Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Safeguards against Data Security Breaches (Part One)
The Growing Role of Social Media in Litigation and How to Prepare for It
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How Facebook's Lawyers Price Their Services
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Two Key Elements Every Social Media Policy Should Include
Jeff Ifrah on the Historic Legalization of Online Gaming in New Jersey
How to Respond to President Obama's Cybersecurity Executive Order
Federal Government Regulations:
Canada Gazette, Part II, March 27, 2013:
Contraventions Act -
SOR/2013-41 Regulations Amending the Application of Provincial Laws Regulations.
Since 2008, if you or your employees are traveling into the United States with a laptop, tablet or other electronic device, that device may be searched by border crossing agents, without cause or justification for suspicion....more
Our series over the next 10 days will highlight the top issues, as we see them, in privacy and security for 2013. Yesterday, we looked at the increase in cybcersecurity disclosure by public companies, triggered by the...more
On December 12, the U.S. Court of Appeals for the Fifth Circuit held that the Stored Communications Act (SCA) does not apply to data stored in a personal cell phone and affirmed a district court’s grant of summary judgment to...more
Originally published in The New York Law Journal on December 10, 2012.
Companies are increasingly permitting employees to BYOD, or bring (and use) their own smart devices. Being able to use the latest, fastest,...more
Employers should be aware that the Cloud Computing Act of 2012 was recently introduced in the US Congress as an amendment to the Computer Fraud and Abuse Act (CFAA). +2012 Bill Tracking S. 3569. It would aid employers by...more
Executive Summary: A District Court in Pennsylvania entered judgment in favor of the employer on a former employee's Computer Fraud and Abuse Act ("CFAA") claim in a dispute over the ownership of the employee's LinkedIn...more
Today, the Director’s Office of Policy, Research, and Legislation (OPRL) at the California Department of Industrial Relations (DIR) announced that the minimum compensation required to qualify for the state's...more
In my talks about technology, one of the things I try to emphasize is that there is no “one size fits all” to your social media and technology policy.
As an example, I often talk about how financial industries have...more
The UK Data Protection Act 1998 (“DPA”) imposes various restrictions on “data controllers”, such as employers, when “processing” personal data relating to individuals. In particular, employers must comply with eight data...more
In R. v. Cole, 2012 SCC 53 (October 19, 2012), the Supreme Court of Canada held that employees may reasonably expect privacy in the information stored on their work-issued computers — at least where personal use is permitted...more
Thanks to California's Employment Development Department (EDD) - the Department that manages California's State Disability Insurance (SDI) program - California employers can now use an enhanced and automated online service...more
With the unprecedented popularity of social media, employees have increasingly used LinkedIn and other online forums to network for business and social purposes. When the line between personal and business use is blurred,...more
In PhoneDog v. Kravitz, an employer and former employee battled over who owns a company-sponsored Twitter account. Now, LinkedIn joins Twitter, as it tries to claim title to the LinkedIn account of a former employee....more
Earlier this month, a federal judge ruled that when a company took over a departing employee’s LinkedIn account, the company did not violate the Computer Fraud and Abuse Act in the case of Eagle v. Edcomm....more
Imagine a disgruntled employee rummaging through your company’s confidential files and covertly stealing trade secrets to use as he builds a competing business. What recourse would you have against the rogue employee?...more
The NLRB has received a lot of attention for its actions the last couple years. One of the storms was caused by the agency’s attention to employer actions based on employee Facebook postings. More to the point, employers were...more
Introduction - The Computer Fraud and Abuse Act (CFAA) criminalizes unauthorized access to a private computer system and allows for individuals suffering harm from such conduct to bring private civil actions for relief....more
New guidance defines when electronically held personal data is "beyond use" once deleted.
As part of its mission to assist companies to understand and fulfil their obligations under the UK's Data Protection Act 1998...more
Employers in North Carolina, Virginia, Maryland, West Virginia and South Carolina have lost a potentially powerful method of protecting their electronic secrets from disgruntled employees who download sensitive material and...more
If your company policies don’t adequately define employee parameters of computer access as well as usage, then your company may find itself losing to disgruntled employees who take or misuse company data.
In This Issue:
- U.S. Supreme Court Holds Pharmaceutical Sales Representatives are Exempt from Overtime Pay
- USCIS Announces Employers Must Continue to Use the Current Form I-9 for Employment Eligibility...more
The United States Supreme Court has recently armed employers with two new defenses while settling an issue that may otherwise have been of fairly limited direct interest to most employers. The Court resolved a recent circuit...more
The federal Computer Fraud and Abuse Act (CFAA) allows an employer to bring a civil action against an employee who accesses the employer's computers "without authorization" or in a manner that "exceeds authorized access."...more
In a victory for pharmaceutical companies, the Ninth Circuit Court of Appeals recently held that plaintiff-appellant pharmaceutical sales representatives (“reps”) were exempt from California law’s overtime requirements. See...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo