Privacy Science, Computers & Technology Criminal Law

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

DOJ Charges Defense Contractor with Removal and Retention of Classified Materials

The Department of Justice (DOJ) yesterday announced that it has charged a Maryland man, Harold Thomas Martin III with theft of government property and unauthorized removal and retention of classified materials by a government...more

Encryption: Ensuring the Right to Privacy in the Information Age?

On December 2nd, 2015, a tragic mass shooting occurred in San Bernardino, California. The attack resulted in 14 deaths and severe injuries to 22 others. The attackers, a married couple, targeted the husband’s workplace – the...more

Aftermath of the Yahoo Breach: M&A Risk and Cybersecurity

In the midst of its acquisition by Verizon Communications Inc., Yahoo Inc. disclosed what looks like one of the largest reported thefts of user information in U.S. history. Yahoo has confirmed that a “state-sponsored”...more

Employee’s Wife Pleads Guilty to Charges After He Stole Patient Information

The Manhattan District Attorney announced this week that a former employee of Lenox Hill Hospital’s wife plead guilty to grand larceny, identity theft in the first degree, and criminal possession of stolen property after her...more

Former IRS Employee Reports to Prison for Identity Theft and Fraud

Nakeisha Hall was sentenced in federal district court in August to serve nine years and two months in prison after she plead guilty for crimes she committed while working for the IRS Taxpayer Advocate Service. Instead of...more

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Litigation Alert: The Sixth Circuit Expands Potential Federal Wiretap Act Liability for Developers and Sellers of Cloud-Based...

Last week, the Sixth Circuit expanded potential liability for violations of the Federal Wiretap Act for manufacturers of devices that can be used for wiretapping, like monitoring software, in reversing the dismissal of a...more

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Congressional Report Finds FDIC Data Breach Response Obstructed Congressional Oversight

On July 12, the U.S. House of Representatives Committee on Science, Space, and Technology (the “Science Committee”) released a report regarding its investigation of an October 2015 data breach and the subsequent response of...more

Baseball Hacking Scandal Leads To 4-Year Sentence And MLB Investigation

On Monday, July 18, 2016, the U.S. District Court for the Southern District of Texas sentenced former St. Louis Cardinals scouting director Chris Correa to nearly four years in prison for the hacking of the Houston Astros’...more

Second Circuit Eases Tension Between U.S. Discovery Requirements and EU Privacy Laws

Microsoft scored an important victory when the Second Circuit ruled that the government is not authorized to issue warrants for customer data stored overseas. In re Warrant to Search a Certain E-mail Account Controlled &...more

Ex-Cardinals scouting director sentenced to serve time in jail for Astros database hacking

Back in January, we wrote about the ex-Cardinals Scouting Director pleading guilty to hacking the Houston Astros database. Now, this week, Christopher Correa, former scouting director and director of baseball development, was...more

You’ve Got (Foreign) Mail: Can Law Enforcement Get to it?

Even though Microsoft is a U.S. corporation subject to domestic subpoenas and warrants, prosecutors are not entitled to emails stored on its servers abroad, the Second Circuit ruled last week in Microsoft Corp. v. United...more

The Stored Communications Act’s Warrant Provisions Do Not Apply Extraterritorially

On July 14, the Second Circuit in Microsoft v. United States ruled that the Stored Communications Act (SCA) “does not authorize a U.S. court to issue and enforce an SCA warrant against a United States-based service provider...more

When Stealing in Baseball Can Land You in Jail: Computer Fraud Sentencing Announced in MLB Case

Although stealing bases, and even signs, in baseball may be part of the game, stealing another team’s trade secrets can land you in federal prison, as one executive recently learned the hard way. As we previously...more

Ransomware Attacks on ePHI May Be a Data Breach Under HIPAA

On July 11, 2016, the Office of Civil Rights (“OCR”) at the Department of Health and Human Services issued new HIPAA guidance regarding the growing epidemic of malicious computer software known as “ransomware”....more

Second Circuit: Stored Communications Act Warrants Cannot Reach Overseas Data

On July 14, 2016, the Second Circuit Court of Appeals determined that a warrant issued under the Stored Communications Act (SCA) is subject to the same territorial restrictions as a traditional warrant: the government’s reach...more

Analogizing an Internet Accessible Computer to Broken Window Blind, Court Finds No Expectation of Privacy in Computers

A federal court in the Eastern District of Virginia has held that a user utilizing a computer connected to the Internet has no expectation of privacy because hackers have repeatedly demonstrated their ability to circumvent...more

Senate Rejects Amendment That Would Expand The FBI’s Data Collection Powers

On Wednesday, June 22, the U.S. Senate voted down a proposal that would have expanded the Federal Bureau of Investigation’s (“FBI”) ability to obtain internet records from technology companies. The measure, a proposed...more

What Attorneys Can Learn from History’s Largest Data Breach

On April 3, 2016, the public learned that millions of client documents from the Panamanian law firm and corporate services provider Mossack Fonseca & Co. (MF) had made their way to an international organization, the...more

DOJ Criminal Chief Continues Push For More Access To Encrypted Data

On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more

Controversy looms over ECPA amendment in wake of Orlando terrorist attack

After the terrorist attack in Orlando, Florida, early this month, the Electronic Communications Privacy Act (ECPA) has been discussed quite a bit. The ECPA, a law which took effect in 1986, limits the government’s access to...more

Ransomware Update: The FBI Weighs In

The FBI recently released an article discussing the spate of ransomware attacks on a variety of different entities, including hospitals. In the article, the FBI warned that ransomware attacks and the cybercriminals carrying...more

How employers can stop departing employees taking client lists with them

When an employee departs for a role with a competitor, there is often a risk that the employee might take confidential client details with them, with potentially damaging consequences for the employer. However, a recent court...more

Happy Times, High Crimes and Misdemeanors (Silicon Valley – Episode 25)

In this week’s episode of Silicon Valley, Richard enjoyed an unprecedented run of success, culminating with the official launch of Pied Piper’s platform. Richard has suffered so many setbacks, it’s little wonder he is...more

346 Results
View per page
Page: of 14

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.