Science, Computers & Technology Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Corporate Espionage: Not Your Typical Sports-“Gate”

Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams. And usually when the talking heads on sports radio and television...more

FDA Reports Results of Annual Crack Down on Illegal Internet Pharmacies

Last week, FDA announced that more than 1,050 websites had illegal drugs and devices seized or received warning letters as part of the Eighth Annual International Internet Week of Action (IIWA). IIWA is an international...more

Welcome to the Digital Age, Officer

California SB 178 Seeks to Apply Warrant Requirement to Electronic Devices and Online Data - The California Senate is currently reviewing the proposed California Electronic Communications Privacy Act (SB 178), which...more

Blog: OIG Reports Targeting Medicare Part D Fraud Issued on the Heels of National Medicare Fraud Sweep

The Health and Human Services (HHS) Office of Inspector General (OIG) released two reports yesterday related to Medicare Part D fraud. The OIG report, Ensuring the Integrity of Medicare Part D, “synthesizes numerous OIG...more

Health care worker sent to jail for HIPAA violations

When we train employees on HIPAA, we always remind them that HIPAA violations carry significant penalties-both civil and criminal. Our favorite line is “Keep your day job.” Stealing patient information is never worth the...more

Caught Stealing More Than Bases, St. Louis Cardinals Teach Trade Secret Safety to All Employers

The recent hacking attack against the Houston Astros is a wake-up call for all employers: no organization is safe from its adversaries’ attempts to steal proprietary information to gain a leg up in the competition. The...more

Law Enforcement in the 21st Century: How The Courts Are Responding

As published in PublicCEO* The world of law enforcement is changing rapidly. In the last few years, technology has advanced by leaps and bounds altering the way police officers do just about everything. New technology...more

Privacy Tuesday – June 2015 – OPM Hack

The news continues to pour in about the two-part massive hack into the federal government’s Office of Personnel Management (OPM) and the compromise of personal information of millions of present and former federal...more

Update Regarding Office of Personnel Management Cyber Attack

More details continue to emerge about the cyber attack and data breach disclosed last week of the U.S. federal government’s Office of Personnel Management (OPM), and those details continue to get worse. While original reports...more

The USA FREEDOM Act Heightens the Need for Carriers to Examine their Data Retention Practices

On Tuesday, June 2, 2015, Barack Obama signed the USA FREEDOM Act into law. Among other reforms, the USA FREEDOM Act adopts a series of modifications to federal foreign intelligence gathering statutes and procedures to...more

UPDATE: Union Claims that Hackers Have Accessed Personal Data of “All” Federal Employees

As an update to our blog post, “Data Breach Affects Millions of Current and Former Government Workers”, a union representing federal workers is now claiming that the hack may be worse than originally feared. Yesterday, the...more

FinCEN Enforcement and Regulatory Focus—Transparency in Real Estate Transactions, Virtual Currency and More

Why it matters - Transparency in the financial system was underscored as a key focus for the Financial Crimes Enforcement Network (FinCEN) by Director Jennifer Shasky Calvery in a speech before the West Coast AML Forum...more

Blog: Key Takeaways from Government Enforcement Panel at ACI Sunshine Conference

Recently, representatives from the United States Attorney’s Office for the Northern District of Georgia, United States Attorney’s Office for the District of New Jersey, and Medicaid Fraud Control Unit (MFCU) for the Office of...more

DOJ Unveils New Cyber Security Unit and Urges Cyber Attack Victims to Cooperate with Post-Breach Investigations

In a recent speech at the Georgetown Cyber Security Law Institute, Assistant Attorney General Leslie Caldwell outlined the recent activities of a new Cyber Security Unit created within the Justice Department’s Computer Crime...more

Silk Road Operator Sentenced to Life in Prison

On May 29, US District Judge Katherine Forrest sentenced Ross Ulbricht – operator of the online dark market known as Silk Road – to life in prison without the possibility of parole. As previously reported, Ulbricht was found...more

Should We Hack Back?

“No,” says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law Center in late May, the head of the U.S. Department of Justice’s (DOJ) Criminal...more

FinCrimes Update - May 2015 Supplement

FEDERAL RESERVE ORDERS TWO FINANCIAL INSTITUTIONS TO IMPROVE BSA/AML COMPLIANCE PROGRAMS - On June 1, a Boston-based international financial services holding company and its banking subsidiary agreed to improve...more

The Future Of The NSA’s Bulk Telephone Metadata Program

Section 215 of the Patriot Act expires today. Section 215 addresses the Federal Bureau of Investigation’s ability to gather business records. In 2006, after passage of amendments to the Patriot Act, the Bush administration...more

The Communications Decency Act May Disappoint

California boldly made an example out of a felonious website owner who operated a website dedicated to shaming, embarrassing and harassing complete strangers. Following the first-ever prosecution of the operator of a “revenge...more

Seizure of memory cards from digital cameras allowed under plain view doctrine

Courts today are faced with applying traditional Fourth Amendment search and seizure doctrines to twenty-first century digital technology. In one such case, the Massachusetts Appellate Court upheld a lower court’s holding in...more

DANGER – “General” Search Warrants in the Digital Age

If you knew that there was a chance—maybe even a good chance—that a law enforcement officer could gain access to every single text, email, photograph and voice mail on your smartphone, going back years, because you were...more

Privacy & Cybersecurity Update - May 2015

In This Issue: - Second Circuit Rules Patriot Act Does Not Authorize Bulk Metadata Collection; Congress Reconsiders Certain Patriot Act Authorities - SEC Issues Cybersecurity Guidance for Investment Companies...more

Silk Road’s Ross Ulbricht Receives Life Sentence

On May 29, 2015, after a lengthy criminal investigation and multi-week trial, Ross Ulbricht, the mastermind behind Silk Road—one of the most famous enterprises to utilize Bitcoin currency—was sentenced to life in prison in a...more

Financial Services Weekly News Roundup - May 2015 #4

CFPB Fines Bank $7.5M for Overdraft Violations, With $49M More in Redress - Why it matters: In its first action targeting overdraft fees, the Consumer Financial Protection Bureau (CFPB) fined Regions Bank $7.5...more

Warrantless Laptop Search Suppressed In Sixth Circuit

On May 20, 2015, the Sixth Circuit ruled that the warrantless search of a laptop exceeded the scope of a preceding private search, and was therefore unconstitutional....more

968 Results
|
View per page
Page: of 39

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×