The Social Engineering Cyber Exposure
FCPA Compliance and Ethics Report-Episode 175-Debra Bruce on new methods for law firm funding and its implications
Bjarne Tellmann of Pearson on Major Disruption in the Legal Industry
Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
Overview: The Ninth Circuit Court of Appeals recently found that probable cause supported a warrant authorizing the electronic search of computer equipment and digital storage devices belonging to a suspected child...more
People v. Kucharski, 2013 WL 1281844 (Ill. App. 2nd Dist. Mar. 29, 2013).
In this harassment through electronic communications case, the defendant allegedly posted lewd comments and offensive remarks on the victims...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
When someone subpoenas subscriber information from an internet service provider, does the subscriber have an expectation of privacy? In California, at least, the answer seems to be: No.
In People v. Stirpo, (Second District...more
This decision is the subject of the grant of certiorari by the United States Supreme Court in United States v. Jones, 10-1259.
Maynard and Jones were co-defendants. All legal issues have either been resolved or abandoned...more
The South Africa Law Reform Commission has approved the publication of its Issue Paper on “Electronic Evidence in Criminal and Civil Proceedings: Admissibility and Related Issues” for general information and comment. The...more
In People v. McInnis, the Defendant was convicted of attempted witness bribery. The Defendant attempted to keep witnesses from testifying against the Defendant’s nephew, in the nephew’s trial for robbery and kidnapping. ...more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top