News & Analysis as of

Data Privacy Cybersecurity Criminal Prosecution

Cimplifi

Going Mobile: Mobile Device Data in Criminal Investigations

Cimplifi on

While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

Fisher Phillips

Workplace Law Forecast 2024 - Your workplace law recap for 2023 and predictions for 2024 to help you prepare for the coming year.

Fisher Phillips on

When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more

Reveal

Legal Risk Management: 5 Ways to Proactively Mitigate Risk

Reveal on

Corporations must innovate and set themselves apart from their competition to achieve long-term success, but they cannot act with reckless abandon in doing so. Rather, they must strategically plan their moves to proactively...more

The Volkov Law Group

Ransomware Criminal Prosecution of Russian National Underscores Pervasive Ransomware Risks

The Volkov Law Group on

In today’s world of cyber threats, many companies have fallen victim to ransomware attacks.  Corporate boards and senior executives face serious issues when their companies are attacked. The payment of ransom is not only...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 6. Privacy Briefs: June 2022

Report on Patient Privacy 22, no. 6 (June, 2022) - A report from the HHS Health Sector Cybersecurity Coordination Center (HC3) found that in early 2022, ransomware groups increasingly turned to legitimate software during...more

Carlton Fields

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

Carlton Fields on

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more

Oberheiden P.C.

Theft of U.S. Companies’ IP Assets and Other National Security Issues Involving Foreign Governments and Foreign-Controlled...

Oberheiden P.C. on

Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more

Morrison & Foerster LLP

China Promulgates Tougher Criminal Provisions Governing Data Privacy

One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more

Robinson+Cole Data Privacy + Security Insider

Cybercrime Forum Darkode nailed by the DOJ and FBI

Last week, (July 15, 2015), the Department of Justice (DOJ) announced that the coordinated law enforcement efforts of 20 countries, including the U.S. effectively dismantled the computer hacking forum Darkode with criminal...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide