News & Analysis as of

Science, Computers & Technology Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

Blockchain Week in Review – April 2017 #2

by Perkins Coie on

Below is a summary of some of the significant legal and regulatory actions that occurred over the past week. This alert is not intended to be a comprehensive list of all such developments, but rather a selection of...more

Cops, Cameras & The Cloud: Axon’s Offer of Free Body Cameras to U.S. Police Departments

Earlier this month, Axon, the company formerly known as Taser, announced that it will offer a one year free trial of its body cameras and cloud storage to every police department in the United States. While controversy about...more

Defending Against Social Engineering Attacks

by Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

Four Indicted On Charges Related To Yahoo Hacks

by King & Spalding on

On March 15, 2017, the United States announced the indictment of four defendants for their roles in the hacks of Yahoo’s network, systems, and user accounts. The indictment stems from an investigation conducted by the Federal...more

NY AG Report Shows Number of Data Breaches Soared in 2016

Unfortunately, it was a record breaking year in the State of New York for data breaches. The New York Attorney General (AG) released his annual data breach report, which announced that the AG’s Office received 1,282 data...more

Maryland Sheriff’s Office Recovers Stolen Construction Goods Through Drones

Last week, Maryland’s Cecil County Sheriff’s Office used an unmanned aerial vehicle (UAV) to recover nearly $400,000 worth of stolen construction equipment, which also led to the arrest of the culprit. The New Jersey State...more

Third Circuit Holds Criminal Defendant in Contempt for Refusing to Decrypt Hard Drives

In a precedential ruling, the Third Circuit Court of Appeals this week upheld a lower court’s ruling holding a criminal defendant in contempt for refusing to decrypt two external hard drives that were seized during a child...more

Digital Divide Deepens: Tech Community Backs Second Circuit in Clash with Magistrates over Reach of U.S. Warrants

The technology community took aim at a recent federal magistrate’s ruling that ordered Google Inc. to comply with search warrants seeking customer emails stored on servers abroad, calling the decision “an impermissible...more

Pharmaceutical Manufacturers and Healthcare Leaders cite Fraud and Abuse Laws as Obstacle to Value-Based Arrangements

As the healthcare industry moves towards value-based purchasing, pay-for-performance, and other payment reform models, industry leaders have identified federal fraud and abuse laws as a barrier to full implementation of such...more

Tech Rally – Industry Giants Back Google's Play to Protect Data

by Bracewell LLP on

On March 10, 2017, Google Inc. filed its objection to a Pennsylvania magistrate judge's order to comply with search warrants and turn over personal user data partially stored on foreign servers abroad. A number of technology...more

"US Announces Record-Setting Penalties for Violations of Export Controls and Economic Sanctions"

On March 7, 2017, the United States announced that China’s Zhongxing Telecommunications Equipment Corporation and ZTE Kangxun Telecommunications Ltd. and their respective affiliates (collectively, ZTE) had agreed to a record...more

Lawyer’s Pants Literally Catch on Fire and Alexa to “Testify”: eDiscovery Trends

by CloudNine on

OK, this first story isn’t exactly an eDiscovery story, but it’s too good to pass up… Here’s a question for you: Would you believe what a lawyer was telling you during closing arguments if his pants were, literally, on fire?...more

Let's Go Phishing!

by Fisher Phillips on

Emails, lots and lots of emails, filling our inboxes. Even with the best security and filters, it seems that hackers are simply building better mousetraps. The bigger problem, however, is the trusting nature of individuals...more

The Government Seeks to Intervene in its Third Generic Drug Price-fixing Lawsuit

Since we last reported on the state and federal government’s generic drug pricing investigations and litigations (click here to read more), the U.S. Department of Justice (“DOJ”) has obtained its first guilty pleas. On...more

Google Required to Hand Over Foreign Stored Emails to Justice Department: eDiscovery Case Law

by CloudNine on

In the ruling In re Search Warrant No. 16-960-M-01 to Google, Pennsylvania Magistrate Judge Thomas J. Rueter ordered Google to comply with a search warrant to produce foreign-stored emails, disagreeing with the U.S. Court of...more

“Alexa, Are My Questions to You Discoverable?”

by Williams Venker & Sanders on

The Amazon Echo is a hands-free speaker controlled with your voice. It features a personal assistant, “Alexa,” who will perform various tasks for the user in response to the “wake word,” Alexa. Over the holidays, I observed...more

Notable New State Privacy and Data Security Laws – Part Two

by Snell & Wilmer on

This is the second in a two-part series addressing recent developments in state privacy and data security laws. This article addresses new laws about student privacy, enforcement/ punishment for data privacy and security...more

FBI Warns of Romance Scams that “Break Hearts and Bank Accounts”

by Snell & Wilmer on

On the eve of Valentine’s Day, the FBI issued a timely warning about the rise of “Romance Scams.” This type of Internet crime typically targets older widowed or divorced women. While these women are typically computer...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

Corporate Investigations and White Collar Defense - February 2017

When Regulatory Failings Turn Criminal: Car Edition Redux - Why it matters: To paraphrase the famous quote from the film “All About Eve”: Fasten your seatbelts, it’s going to be a bumpy car ride. In the first part of...more

US Magistrate Judge Upholds Search Warrants for Google Data Stored Overseas, “Shards” and All

by Latham & Watkins LLP on

Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more

To Obtain Data Abroad, Government Just Googles It

by Bracewell LLP on

As technology companies expand globally they increasingly are storing customer electronic data in servers outside the United States. To keep apace, the Justice Department has become more creative in adapting existing legal...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

by Bass, Berry & Sims PLC on

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

Does Facebook Have the Right to Challenge Search Warrants Seeking Facebook Users’ Data? New York’s Highest Court Hears Argument

Facebook is the latest social media giant to push back on law enforcement efforts to seek user information. On Tuesday, the New York Court of Appeals heard oral argument in a case focusing on whether Facebook has the...more

1,217 Results
|
View per page
Page: of 49
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!