We’re very happy to now be part of the American Bar Association Journal’s Blawg Directory.
Here’s the ABA post:
White Collar Wire
“Don’t read us because you’re a criminal. Read us because, some time or other, someone may think you are. This is a blog about business crime. We post stories about news, cases, judicial opinions, practical tips and scholarly work regarding white-collar criminal and civil enforcement, grand jury investigations and regulatory compliance We want to be useful to businesspeople, internal counsel, defense lawyers in private practice, prosecutors and law-school teachers. Sometimes, we write about crime fiction, cocktails and theology. As anyone who’s ever been involved in the defense or prosecution of a white-collar case can testify, all three come in handy.”Author: Jack Sharman is a partner at Lightfoot, Franklin & White in Birmingham, Ala.
Blawg Related Categories:Criminal Justice • White Collar Crime • Partner
A blog about law.
“Blogs? We don’t need no stinkin’ blogs.”
Federal district court judge declaring a mistrial in Katrina police-shootings: “a prosecutorial game of qualsiasi mezzo.” #ethics #DOJ #Katrina (via White Collar Prof blog)
You use your cell phone for work? In a potentially important Title III opinion, the Fifth Circuit limits the territorial reach of cellphone interception in United States v. Richard North. In part: “[A] district court cannot authorize interception of cell phone calls when neither the phone nor the listening post is present within the court’s territorial jurisdiction.”
The ABA White-Collar Crime Committee often produces good materials, and of course it hosts the annual Institute on White-Collar Crime. Here is the most recent ABA White-Collar Crime Committee Newsletter.
From Professor Susan Brenner at Cyb3rCrim3: Once again, in a dispute between a company and a former employee — The Shit-Canned Laptop — under the federal Computer Fraud and Abuse Act, the federal district court finds that the narrow interpretation of “exceeds access” is the appropriate understanding of the statute. The court in Dresser-Rand Co. v. Jones, 2013 WL 3810859 (2013), recognized a
split between what is cast as a broad versus a narrow interpretation of the term `without authorization.’ Under the narrow view, an employee given access to a work computer is authorized to access that computer regardless of his or her intent to misuse information and any policies that regulate the use of information. . . .
Under the broad view, if an employee has access to information on a work computer to perform his or her job, the employee may exceed his or her access misusing the information on the computer, either by severing the agency relationship through disloyal activity, or by violating employer policies and/or confidentiality agreements. . . .
The lesson seems to be that, in many such situations, the best option is for the aggrieved company to proceed foremost under trade-secrets and state-law theories, rather than the hybrid criminal/civil structure of the CFAA.
For companies in disputes with former employees, like this: Korn/Ferry, CFAA and Trade Secrets the best approach may be a trade-secrets claim, not the Computer Fraud and Abuse Act.
Commercial “suicide” to shield customers’ data. For a white-collar defense lawyer, do the ethics of confidentiality-protection require encryption of communications with one’s client?http://t.co/ssCdRUq5Rf. The “Silent Circle” technology is intriguing.
At trial, would encryption be admissible as evidence of intent?
Interesting note —
Voir Dire: Paper or Plastic? — on the use of different digital apps and platforms for jury selection. A cloud-based seating chart?