by GB&A Insurance on

A look at the FBI’s Internet Complaint Center indicates Business Email Compromise (also known as CEO Fraud and Social Engineering Fraud) topped the list of fraud complaints by a huge margin....more

Contraband Drone Crashes Near Prison in Washington State

Recently, a drone carrying 16 individual bags of marijuana, cell phones and chargers, two bags of tobacco, and 31 oxycodone pills crashed into the ground near the Washington State Prison yard....more

Company Director Becomes First Ever Convicted Under Hong Kong Privacy Law For Failing To Respond To Investigation Summons

by King & Spalding on

The director of a Hong Kong employment agency was convicted of a criminal offense arising under Hong Kong’s Personal Data (Privacy) Ordinance (“PDPO”) on June 30, 2017. The director pleaded guilty before the Kowloon City...more

Another Rematch Between Tech Companies and the Government over the Territorial Reach of the Stored Communications Act

Lawyers for the tech community are gearing up for argument next month in the U.S. District Court in San Francisco, seeking to overturn another magistrate’s order that requires digital information stored outside of the U.S. to...more

The Fourth Amendment Implications of Sharing Server Space

The prosecution of Martin Shkreli, whom the BBC has called “the most hated man in America,” reveals some important lessons about the Fourth Amendment protections against search and seizure in the digital corporate context:...more

DOJ Asks SCOTUS to Take on Microsoft Case and Verizon Suffers its own Data Breach: eDiscovery Trends

by CloudNine on

A rare two-topic day, but both are notable… Remember the Microsoft Ireland Warrant case, where the Second Circuit reversed earlier rulings and denied the government’s efforts to compel Microsoft to provide emails in that...more

Conviction for Economic Espionage, Sale of Trade Secrets to China

by McDermott Will & Emery on

The US Court of Appeals for the Ninth Circuit upheld the first federal jury criminal conviction for economic espionage and theft of trade secrets under the Economic Espionage Act of 1996 (EEA), even though the owner of the...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

Stolen Tax Returns? Virginia Seeks a Solution.

Did someone steal your tax return? You are not alone. Indeed, the rise in tax-related identity theft has been well documented. In 2015, the FTC reported a 50% increase in identity theft complaints. A primary cause for...more

The Office of the National Coordinator Releases Guidance on Recent International Ransomware Campaign

by Foley & Lardner LLP on

With the news of the newest international ransomware campaign that is currently affecting some organizations within the Health Care sector, it is important to not only educate staff on necessary precautions, but also be aware...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

Hacker Sentenced To Nearly Five Years In Prison For Phishing Scheme

by King & Spalding on

On Monday, June 5, 2017, the United States Department of Justice (“DOJ”) announced that a Cameroonian citizen, Eric Donys Simeu, had been sentenced to four years and ten months in prison for phishing campaigns targeting...more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

DOJ Reports on Drones Flying Contraband to Prisons

While drone delivery services are certainly on the agendas are large retailers like Amazon, inmates in jails across the U.S. are already using drones to receive their own aerial contraband shipments. Through a Freedom of...more

Senate Considers Potential Changes to ECPA to Ease Access to Electronic Data Across Borders

Terrorist attacks, most recently in London and Manchester, England, have raised the pressure on law enforcement and lawmakers in countries like the U.K. and the U.S., to proactively intercept and interrupt terrorist...more

Murder Arrest Warrant Weaves Web of Data Evidence in – Fitbit, Facebook, Alarm Systems and More

The warrant that led to the arrest of a husband for the alleged murder of his wife weaves a web of electronic evidence. Based in large part on Fitbit fitness tracker data, Connecticut authorities have charged Richard Debate...more

One Month to Better Investigations and Reporting-Day 10-Best Practices in a Cross-Border Investigation

by Thomas Fox on

Description: Mara Senn and a colleague, Michelle Albert, published in the FCPA Report, Volume 3, Number 1, entitled “Internal Investigations, How to Conduct an Anti-Corruption Investigation: Developing and Implementing the...more

U.S. Supreme Court Will Hear Mobile Phone Privacy Case

The United States Supreme Court has just agreed to hear the case of a Detroit man who was sentenced to 116 years in prison after data from his own cellular phone was used against him at his trial for his role in a string of...more

Google Again Ordered to Produce Internationally Stored Data: eDiscovery Case Law

by CloudNine on

In the case In re: Search of Content that is Stored at Premises Controlled by Google, Case No. 16-80263 (N.D. Cali., Apr. 19, 2017), California Magistrate Judge Laurel Beeler, noting that the “SCA regulates disclosure of data...more

WannaCry: What to Know and What to Do

by Snell & Wilmer on

On Friday, May 12, 2017, a malicious ransomware program known as WannaCry was discovered infecting computer systems all over the world. It set off alarms globally, and so far has infected over 200,000 computers across more...more

English Court Questions the Application of Litigation Privilege in Criminal Investigations

On 8 May 2017, the English High Court of Justice handed down judgment in The Director of the Serious Fraud Office v. Eurasian Natural Resources Corporation Ltd,1 which could significantly limit the application of litigation...more

Warrant Needed for “Black Box” Data in Florida

by Wilson Elser on

In a case of first impression in Florida, a split appellate court in State of Florida v. Charles Wiley Worsham Jr., No. 4D15-2733 (Fla. Dist. Ct. App. Mar. 29, 2017), held that a warrant was necessary before law enforcement...more

WannaCry Malware and Medical Device Security

by Knobbe Martens on

The WannaCry virus has infected and frozen computers in many industries around the world. According to a news source report, the virus has extorted doctors and hospital administrators for the keys to unlock and regain access...more

829 Results
|
View per page
Page: of 34
Cybersecurity

Follow Criminal Law Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.