Privacy Criminal Law Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

China Update: Privacy Law and Network Security Developments

The past 16 months have been eventful in China in connection with privacy law and network security developments. Key privacy law developments included: .. the coming into effect of new privacy provisions of the...more

Riley and the Third-party Doctrine

On June 25, 2014, the U.S. Supreme Court issued one groundbreaking opinion in two cases regarding cellphone searches incident to arrest. In a unanimous opinion, the court held that under the Fourth Amendment, police must...more

Two Oft-Neglected Cybersecurity Protections

With each passing year, cybercrime moves further into the mainstream of public company existence. What until recently was mostly an annoying, abstract concern for a handful of companies is now a daily menace that impacts...more

Guard Your Sheep, The Dyre Wolf is Coming

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Breaking News: Executive Order Signed Relating to “Significant Malicious Cyber-Enabled Activities”

President Obama today signed an Executive Order granting authority to the Department of the Treasury’s Office of Foreign Assets Control (OFAC) to impose sanctions on individuals and entities determined to be “responsible for...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Your Mom and the Courts Agree: Naked Online Pix are Not OK

Since the 1990s and the rise of the Internet and social media, each one of us has become increasingly aware of the risks and dangers of unwanted posts and how fast a “discreet” image can go viral....more

New York Proposes Tough New Anti-Money Laundering and Cybersecurity Measures on Financial Services Companies

Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more

California May Limit Law Enforcement’s Warrantless Data Collection

Eager to retain its spot among the principal laboratories for domestic privacy legislation, California’s legislature is set to debate Senate Bill 178, legislation restricting state law enforcement agencies from requesting...more

Connected cars are privacy and security threats?

The recent report from the US Senator Ed Markey raises issues on the future of connected cars because of the privacy issues and the potential cybercrimes that might affect the security of vehicles.  ...more

An Attempt For ECPA Reform

Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more

HIPAA' s Criminal Charges Pack a Heavy Punch

Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more

A Winnable Fight Against Crimes In Cyberspace

California boldly made an example out of a felonious website owner who operated a website dedicated to shaming, embarrassing and harassing complete strangers. Following the first ever prosecution of the operator of a “revenge...more

Two-Factor Authentication Is a Necessity for Companies

It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

Alert: Pro-ISIS Hackers Targeting Media Outlets

Recent widely publicized cyberattacks have made clear that nation-state hackers are now hacking companies for political purposes and they appear to be focused on broadcasters and other media companies....more

FBI Director James Comey To The Private Sector: “You need protection. You need guidance. I need information.”

FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more

FinCrimes Update - December 2014, Volumn 1, Issue 10

In this Issue: BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement...more

What’s on the Horizon in the Golden State?

As we near the turn of the year into 2015, organizations should keep an eye on laws taking effect on the West Coast. This year, the crop of new privacy statutes includes a few without precedent anywhere in the country. The...more

Subscriber Does Not Have Fourth Amendment Privacy Interest in Own IP Data

In 2012, the Supreme Court decided the case of United States v. Jones, 132 S. Ct. 945 (2012). Jones involved the government's use of a GPS tracking device on a vehicle and the information gleaned therefrom. The holding was...more

DOJ Announces Formation of Cybersecurity Unit In Efforts to Prevent Cybercrime

On December 4, Assistant AG Leslie Caldwell delivered remarks at the Cybercrime 2020 Symposium regarding the DOJ’s recent efforts to fight cybercrime. Specifically, Caldwell noted the DOJ’s Criminal Division is (i) increasing...more

DOJ Announces New Cybersecurity Unit in the Criminal Division

To address cyber threats on multiple fronts, the DOJ is creating a new Cybersecurity Unit with the goal of having both a robust enforcement strategy as well as a broad prevention strategy....more

Status Updates - December 2014

Yik Yak arrests. For several months now we at Socially Aware have been writing about how college students have been using the purportedly anonymous messaging app Yik Yak to communicate deeply offensive remarks and threats of...more

Apple Strengthens Privacy Protections

Apple recently changed its privacy policy which has made headlines – it will no longer unlock iPhones and iPads for law enforcement. Prior to this change, Apple would assist law enforcement in unlocking Apple devices when...more

Privacy Monday (on Tuesday….) November 2014

Sometimes the day just gets away from you ….. Here are three privacy & security things you should know for your week: 1. FTC Cites TRUSTe With Misrepresenting Practices – Fines $200,000 Apparently TRUSTe...more

218 Results
|
View per page
Page: of 9

Follow Privacy Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×