Category: Laws

  • Cyberlaws for Businesses – Jan 2025 Edition

    Corporations should be particularly aware of several key cyber laws and regulations that govern data protection, privacy, and cybersecurity practices. Here are some of the most significant ones: Corporations must also be aware of sector-specific laws like those from the National Institute of Standards and Technology (NIST) for cybersecurity frameworks or the North American Electric…

  • Virginia Computer Crimes Act 18.2-152.1

    CISO Legal Summary: Overview:The Virginia Computer Crimes Act outlines various offenses related to computer misuse, including fraud, trespass, invasion of privacy, and the use of computers in criminal activities. It also defines key terms and establishes penalties for violations. Key Definitions: Major Offenses: Civil Relief (§ 18.2-152.12): Additional Provisions: Article 7.1. Computer Crimes. § 18.2-152.1.…

  • Stored Communications Act 18 USC 121

    CISO Legal Summary: Overview:This statute addresses the unlawful access to electronic communications stored by service providers, outlining offenses, penalties, and exceptions. Key Offenses: Penalties: Exceptions: §2701. Unlawful access to stored communications (a) Offense.—Except as provided in subsection (c) of this section whoever— (1) intentionally accesses without authorization a facility through which an electronic communication service is…

  • Computer Fraud and Abuse Act 18 USC 1030

    CISO Legal Summary: Overview:This statute addresses various forms of computer-related fraud and unauthorized access, outlining specific offenses, penalties, and definitions related to computer crimes. Key Offenses: Penalties: Investigative Authority: Definitions: Civil Actions: Exemptions: §1030. Fraud and related activity in connection with computers (a) Whoever- (1) having knowingly accessed a computer without authorization or exceeding authorized…

  • Harrods Ltd. v. Sixty Internet Domain Names

    CISO Legal Summary: The case “Harrods Limited v. Sixty Internet Domain Names” involves a legal dispute over the registration and use of internet domain names between two companies, both named “Harrods,” with legitimate rights to the name in different regions. Harrods Limited (Harrods UK), the owner of the famous Harrods department store in London, sued…

  • Hately v. Watts

    CISO Legal Summary The case Patrick Hately v. Dr. David Watts involves allegations that Dr. David Watts unlawfully accessed Patrick Hately’s web-based email account, violating the Virginia Computer Crimes Act and the federal Stored Communications Act (SCA). The district court dismissed Hately’s claims, but the Fourth Circuit Court of Appeals reversed and remanded the case. KEY ISSUES:…

  • Wilson v. Volkswagen of America, Inc.

    CISO Legal Case Summary: The case John W. Wilson v. Volkswagen of America, Inc., et al. involves a products liability claim arising from an automobile accident in which the plaintiff, John W. Wilson, was seriously injured while driving a Volkswagen Beetle. The case centers on the alleged defects in the car’s design, manufacture, and assembly, which Wilson…

  • Attkisson v. Holder

    CISO Legal Case Summary: The case Sharyl Thompson Attkisson, et al. v. Eric Himpton Holder, Jr., et al. involves allegations by journalist Sharyl Attkisson and her family against various government officials and corporate entities for unauthorized surveillance and intrusion into their electronic devices. The plaintiffs claimed that their devices were unlawfully accessed as part of a government…

  • GLOBAL POLICY PARTNERS, LLC v. Yessin  

    CISO Legal Case Summary: The case Global Policy Partners, LLC, et al. v. Brent Yessin involves allegations of unauthorized access to email accounts under the Computer Fraud and Abuse Act (CFAA) and the Stored Communications Act (SCA). The plaintiffs, Global Policy Partners, LLC (GPP) and Katherine Friess Yessin, accused Brent Yessin, a founding manager of GPP, of…