Science, Computers & Technology Criminal Law Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Two-Factor Authentication Is a Necessity for Companies

It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

Alert: Pro-ISIS Hackers Targeting Media Outlets

Recent widely publicized cyberattacks have made clear that nation-state hackers are now hacking companies for political purposes and they appear to be focused on broadcasters and other media companies....more

FBI Director James Comey To The Private Sector: “You need protection. You need guidance. I need information.”

FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more

FinCrimes Update - December 2014, Volumn 1, Issue 10

In this Issue: BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement...more

What’s on the Horizon in the Golden State?

As we near the turn of the year into 2015, organizations should keep an eye on laws taking effect on the West Coast. This year, the crop of new privacy statutes includes a few without precedent anywhere in the country. The...more

Subscriber Does Not Have Fourth Amendment Privacy Interest in Own IP Data

In 2012, the Supreme Court decided the case of United States v. Jones, 132 S. Ct. 945 (2012). Jones involved the government's use of a GPS tracking device on a vehicle and the information gleaned therefrom. The holding was...more

DOJ Announces Formation of Cybersecurity Unit In Efforts to Prevent Cybercrime

On December 4, Assistant AG Leslie Caldwell delivered remarks at the Cybercrime 2020 Symposium regarding the DOJ’s recent efforts to fight cybercrime. Specifically, Caldwell noted the DOJ’s Criminal Division is (i) increasing...more

DOJ Announces New Cybersecurity Unit in the Criminal Division

To address cyber threats on multiple fronts, the DOJ is creating a new Cybersecurity Unit with the goal of having both a robust enforcement strategy as well as a broad prevention strategy....more

Status Updates - December 2014

Yik Yak arrests. For several months now we at Socially Aware have been writing about how college students have been using the purportedly anonymous messaging app Yik Yak to communicate deeply offensive remarks and threats of...more

Apple Strengthens Privacy Protections

Apple recently changed its privacy policy which has made headlines – it will no longer unlock iPhones and iPads for law enforcement. Prior to this change, Apple would assist law enforcement in unlocking Apple devices when...more

Privacy Monday (on Tuesday….) November 2014

Sometimes the day just gets away from you ….. Here are three privacy & security things you should know for your week: 1. FTC Cites TRUSTe With Misrepresenting Practices – Fines $200,000 Apparently TRUSTe...more

ICO Issues Warning over Misuse of Personal Data

The warning follows the recent Magistrate's Court decision which saw the ICO use its enforcement powers to bring criminal proceedings against a paralegal at a law firm, for unlawfully obtaining personal data. The paralegal...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

QATAR: Promulgating the Cybercrime Prevention Law

On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more

Face video scan can trigger data protection breach?

Data protection breaches of health related sensitive data might occur through a mere video scanning an individual’s face according to a recent research....more

California Enacts Smartphone Kill Switch Law to Promote Data Security

This week California enacted into law Senate Bill 962, which requires a “kill switch” on all smartphones that would render the device inoperable. The law applies to all smartphones manufactured after July 1, 2015 and sold in...more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

Secret Service Raises Warning About Backoff POS Malware

The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named “Backoff” that was being used to steal payment card data from point-of-sale (POS) systems. The Alert...more

Cybersecurity: How well are Latin American banks protected against cyber attacks?

Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more

FBI Warning to Health Care Sector Holds True

In April of this year, the FBI issued a Private Industry Notification (PIN) to the health care industry warning of the “likely increase [in] cyber intrusions against health care systems.” In the same month, and into June of...more

Court protects privacy in ruling on warrantless searches of cellphones

Every now and then The Nine agree on something. Among the unanimous rulings the U.S. Supreme Court issued in the final stretch this year was Riley v. California, which held that law enforcement officials may not make a...more

Emergency UK Legislation Expands Government Powers to Retain and Intercept Data

On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more

Federal Prosecutors Bring Criminal Charges against Individual for Alleged HIPAA Violation

Federal prosecutors in the Eastern District of Texas recently brought criminal charges under the Health Insurance Portability and Accountability Act (“HIPAA”) against a former East Texas hospital employee. The former...more

209 Results
|
View per page
Page: of 9

Follow Science, Computers & Technology Updates on: