Author: CISO Legal
-
Perk v. Vector Resources Group, Ltd.
CISO Legal Case Summary: The case Leo J. Perk v. Vector Resources Group, Ltd., et al. involves an appeal by Leo J. Perk, a practicing attorney, against Vector Resources Group, Charles Michael Monahan, and the law firm Sheffield & Bricken, P.C. The appeal addresses whether the trial court erred in sustaining the defendants’ demurrer to Perk’s motion…
-
Brewer v. Commonwealth
CISO Legal Case Summary: The case Cody W. Brewer v. Commonwealth of Virginia involves the conviction of Cody W. Brewer for computer fraud under Virginia law. Brewer was accused of using his smartphone to make unauthorized transfers from his grandmother’s bank account to his own accounts. The central issue on appeal was whether Brewer’s smartphone qualified as…
-
Jaynes v. Commonwealth
CISO Legal Case Summary: The case Jeremy Jaynes v. Commonwealth of Virginia involves the conviction of Jeremy Jaynes for sending unsolicited bulk emails, commonly known as spam, in violation of Virginia’s anti-spam statute, [Code § 18.2-152.3:1]. Jaynes was convicted for sending over 10,000 emails within a 24-hour period on multiple occasions, using falsified routing information to disguise…
-
Wallace v. Commonwealth
CISO Legal Case Summary: The case of Taylor Amil Wallace v. Commonwealth of Virginia revolves around the interpretation of the computer fraud statute under Virginia law. Wallace was initially convicted of computer fraud, among other charges, after depositing forged checks into her bank account using an ATM. The key legal question was whether Wallace’s use of the…
-
Virginia Computer Crimes Act 18.2-152.1
CISO Legal Summary: Overview:The Virginia Computer Crimes Act outlines various offenses related to computer misuse, including fraud, trespass, invasion of privacy, and the use of computers in criminal activities. It also defines key terms and establishes penalties for violations. Key Definitions: Major Offenses: Civil Relief (§ 18.2-152.12): Additional Provisions: Article 7.1. Computer Crimes. § 18.2-152.1.…
-
Stored Communications Act 18 USC 121
CISO Legal Summary: Overview:This statute addresses the unlawful access to electronic communications stored by service providers, outlining offenses, penalties, and exceptions. Key Offenses: Penalties: Exceptions: §2701. Unlawful access to stored communications (a) Offense.—Except as provided in subsection (c) of this section whoever— (1) intentionally accesses without authorization a facility through which an electronic communication service is…
-
Computer Fraud and Abuse Act 18 USC 1030
CISO Legal Summary: Overview:This statute addresses various forms of computer-related fraud and unauthorized access, outlining specific offenses, penalties, and definitions related to computer crimes. Key Offenses: Penalties: Investigative Authority: Definitions: Civil Actions: Exemptions: §1030. Fraud and related activity in connection with computers (a) Whoever- (1) having knowingly accessed a computer without authorization or exceeding authorized…
-
Harrods Ltd. v. Sixty Internet Domain Names
CISO Legal Summary: The case “Harrods Limited v. Sixty Internet Domain Names” involves a legal dispute over the registration and use of internet domain names between two companies, both named “Harrods,” with legitimate rights to the name in different regions. Harrods Limited (Harrods UK), the owner of the famous Harrods department store in London, sued…
-
Hately v. Watts
CISO Legal Summary The case Patrick Hately v. Dr. David Watts involves allegations that Dr. David Watts unlawfully accessed Patrick Hately’s web-based email account, violating the Virginia Computer Crimes Act and the federal Stored Communications Act (SCA). The district court dismissed Hately’s claims, but the Fourth Circuit Court of Appeals reversed and remanded the case. KEY ISSUES:…
-
Wilson v. Volkswagen of America, Inc.
CISO Legal Case Summary: The case John W. Wilson v. Volkswagen of America, Inc., et al. involves a products liability claim arising from an automobile accident in which the plaintiff, John W. Wilson, was seriously injured while driving a Volkswagen Beetle. The case centers on the alleged defects in the car’s design, manufacture, and assembly, which Wilson…