Supreme Court Limits Scope of Computer Crime Law

Nathan Van Buren was a police officer in rural Georgia. As such, he had lawful access to both the National Crime Information Computer (NCIC) and the Georgia Crime Information Center (GCIC) with the understanding that he could use the computer for “law… Continue reading Supreme Court Limits Scope of Computer Crime Law

White House Issues Advisory to Business Leaders on Ransomware Practices

In the wake of the highly publicized attacks on both gasoline and food infrastructures by Russian-based ransomware attackers, the Biden administration on June 3 issued an advisory to business leaders directing them to take action to harden their systems against ransomware and to be more resilient against similar attacks. It has also been reported that…

The post White House Issues Advisory to Business Leaders on Ransomware Practices appeared first on SecurityCurrent.

Continue reading White House Issues Advisory to Business Leaders on Ransomware Practices

Supreme Court To Decide Scope of Federal Hacking Law

For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on the use of computers, computer databases and data glea… Continue reading Supreme Court To Decide Scope of Federal Hacking Law

High Court Deals Blow to Data Privacy Regulations

Like the Kubler-Ross stages of grief, there are multiple stages of data breach. Anger, denial, blame, investigation, litigation, regulation and, ultimately, resignation. This includes possible class action litigation by consumers, banks, vendors, supp… Continue reading High Court Deals Blow to Data Privacy Regulations

Federal Court Narrows ‘Third Party’ Warrant Requirement

In United States v. Carpenter, the United States Supreme Court ruled that, before the police could obtain historical cell site location information (CSLI) about the location of someone’s cell phone in the past, they had to seek and obtain a warrant fr… Continue reading Federal Court Narrows ‘Third Party’ Warrant Requirement

Federal Court Permits Warrantless Device Searches at Border

With the weather getting warmer, and vaccinations against COVID-19 increasing, we are likely to see an increase in travel — including international business travel. But for individuals and companies seeking to protect their data privacy, a recen… Continue reading Federal Court Permits Warrantless Device Searches at Border

Jailbreak or Jail – Is Hacking for the Government A Crime?

After the horrific shooting in San Bernardino, California, federal law enforcement officers seized the now-dead suspect’s iPhone, and sought to examine it. However, the phone was “locked” using proprietary hardware and software from Apple. The governm… Continue reading Jailbreak or Jail – Is Hacking for the Government A Crime?

Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim”

One of the more common forms of cyberattack is that of a business email compromise (BEC) – when the email account of either a buyer or seller (or both) is compromised by a hacker who then spoofs one or both of the parties to demand or redirect p… Continue reading Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim”

Is Facebook a “Party” to Capture of Offline Activity?

Facebook uses tracking plug-ins; bits of code that the consumer is unaware of, to track the behavior of users when they log out of the social media site, and which tells Facebook what websites their subscribers are visiting and what they are doing whe… Continue reading Is Facebook a “Party” to Capture of Offline Activity?

On Beauty Queens, Hackers and the U.S. Supreme Court

The U.S. Supreme Court may ultimately decide whether a Florida beauty queen and her mother are criminals, and indeed, the entire scope of the computer crime statute. According to reports in the Washington Post, 50-year-old Laura Rose Carroll, an assis… Continue reading On Beauty Queens, Hackers and the U.S. Supreme Court