News & Analysis as of

Science, Computers & Technology Criminal Law Communications & Media

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Defending Against Social Engineering Attacks

by Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

Third Circuit Holds Criminal Defendant in Contempt for Refusing to Decrypt Hard Drives

In a precedential ruling, the Third Circuit Court of Appeals this week upheld a lower court’s ruling holding a criminal defendant in contempt for refusing to decrypt two external hard drives that were seized during a child...more

Digital Divide Deepens: Tech Community Backs Second Circuit in Clash with Magistrates over Reach of U.S. Warrants

The technology community took aim at a recent federal magistrate’s ruling that ordered Google Inc. to comply with search warrants seeking customer emails stored on servers abroad, calling the decision “an impermissible...more

US Magistrate Judge Upholds Search Warrants for Google Data Stored Overseas, “Shards” and All

by Latham & Watkins LLP on

Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more

Does Facebook Have the Right to Challenge Search Warrants Seeking Facebook Users’ Data? New York’s Highest Court Hears Argument

Facebook is the latest social media giant to push back on law enforcement efforts to seek user information. On Tuesday, the New York Court of Appeals heard oral argument in a case focusing on whether Facebook has the...more

First Criminal Prosecution Under Amended Arizona Telemarketing Law

by Klein Moynihan Turco LLP on

Last week, Arizona State resident Lukeroy Rose became the first person to plead guilty to an alleged criminal violation of a recently amended Arizona telemarketing law. How can telemarketers and text message marketers...more

Can Amazon’s Echo Help Solve a Murder Mystery?

by Robins Kaplan LLP on

Is Amazon’s Echo device the crucial key to cracking a murder mystery? Prosecutors in Bentonville, Ark. hope that the smart speaker technology could at least provide some additional clues into the Benton County murder. The...more

Amazon’s Echo May Possess Evidence in a Murder Case

Police in Bentonville, Arkansas are seeking records from an Amazon Echo device (for the second time) which may contain records in connection with a murder investigation in the home of James Andrew Bates where Victor Collins...more

Password Sharing Is Not a Crime, Ninth Circuit Reassures in Denial of Nosal’s Request for Rehearing

Since the early days of this blog, we’ve been covering the ongoing legal battle involving ex-Korn Ferry recruiter David Nosal as it winds its way through the courts. The latest chapter in this saga came on December 8, 2016,...more

Investigatory Powers Act 2016 becomes law

by White & Case LLP on

The UK Investigatory Powers Bill has received royal assent and passed into law as the Investigatory Powers Act 2016. The Act will have a significant and far reaching impact on data, technology and communications businesses,...more

Privacy Perils: Identify Theft and Social Networking

by Bass, Berry & Sims PLC on

Identity theft through social networking is on the rise. Hacked accounts may be used to impersonate you and potentially cause reputational harm, or may even link the hacker to your financial account information and...more

When Using a Computer Becomes a Crime, Part Two: ACLU, Facebook Weigh In on Ninth Circuit’s Answer

The Electronic Frontier Foundation (“EFF”) and the American Civil Liberties Union (“ACLU”) have weighed in on Facebook’s high-profile dispute with a social media aggregation company over whether it had unlawfully accessed...more

Encryption: Ensuring the Right to Privacy in the Information Age?

by LeClairRyan on

On December 2nd, 2015, a tragic mass shooting occurred in San Bernardino, California. The attack resulted in 14 deaths and severe injuries to 22 others. The attackers, a married couple, targeted the husband’s workplace – the...more

Using VPN Technology in the UAE: Awareness and Action

by Reed Smith on

There has been much discussion in the media regarding the use of virtual private networks (VPNs) in the United Arab Emirates (UAE), triggered by the recently announced Federal Law No. (12) of 2016 (the Amendment), which...more

Litigation Alert: The Sixth Circuit Expands Potential Federal Wiretap Act Liability for Developers and Sellers of Cloud-Based...

by Fenwick & West LLP on

Last week, the Sixth Circuit expanded potential liability for violations of the Federal Wiretap Act for manufacturers of devices that can be used for wiretapping, like monitoring software, in reversing the dismissal of a...more

When It Absolutely, Positively Has to Be Indicted Overnight: How to Prevent Future Debacles Like the FedEx Prosecution

by Pepper Hamilton LLP on

Against the backdrop of years of unprecedented monetary penalties imposed through DOJ civil settlements and deferred prosecution agreements with financial institutions embroiled in the 2008 financial meltdown, the DOJ came...more

Weekly Web Wrap-Up

Welcome to Sheppard Mullin’s Weekly Web Wrap-Up, a quick list of the past week’s top news in the social media, gaming, and virtual goods and currencies industries curated by Social Media & Games Team. Here are some of the...more

When Is Using a Computer a Crime? Rehearing Sought on Ninth Circuit’s “Distressingly Unclear” Answer

Facebook recently won a landmark victory in the Ninth Circuit against a company that accessed Facebook’s computers to help users manage their social network accounts. Now the company, Power Ventures, Inc., says that the...more

Second Circuit Eases Tension Between U.S. Discovery Requirements and EU Privacy Laws

by Dorsey & Whitney LLP on

Microsoft scored an important victory when the Second Circuit ruled that the government is not authorized to issue warrants for customer data stored overseas. In re Warrant to Search a Certain E-mail Account Controlled &...more

Ex-Cardinals scouting director sentenced to serve time in jail for Astros database hacking

Back in January, we wrote about the ex-Cardinals Scouting Director pleading guilty to hacking the Houston Astros database. Now, this week, Christopher Correa, former scouting director and director of baseball development, was...more

You’ve Got (Foreign) Mail: Can Law Enforcement Get to it?

Even though Microsoft is a U.S. corporation subject to domestic subpoenas and warrants, prosecutors are not entitled to emails stored on its servers abroad, the Second Circuit ruled last week in Microsoft Corp. v. United...more

The Stored Communications Act’s Warrant Provisions Do Not Apply Extraterritorially

by Reed Smith on

On July 14, the Second Circuit in Microsoft v. United States ruled that the Stored Communications Act (SCA) “does not authorize a U.S. court to issue and enforce an SCA warrant against a United States-based service provider...more

Court: Stored Communications Act Warrant Cannot Be Used to Seize Data Held Overseas

by Ballard Spahr LLP on

In a case that may have significant impact for companies providing public Internet and cloud services, the Second Circuit has ruled that a federal court may not issue a criminal warrant ordering a U.S. company to produce...more

“Run for the Hills” Validated by the Second Circuit: Warrants for Electronic Communications Cannot Apply Across International...

by Bryan Cave on

In the lore of the Wild West, when an outlaw needed to escape the hangman’s noose, he made a run for the border, hoping to cross the border before the sheriff could catch him. Today, with the Wild West of the Internet, where...more

CFAA Double Feature: Ninth Circuit Issues Two Important Decisions on the Scope of Liability Related to Data Scraping and...

This past week, the Ninth Circuit released two important decisions that clarify the scope of liability under the federal Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. The Act was originally designed to target...more

364 Results
|
View per page
Page: of 15
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!