Data Theft

News & Analysis as of

Business Litigation Alert: "Will There Be a Jump in Cyber Attacks in 2016? Survey Says... Yes"

Last year, we saw some major cyber breaches affect millions of Americans (remember the June 2015 hack of the federal Office of Personal Management that impacted over 20 million Americans?). Unfortunately, cyber-attacks do not...more

‘Cannibal Cop’ Decision Restrains Employers

Second Circuit ruling on data theft creates more inconsistency regarding federal law’s reach. In December, a divided panel of the U.S. Court of Appeals for the Second Circuit in U.S. v. Valle interpreted the Computer...more

Stealing Bases Okay; Stealing Data Not So Much

On January 8, 2016, Christopher Correa, the former director of Baseball Development for the St. Louis Cardinals, pleaded guilty to each count of a five-count criminal information, charging him with felony violations of...more

Cybersecurity and Data Privacy and E-Discovery and Information Management: Second Circuit Draws Line Between Employees and Hackers...

Employers in New York face a heightened hurdle to holding employees legally accountable for theft and other misuse of company data after the Second Circuit’s recent decision in United States v. Valle. The Court has held that...more

Hacker arrests and prosecutions update

We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more

OPM admits 5.6 million fingerprints stolen during breach

The Office of Personnel Management (OPM) reported yesterday that fingerprint data stolen during the breach of almost 22 million Americans’ data is estimated to be 5.6 million instead of the original estimate of 1.1 million....more

Federal Court Dismisses Computer Fraud and Abuse Act Claim That Was Filed Against Our Clients

Here’s a recent victory we obtained on behalf of our clients SunEdison, Inc., et al. The individual defendants (then-current employees of SunPower, Inc.) were alleged to have violated the federal Computer Fraud and Abuse Act...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

China Promulgates Tougher Criminal Provisions Governing Data Privacy

One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more

OPM Faces Another Class Action For The Theft Of Data Affecting 21.5 Million Current, Former And Prospective Government Employees

On August 14, 2015, a class action was filed in the United States District Court for the District of Columbia on behalf of about 21.5 million federal employees, contractors, and job applicants whose personal information was...more

Damage Control: After an Insider Breach

In the immediate aftermath of a major security or data breach companies should re-evaluate their risk management systems. In a previous post on insider threats, we outline what a company can do to prevent risks associated...more

Is the employer hijacking the case, or not?

The Labour Tribunal is a specialised court set up to provide a simple, inexpensive and informal means of resolving employment disputes in Hong Kong. The Tribunal has exclusive jurisdiction to deal with claims arising from a...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Responding to Insider Data Theft

Our 2015 monthly Privacy Issues Wednesday webinar series continued this month with Jonathan Cain and Paul Pelletier’s Responding to Insider Data Theft & Disclosure presentation. Jonathan and Paul discussed how distinguishing...more

Fourth Circuit Upholds Federal Criminal Conviction for Accessing Former Employer's Database

The federal Computer Fraud and Abuse Act (CFAA) was primarily intended to deter and punish database hacking by third parties. Employers involved in disputes with former employees have attempted to use CFAA in response to...more

Blog: Cyberthieves Collect Confidential Information, Apparently To Conduct Insider Trading

Here is an unnerving warning from FireEye, a cybersecurity firm, discussed in this article from MarketWatch, regarding a sophisticated, native-English-speaking group, designated FIN4, that has targeted almost 100 public...more

Travelers, Beware the “Darkhotel” Hacks Over Hotel Internet

Business travelers may be targeted and hacked through hotel Wi-Fi networks, according to a recent report by Kaspersky Lab. Hackers have been stealing company data from top executives at luxury hotels in an attack known as...more

To Catch an E-Thief — Under Federal Property Law

As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition. The fundamental shift for busi­nesses in the past 15 years from paper documents to computer data has forced the courts...more

Lawyers for multiple small companies have accused search engine giant Google Inc. of stealing from their clients’ trade secrets

In the past lawyers for multiple small companies have accused search engine giant Google Inc. of stealing and profiting from their clients’ trade secrets. In the case of VSL Communications, their lawyers claim that Google did...more

No Harm, No Foul – Appellate Court Finds No CMIA Claim Without Actual Injury

California’s Confidentiality of Medical Information Act, Cal. Civ. Code § 56 et seq. (“CMIA”), provides that an individual may recover $1,000 nominal damages (plus actual damages if any) based on the negligent release of...more

David Nosal, Employee Data Theft, and Why Employment Lawyers Should Understand Their Clients' IT Infrastructure

Earlier this month, a federal judge in San Francisco sentenced David Nosal to a year in prison, three years’ supervised release, 400 hours of community service, and $60,000 in fines. His crime? Nosal violated the Computer...more

CFPB issues data breach advisory for consumers

In the wake of the recent publicity about data breaches at several major retailers, the CFPB has issued a consumer advisory. Written in easy to understand language, the advisory describes steps consumers can take to protect...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

Restarting the Federal Data Privacy Law Engine

The recent data security breaches at Target, Niemen Marcus, and a few other retailers has been a catalyst to Congress restarting talks about a federal data privacy law. Currently, there are pending bills in both the House and...more

On a Collision Course: How Domain Name Collision Could be Your Biggest Security Threat

We are barely a month into 2014 and one of the news stories that is likely to be most memorable for the year is the Target security breach that resulted in upwards of 70 million customers’ personal information being...more

43 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×