Criminal Law Science, Computers & Technology Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Lab tech indicted for identity theft

A lab tech working at a Las Vegas pediatric cardiology practice has been indicted on one count of illegal use and disclosure of patient health information and one count of aggravated identity theft. The lab tech had...more

California Updates Privacy Rights with the Electronic Communications Privacy Act

Starting on New Years Day 2016, a new law will prohibit California law enforcement agencies from compelling California residents and businesses to turn over metadata or electronic communications (e.g., texts, emails,...more

California Gives the Fourth Amendment a 21st Century Makeover

The average American today generates more media than they did at any other point in history, and the ease with which our communications, photos, and videos are sent and stored digitally means most of us have more media stored...more

Should Smartphone Manufacturers Be Legally Compelled to Unlock Users’ Devices?

Picture this: A criminal defendant is indicted for three counts related to the possession of methamphetamine, and federal prosecutors obtain a warrant for the defendant’s iPhone. But the iPhone is passcode protected, and...more

HIPAA Lessons from the Warner Chilcott Settlement

Last week, the US Attorney’s Office in Boston announced that drug company Warner Chilcott agreed to plead guilty to health care fraud and pay $125 million to resolve criminal and civil liability arising out of allegations...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Hacker arrests and prosecutions update

We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more

The Limits to Ordering Computer Monitoring as a Special Condition of Supervised Release in the Federal Court System

There are limits to when a Federal District Court Judge may order computer monitoring by United States Probation as a special condition of supervised release. While it can be argued that individuals on supervised release...more

Focus on China - October 2015

Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more

Judicial Redress Act Passes House; May Aid New U.S.-E.U. Safe Harbor

On October 20, the U.S. House of Representatives passed the Judicial Redress Act (the “Act”) to allow European Union residents to challenge certain privacy violations by the U.S. government in U.S. courts. If passed by the...more

Daily Fantasy Sports Industry Could Fall Apart After Scandal

Greenberg Glusker litigation partner Ricardo Cestero was quoted in a Law360 article, Daily Fantasy Sports Industry Could Fall Apart After Scandal, (subscription required), addressing a customer class action filed against the...more

Chinese government arrests hackers

We have been reporting on the success of the Department of Justice in combatting cybercrime through prosecutions of hackers. But we never expected this. Following Chinese President Xi’s visit to the U.S., and for the first...more

Disgruntled Former Tribune Company Employee Who Aided Hacking Convicted; Could Face Jail Time

On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more

California Law Enforcement and Industry Gain Procedural Certainty with Historic Cal-ECPA Bill

On October 8, 2015, Governor Jerry Brown of California signed into law Senate Bill 178, known as the California Electronic Communications Privacy Act (Cal-ECPA). Cal-ECPA mandates that California law enforcement agencies...more

The Internet of Things and the Inevitable Collision with Product Liability PART 4: Government Oversight

The exponential growth of the Internet of Things (IoT) is far outpacing the ability of stakeholders to address safety standards and security concerns. This is not unusual as rapidly developing technology often challenges...more

DOJ Disables Malware Designed for Bank-Theft; Unseals Indictment Against Botnet Administrator

On October 13, the DOJ unsealed an indictment against a Moldovan citizen for his alleged involvement in a criminal conspiracy to steal confidential financial information by distributing malware software through phishing...more

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

Feds continue to prosecute hackers

Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more

The Evolving Landscape of “Hacking Back” Against Cyber Attacks

Self-defense is a natural, almost reflexive human instinct. But it has a complicated history in American law, full of contradiction and compromise. Many jurisdictions have long recognized that an otherwise illegal act—such...more

California Joins Other States with the Passage of CalECPA

Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more

Safe Harbor Invalid! Will the ECJ follow the Advocate General recommendation?

Advocate General Yves Bot today delivered an opinion recommending that the European Court of Justice (ECJ) find the U.S.-EU Safe Harbor Program invalid. His opinion, while non-binding, relates to a request for a preliminary...more

European Parliament publishes its proposals for the security of the EU

On 9 July 2015 the European Parliament published its European agenda on security, setting out the current situation of security in the European Union before identifying three key areas upon which efforts should be focused:...more

California Attorney General’s Open Data Initiative – The Latest in State and Federal Government Efforts to Harness the Power of...

Early this month, California Attorney General Kamala D. Harris announced a unique data initiative to expand the public’s access to key criminal justice information that has been, to date, largely blocked from public...more

Arizona’s Revenge Porn Law Remains on Indefinite Hold

Earlier this year, the Arizona Legislature made major revisions to Arizona’s revenge porn law, Arizona Revised Statutes § 13-1425. Arizona is neither the first nor the only state to prohibit the unauthorized disclosure...more

280 Results
View per page
Page: of 12

Follow Criminal Law Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.