News & Analysis as of

Computer Fraud and Abuse Act (CFAA)

Global Privacy & Cybersecurity Update Vol. 15

by Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - FTC Comments on Improvements to IoT Device Security - On June 19, the Federal Trade Commission ("FTC") submitted comments to a working group organized by the...more

Getting Divorced? Four Cautionary Tips about Accessing Your Spouse’s Electronic Information

by Jaburg Wilk on

Question: I know my spouse’s passwords to their social media accounts, bank accounts and/or email accounts, can I log into their account and get the information we need to help win my case? ...more

hiQ Labs, Inc. v. LinkedIn Corp.: A Federal Court Weighs in on Web Scraping, Free Speech Rights, and the Computer Fraud and Abuse...

by Ropes & Gray LLP on

In recent years, a number of firms in a variety of industries have utilized automated research methods, including web scraping tools and certain forms of artificial intelligence such as bots, to gather information from a...more

District Court Issues Injunction in hiQ v. LinkedIn Scraping Case

On August 14, 2017, the U.S. District Court for the Northern District of California issued a preliminary injunction that prohibits LinkedIn from implementing legal or technological restrictions on hiQ's access, copying, and...more

District Court Rules that Startup Can Use Web Scrapers to Collect Information from Public LinkedOn Profiles, Despite Protests for...

On August 14, 2017, on a motion for preliminary injunction, the District Court for the Northern District of California held that LinkedIn, a social network owned by Microsoft, Inc., could not continue to block hiQ, a data...more

A Green Light for Screen Scraping? Proceed With Caution…

by Proskauer Rose LLP on

Court Issues Injunction Barring Blocking of Scraping and Holds CFAA Likely Doesn’t Apply - Websites make information available to clients, users, customers and subscribers. Data aggregators, investors, competitors and...more

Ending Data Scraping Dispute, Craigslist Reaches $31M Settlement with Instamotor

Craigslist has used a variety of technological and legal methods to prevent unauthorized parties from violating its terms of use by scraping, linking to, or accessing user postings for their own commercial purposes. For...more

Did Data Scraping Just Get A Tiny Bit Safer?

by Dickinson Wright on

Is it okay to scrape data from another website? This is a frequently asked question that almost always leads to an ambiguous and equivocal answer. Legal practitioners are quick to point out the risks of civil and criminal...more

Federal Lawmakers Consider IoT Security Standard

A new federal bill would regulate security for Internet of Things (IoT) devices by requiring government vendors to conform to standards and make sure that products can have security problems patched....more

US lawmakers introduce bill to address cybersecurity flaws in the Internet of Things

by DLA Piper on

A bipartisan group of US senators has introduced the Internet of Things (IoT) Cybersecurity Improvement Act of 2017, which seeks to impose baseline cybersecurity standards for IoT devices sold to the US government. Notably,...more

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

by Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

Draft Cybersecurity Legislation Would Impose Substantial New Obligations on Vendors Selling Interconnected Devices to the U.S....

On Tuesday, August 1, 2017, a bipartisan group of four Senators from the Senate Cybersecurity Caucus introduced legislation designed to improve the cybersecurity of devices purchased by the U.S. government and – albeit...more

Consumer Protection Class Action Lawsuit Over “Free” Candy Crush Plays Will Proceed

by Reed Smith on

A class action lawsuit against the developer of Candy Crush will continue in Illinois federal court. According to the complaint, Candy Crush, a popular mobile game, entices users into sharing the game with Facebook friends in...more

Consumer Financial Data Aggregation & the Potential for Regulatory Intervention

A confluence of regulatory activity and policy debates seems to be laying the groundwork for future regulation of consumer financial data aggregation activities. The outcome of these activities could significantly affect how...more

What Would the Perfect Employee Agreement Look Like?

Lawyers strive for perfection in their work, but time constraints, budgets, and other factors work against us. Also, perfection is not always the same thing in every circumstance. It is interesting, however, to contemplate...more

Employer Grabs the Driver’s Seat on Electronic Privacy Claims

by PretiFlaherty on

Most employment laws are like a one-way street, where the only party with the ability to drive a claim is the employee. When it comes to electronic privacy, however, some federal statutes allow for two-way traffic. ...more

The Ninth Circuit Holds that California’s Anti-Hacking Law, Penal Code Section 502, does not Proscribe Unauthorized “Access” to a...

by Nossaman LLP on

California’s Computer Data Access And Fraud Act, Cal. Pen. Code, § 502 (“CDAFA”) is a state law analog to the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 et seq. (“CFAA”). Both are aimed at fighting unauthorized...more

The Computer Fraud and Abuse Act Will Need To Wait Another Day In The Commercial Division

Justice Shirley Kornreich recently issued one of the few New York state court decisions that address the Computer Fraud and Abuse Act (“CFAA”). Spec Simple, Inc. v. Designer Pages Online LLC, No. 651860/2015, 2017 BL...more

Update: Case Involving Sharing Of Passwords May Be Headed To The Supreme Court

by Jackson Lewis P.C. on

Last August, we reported on a Ninth Circuit case in which a former employee was convicted of a crime under the Computer Fraud and Abuse Act (“CFAA”) for accessing and downloading information from his former company’s database...more

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

Company Awarded Damages After Former Employee Hacks Its Systems And Hijacks Its Website

by Jackson Lewis P.C. on

A company can recover damages from its former employee in connection with his hacking into its payroll system to inflate his pay, accessing its proprietary files without authorization and hijacking its website, a federal...more

Auction House Accused of Scraping Competitor’s Web Listings

Screen scraping is a problem that has vexed website owners since the early days of e-commerce – how to make valuable content available to users and customers, but prevent competitors from accessing such content for commercial...more

Four Indicted On Charges Related To Yahoo Hacks

by King & Spalding on

On March 15, 2017, the United States announced the indictment of four defendants for their roles in the hacks of Yahoo’s network, systems, and user accounts. The indictment stems from an investigation conducted by the Federal...more

(Alleged) Spammer Squares Off With (Alleged) Hacker, Highlighting Risk of Cyber Threats

What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more

Workplace Investigations and Privacy of Electronic Communications

by PretiFlaherty on

The situation is common enough: an employee is alleged to have engaged in misconduct and, as part of its investigation, the employer decides to search the employee’s company-issued computer for any relevant documents and...more

231 Results
|
View per page
Page: of 10
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.