Science, Computers & Technology Privacy Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Your Mom and the Courts Agree: Naked Online Pix are Not OK

Since the 1990s and the rise of the Internet and social media, each one of us has become increasingly aware of the risks and dangers of unwanted posts and how fast a “discreet” image can go viral....more

New York Proposes Tough New Anti-Money Laundering and Cybersecurity Measures on Financial Services Companies

Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more

California May Limit Law Enforcement’s Warrantless Data Collection

Eager to retain its spot among the principal laboratories for domestic privacy legislation, California’s legislature is set to debate Senate Bill 178, legislation restricting state law enforcement agencies from requesting...more

Connected cars are privacy and security threats?

The recent report from the US Senator Ed Markey raises issues on the future of connected cars because of the privacy issues and the potential cybercrimes that might affect the security of vehicles.  ...more

An Attempt For ECPA Reform

Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more

HIPAA' s Criminal Charges Pack a Heavy Punch

Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more

A Winnable Fight Against Crimes In Cyberspace

California boldly made an example out of a felonious website owner who operated a website dedicated to shaming, embarrassing and harassing complete strangers. Following the first ever prosecution of the operator of a “revenge...more

Two-Factor Authentication Is a Necessity for Companies

It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more

EU Art. 29 Assesses Cybercrime Assessment

The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more

Alert: Pro-ISIS Hackers Targeting Media Outlets

Recent widely publicized cyberattacks have made clear that nation-state hackers are now hacking companies for political purposes and they appear to be focused on broadcasters and other media companies....more

FBI Director James Comey To The Private Sector: “You need protection. You need guidance. I need information.”

FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more

FinCrimes Update - December 2014, Volumn 1, Issue 10

In this Issue: BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement...more

What’s on the Horizon in the Golden State?

As we near the turn of the year into 2015, organizations should keep an eye on laws taking effect on the West Coast. This year, the crop of new privacy statutes includes a few without precedent anywhere in the country. The...more

Subscriber Does Not Have Fourth Amendment Privacy Interest in Own IP Data

In 2012, the Supreme Court decided the case of United States v. Jones, 132 S. Ct. 945 (2012). Jones involved the government's use of a GPS tracking device on a vehicle and the information gleaned therefrom. The holding was...more

DOJ Announces Formation of Cybersecurity Unit In Efforts to Prevent Cybercrime

On December 4, Assistant AG Leslie Caldwell delivered remarks at the Cybercrime 2020 Symposium regarding the DOJ’s recent efforts to fight cybercrime. Specifically, Caldwell noted the DOJ’s Criminal Division is (i) increasing...more

DOJ Announces New Cybersecurity Unit in the Criminal Division

To address cyber threats on multiple fronts, the DOJ is creating a new Cybersecurity Unit with the goal of having both a robust enforcement strategy as well as a broad prevention strategy....more

Status Updates - December 2014

Yik Yak arrests. For several months now we at Socially Aware have been writing about how college students have been using the purportedly anonymous messaging app Yik Yak to communicate deeply offensive remarks and threats of...more

Apple Strengthens Privacy Protections

Apple recently changed its privacy policy which has made headlines – it will no longer unlock iPhones and iPads for law enforcement. Prior to this change, Apple would assist law enforcement in unlocking Apple devices when...more

Privacy Monday (on Tuesday….) November 2014

Sometimes the day just gets away from you ….. Here are three privacy & security things you should know for your week: 1. FTC Cites TRUSTe With Misrepresenting Practices – Fines $200,000 Apparently TRUSTe...more

ICO Issues Warning over Misuse of Personal Data

The warning follows the recent Magistrate's Court decision which saw the ICO use its enforcement powers to bring criminal proceedings against a paralegal at a law firm, for unlawfully obtaining personal data. The paralegal...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

QATAR: Promulgating the Cybercrime Prevention Law

On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more

Face video scan can trigger data protection breach?

Data protection breaches of health related sensitive data might occur through a mere video scanning an individual’s face according to a recent research....more

California Enacts Smartphone Kill Switch Law to Promote Data Security

This week California enacted into law Senate Bill 962, which requires a “kill switch” on all smartphones that would render the device inoperable. The law applies to all smartphones manufactured after July 1, 2015 and sold in...more

215 Results
|
View per page
Page: of 9

Follow Science, Computers & Technology Updates on: