Science, Computers & Technology Privacy Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Law Enforcement Permitted To Obtain GPS Location Data Without A Warrant In A Sex Trafficking Investigation

In United States v. Gilliam, 15-387, the Second Circuit (Newman, Winter, Cabranes) held that, under the exigent circumstances present in that case, law enforcement could use cell phone GPS data to locate a suspect without...more

Privacy Perils: Identify Theft and Social Networking

Identity theft through social networking is on the rise. Hacked accounts may be used to impersonate you and potentially cause reputational harm, or may even link the hacker to your financial account information and...more

What you should know about identity theft

Take precautions in giving your personal information as people with ill intentions may misuse it. Dubai: As alarming as it sounds, you could be the next victim of identity theft.The phenomenon is becoming more prevalent...more

Banks Should Prepare for Increased Collaboration between IT, Legal and BSA/AML Compliance Departments under New FinCEN Guidance

Last month, the U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) issued an Advisory which provided substantial guidance to financial institutions regarding the scope of information that must be...more

When Using a Computer Becomes a Crime, Part Two: ACLU, Facebook Weigh In on Ninth Circuit’s Answer

The Electronic Frontier Foundation (“EFF”) and the American Civil Liberties Union (“ACLU”) have weighed in on Facebook’s high-profile dispute with a social media aggregation company over whether it had unlawfully accessed...more

Are Cyber Thieves Compromising E-Mail? .. YES!

Recently FinCEN issued Advisory (FIN-2016-A003) regarding e-mail compromise schemes that defraud Financial Institutions by deceiving them into conducting wire transfers that result in misappropriated customers funds. The...more

Disclosing personal data – new protections for regulated sector firms?

New protections are being proposed in the UK to allow regulated sector firms to share information regarding suspicions relating to money laundering and terrorist financing, in circumstances where law enforcement has been...more

FinCEN Issues Advisory on the Reporting of Cyber-Events and Cyber-Enabled Crimes

The Financial Crimes Enforcement Network, or FinCEN, an arm of the United States Department of the Treasury, issued an advisory last week to remind financial institutions of their obligations to report cyber-events on...more

DOJ Charges Defense Contractor with Removal and Retention of Classified Materials

The Department of Justice (DOJ) yesterday announced that it has charged a Maryland man, Harold Thomas Martin III with theft of government property and unauthorized removal and retention of classified materials by a government...more

Encryption: Ensuring the Right to Privacy in the Information Age?

On December 2nd, 2015, a tragic mass shooting occurred in San Bernardino, California. The attack resulted in 14 deaths and severe injuries to 22 others. The attackers, a married couple, targeted the husband’s workplace – the...more

Aftermath of the Yahoo Breach: M&A Risk and Cybersecurity

In the midst of its acquisition by Verizon Communications Inc., Yahoo Inc. disclosed what looks like one of the largest reported thefts of user information in U.S. history. Yahoo has confirmed that a “state-sponsored”...more

Employee’s Wife Pleads Guilty to Charges After He Stole Patient Information

The Manhattan District Attorney announced this week that a former employee of Lenox Hill Hospital’s wife plead guilty to grand larceny, identity theft in the first degree, and criminal possession of stolen property after her...more

Former IRS Employee Reports to Prison for Identity Theft and Fraud

Nakeisha Hall was sentenced in federal district court in August to serve nine years and two months in prison after she plead guilty for crimes she committed while working for the IRS Taxpayer Advocate Service. Instead of...more

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Litigation Alert: The Sixth Circuit Expands Potential Federal Wiretap Act Liability for Developers and Sellers of Cloud-Based...

Last week, the Sixth Circuit expanded potential liability for violations of the Federal Wiretap Act for manufacturers of devices that can be used for wiretapping, like monitoring software, in reversing the dismissal of a...more

Sharing of Passwords Under Certain Circumstances Unlawful

Many companies have experienced the departure of an employee and the elimination of that former employees access to the company’s computers and networks. In the recent case of USA v. Nosal, D.C. No. 3:08-cr-00237-EMC-1 (July...more

Congressional Report Finds FDIC Data Breach Response Obstructed Congressional Oversight

On July 12, the U.S. House of Representatives Committee on Science, Space, and Technology (the “Science Committee”) released a report regarding its investigation of an October 2015 data breach and the subsequent response of...more

Baseball Hacking Scandal Leads To 4-Year Sentence And MLB Investigation

On Monday, July 18, 2016, the U.S. District Court for the Southern District of Texas sentenced former St. Louis Cardinals scouting director Chris Correa to nearly four years in prison for the hacking of the Houston Astros’...more

Second Circuit Eases Tension Between U.S. Discovery Requirements and EU Privacy Laws

Microsoft scored an important victory when the Second Circuit ruled that the government is not authorized to issue warrants for customer data stored overseas. In re Warrant to Search a Certain E-mail Account Controlled &...more

Ex-Cardinals scouting director sentenced to serve time in jail for Astros database hacking

Back in January, we wrote about the ex-Cardinals Scouting Director pleading guilty to hacking the Houston Astros database. Now, this week, Christopher Correa, former scouting director and director of baseball development, was...more

You’ve Got (Foreign) Mail: Can Law Enforcement Get to it?

Even though Microsoft is a U.S. corporation subject to domestic subpoenas and warrants, prosecutors are not entitled to emails stored on its servers abroad, the Second Circuit ruled last week in Microsoft Corp. v. United...more

The Stored Communications Act’s Warrant Provisions Do Not Apply Extraterritorially

On July 14, the Second Circuit in Microsoft v. United States ruled that the Stored Communications Act (SCA) “does not authorize a U.S. court to issue and enforce an SCA warrant against a United States-based service provider...more

When Stealing in Baseball Can Land You in Jail: Computer Fraud Sentencing Announced in MLB Case

Although stealing bases, and even signs, in baseball may be part of the game, stealing another team’s trade secrets can land you in federal prison, as one executive recently learned the hard way. As we previously...more

Ransomware Attacks on ePHI May Be a Data Breach Under HIPAA

On July 11, 2016, the Office of Civil Rights (“OCR”) at the Department of Health and Human Services issued new HIPAA guidance regarding the growing epidemic of malicious computer software known as “ransomware”....more

Second Circuit: Stored Communications Act Warrants Cannot Reach Overseas Data

On July 14, 2016, the Second Circuit Court of Appeals determined that a warrant issued under the Stored Communications Act (SCA) is subject to the same territorial restrictions as a traditional warrant: the government’s reach...more

354 Results
|
View per page
Page: of 15

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×