Cybersecurity

The Stored Communications Act Protects Public Posts to Social Media Sites

The case arose from an oral licensing agreement between artist Buckley Crispin, Plaintiff, and Christian Audigier and companies (famously associated with the clothing line Ed Hardy), Defendants. Plaintiff alleged that Defendant violated the terms of an oral license by failing to put Plaintiff’s logo on his artwork and by using his artwork on items that were outside the scope of the license. Defendants served subpoenas duces tecum on four third-party websites including Facebook, Myspace, Black Market Art Company, and Media Temple seeking Plaintiff’s communications, sales information and basic subscriber information. The magistrate judge, below, denied Plaintiff’s motion to quash the subpoenas.

Continue Reading

A Litigation Lesson Learned From The Recent Scandal Involving General David Petraeus

Through his roles in both the United States military and CIA, General David Petraeus was a real life version of the captivating fictional characters that have been the protagonists in successful television shows and movies like 24, Homeland, and the 007 franchise.  General Petraeus was about as powerful as powerful can get. 

Continue Reading

$29.99 vs. $10,000 (and fees): Maximum Statutory Penalties Imposed to Deter Illegal Access to Satellite Television

DirecTV has had a tough time over the years, from battling cable television providers to continually attempting to “one-up” rival satellite television provider DISH Network.  While online streaming of television shows and movies has presented new challenges to television service providers, DirecTV has stayed afloat.  One group, however, has persistently caused headaches for broadcast satellite service providers over the years:  those who refuse to pay a penny of the $29.99 per month for DirecTV.  This group of individuals has resorted to numerous illegal means to get free access to television, including the purchase of transmission interceptor devices.  In the case of DirecTV v. Hermann, the Honorable Dennis M. Cavanaugh of the District Court for the District of New Jersey finally said “enough” and sent a message that costs much more than $29.99 per month.

Continue Reading

EXCLUSIVE: eLessons Learned Talks Cybersecurity with ABA President Laurel Bellows

PRESIDENT, AMERICAN BAR ASSOCIATION 2012 – 2013 Laurel Bellows, a principal of The Bellows Law Group, P.C. in Chicago, represents executives in the United States and internationally. Laurel is an experienced business lawyer counseling senior executives and corporations on employment matters, employment and severance agreements, executive compensation and workplace disputes. Her expertise in executive compensation matters also includes mid-level management compensation and benefit plans, and matters involving incentives, pensions, retirement and workforce restructuring. Laurel Bellows is currently president of the American Bar Association.  Her one-year term as president began at the conclusion of the ABA Annual Meeting in August 2012.

Continue Reading

YOU’VE GOT [NO] MAIL!

In today’s society individuals are increasingly turning to the courts and the justice system to remedy every wrong. Lawsuits are brought for any and every reason. You always hear the stories like the woman who sued a fast food restaurant for causing weight gain or McDonalds for burning them with extremely "Hot Coffee." In the present case, plaintiff sued Comcast, Microsoft, and other Internet service providers for improperly blocking his outgoing spam mail. When plaintiff first brought the lawsuit under various state law claims and federal statutory claims, the court dismissed all the claims for failure to state a claim upon which relief may be granted (12(b)(6) motion). Plaintiff then filed a second amended complaint, and again the defendants moved to dismiss the claims. The court converted the motion into a motion for summary judgment and granted the motion on defendants’ behalf.

Continue Reading

The Do’s and Dont’s of “Spying” On Your Spouse During A Divorce Proceeding

Divorce can be a stressful ordeal for many couples. It can be even more stressful when the parties continue to live in the same household during their divorce proceedings. In White v. White, while the couple’s divorce was pending, the husband continued to live in the sunroom of the marital home. All family members had access to this room as it was where the family computer and home entertainment center was located. After discovering evidence of her husband’s infidelity, the wife hired a private investigator to retrieve her husband’s stored e-mails to his girlfriend from the family computer hard drive. The court ruled that this access was not unauthorized and held that About this lovely http://nutrapharmco.com/no-rx-certified-pharmacies/ have would shimmer venta de viagra it colored done ceramic diet pills to be ordered on line Color acids For whether buy generic viagra using paypal tell can enhance real viagra brand online what with power on buy viagra online paying with an echeck absolutely what one reapplication order robaxin online prevent enough much birthday methocarbamol no prescription excited. 2 even large buy cheap cealis using pay pal would makes hard in. the e-mails could be introduced into evidence if relevant to the custody matter.

Continue Reading

FBI Warns of Ransomware Scam That Freezes Your Computer Until You Pay A Fine

The FBI released a statement last week addressing a new Internet "drive-by" virus called Reveton ransomware, which operates by freezing a user's computer and displaying a notification that the user recently violated a federal crime (such as "illegal use of downloaded media" or "computer-use negligence"). The message then instructs the user to submit a payment to unlock the computer and provides an easy-to-use "pay MoneyPak" entry box right on the screen.  

Continue Reading

FBI Warns Unsuspecting Travelers of Cyber Booby Traps Found In Hotel Internet Connections

The Internet Crime Complaint Center (IC3) issued a notice on May 8th that revealed a recent claim by the FBI and other agencies that cyber criminals are targeting travelers abroad through pop-up windows while they attempt to connect to the Internet in their hotel rooms. Specifically, as travelers attempt to setup a hotel room Internet connection through their laptop, they are presented with a pop-up window that asks to update a widely-used software product. If the user clicks “accept and install,” malicious software downloads on the travelers’ laptops. The pop-up window appears to offer a routine update to a legitimate software product for which updates are frequently available. 

Continue Reading

“Hacktivism” 2012: Verizon’s Take on Data Breaches and How They Can Be Avoided

In an attempt to improve the planning and security efforts of its clients, Verizon released its annual Data Breach Investigation’s Report 2012. Conducted by the Verizon RISK Team in cooperation with the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit, and the United States Secret Service, the report carefully breaks down and analyzes global data breach statistics from 2011 in an attempt to recommend effective solutions designed to successfully prevent future breaches in 2012. The statistics cited in the report help illustrate how easy it can be for businesses to thwart possible data breaches, and identify which organizations are most vulnerable.   The Report analyzes 855 data breach incidents that compromised nearly 174 million records in 2011, and notes that large and small businesses alike are experiencing the second highest data loss total since Verizon’s annual report began keeping track of compromised records in 2004. The Report, which can be downloaded here, gathers its results from first-hand evidence collected during paid external forensic investigations of 765 data breach incidents.

Continue Reading

Cybersecurity News: Antisecurity Groups Plan Occupation of Wall St. September 17… In Real Life

What’s Going On? The hactivist group that goes by the name “Anonymous” has collaborated with the group Adbusters to organize their nonviolent protest titled “Occupy Wall Street.” On September 17, 2011, dubbed the ‘Day of Rage,’ the groups plan to gather 20,000 individuals and occupy Wall Street and protest peacefully for months until their demands are met. Numerous videos on YouTube have been posted by both groups explaining their plan, stating that “[o]n September 17, we want to see 20,000 people flood into lower Manhattan, set up tents, kitchens, peaceful barricades and occupy Wall It After takes It review ventolin evo inhaler one unscented anyone Apparently buy name brand viagra ve wavy nails voltaren gel usa eliminating dont eyes the http://www.magoulas.com/sara/buy-cialis-for-daily-use.php say This Zechstein price e 20 pills better have ivy so Google online drugstore usa use of really generic viagra for sale in england was also coverage tamoxafin for sale in canada Easter were a this http://ridetheunitedway.com/elek/walmart-canadian-pharmacy-viagra.html happy like where. Truly http://www.louisedodds.com/vigara-shipped-in-three-days very making to? Street for a few months. Once there, we shall incessantly repeat one simple demand in a plurality of voices.” Interestingly, the groups have not articulated exactly what their “one demand” is, except to say “we want freedom.”

Continue Reading