Science, Computers & Technology Civil Procedure Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

When Is Using a Computer a Crime? Rehearing Sought on Ninth Circuit’s “Distressingly Unclear” Answer

Facebook recently won a landmark victory in the Ninth Circuit against a company that accessed Facebook’s computers to help users manage their social network accounts. Now the company, Power Ventures, Inc., says that the...more

Sparks Fly in Ninth Circuit’s Nosal II Opinion

As many loyal TSW readers know, we’ve been watching the ongoing saga involving ex-Korn Ferry recruiter David Nosal wind its way through the courts since the early days of this blog. And last month, the highly anticipated...more

Second Circuit: Stored Communications Act Warrants Cannot Reach Overseas Data

On July 14, 2016, the Second Circuit Court of Appeals determined that a warrant issued under the Stored Communications Act (SCA) is subject to the same territorial restrictions as a traditional warrant: the government’s reach...more

The Supreme Court - May 2016

The Supreme Court of the United States issued one decision on May 2, 2016: Ocasio v. United States, No. 14-361: Petitioner Samuel Ocasio, a former police officer, was tried and convicted under the Hobbs Act for...more

Health Care Fraud and Abuse Control (HCFAC) Program Logs $2.4 Billion in Recoveries for FY 2015

The federal government won or negotiated more than $1.9 billion in judgments and settlements, and attained additional administrative impositions in health care fraud cases and proceedings in FY 2015, according to the latest...more

7th Circuit Grants Partial Reprieve to Trade Secret Thief Who Couldn’t Shoot Straight

Crime Does Not Pay - You have to feel a little sorry for Yihao Pu. Pu was a finance engineer who worked for two companies with proprietary systems for executing high frequency stock trading (HTF). Pu illegally...more

Rival Court Decisions Reflect Shifting Views on Privacy in Public

With the spotlight on one high-profile battle that pits privacy rights against public safety interests, another crucial, similar dispute is making its way through the courts. How to evaluate new technology and its potential...more

Challenging Psychological Tests in Litigation – The Value and Limitations of The MCMI-III™

The Millon Clinical Multiaxial Inventory III (“MCMI-III”™) is a popular assessment tool used by clinical psychologists, that has been in use since approximately 1977. This instrument has been the subject of many articles and...more

Spoofing Is No Joke: Prosecutors Clamp Down on High-Frequency Traders

On November 3, 2015, an Illinois federal jury convicted Michael Coscia, a high-frequency commodities trader, of six counts of commodities fraud and six counts of spoofing—entering a buy or sell order with the intent to cancel...more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

The “Cannibal Cop” and Protection of Computerized Data

In an unusual criminal case, the Second Circuit Court of Appeals recently weighed in on an important question at the intersection of employment law and data security. The decision will likely have implications wherever...more

Prosecutors Record First-Ever Conviction for ‘Spoofing’: A New Era of Trading Enforcement

Asset managers and other traders should expect aggressive anti-spoofing enforcement and consider reviewing their trading practices in light of this most recent development. On November 3, 2015, a federal jury in...more

Will The CFAA, An Old Anti-Hacking Law, Apply To Password Sharing?

David Nosal, an ex-employee of Korn Ferry International (“KFI”), convinced some of his former colleagues to download source lists from KFI using their log-in credentials and the log-in credentials of another employee. In...more

Motion to Quash Service Is Not a Collateral Order and Therefore Not Appealable - United States v. Sinovel Wind Grp. Co.

The U.S. Court of Appeals for the Seventh Circuit concluded that the district court’s denial of defendant Sinovel’s motion to quash service of process is not an appealable order under the collateral order doctrine. The Court...more

New York v. Aleynikov: New York State’s Penal Code (Like Federal Criminal Law) Does Not Cover Electronic Reproduction of Source...

In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more

Motorola and the Extraterritorial Application of US Antitrust Laws to Foreign Component Price Fixing Cartels

Last month the Supreme Court declined to accept an appeal for two related antitrust cases involving an international price-fixing cartel. The cases come from different circuits, one was criminal and the other civil, but they...more

The USA FREEDOM Act Heightens the Need for Carriers to Examine their Data Retention Practices

On Tuesday, June 2, 2015, Barack Obama signed the USA FREEDOM Act into law. Among other reforms, the USA FREEDOM Act adopts a series of modifications to federal foreign intelligence gathering statutes and procedures to...more

Kolon Finally Served With Criminal Summons in Korea, Subsequently Settles for $360 Million

On April 30, 2015, Kolon Industries finally resolved two long-standing disputes regarding its alleged misappropriation of trade secrets related to DuPont Co.’s bullet-proof Kevlar Material.  The settlement resolved a six-year...more

To Catch an E-Thief — Under Federal Property Law

As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition. The fundamental shift for busi­nesses in the past 15 years from paper documents to computer data has forced the courts...more

North Carolina ABC Legislative Wrap-Up 2014

The 2014 legislative short session adjourned on August 20, 2014. The General Assembly passed several bills affecting alcoholic beverages in North Carolina. Significant provisions of those bills are summarized below....more

Judge Rakoff Rules that Bitcoin Is Money in New York Federal Court

On August 19, Judge Jed S. Rakoff of the US District Court for the Southern District of New York issued a ruling in the case of Robert Faiella, holding that bitcoins are “money,” citing the plain meaning of the term in The...more

Microsoft loses third round of battle against extra-territorial warrants

On 31 July, the chief judge of the Southern District of New York delivered the latest in a series of controversial judgments stemming from a test case brought by Microsoft in an extra-territorial warrant issued under the U.S....more

Court Requires Employer To Pay Legal Fees Of Ex-Employee Charged With Trade Secret Theft

On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more

Chad Elie v. Ifrah Law PLLC [Professional Negligence Claims]

Order Granting Limited Stay of Discovery Nevada

ORDER that all discovery is stayed in this case until the earlier of 20 days after Defendant files an answer or February 21, 2014. Discovery Plan and Scheduling Order due by 3/13/2014. Signed by Magistrate Judge Cam Ferenbach...more

Governmental Authority in Accessing Private Information of Internet Users in China

The revelation of the U.S. mass data collection program PRISM has triggered a worldwide discussion about the government’s access to the private communications of Internet users....more

63 Results
View per page
Page: of 3

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.