News & Analysis as of

Science, Computers & Technology Criminal Law

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Why Banning Criminals From The Web Doesn’t Work

by Ifrah PLLC on

A few weeks ago, the Supreme Court issued a unanimous ruling in Packingham v. North Carolina, 137 S. Ct. 1730 (U.S. 2017) invalidating a state law outlawing registered sex offenders from accessing websites which could...more

DOJ Takes Down AlphaBay, the World’s Largest Dark Web Marketplace

by McGuireWoods LLP on

The U.S. Department of Justice has announced the seizure of AlphaBay, the largest criminal marketplace on the Internet, which was used to sell stolen financial information, identification documents and other personal data,...more

What To Look For In Strong Computer Fraud & Social Engineering Insurance

by GB&A Insurance on

Cyber security has been the talk of the town for quite a while now. Organizations today flooded with statistics and mentions of the importance of proper security measures and cyber liability programs. Some companies...more

DOJ Asks SCOTUS to Take on Microsoft Case and Verizon Suffers its own Data Breach: eDiscovery Trends

by CloudNine on

A rare two-topic day, but both are notable… Remember the Microsoft Ireland Warrant case, where the Second Circuit reversed earlier rulings and denied the government’s efforts to compel Microsoft to provide emails in that...more

Conviction for Economic Espionage, Sale of Trade Secrets to China

by McDermott Will & Emery on

The US Court of Appeals for the Ninth Circuit upheld the first federal jury criminal conviction for economic espionage and theft of trade secrets under the Economic Espionage Act of 1996 (EEA), even though the owner of the...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

Stolen Tax Returns? Virginia Seeks a Solution.

Did someone steal your tax return? You are not alone. Indeed, the rise in tax-related identity theft has been well documented. In 2015, the FTC reported a 50% increase in identity theft complaints. A primary cause for...more

The Office of the National Coordinator Releases Guidance on Recent International Ransomware Campaign

by Foley & Lardner LLP on

With the news of the newest international ransomware campaign that is currently affecting some organizations within the Health Care sector, it is important to not only educate staff on necessary precautions, but also be aware...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

New York Attorney General Unveils Latest Ticket Bot Enforcement Actions against Ticket Vendors and Software Developer

With summer concerts and music festivals in full swing, many fans will be surprised to find $145 face value tickets reselling online for $3,000 to $11,000....more

Reimbursement Manager Pleads Guilty for Prior Authorization Process Issues

by Bass, Berry & Sims PLC on

On Monday, June 19, 2017, Elizabeth Gurrieri became the second former employee of Insys Therapeutics (Insys) to plead guilty to federal anti-kickback charges related to the drug Subsys, an expensive fentanyl-based painkiller....more

Hacker Sentenced To Nearly Five Years In Prison For Phishing Scheme

by King & Spalding on

On Monday, June 5, 2017, the United States Department of Justice (“DOJ”) announced that a Cameroonian citizen, Eric Donys Simeu, had been sentenced to four years and ten months in prison for phishing campaigns targeting...more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

DOJ Reports on Drones Flying Contraband to Prisons

While drone delivery services are certainly on the agendas are large retailers like Amazon, inmates in jails across the U.S. are already using drones to receive their own aerial contraband shipments. Through a Freedom of...more

The Past, Present, and Future of Government Regulation of Off-Label Communications – Part 3

This is Part 3 in my series exploring the history of FDA’s regulation of off-label communications, which has become newly relevant in light of the recent events highlighted in Part 1. In this installment, I continue...more

Grand Jury Indicts Startup Founder Isaac Choi – Implications for Silicon Valley

by Fenwick & West LLP on

On June 7, the U.S. Department of Justice arrested Isaac Choi, the founder and former chief executive of the Silicon Valley startup, WrkRiot, on wire fraud charges. A San Jose, California grand jury had indicted Choi under...more

Update on Regulatory Compliance in the Global Health Care Industry

by Baker Ober Health Law on

A comprehensive understanding of the constantly evolving layers that make up federal anti-corruption statutes, sanctions regulations and export control restrictions is imperative for both the pharmaceutical and health care...more

This Week in FCPA-Episode 57, the Father’s Day Edition

by Thomas Fox on

This week, as their tribute to their Dad, we are guest hosted by Jay’s daughters, Millie and Michela. They lead us through a wide-ranging discussion on some of the week’s top compliance related stories, including: 1. The...more

Senate Considers Potential Changes to ECPA to Ease Access to Electronic Data Across Borders

Terrorist attacks, most recently in London and Manchester, England, have raised the pressure on law enforcement and lawmakers in countries like the U.K. and the U.S., to proactively intercept and interrupt terrorist...more

Murder Arrest Warrant Weaves Web of Data Evidence in – Fitbit, Facebook, Alarm Systems and More

The warrant that led to the arrest of a husband for the alleged murder of his wife weaves a web of electronic evidence. Based in large part on Fitbit fitness tracker data, Connecticut authorities have charged Richard Debate...more

Blockchain Week in Review - June 2017 #5

by Perkins Coie on

Below is a summary of some of the significant legal and regulatory actions that occurred over the past week. This alert is not intended to be a comprehensive list of all such developments, but rather a selection of...more

Everything Compliance-Episode 12

by Thomas Fox on

Show Notes for Episode 12, the Summer Haze Edition The dog days of summer are on the horizon and the Houston Astros lead the major leagues in winning percentage. Coincidence that the US pulls out of the Paris Climate Accords...more

Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls

by Thomas Fox on

In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more

Blockchain Week in Review – May 2017 #4

by Perkins Coie on

Below is a summary of some of the significant legal and regulatory actions that occurred over the past week. This alert is not intended to be a comprehensive list of all such developments, but rather a selection of...more

Former Lutonix VP Pleads Guilty to Trade Secret Theft

by Knobbe Martens on

On May 9, 2017, according to court records, Christopher Barry, former Vice President of R&D at Lutonix Inc., pled guilty to stealing Lutonix’s trade secrets in the form of several confidential electronic files....more

1,260 Results
|
View per page
Page: of 51
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.