Stored Communications Act

News & Analysis as of

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

The Cards Hack the Astros – So What Law Applies? [audio]

In a developing story, The New York Times is reporting that the FBI is investigating the St. Louis Cardinals for hacking into the Houston Astros’ computer networks to steal the Astros’ internal baseball operation intelligence...more

CFAA and SCA Do Not Prohibit Creation Of A Fake Facebook Page

The defendants in a case pending in Chicago federal court were accused of contravening Facebook’s terms of use by accessing its computers in order to create a phony page and then using it to ridicule someone. In Bittman v....more

Strategies For Businesses Protecting Electronic Data Within California

Part One: The Computer Fraud And Abuse Act (18 U.S.C. § 1030 Et Seq.) - Data security is top-of-mind in today's corporate world. According to The Ponemon Institute's 2015 Cost of Data Breach Study, the average total...more

Oral Argument Scheduled in Microsoft Foreign Data Demand Appeal

The U.S. Second Circuit Court of Appeals scheduled oral argument for September 9, 2015 on Microsoft’s appeal of a district court opinion upholding the validity of the U.S. government’s search warrant for customer data stored...more

Advertising Law - June 2015 #2

NFL Scores Victory at Eighth Circuit, $42M Deal With Former Players Upheld - The Eighth Circuit Court of Appeals affirmed the $42 million settlement between the National Football League (NFL) and almost 25,000 former pro...more

Strategies For Businesses Protecting Electronic Data Within California

Businesses in California have a number of tools with which to fight off unauthorized intrusions into their electronic data whether perpetrated by employees, former employees, disreputable competitors or random hackers....more

Think your Cellphone Usage is Private? Think Again

In a closely-watched case out of Miami, the Eleventh Circuit Court of Appeals redefined the zone of privacy for cell phone users. As the Tech World was focused on Miami for the second annual eMerge conference, the court...more

Eleventh Circuit Court of Appeals: Warrantless Cell Site Data Constitutional

The U.S. Court of Appeals for the Eleventh Circuit, sitting as a full panel, has ruled that law enforcement may acquire historical cell site data information (i.e., past location information) from wireless telecommunications...more

E-Discovery Update: When Personal and Work Data Collide

In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more

A Modern Game of Hide and Go Seek? Some Lessons Learned Following Sony and Other Widely-Publicized Data Breaches

While the recent hack of Sony was prominent news because of the celebrity ties and potential geo-political implications, other prominent cyber-attacks over the last few months are enough to give any company pause. The January...more

Lenovo’s Unsecure Adware On Consumer PCs Prompts Class Action Lawsuits

Security experts recently discovered that about 50 different consumer PC models sold by Lenovo since September 2014 were shipped with adware known as Superfish Visual Discovery that could be exploited by hackers to spoof...more

Privacy Settings Won’t Keep Social Media Posts Out Of Court

On Jan. 7, 2015, in Nucci v. Target Corp., et al, the District Court of Appeal of the State of Florida, Fourth District, upheld a lower court’s order compelling plaintiff Maria Nucci to produce photographs originally posted...more

Another Class Action Pops Up For Complaints About Pop-Ups

A class action lawsuit recently instituted in federal court in the Northern District of California, Hunter v. Lenovo et al., alleges that Lenovo Inc., a computer manufacturer, violated its customers’ rights by selling...more

Photographs Posted on Facebook are Discoverable

The Fourth District in Nucci v. Target Corp., --- So. 3d ----, 2015 WL 71726, 40 Fla. Law Weekly D166 (Fla. 4th DCA Jan. 7, 2015), recently held that photographs posted on a plaintiff’s social media sites are discoverable if...more

Accessing Digital Assets

For several years the Uniform Law Commission (the “ULC”), a non-partisan body that conceives model laws addressing legal issues of widespread importance, which legislatures are free to adopt fully or in modified form, has...more

Survey Says Sharing Information is Crucial in a Volatile Data Security Environment

Information sharing allows for better insight into existing threats and vulnerabilities and alerts organizations to the existence of important data that can help prevent cyberattacks and mitigate the effects of ongoing...more

Cybersecurity Litigation Monthly Newsletter

In August, Paytime, Inc., a payroll services company, moved to dismiss a putative class action filed in the wake of a data breach in which the personal and financial information of more than 230,000 people was compromised. ...more

Cybersecurity Litigation Monthly Newsletter

As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more

Is Dark Fiber a Regulated Service?

It seems logical to think that leasing dark fiber is not a telecommunications service. Dark fiber is only a component of a service, not a service unto itself. It may therefore come as a surprise to know that the FCC (and the...more

Woman Brings Charges Against Ex-Husband for Intercepted E-mails

In a recent New York case, Zaratzian v. Abadir, a former wife, filed a lawsuit against her former husband and his attorney alleging they violated the Wiretap Act and Stored Communications Act when she discovered that her...more

Emerging Technologies Push the Boundaries of Privacy Law

As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more

Microsoft Stands Up in Court for European Privacy Rights?

A Stored Communications Act (SCA) search warrant case arising out of a New York federal narcotics trafficking investigation is being closely watched by EU data protection authorities, privacy advocates, multinational...more

I Want My Selfie Back!!!

If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

82 Results
|
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×