Search Results (117)
Documents on Criminal Law, Internet & E-Commerce, Entertainment & Sports
Show: results per page
|UK to Implement Fourth Money Laundering Directive, Presenting an Opportunity for the Gaming Sector to Provide Input|
Lisa Navarro; Greenberg Traurig Maher LLP;
October 20, 2016, previously published on October 17, 2016The current EU Money Laundering and Terrorist Financing (ML/TF) measures are contained in the Third Money Laundering Directive (3MLD). 3MLD was implemented into UK law by the Money Laundering Regulations 2007, the Proceeds of Crime Act 2002, and the Terrorism Act 2000. These Regulations promote a...
Wiretap Act and CIPA Violations Held to Satisfy Spokeo Test for Standing in
Latest Gmail Privacy Class Action|
Kevin M. McGinty; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
October 10, 2016, previously published on October 3, 2016In the wake of the Supreme Court’s decision in Spokeo, Inc. v. Robins, 136 S. Ct. 1540 (2016), lower courts have begun to address whether alleged violations of statutes intended to protect privacy suffice, in the absence of any further alleged injury, to establish Article III standing. In...
|No Expansion of CFAA Liability for Monetary Exploit of Software Bug|
Jeffrey D. Neuburger; Proskauer Rose LLP;
November 15, 2013, previously published on November 13, 2013In the game Monopoly, lucky players landing on Community Chest might turn over the highly desirable “Bank Error in Your Favor, Collect $200" card. By the next turn, the proceeds are usually invested in properties and houses, yet, some might wonder whether accepting such a windfall was...
|FBI Prohibited From Issuing National Security Letters|
Steven J. Bonafonte, Alex V. Hernandez, Timothy G. Ronan, James T. (Tim) Shearin; Pullman & Comley, LLC;
April 5, 2013In a detailed opinion issued just this month, the U.S. District Court for the Northern District of California struck down an oft-used FBI counterterrorism tool. Under the statute at issue, the FBI has issued tens of thousands of so-called National Security Letters (“NSLs”) to ECSPs -...
|Supreme Court's New Ruling May Bolster Defense of Data Breach and Privacy Cases|
Anjali C. Das, Christina L. Talamonti; Wilson Elser Moskowitz Edelman & Dicker LLP;
March 28, 2013, previously published on March 25, 2013In Clapper v. Amnesty International, 568 U.S. 2013, the United States Supreme Court upheld the strict requirements under Article III for a plaintiff to have standing to sue in privacy cases. Rejecting Respondents' arguments as too speculative, the Court held that for future harm to constitute...
|Cyber Crimes: What You Need to Know About Risk Management & Insurance|
Jack Montgomery; Bernstein Shur;
June 23, 2012, previously published on June 20, 2012The impact and skyrocketing costs of cyber crimes can be devastating to businesses. According to a recent study*, the cost to clean up after an attack ballooned from $247,744 to $417,748 from 2010 to 2011. Despite enormous resources devoted to combating cyber crimes, incidents continue to grow and...
|DOJ's Reversal on the Wire Act - What It Means for Internet Gaming|
J. Daniel Walsh; Greenberg Traurig, LLP;
January 3, 2012, previously published on December 28, 2011On Friday, December 23, 2011, the Department of Justice (DOJ) released for the first time a memorandum signed by Virginia A. Seitz, the Assistant Attorney General for the Criminal Division, dated September 20, 2011, responding to two different inquiries — one from two state lotteries and one...
|Lie about Your Age...Steal A Trade Secret...It's All Criminal.|
Michael R. Greco; Fisher & Phillips LLP;
November 21, 2011, previously published on November 20, 2011Could it possibly be equally as unlawful to lie about your age as it is to download trade secrets from your employer's computer? Some say that both may constitute a violation of the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (“CFAA”), and therefore the statute must be...
|Wire Transfer Fraud in Massachusetts: Basic Risk Allocation Principles|
Sally Fitch LLP;
November 17, 2011Fraudulent wire transfers initiated by sophisticated cyber criminals pose a significant risk to businesses and financial institutions. Technologically savvy fraudsters can steal confidential information through a variety of mechanisms, including malicious software installed on an unwitting victim's...
|E-Discovery in Criminal Investigations|
Therese Craparo, Patrick Kellermann, Michael E. Lackey, Michelle N. Webster; Mayer Brown LLP;
October 3, 2011, previously published on September 2011A senior corporate executive is under investigation by the Department of Justice for accounting fraud. In the course of discovery, he learns that the investigators and prosecutors secured a warrant to seize a large number of personal emails from an Internet-based electronic mail service. The...