Privacy Criminal Law International Trade

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

FinCrimes Update: December 2015 Summary, Volume 2, Issue 10

AML/BSA & OFAC: OFAC PUBLISHES CYBER-RELATED SANCTIONS REGULATIONS - On December 31, OFAC issued regulations to implement Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in...more

The California Electronic Communications Privacy Act – California Takes the Lead on Digital Privacy in the U.S.

California, home of many of the world’s largest technology companies, has long been at the forefront of protecting personal electronic information in the United States. California adopted the nation’s first data breach...more

Alleged VTech hacker arrested

We previously reported that VTech suffered a data breach exposing millions of children’s and their parents’ personal information. The South East Regional Organised Crime Unit in the UK has announced that it has arrested a 21...more

Global Anti-Corruption Perspective: Conducting Investigations in the Middle East: 10 Key Considerations

It is now commonplace for corporate entities to conduct investigations or risk assessments in multiple territories and jurisdictions at the same time. This type of work is, in part, a direct consequence of increasingly global...more

Schrems & The Collapse of Safe Harbor: What Are The Alternatives to EU Data Collection? [Video]

In the second part of a Front-Line interview, Jo Sherman, CEO, EDT, shares her views on how organizations can comply with new EU regulations in the context of the recent Schrems decision, and the collapse of safe harbor. As...more

The Schrems Decision and Safe Harbor: Can you bring tools to the data? [Video]

In this Front-Line interview, which is the first of two parts, EDT CEO, Jo Sherman, shares her views as to how data protection and transfer have now changed with regards to the recent Schrems decision. Jo encourages...more

Focus on China - October 2015

Welcome to the third issue of Focus on China Compliance for 2015. According to the FCPA Blog’s October 2015 Corporate Investigations List, China leads the countries reported to be involved in FCPA investigations with 29...more

Judicial Redress Act Passes House; May Aid New U.S.-E.U. Safe Harbor

On October 20, the U.S. House of Representatives passed the Judicial Redress Act (the “Act”) to allow European Union residents to challenge certain privacy violations by the U.S. government in U.S. courts. If passed by the...more

Chinese government arrests hackers

We have been reporting on the success of the Department of Justice in combatting cybercrime through prosecutions of hackers. But we never expected this. Following Chinese President Xi’s visit to the U.S., and for the first...more

United States v. Microsoft: ‘Global Chaos,’ Outdated Legislation And a Judge’s Plea to Congress

The Second Circuit’s challenge in considering the validity of a U.S. Stored Communications Act warrant to Microsoft for e-mails located on servers in Ireland involves interpreting the SCA, which was enacted nearly three...more

Safe Harbor Invalid! Will the ECJ follow the Advocate General recommendation?

Advocate General Yves Bot today delivered an opinion recommending that the European Court of Justice (ECJ) find the U.S.-EU Safe Harbor Program invalid. His opinion, while non-binding, relates to a request for a preliminary...more

European Parliament publishes its proposals for the security of the EU

On 9 July 2015 the European Parliament published its European agenda on security, setting out the current situation of security in the European Union before identifying three key areas upon which efforts should be focused:...more

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

Alleged Ringleader of Global Cybercrimes Extradited to United States to Face Charges

Today, the DOJ unsealed an eighteen-count indictment in Brooklyn, New York charging a Turkish citizen (Defendant) with organizing worldwide cyberattacks against at least three U.S. payment processors’ computer networks. The...more

Global Connection - June 2015

The latest edition of Global Connection offers insight into a potential money laundering crackdown in the real estate sector, information on the Federal Trade Commission’s approach to data breach investigations and a legal...more

Update Regarding Office of Personnel Management Cyber Attack

More details continue to emerge about the cyber attack and data breach disclosed last week of the U.S. federal government’s Office of Personnel Management (OPM), and those details continue to get worse. While original reports...more

French National Assembly Adopting Surveillance Legislation

On 5 May 2015, the French National Assembly adopted a Bill aiming at reinforcing state surveillance. Several internet players as well as politicians have already raised serious concerns regarding the adoption of this Bill....more

France: Lower House of Parliament Adopts Controversial Draft Law on Surveillance

The mood is shifting in the debate between privacy and security as France prepares to enact a controversial terrorism surveillance law critics have nicknamed the “French Patriot Act.” In the wake of the revelations...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

Breaking News: Executive Order Signed Relating to “Significant Malicious Cyber-Enabled Activities”

President Obama today signed an Executive Order granting authority to the Department of the Treasury’s Office of Foreign Assets Control (OFAC) to impose sanctions on individuals and entities determined to be “responsible for...more

International Fraud & Asset Tracing (3rd Edition), France

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption Legislation -...more

MoFo Global Procurement Quarterly: Winter 2015

In This Issue: - Protection of Security Relevant Information vs. Enhancement of Global Competition – Germany's "No Spy Decree" for Public Tenders under Continuous Scrutiny - RWIND Tenderer Test: Objective or...more

Connected cars are privacy and security threats?

The recent report from the US Senator Ed Markey raises issues on the future of connected cars because of the privacy issues and the potential cybercrimes that might affect the security of vehicles.  ...more

79 Results
|
View per page
Page: of 4

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×