It’s a crime when you use interstate wire communications (e.g., phone, radio, television, internet) to engage in a scheme to defraud or to obtain money by false pretenses. Wire fraud is one type of cybercrime that takes place by using technology. In most cases, the culprit uses some kind of…
Articles Posted in Cybersecurity
Wire Fraud Laws – Part II
Wire fraud can be considered a white-collar crime. The government usually relies on the wire fraud statute if other types of criminal statutes such as healthcare fraud or bank fraud would not be applicable. There are several prima facie elements for wire fraud as we have discussed in previous articles.…
Wire Fraud Laws – Part I
A person can be prosecuted for wire fraud when there is reliable evidence of a scheme to defraud another by using electronic communications such as wire, radio or television. The defendant must be part of a fraudulent scheme and have a specific intent to commit the fraud. In some cases,…
Global Cross-Border Privacy Rules Forum
The United States Department of Commerce has issued a declaration regarding global cross-border privacy rules. These privacy rules are designed to promote data flows with privacy protections. The participants (which include Canada, Japan, Republic of Korea, Philippines, Singapore, Chinese Taipei, and United States of America) have declared that: (1) the…
Cyberstalking and Cyberharassment Laws
Cyberstalking takes place when the culprit uses information and communication technologies to initiate the violations. These actions may include harassment, annoyance, attacks, or threats against the victims. The culprits can start the attacks by emails, instant messages, calling, texting, or other communication methods. There have been cases where the culprit…
Identity Theft Laws
In general, there are four categories of identity theft. First, “financial identity theft” takes place when the adverse party uses the victim’s identity to gain access to funds, goods, or services. The adverse party may use the victim’s information to open a bank account, get a debit or credit card,…
Corporate Cybersecurity
It’s important to implement practical corporate cybersecurity measures especially in today’s volatile climate. The number of reported cyber threats are increasing as we progress and it will most likely continue on the same trajectory. All businesses and commercial enterprises are a target especially if they have access or control over…
Electronic Data Retention Regulations
Electronic data has been growing in size and proportion for several decades. The sheer amount of electronic files (e.g., emails, pictures, videos) has consumed local and remote databases. The cloud storage facilities have been put together to hold this information for us. Cloud storage facilities have certain obligations towards their…
Data Disposal and Email Retention Laws
Data disposal is a key process in a legal entity’s policies and procedures for managing personal and confidential information. In general, private and public entities store data on their servers. This information may include financial and health information which should not fall into the wrong hands. So, there must be…
Artificial Intelligence Laws
Artificial intelligence (“AI”) is defined as a system that imitates human intelligence to conduct similar tasks by improving itself based on the submitted or collected information. Artificial intelligence can be used in various industries such as manufacturing, automobiles, education, medicine, and financial services. Artificial intelligence can be used to detect…