News & Analysis as of

Criminal Law Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:

Permissible Disclosures Under the Stored Communications Act

by Revision Legal on

The Stored Communications Act, which is codified at 18 USC 121, sections 2701-2712, is federal law that governs the conduct of electronic communication service providers and the voluntary and compelled disclosure of the...more

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

Defending Against Social Engineering Attacks

by Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

Privacy Commissioner critical of the bank's disclosure of personal information to the police

by DLA Piper on

A recent finding by the New Zealand  Privacy Commissioner (Commissioner) highlighted the need for organisations holding personal information to have appropriate policies and procedures in place to deal with requests from law...more

NY AG Report Shows Number of Data Breaches Soared in 2016

Unfortunately, it was a record breaking year in the State of New York for data breaches. The New York Attorney General (AG) released his annual data breach report, which announced that the AG’s Office received 1,282 data...more

Maryland Sheriff’s Office Recovers Stolen Construction Goods Through Drones

Last week, Maryland’s Cecil County Sheriff’s Office used an unmanned aerial vehicle (UAV) to recover nearly $400,000 worth of stolen construction equipment, which also led to the arrest of the culprit. The New Jersey State...more

Third Circuit Holds Criminal Defendant in Contempt for Refusing to Decrypt Hard Drives

In a precedential ruling, the Third Circuit Court of Appeals this week upheld a lower court’s ruling holding a criminal defendant in contempt for refusing to decrypt two external hard drives that were seized during a child...more

Digital Divide Deepens: Tech Community Backs Second Circuit in Clash with Magistrates over Reach of U.S. Warrants

The technology community took aim at a recent federal magistrate’s ruling that ordered Google Inc. to comply with search warrants seeking customer emails stored on servers abroad, calling the decision “an impermissible...more

Tech Rally – Industry Giants Back Google's Play to Protect Data

by Bracewell LLP on

On March 10, 2017, Google Inc. filed its objection to a Pennsylvania magistrate judge's order to comply with search warrants and turn over personal user data partially stored on foreign servers abroad. A number of technology...more

Lawyer’s Pants Literally Catch on Fire and Alexa to “Testify”: eDiscovery Trends

by CloudNine on

OK, this first story isn’t exactly an eDiscovery story, but it’s too good to pass up… Here’s a question for you: Would you believe what a lawyer was telling you during closing arguments if his pants were, literally, on fire?...more

Odor of Marijuana Grounds for Vehicle Search

by Pessin Katz Law, P.A. on

In Robinson, et. al. v State, Nos. 37, 39, & 46, September Term, 2016, decided January 20, 2017 (Watts, J.), the Maryland Court of Appeals, Maryland’s highest court, (the “Court”) held that a law enforcement officer...more

Privileged information is generally safe from Subject Access Requests

by White & Case LLP on

Subject Access Requests ("SARs") are an increasingly popular weapon in litigation, because they can be used to provide a cheap and quick form of pre-action disclosure. However, courts have confirmed that information subject...more

“Alexa, Are My Questions to You Discoverable?”

by Williams Venker & Sanders on

The Amazon Echo is a hands-free speaker controlled with your voice. It features a personal assistant, “Alexa,” who will perform various tasks for the user in response to the “wake word,” Alexa. Over the holidays, I observed...more

Notable New State Privacy and Data Security Laws – Part Two

by Snell & Wilmer on

This is the second in a two-part series addressing recent developments in state privacy and data security laws. This article addresses new laws about student privacy, enforcement/ punishment for data privacy and security...more

FBI Warns of Romance Scams that “Break Hearts and Bank Accounts”

by Snell & Wilmer on

On the eve of Valentine’s Day, the FBI issued a timely warning about the rise of “Romance Scams.” This type of Internet crime typically targets older widowed or divorced women. While these women are typically computer...more

HR, Payroll, Finance Department Beware: Renewed IRS W-2 Phishing Scam Alert

by Dickinson Wright on

The Internal Revenue Service and other agencies recently issued an urgent reminder Alert warning of a sophisticated scam to obtain confidential information and in some cases, fraudulent cash wire transfer payments. Scammers...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

US Magistrate Judge Upholds Search Warrants for Google Data Stored Overseas, “Shards” and All

by Latham & Watkins LLP on

Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more

To Obtain Data Abroad, Government Just Googles It

by Bracewell LLP on

As technology companies expand globally they increasingly are storing customer electronic data in servers outside the United States. To keep apace, the Justice Department has become more creative in adapting existing legal...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

by Bass, Berry & Sims PLC on

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

Does Facebook Have the Right to Challenge Search Warrants Seeking Facebook Users’ Data? New York’s Highest Court Hears Argument

Facebook is the latest social media giant to push back on law enforcement efforts to seek user information. On Tuesday, the New York Court of Appeals heard oral argument in a case focusing on whether Facebook has the...more

Litigation Alert: Pennsylvania Court Holds Google Must Produce Emails Stored Overseas

by Fenwick & West LLP on

Last week, in In re Search Warrants Nos. 16-960-M-01and 16-1061-M to Google, a federal magistrate judge in the Eastern District of Pennsylvania ordered Google to comply with three search warrants to turn over users’...more

Drone Operator Arrested in California for Operation Near Helicopter Rescue

On January 27, 2017, police in Pacifica, California arrested a drone operator for allegedly flying a drone near the scene of a helicopter rescue, which effectively delayed the rescue operation. Police and fire rescue...more

First Criminal Prosecution Under Amended Arizona Telemarketing Law

by Klein Moynihan Turco LLP on

Last week, Arizona State resident Lukeroy Rose became the first person to plead guilty to an alleged criminal violation of a recently amended Arizona telemarketing law. How can telemarketers and text message marketers...more

Sharply Divided Circuit Denies Government’s En Banc Petition In Microsoft Appeal

In July 2016, the Second Circuit ruled that the Government could not employ a domestic search warrant, issued pursuant to the Stored Communications Act, 18 U.S.C. § 2703 (the “SCA”), to compel disclosure of an email account...more

799 Results
|
View per page
Page: of 32
Cybersecurity

Follow Criminal Law Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!