Supreme Court: Private Information Is Worthy of Protection, Even on Cell Phones

In Riley v. California the Supreme Court made it clear that people’s private information is worthy of protection, even on their cell phones, in holding that cell phones are generally protected from searches without a warrant.  The Supreme Court ruled Wednesday that police cannot go snooping through people’s cell phones without a warrant, in a unanimous […]

, ,

Leave a comment

Social Media Evidence From Facebook Used Get to Get Rape, Sodomy, Domestic Violence Charges Dismissed

Do you remember the reason I gave you yesterday, when I blogged about why you cannot delete social media posts or accounts once you anticipate you will be in a lawsuit? (see Do Not Delete Relevant Social Media Accounts or Posts During Lawsuits > Spoliation of Evidence) That’s right, because “the law has a right to […]

, ,

Leave a comment

Do Not Delete Relevant Social Media Accounts or Posts During Lawsuits > Spoliation of Evidence

“The law has a right to every man’s evidence.” The old saying means that when you are in possession of something that could be used as evidence, and you anticipate that you are going to be involved in a lawsuit that may have even a tangential relationship to that evidence, you have a duty to preserve […]

, , ,

3 Comments

Beckett Media Files Two “Data Scraping” Cases in Northern District of Texas – Will the CFAA Claims Survive?

Beckett Media recently filed two cases in the Northern District of Texas that allege violations of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (the CFAA). Just a few months ago I blogged about how Texas is a favorable jurisdiction for plaintiffs to bring CFAA claims (Yes, Texas is a good state for plaintiffs […]

Leave a comment

3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach

In an earlier blog post I wrote about how [w]hen your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach to protect the data and keep it from happening? What steps is […]

, , , , ,

Leave a comment