News & Analysis as of

Privacy International Trade Criminal Law

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

China’s Cyberspace Administration announces first state level investigations under Cybersecurity Law

by Dechert LLP on

China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more

Company Director Becomes First Ever Convicted Under Hong Kong Privacy Law For Failing To Respond To Investigation Summons

by King & Spalding on

The director of a Hong Kong employment agency was convicted of a criminal offense arising under Hong Kong’s Personal Data (Privacy) Ordinance (“PDPO”) on June 30, 2017. The director pleaded guilty before the Kowloon City...more

Another Rematch Between Tech Companies and the Government over the Territorial Reach of the Stored Communications Act

Lawyers for the tech community are gearing up for argument next month in the U.S. District Court in San Francisco, seeking to overturn another magistrate’s order that requires digital information stored outside of the U.S. to...more

DOJ Asks SCOTUS to Take on Microsoft Case and Verizon Suffers its own Data Breach: eDiscovery Trends

by CloudNine on

A rare two-topic day, but both are notable… Remember the Microsoft Ireland Warrant case, where the Second Circuit reversed earlier rulings and denied the government’s efforts to compel Microsoft to provide emails in that...more

Conviction for Economic Espionage, Sale of Trade Secrets to China

by McDermott Will & Emery on

The US Court of Appeals for the Ninth Circuit upheld the first federal jury criminal conviction for economic espionage and theft of trade secrets under the Economic Espionage Act of 1996 (EEA), even though the owner of the...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

Senate Considers Potential Changes to ECPA to Ease Access to Electronic Data Across Borders

Terrorist attacks, most recently in London and Manchester, England, have raised the pressure on law enforcement and lawmakers in countries like the U.K. and the U.S., to proactively intercept and interrupt terrorist...more

One Month to Better Investigations and Reporting-Day 10-Best Practices in a Cross-Border Investigation

by Thomas Fox on

Description: Mara Senn and a colleague, Michelle Albert, published in the FCPA Report, Volume 3, Number 1, entitled “Internal Investigations, How to Conduct an Anti-Corruption Investigation: Developing and Implementing the...more

English Court Questions the Application of Litigation Privilege in Criminal Investigations

On 8 May 2017, the English High Court of Justice handed down judgment in The Director of the Serious Fraud Office v. Eurasian Natural Resources Corporation Ltd,1 which could significantly limit the application of litigation...more

WannaCry Malware and Medical Device Security

by Knobbe Martens on

The WannaCry virus has infected and frozen computers in many industries around the world. According to a news source report, the virus has extorted doctors and hospital administrators for the keys to unlock and regain access...more

Ransomware Attack – Quick Facts

By now, you may have heard about the global ransomware attacks affecting health care and other organizations throughout the world, in particular the United Kingdom, but also in the United States. The ransomware variant,...more

WannaCry Ransomware Attack Updates — Europol Says “Patch Before Monday”

UPDATE: Europol chief Rob Wainwright told the BBC, “Companies need to make sure they have updated their systems and ‘patched where they should’ before staff arrives for work on Monday morning.” By now, you may have...more

Blurring The Line Between Foreign and Domestic: The Expansion of Search Warrant Powers Overseas

A dispute in California federal court over whether Google must turn over documents stored overseas in response to a search warrant may have major implications for white collar practitioners and their clients. Last week Google...more

Everything Compliance-Episode 10, the first 100 Days of the Trump Administration-Part I

by Thomas Fox on

This episode is the first of a two-part series of podcasts dedicated to the chaotic (at best) first 100 days of the Trump administration as it related to compliance. This episode includes Jonathan Armstrong and Jay Rosen. The...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

Digital Divide Deepens: Tech Community Backs Second Circuit in Clash with Magistrates over Reach of U.S. Warrants

The technology community took aim at a recent federal magistrate’s ruling that ordered Google Inc. to comply with search warrants seeking customer emails stored on servers abroad, calling the decision “an impermissible...more

Tech Rally – Industry Giants Back Google's Play to Protect Data

by Bracewell LLP on

On March 10, 2017, Google Inc. filed its objection to a Pennsylvania magistrate judge's order to comply with search warrants and turn over personal user data partially stored on foreign servers abroad. A number of technology...more

Privileged information is generally safe from Subject Access Requests

by White & Case LLP on

Subject Access Requests ("SARs") are an increasingly popular weapon in litigation, because they can be used to provide a cheap and quick form of pre-action disclosure. However, courts have confirmed that information subject...more

US Magistrate Judge Upholds Search Warrants for Google Data Stored Overseas, “Shards” and All

by Latham & Watkins LLP on

Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more

Litigation Alert: Pennsylvania Court Holds Google Must Produce Emails Stored Overseas

by Fenwick & West LLP on

Last week, in In re Search Warrants Nos. 16-960-M-01and 16-1061-M to Google, a federal magistrate judge in the Eastern District of Pennsylvania ordered Google to comply with three search warrants to turn over users’...more

Sharply Divided Circuit Denies Government’s En Banc Petition In Microsoft Appeal

In July 2016, the Second Circuit ruled that the Government could not employ a domestic search warrant, issued pursuant to the Stored Communications Act, 18 U.S.C. § 2703 (the “SCA”), to compel disclosure of an email account...more

Second Circuit Court of Appeals Denies Rehearing in Microsoft Case

Back in December 2013, a U.S. magistrate issued a seemingly routine warrant in a narcotics case demanding that Microsoft turn over messages from a customer’s email account that resided on a server in Ireland. That warrant,...more

Investigatory Powers Act 2016 becomes law

by White & Case LLP on

The UK Investigatory Powers Bill has received royal assent and passed into law as the Investigatory Powers Act 2016. The Act will have a significant and far reaching impact on data, technology and communications businesses,...more

Everything Compliance-Episode 2

by Thomas Fox on

This episode is dedicated exclusively to where FCPA enforcement, SEC enforcement, the compliance profession and compliance programs may be headed under the Trump administration, with a dash of anti-trust enforcement and EU...more

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

109 Results
|
View per page
Page: of 5
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.