Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols.
Key...more
2/21/2020
/ Cyber Threats ,
Department of Justice (DOJ) ,
Electronically Stored Information ,
Email ,
FBI ,
Financial Fraud ,
Financial Transactions ,
Fraud ,
Risk Management ,
Security and Privacy Controls ,
Wire Fraud
Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more
2/15/2017
/ Corporate Counsel ,
Electronically Stored Information ,
Extraterritoriality Rules ,
Google ,
International Data Transfers ,
Ireland ,
Microsoft ,
MLAT ,
Popular ,
Search Warrant ,
Stored Communications Act ,
Young Lawyers
The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC.
On November 7, 2016, the Standing Committee of the National People’s Congress...more
Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations. In Congress, a proposal to reform the SCA...more
4/25/2016
/ Criminal Investigations ,
Electronically Stored Information ,
Email ,
First Amendment ,
Fourth Amendment ,
Law Enforcement ,
Microsoft ,
Popular ,
Proposed Legislation ,
Search Warrant ,
Social Media ,
Social Networks ,
Stored Communications Act ,
Subpoenas ,
Third-Party Service Provider