Science, Computers & Technology Privacy Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

European Commission Publishes Proposal for Signing the EU-U.S. Umbrella Agreement

The EU-U.S. data protection Umbrella Agreement consists of a framework of principles and safeguards for trans-Atlantic transfers of personal data (such as criminal records, names and addresses) in relation to the prevention,...more

Sentencing of Keys, Responsible for 2010 LA Times Data Breach, Should Remind Companies to Fortify Cybersecurity and Plan Response...

A federal judge in California recently sentenced a former employee of KTXL Fox40, a Tribune Company-owned television station, to two years in prison for three felony convictions relating to his assistance to the “hacktivist”...more

Supreme Court Eases Limits On U.S. Government Hacking Authority

On April 28, 2016, the U.S. Supreme Court approved amendments to Rule 41 of the Federal Rules of Criminal Procedure that would allow federal judges to issue search warrants granting remote access to electronic devices outside...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

The Proof Is in the Password!

Consider this scenario: A young couple entrusts you, an experienced real estate attorney, to assist them in the purchase of their first home. Days before closing, your unsecured email account gets hacked and your client...more

When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues

Are criminal cyberattacks increasing in sophistication and frequency? Yes. Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks?...more

U.S. Supreme Court Proposes Change to Rules Applicable to Searches of Electronic Data

The United States Supreme Court — which establishes rules of civil and criminal procedure, subject to the objection of Congress — has proposed a significant amendment to the rules applicable to searches of electronic data...more

Hackers responsible for ruthless SpyEye Trojan sentenced to 24 1/2 years

The Department of Justice has announced that two hackers who built and sold the Trojan called SpyEye, that caused close to $1 billion in banking losses, have been sentenced for a combined 24 1/2 years in federal court in...more

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Expectations of Privacy: Location Matters

Sometimes law enforcement needs a warrant to access cellphone data, sometimes a court order. Sometimes nothing is required. Roaming while you roam. Depending on where you use your cell phone, law enforcement may...more

Need to Decrypt an iPhone? There’s an “Act” for That

A pair of recent cases pitted the U.S. Department of Justice (DOJ) against Apple, Inc. (Apple) in a Herculean struggle between asserted interests in national security and privacy. In both cases, the DOJ relied on the same...more

Expanding Horizons: Drone Regulations from a Prosecutorial Perspective

BB&K attorney Jordan Ferguson writes about the criminal side of drones for the California District Attorneys Association’s Prosecutor’s Brief. Over the next few years, the skies are likely to get much more crowded....more

Chinese national hacker pleads guilty to sending U.S. military data to China

The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information...more

Cyber prosecutions update

The feds have been busy on the cyber prosecutions front. First, on March 18, 2016, the FBI announced that a multi-agency collaborative effort blew up an identity theft ring whose leader was an inmate in a Georgia prison. The...more

Ninth Circuit Addresses Probationers’ Cell Phone Searches by Police

The centrality of cell phones to our daily lives, and the wide array of sensitive information those phones may carry, creates a complex and ever-evolving series of issues over the amount of privacy we can expect to be...more

iWon’t: Apple’s Face-Off with the DOJ

In what is quickly becoming one of the closest-watched cases in the country, Apple is now at loggerheads with the Department of Justice and FBI over its refusal to unlock the iPhone of one of the San Bernardino shooters....more

National Debate on Digital Privacy Shows No Signs of Slowing

The Justice Department’s dispute with Apple related to encryption on the iPhone used by one of the San Bernardino shooters has reinvigorated the national debate on digital privacy. Though it is not clear how the California...more

Apple vs. FBI: The House Judiciary Committee Hearing and Takeaways

Among the major headlines dominating not only the recent news cycle, but also this week’s RSA Conference in San Francisco, has been Apple’s challenge to the federal government’s request that Apple assist in unlocking the...more

Rival Court Decisions Reflect Shifting Views on Privacy in Public

With the spotlight on one high-profile battle that pits privacy rights against public safety interests, another crucial, similar dispute is making its way through the courts. How to evaluate new technology and its potential...more

Should Apple Always Have a Key to All iPhone Data? To Some iPhone Data?

On February 16, 2016, U.S. Magistrate Judge Sheri Pym of the U.S. District Court for the Central District of California issued an Order under the All Writs Act directing Apple Inc. to cooperate with efforts by the Federal...more

Apple vs. FBI- What’s Really at Stake?

The Apple vs. FBi case has sparked fireworks in recent days and for good reason. The FBI is relying on a 227-year-old statute called the All Writs Act to support its request for Apple to hack the San Bernadino iPhone that...more

Backdooring Investment Security (On the Apple Case)

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

FBI Recruits Apple to Help Unlock Your iPhone

It is a well-known maxim that “bad facts make bad law.” And as anybody even casually browsing social media this week likely has seen, the incredibly tragic facts surrounding the San Bernadino attacks last December have led...more

FBI v Apple: Using a 1789 Law in a 21st Century Privacy Fight

Earlier this week Apple CEO Tim Cook announced to Apple customers that the company would oppose a federal court order (the “Order”) issued on February 16, 2016 that the company believes “threatens the security of our...more

324 Results
|
View per page
Page: of 13

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×