Tag

legal case

0 views collected around this technical thread.

Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Beijing Chaoyang Court Rules Unfair Competition in Navigation Data Scraping, Awards 12.5 Million Yuan Compensation

The Chaoyang District People's Court in Beijing found that a technology company illegally scraped the "congestion delay index" from a navigation map, used it for commercial purposes, and ordered it to stop the infringement and pay a total of 12.5 million yuan in damages, highlighting the legal protection of competitive data rights.

Chinadata scrapinginformation security
0 likes · 5 min read
Beijing Chaoyang Court Rules Unfair Competition in Navigation Data Scraping, Awards 12.5 Million Yuan Compensation
Efficient Ops
Efficient Ops
Jun 16, 2024 · Information Security

How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison

A Singapore court sentenced former NCS employee Kandula Nagaraju to over two years in prison after he illegally accessed his ex‑employer’s QA system, deleted 180 virtual servers, and caused more than $670,000 in damages, highlighting serious cybersecurity and legal repercussions.

Data LossUnauthorized Accesscybercrime
0 likes · 6 min read
How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison
Java Architect Essentials
Java Architect Essentials
Jan 3, 2024 · Information Security

Shanghai Police Arrest 14 Suspects in Chip Technology Trade Secret Infringement Case Involving Huawei Hi1152 V100

Shanghai police, with cooperation from Jiangsu authorities, arrested 14 individuals suspected of infringing Huawei's Hi1152 V100 Wi‑Fi chip trade secrets, detailing the seized chips, legal actions, company backgrounds, and the broader implications for semiconductor intellectual‑property security in China.

HuaweiIntellectual PropertyWiFi
0 likes · 10 min read
Shanghai Police Arrest 14 Suspects in Chip Technology Trade Secret Infringement Case Involving Huawei Hi1152 V100
Selected Java Interview Questions
Selected Java Interview Questions
Dec 24, 2022 · R&D Management

The EDA Century Battle: Cadence vs Avant – A Tale of Corporate Espionage and Legal Warfare

This article recounts the dramatic saga of the EDA industry’s century‑long rivalry between Cadence and Avant, detailing the background, aggressive talent poaching, a pivotal bug that exposed code theft, the ensuing legal battle, and the ultimate financial and strategic fallout for both companies.

Corporate EspionageEDAIntellectual Property
0 likes · 12 min read
The EDA Century Battle: Cadence vs Avant – A Tale of Corporate Espionage and Legal Warfare
Java Architect Essentials
Java Architect Essentials
Oct 23, 2022 · Information Security

Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring

A Dutch employee was awarded €75,000 (≈ ¥520,000) after a Dutch court ruled that his dismissal for refusing to keep his webcam on during remote work violated his privacy rights, highlighting legal limits on employer surveillance and prompting broader debate on remote‑work monitoring practices.

data protectionemployee monitoringlegal case
0 likes · 7 min read
Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring
Java Architect Essentials
Java Architect Essentials
Aug 12, 2022 · Information Security

Case Study: Illegal Web Crawling Causing System Outage and Criminal Conviction

This article recounts the 2018 legal case in which a company's automated web crawler overloaded a municipal residence‑permit system, causing service disruption and data leakage, leading to the CTO and programmer’s conviction for damaging computer information systems.

computer crimeinformation securitylegal case
0 likes · 8 min read
Case Study: Illegal Web Crawling Causing System Outage and Criminal Conviction
IT Services Circle
IT Services Circle
May 6, 2022 · Information Security

Court Rules QR‑Code Ordering System Infringes Consumer Privacy in Sichuan Hot Pot Restaurant

A Sichuan hot‑pot restaurant was ordered by the court to stop forcing customers to scan QR codes for ordering, as the practice unlawfully collected personal data such as WeChat nickname, avatar, phone number, and location, violating privacy and consumer rights.

QR code orderingconsumer rightsinformation security
0 likes · 5 min read
Court Rules QR‑Code Ordering System Infringes Consumer Privacy in Sichuan Hot Pot Restaurant
Architecture Digest
Architecture Digest
Feb 19, 2022 · Information Security

Case Study: Illegal Web Crawling and Criminal Conviction in China

This article recounts how a corporate web‑crawling tool designed to automate housing‑loan data collection overloaded a municipal residence‑permit system, triggered a large‑scale denial‑of‑service attack, and led to the CTO and programmer being prosecuted for damaging a computer information system.

computer crimecyberlawdata scraping
0 likes · 8 min read
Case Study: Illegal Web Crawling and Criminal Conviction in China
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 18, 2021 · Information Security

Case Study: “Da Niu Assistant” Location‑Spoofing App, Its Business Model, and Legal Consequences

The article recounts how a developer created the “Da Niu Assistant” app to spoof DingTalk check‑ins, generated several hundred thousand yuan in revenue, was analyzed by Alibaba security engineers, and ultimately led to a five‑year‑six‑month prison sentence, highlighting the risks of security‑related startups.

DingTalkinformation securitylegal case
0 likes · 5 min read
Case Study: “Da Niu Assistant” Location‑Spoofing App, Its Business Model, and Legal Consequences
Top Architect
Top Architect
Sep 20, 2021 · Information Security

Case Study: Violation of Computer Information System Laws by Yang Mou – Court Judgment and Legal Analysis

The article details how Yang Mou, a former ticketing system programmer, remotely accessed and sabotaged a bus company's ticketing platform in October 2020, leading to a court conviction for destroying computer information systems under Chinese criminal law, with a nine‑month prison sentence and references to relevant statutes.

Chinese lawcomputer crimeinformation security
0 likes · 6 min read
Case Study: Violation of Computer Information System Laws by Yang Mou – Court Judgment and Legal Analysis
Top Architect
Top Architect
Mar 17, 2021 · Information Security

Case Study: Baidu Engineer Convicted for Unauthorized System Manipulation and Financial Fraud

A former Baidu advertising platform engineer illegally altered media‑review data using CURL commands and scripts, enabling 735 fraudulent sites to pass audits and generating over 3.7 million yuan in ad revenue, ultimately resulting in a conviction for destroying computer information systems.

Baiducomputer crimedata tampering
0 likes · 8 min read
Case Study: Baidu Engineer Convicted for Unauthorized System Manipulation and Financial Fraud
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Efficient Ops
Efficient Ops
Nov 23, 2020 · Information Security

When Revenge Becomes a Crime: A Programmer’s OBS Sabotage Case

A Chinese programmer, angry over an unpaid bonus, altered Huawei Cloud OBS storage code, crippling a consumer platform for hours, leading to a conviction for destroying a computer information system and sparking a broader discussion on developer respect and security safeguards.

cloud storagecode sabotagedeveloper misconduct
0 likes · 7 min read
When Revenge Becomes a Crime: A Programmer’s OBS Sabotage Case
DevOps
DevOps
Mar 25, 2016 · Operations

Case Study: The 2005 Mizuho Securities Fat‑Finger Trading Error and Its Legal Aftermath

The 2005 Mizuho Securities “fat‑finger” incident, caused by a trader’s input error and a hidden bug in the Tokyo Stock Exchange’s Fujitsu‑built trading system, led to a ¥400 billion loss, sparking extensive litigation that highlighted responsibilities for software bugs, system testing, and operational risk management.

financial systemslegal caseoperational risk
0 likes · 12 min read
Case Study: The 2005 Mizuho Securities Fat‑Finger Trading Error and Its Legal Aftermath