Science, Computers & Technology Privacy Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Internal Revenue Service Announces Creation Of A Criminal Investigative Team To Focus On Cyber Tax Fraud

A May 5, 2015 report detailed that the Internal Revenue Service (“IRS”) has created a new cybercrime investigation team. Based in Washington, D.C., and made up of about a dozen specially-trained agents, the unit will focus...more

French National Assembly Adopting Surveillance Legislation

On 5 May 2015, the French National Assembly adopted a Bill aiming at reinforcing state surveillance. Several internet players as well as politicians have already raised serious concerns regarding the adoption of this Bill....more

Laptops, Border Checks and The Fourth Amendment

Developments in law are sluggish compared to the rapid rate of technological advancement, and courts must constantly apply old legal principles to technologies which were not contemplated at the time the laws were enacted. ...more

France: Lower House of Parliament Adopts Controversial Draft Law on Surveillance

The mood is shifting in the debate between privacy and security as France prepares to enact a controversial terrorism surveillance law critics have nicknamed the “French Patriot Act.” In the wake of the revelations...more

Justice Department Provides Cybersecurity Guidance

In late April, the Department of Justice’s Cybersecurity Unit provided a set of voluntary best practices for companies faced with the prospect of data breaches. The DOJ’s best practices were expressly developed with smaller...more

Breaking Down the DOJ Cybersecurity Unit’s Guidance on Responding to Cyberattacks

Another federal agency has weighed in with “guidance” on cybersecurity preparation and breach response. The Department of Justice (DOJ) is the latest to issue guidance on how companies should respond to data breaches. The...more

DOJ Guidance for Victims of Cybercrime: The Dos and Do Nots of Cyber Preparedness

On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more

DOJ Cybersecurity Unit Releases “Best Practices” For Cyber Breaches

Last week, in conjunction with the Criminal Division’s Cybersecurity Industry Roundtable, the U.S. Department of Justice released its “Best Practices” guide for preparing for and responding to a cyber incident....more

Executive Order Authorizes Sanctions against Cybercriminals

Citing cyberthreats as one of the most serious economic and national security challenges to the U.S., President Obama recently issued an executive order (EO) authorizing the use of economic sanctions against those who...more

Protecting Personal Data in China: An Update

Personal data protection legislation has been a widely discussed topic in recent years in China, mainly because employees of institutions that amass personal data of users and clients in the course of their business (such as...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

China Update: Privacy Law and Network Security Developments

The past 16 months have been eventful in China in connection with privacy law and network security developments. Key privacy law developments included: .. the coming into effect of new privacy provisions of the...more

Riley and the Third-party Doctrine

On June 25, 2014, the U.S. Supreme Court issued one groundbreaking opinion in two cases regarding cellphone searches incident to arrest. In a unanimous opinion, the court held that under the Fourth Amendment, police must...more

Two Oft-Neglected Cybersecurity Protections

With each passing year, cybercrime moves further into the mainstream of public company existence. What until recently was mostly an annoying, abstract concern for a handful of companies is now a daily menace that impacts...more

Guard Your Sheep, The Dyre Wolf is Coming

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Breaking News: Executive Order Signed Relating to “Significant Malicious Cyber-Enabled Activities”

President Obama today signed an Executive Order granting authority to the Department of the Treasury’s Office of Foreign Assets Control (OFAC) to impose sanctions on individuals and entities determined to be “responsible for...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Your Mom and the Courts Agree: Naked Online Pix are Not OK

Since the 1990s and the rise of the Internet and social media, each one of us has become increasingly aware of the risks and dangers of unwanted posts and how fast a “discreet” image can go viral....more

New York Proposes Tough New Anti-Money Laundering and Cybersecurity Measures on Financial Services Companies

Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more

California May Limit Law Enforcement’s Warrantless Data Collection

Eager to retain its spot among the principal laboratories for domestic privacy legislation, California’s legislature is set to debate Senate Bill 178, legislation restricting state law enforcement agencies from requesting...more

Connected cars are privacy and security threats?

The recent report from the US Senator Ed Markey raises issues on the future of connected cars because of the privacy issues and the potential cybercrimes that might affect the security of vehicles.  ...more

An Attempt For ECPA Reform

Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more

HIPAA' s Criminal Charges Pack a Heavy Punch

Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more

A Winnable Fight Against Crimes In Cyberspace

California boldly made an example out of a felonious website owner who operated a website dedicated to shaming, embarrassing and harassing complete strangers. Following the first ever prosecution of the operator of a “revenge...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

226 Results
|
View per page
Page: of 10

Follow Science, Computers & Technology Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×