Privacy Criminal Law

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Future Unclear For NSA’s Bulk Telephone Metadata Collection Program

Fast approaching is the June 1 expiration of certain provisions of the Patriot Act, including § 215 (codified as 50 U.S.C § 1861), which is the basis for the National Security Agency’s (NSA) bulk telephone metadata collection...more

Law Enforcement Data May Not Be Subject to PRA

Data collected by automated license plate readers is exempt from disclosure under the Public Records Act, a California appellate court held this week. ALPRs scan license plates visible from their position and automatically...more

Internal Revenue Service Announces Creation Of A Criminal Investigative Team To Focus On Cyber Tax Fraud

A May 5, 2015 report detailed that the Internal Revenue Service (“IRS”) has created a new cybercrime investigation team. Based in Washington, D.C., and made up of about a dozen specially-trained agents, the unit will focus...more

French National Assembly Adopting Surveillance Legislation

On 5 May 2015, the French National Assembly adopted a Bill aiming at reinforcing state surveillance. Several internet players as well as politicians have already raised serious concerns regarding the adoption of this Bill....more

Laptops, Border Checks and The Fourth Amendment

Developments in law are sluggish compared to the rapid rate of technological advancement, and courts must constantly apply old legal principles to technologies which were not contemplated at the time the laws were enacted. ...more

France: Lower House of Parliament Adopts Controversial Draft Law on Surveillance

The mood is shifting in the debate between privacy and security as France prepares to enact a controversial terrorism surveillance law critics have nicknamed the “French Patriot Act.” In the wake of the revelations...more

Justice Department Provides Cybersecurity Guidance

In late April, the Department of Justice’s Cybersecurity Unit provided a set of voluntary best practices for companies faced with the prospect of data breaches. The DOJ’s best practices were expressly developed with smaller...more

Breaking Down the DOJ Cybersecurity Unit’s Guidance on Responding to Cyberattacks

Another federal agency has weighed in with “guidance” on cybersecurity preparation and breach response. The Department of Justice (DOJ) is the latest to issue guidance on how companies should respond to data breaches. The...more

DOJ Guidance for Victims of Cybercrime: The Dos and Do Nots of Cyber Preparedness

On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more

DOJ Cybersecurity Unit Releases “Best Practices” For Cyber Breaches

Last week, in conjunction with the Criminal Division’s Cybersecurity Industry Roundtable, the U.S. Department of Justice released its “Best Practices” guide for preparing for and responding to a cyber incident....more

Locke Lord QuickStudy: SJC Adopts New Lower Standard for Motions to Seal Criminal Records

The Supreme Judicial Court (SJC) recently revisited a nearly 20 year old opinion that imposed an onerous burden of proof on former defendants trying to seal their criminal records in the Commonwealth. Previously,...more

Executive Order Authorizes Sanctions against Cybercriminals

Citing cyberthreats as one of the most serious economic and national security challenges to the U.S., President Obama recently issued an executive order (EO) authorizing the use of economic sanctions against those who...more

Protecting Personal Data in China: An Update

Personal data protection legislation has been a widely discussed topic in recent years in China, mainly because employees of institutions that amass personal data of users and clients in the course of their business (such as...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

Don’t Shoot the Messenger: The Expanding Scope of the John Doe Summons

The John Doe summons is an information-gathering tool that has been available to the IRS for many years, traditionally used to seek information about unknown persons suspected of tax evasion from banks, investment advisors or...more

U.S. Supreme Court Rules Prolonging Traffic Stop to Conduct Dog Sniff is Unconstitutional

Overview: Police may not extend a routine traffic stop to give a police dog time to conduct a search for narcotics, the United States Supreme Court held this week. The Court determined that, absent reasonable suspicion,...more

China Update: Privacy Law and Network Security Developments

The past 16 months have been eventful in China in connection with privacy law and network security developments. Key privacy law developments included: .. the coming into effect of new privacy provisions of the...more

Riley and the Third-party Doctrine

On June 25, 2014, the U.S. Supreme Court issued one groundbreaking opinion in two cases regarding cellphone searches incident to arrest. In a unanimous opinion, the court held that under the Fourth Amendment, police must...more

Two Regulatory Crises

It strikes me that two civil regulators are facing dire attacks on aspects of their enforcement programs – both in different U.S. Courts of Appeals – at the same time. Both of these attacks arise out of generalized statutes...more

Two Oft-Neglected Cybersecurity Protections

With each passing year, cybercrime moves further into the mainstream of public company existence. What until recently was mostly an annoying, abstract concern for a handful of companies is now a daily menace that impacts...more

Guard Your Sheep, The Dyre Wolf is Coming

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Breaking News: Executive Order Signed Relating to “Significant Malicious Cyber-Enabled Activities”

President Obama today signed an Executive Order granting authority to the Department of the Treasury’s Office of Foreign Assets Control (OFAC) to impose sanctions on individuals and entities determined to be “responsible for...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Your Mom and the Courts Agree: Naked Online Pix are Not OK

Since the 1990s and the rise of the Internet and social media, each one of us has become increasingly aware of the risks and dangers of unwanted posts and how fast a “discreet” image can go viral....more

New York Proposes Tough New Anti-Money Laundering and Cybersecurity Measures on Financial Services Companies

Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more

619 Results
|
View per page
Page: of 25

Follow Privacy Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×