Privacy Science, Computers & Technology Criminal Law

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

“Alexa, Are My Questions to You Discoverable?”

The Amazon Echo is a hands-free speaker controlled with your voice. It features a personal assistant, “Alexa,” who will perform various tasks for the user in response to the “wake word,” Alexa. Over the holidays, I observed...more

Notable New State Privacy and Data Security Laws – Part Two

This is the second in a two-part series addressing recent developments in state privacy and data security laws. This article addresses new laws about student privacy, enforcement/ punishment for data privacy and security...more

FBI Warns of Romance Scams that “Break Hearts and Bank Accounts”

On the eve of Valentine’s Day, the FBI issued a timely warning about the rise of “Romance Scams.” This type of Internet crime typically targets older widowed or divorced women. While these women are typically computer...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

US Magistrate Judge Upholds Search Warrants for Google Data Stored Overseas, “Shards” and All

Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more

To Obtain Data Abroad, Government Just Googles It

As technology companies expand globally they increasingly are storing customer electronic data in servers outside the United States. To keep apace, the Justice Department has become more creative in adapting existing legal...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

Does Facebook Have the Right to Challenge Search Warrants Seeking Facebook Users’ Data? New York’s Highest Court Hears Argument

Facebook is the latest social media giant to push back on law enforcement efforts to seek user information. On Tuesday, the New York Court of Appeals heard oral argument in a case focusing on whether Facebook has the...more

Drone Operator Arrested in California for Operation Near Helicopter Rescue

On January 27, 2017, police in Pacifica, California arrested a drone operator for allegedly flying a drone near the scene of a helicopter rescue, which effectively delayed the rescue operation. Police and fire rescue...more

First Criminal Prosecution Under Amended Arizona Telemarketing Law

Last week, Arizona State resident Lukeroy Rose became the first person to plead guilty to an alleged criminal violation of a recently amended Arizona telemarketing law. How can telemarketers and text message marketers...more

Sharply Divided Circuit Denies Government’s En Banc Petition In Microsoft Appeal

In July 2016, the Second Circuit ruled that the Government could not employ a domestic search warrant, issued pursuant to the Stored Communications Act, 18 U.S.C. § 2703 (the “SCA”), to compel disclosure of an email account...more

Second Circuit Court of Appeals Denies Rehearing in Microsoft Case

Back in December 2013, a U.S. magistrate issued a seemingly routine warrant in a narcotics case demanding that Microsoft turn over messages from a customer’s email account that resided on a server in Ireland. That warrant,...more

Can Amazon’s Echo Help Solve a Murder Mystery?

Is Amazon’s Echo device the crucial key to cracking a murder mystery? Prosecutors in Bentonville, Ark. hope that the smart speaker technology could at least provide some additional clues into the Benton County murder. The...more

Amazon’s Echo May Possess Evidence in a Murder Case

Police in Bentonville, Arkansas are seeking records from an Amazon Echo device (for the second time) which may contain records in connection with a murder investigation in the home of James Andrew Bates where Victor Collins...more

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

Indictment Issued in Law Firm Hacks

In what New York’s top federal prosecutor called a “wake-up call for law firms around the world,” three Chinese citizens have been charged with hacking into the servers of two prominent – but unidentified – international law...more

Large Majority of Businesses Pay to Unlock Ransomware

2016 has been a banner year for ransomware cybercriminals. We have seen a dramatic rise in the use of ransomware, and businesses continue to become victims to ransomware, primarily through phishing and spear phishing schemes....more

Password Sharing Is Not a Crime, Ninth Circuit Reassures in Denial of Nosal’s Request for Rehearing

Since the early days of this blog, we’ve been covering the ongoing legal battle involving ex-Korn Ferry recruiter David Nosal as it winds its way through the courts. The latest chapter in this saga came on December 8, 2016,...more

Investigatory Powers Act 2016 becomes law

The UK Investigatory Powers Bill has received royal assent and passed into law as the Investigatory Powers Act 2016. The Act will have a significant and far reaching impact on data, technology and communications businesses,...more

Law Enforcement Permitted To Obtain GPS Location Data Without A Warrant In A Sex Trafficking Investigation

In United States v. Gilliam, 15-387, the Second Circuit (Newman, Winter, Cabranes) held that, under the exigent circumstances present in that case, law enforcement could use cell phone GPS data to locate a suspect without...more

Privacy Perils: Identify Theft and Social Networking

Identity theft through social networking is on the rise. Hacked accounts may be used to impersonate you and potentially cause reputational harm, or may even link the hacker to your financial account information and...more

What you should know about identity theft

Take precautions in giving your personal information as people with ill intentions may misuse it. Dubai: As alarming as it sounds, you could be the next victim of identity theft.The phenomenon is becoming more prevalent...more

Banks Should Prepare for Increased Collaboration between IT, Legal and BSA/AML Compliance Departments under New FinCEN Guidance

Last month, the U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) issued an Advisory which provided substantial guidance to financial institutions regarding the scope of information that must be...more

When Using a Computer Becomes a Crime, Part Two: ACLU, Facebook Weigh In on Ninth Circuit’s Answer

The Electronic Frontier Foundation (“EFF”) and the American Civil Liberties Union (“ACLU”) have weighed in on Facebook’s high-profile dispute with a social media aggregation company over whether it had unlawfully accessed...more

Are Cyber Thieves Compromising E-Mail? .. YES!

Recently FinCEN issued Advisory (FIN-2016-A003) regarding e-mail compromise schemes that defraud Financial Institutions by deceiving them into conducting wire transfers that result in misappropriated customers funds. The...more

371 Results
|
View per page
Page: of 15

Follow Privacy Updates on:

Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×