Cullen & Dykman Sees Colleges Calling for Title IX Help v
What is a PBT? Do I have to cooperate?
BigLaw Recruiter: We Didn't Kill Dewey & LeBoeuf
How the Rise in Undercover Investigations is Changing the Law
A Moment of Simple Justice - A Prosecutor's Duty
Government’s Health Care Fraud “Cash Cow” Keeps Mooing
Uncovering Factory Farming - The Effects of Ag Gag Laws
Uncovering the “Why” in FCPA Compliance Issues
A Moment of Simple Justice - Undercover Lover
What are field sobriety tests? Do I have to take them?
FCPA Compliance and Ethics Report-Episode 117-the Avon FCPA Enforcement Action
A Moment of Simple Justice - Jails for Sale
A Moment of Simple Justice - Stop Talking
A Moment of Simple Justice - Snitching Ain't Easy
Combining Arms for Justice-Involved Veterans
A Moment of Simple Justice - Death by Cop
How Did The NFL Get This So Wrong?
A Moment of Simple Justice - Ferguson & the Media
A Moment of Simple Justice - Hopping Turnstiles
The 10 Essential Steps to Implement an Effective Anti-Corruption Compliance Program
It's a commonplace occurrence in Silicon Valley for skilled employees to move from one company to another, followed quickly by a civil trade secret lawsuit alleging that the employee stole trade secrets from his prior...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
Overview: The Ninth Circuit Court of Appeals recently found that probable cause supported a warrant authorizing the electronic search of computer equipment and digital storage devices belonging to a suspected child...more
People v. Kucharski, 2013 WL 1281844 (Ill. App. 2nd Dist. Mar. 29, 2013).
In this harassment through electronic communications case, the defendant allegedly posted lewd comments and offensive remarks on the victims...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
When someone subpoenas subscriber information from an internet service provider, does the subscriber have an expectation of privacy? In California, at least, the answer seems to be: No.
In People v. Stirpo, (Second District...more
This decision is the subject of the grant of certiorari by the United States Supreme Court in United States v. Jones, 10-1259.
Maynard and Jones were co-defendants. All legal issues have either been resolved or abandoned...more
The South Africa Law Reform Commission has approved the publication of its Issue Paper on “Electronic Evidence in Criminal and Civil Proceedings: Admissibility and Related Issues” for general information and comment. The...more
In People v. McInnis, the Defendant was convicted of attempted witness bribery. The Defendant attempted to keep witnesses from testifying against the Defendant’s nephew, in the nephew’s trial for robbery and kidnapping. ...more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National...more
Find a Criminal Law Author »
Back to Top