Privacy Criminal Law Constitutional Law

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

Defence & Indemnity - April 2016: IV. PRACTICE ISSUES B.

B. Do police need a warrant to access the data on a vehicle’s airbag control module without the owner or driver’s permission? R. v. Fedan, 2016 BCCA 26, per Smith, J.A. [4176]...more

U.S. Supreme Court Proposes Change to Rules Applicable to Searches of Electronic Data

The United States Supreme Court — which establishes rules of civil and criminal procedure, subject to the objection of Congress — has proposed a significant amendment to the rules applicable to searches of electronic data...more

DOL Persuader Regulations Expose Every Employer to Reporting Requirements and Disclosures

All employers should examine their use of labor and employment service providers to mitigate unwanted disclosure of fees paid to such providers. To protect confidentiality and the integrity of the attorney-client...more

Are Changes in Store for the Stored Communications Act?

Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations. In Congress, a proposal to reform the SCA...more

Seventh Circuit Eliminates “Consent Once Removed” Doctrine

If a business invites an employee, customer, or business associate onto its premises, has it consented to a search by government agents? Under the “consent once removed” doctrine, the answer may be yes if the invited...more

Ninth Circuit Addresses Probationers’ Cell Phone Searches by Police

The centrality of cell phones to our daily lives, and the wide array of sensitive information those phones may carry, creates a complex and ever-evolving series of issues over the amount of privacy we can expect to be...more

iWon’t: Apple’s Face-Off with the DOJ

In what is quickly becoming one of the closest-watched cases in the country, Apple is now at loggerheads with the Department of Justice and FBI over its refusal to unlock the iPhone of one of the San Bernardino shooters....more

National Debate on Digital Privacy Shows No Signs of Slowing

The Justice Department’s dispute with Apple related to encryption on the iPhone used by one of the San Bernardino shooters has reinvigorated the national debate on digital privacy. Though it is not clear how the California...more

Apple vs. FBI: The House Judiciary Committee Hearing and Takeaways

Among the major headlines dominating not only the recent news cycle, but also this week’s RSA Conference in San Francisco, has been Apple’s challenge to the federal government’s request that Apple assist in unlocking the...more

Rival Court Decisions Reflect Shifting Views on Privacy in Public

With the spotlight on one high-profile battle that pits privacy rights against public safety interests, another crucial, similar dispute is making its way through the courts. How to evaluate new technology and its potential...more

Should Apple Always Have a Key to All iPhone Data? To Some iPhone Data?

On February 16, 2016, U.S. Magistrate Judge Sheri Pym of the U.S. District Court for the Central District of California issued an Order under the All Writs Act directing Apple Inc. to cooperate with efforts by the Federal...more

Backdooring Investment Security (On the Apple Case)

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

FBI Recruits Apple to Help Unlock Your iPhone

It is a well-known maxim that “bad facts make bad law.” And as anybody even casually browsing social media this week likely has seen, the incredibly tragic facts surrounding the San Bernadino attacks last December have led...more

Federal Court Orders Apple to Unlock San Bernardino Gunman’s Phone

Apple must help the FBI unlock an iPhone used by one of the attackers in the San Bernardino, Calif. assault in December, a federal magistrate judge ruled this week. The ruling handed the government an important victory in an...more

Not So Fast, Not So Much – Data Protection for Cell Tower Traffic Data

In the context of criminal investigations police in Canada may obtain “tower dump” production orders. These are orders requiring the applicable cellular telecommunications providers to disclose all records of cellular traffic...more

California Updates Privacy Rights with the Electronic Communications Privacy Act

Starting on New Years Day 2016, a new law will prohibit California law enforcement agencies from compelling California residents and businesses to turn over metadata or electronic communications (e.g., texts, emails,...more

California Gives the Fourth Amendment a 21st Century Makeover

The average American today generates more media than they did at any other point in history, and the ease with which our communications, photos, and videos are sent and stored digitally means most of us have more media stored...more

Should Smartphone Manufacturers Be Legally Compelled to Unlock Users’ Devices?

Picture this: A criminal defendant is indicted for three counts related to the possession of methamphetamine, and federal prosecutors obtain a warrant for the defendant’s iPhone. But the iPhone is passcode protected, and...more

California Reaffirms First Amendment Right to Record Police in Public

As deputy U.S. marshals detained a group of people in Beatriz Paez’s neighborhood, the 34-year-old South Gate, Calif. resident began recording the incident. Video from another camera-wielding bystander rolls as a different...more

The Limits to Ordering Computer Monitoring as a Special Condition of Supervised Release in the Federal Court System

There are limits to when a Federal District Court Judge may order computer monitoring by United States Probation as a special condition of supervised release. While it can be argued that individuals on supervised release...more

California Law Enforcement and Industry Gain Procedural Certainty with Historic Cal-ECPA Bill

On October 8, 2015, Governor Jerry Brown of California signed into law Senate Bill 178, known as the California Electronic Communications Privacy Act (Cal-ECPA). Cal-ECPA mandates that California law enforcement agencies...more

United States v. Microsoft: ‘Global Chaos,’ Outdated Legislation And a Judge’s Plea to Congress

The Second Circuit’s challenge in considering the validity of a U.S. Stored Communications Act warrant to Microsoft for e-mails located on servers in Ireland involves interpreting the SCA, which was enacted nearly three...more

Arizona’s Revenge Porn Law Remains on Indefinite Hold

Earlier this year, the Arizona Legislature made major revisions to Arizona’s revenge porn law, Arizona Revised Statutes § 13-1425. Arizona is neither the first nor the only state to prohibit the unauthorized disclosure...more

Government Dismisses Its Case After Warrantless Airport Laptop Search

The government has voluntarily dismissed its case against Jae Shik Kim, the South Korean businessman for whom Ifrah Law obtained a motion to suppress in federal court. In 2012, Mr. Kim was stopped by federal agents as he...more

336 Results
|
View per page
Page: of 14

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×