Privacy Criminal Law International Trade

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Status Updates - November 2014 #2

..Bad chords. A European musician’s attempt to stop a negative concert review from continuing to appear in Internet search results is raising questions about whether the EU’s “right to be forgotten” ruling could prevent the...more

QATAR: Promulgating the Cybercrime Prevention Law

On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more

Behind the Great Firewall Of Ediscovery In Asia

When dealing with US requests for data subject to ediscovery rules in Asia, corporate counsel at multinational corporations must be on top of their game. Managing ediscovery in the United States alone presents a significant...more

Federal District Court Decision in Microsoft Case re Warrants for Content Stored Outside US

On July 31, the district court judge issued a ruling in the case involving the US Government’s warrant issued to Microsoft to compel production of data stored on the servers of its wholly owned Irish subsidiary located in...more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

Cybersecurity: How well are Latin American banks protected against cyber attacks?

Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more

Emergency UK Legislation Expands Government Powers to Retain and Intercept Data

On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more

Microsoft loses third round of battle against extra-territorial warrants

On 31 July, the chief judge of the Southern District of New York delivered the latest in a series of controversial judgments stemming from a test case brought by Microsoft in an extra-territorial warrant issued under the U.S....more

Where to Now St. Peter? – Due Diligence Going Forward in China

Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more

Hackers steal 1.2 billion passwords – 4 steps to take now

The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more

Did Russian Hackers Really Amass Over a Billion Passwords?

It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more

Russian Hackers Reportedly Obtain Internet Credentials of More Than 500 Million Users

On August 5, The New York Times reported that Russian hackers have obtained what could be the largest collection of confidential data in history. The security firm that discovered the breach continues to alert affected...more

SDNY Judge Orders Microsoft to Produce Emails Stored Abroad

Chief Judge Loretta A. Preska of the U.S. District Court for the Southern District of New York affirmed Magistrate Judge James C. Francis IV’s opinion and ordered that the U.S. Department of Justice (DOJ) could compel...more

One year of Data Protection Enforcement in France: what the CNIL’s Activity Report 2013 Reveals and what to expect in 2014

According to the French Data Protection Authority’s (“CNIL”) recently issued activity report for 2013, the CNIL was especially busy in 2013. The main topics addressed by the CNIL in 2013 were the creation of a national...more

Cyberliability Developments in the Offshore Jursidictions

The offshore jurisdictions are catching up fast with legal issues relating to cybercrime, cyberliability, and the use and discovery of electronic documents. In the wake of the embarrassing leak in April 2013 of about...more

Data Protection in Singapore - The Personal Data Protection Act 2012

The Personal Data Protection Act 2012 (Act) was passed by the Singapore Parliament on 15 October 2012 and came into effect in Singapore on 2 January 2013. One major component of the Act was to put in place general data...more

Social Pressure Dampens the Success of Ghana’s Whistleblower Law

A farmer in Ghana admits that for years he concealed the corruption of a local public officer who works in his region of Ghana. The farmer is aware of the 2006 Ghana Whistleblower Act and knows that every Ghanaian has a civic...more

Governmental Authority in Accessing Private Information of Internet Users in China

The revelation of the U.S. mass data collection program PRISM has triggered a worldwide discussion about the government’s access to the private communications of Internet users....more

Employers With International Operations Must Take Care to Protect Employee Data

When is the last time your company reviewed its data protection policies? If your company employs any international employees, it may have obligations under foreign laws to have specific safeguards in place....more

Pols Gone Wild: Congress Discovers Trade Secret Theft And Cybersecurity Are Problems; We Sort Through The Explosion Of Legislation

Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more

FCPA Enforcement As A Security Issue And Implications For The Compliance Practitioner

One of the things that has long puzzled me is what led to the significant rise in the enforcement of the Foreign Corrupt Practices Act (FCPA) beginning in the 2003-2004 time frame? ...more

Preventing Corruption While Protecting Personal Information

Multinational businesses are subject to a patchwork of laws of the various jurisdictions in which they operate. Complying with the myriad rules and regulations can be challenging. Compliance obligations vary from one country...more

The Real Lesson of Chinese Cyberhacking

There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more

Protecting Personal Data in China

This advisory is one of a series prepared by Pillsbury's China Practice on questions frequently asked by our clients doing business in China. In June 2012, we published an advisory on personal data protection in China in...more

FinCEN Issues Virtual Currency Guidance

The Financial Crimes Enforcement Network (FinCEN) has issued formal guidance to clarify the anti-money laundering obligations of administrators and exchangers of convertible virtual currency. “Virtual” currency, unlike...more

50 Results
|
View per page
Page: of 2

Follow Privacy Updates on: