Latest Posts › Electronically Stored Information

Share:

The Pervasive Threat of Business Email Compromise Fraud - and How to Prevent It

Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key...more

US Magistrate Judge Upholds Search Warrants for Google Data Stored Overseas, “Shards” and All

Another front recently emerged in the legal battle over whether US law enforcement authorities can use a search warrant issued under the Stored Communications Act (SCA) to obtain data stored overseas. Until now, the battle...more

China Issues Its First Network Security Law

The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC. On November 7, 2016, the Standing Committee of the National People’s Congress...more

Are Changes in Store for the Stored Communications Act?

Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations. In Congress, a proposal to reform the SCA...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide