Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.
FCC Proposes New Rules On Local Wireless Siting
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
What to expect from FCC Post-Governement Shutdown
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
Jason Maloni on Data Security
JOBS Act Implementation Regulations
Ernest DelBuono on Aviation
Jack Deschauer on Government Investigations
PODCAST - Inside Law - Public Policy Issues in 2013
Condo Adviser: Condominium Rules and Enforcement
Condo Adviser: What is 'FHA approved,' exactly?
Condo Owners and Dealing with Uncooperative Management Companies
Reserve Funds: Purposes and Common Mistakes
Instapundit: America's IP Laws Need to be "Pruned Back"
Social Media At Work - What's Allowed and What Isn't? PODCAST - Inside Law
Release of new book on the 'Best Practices Under the FCPA and Bribery Act"
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Serving Legal Documents Through Social Media
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
On October 22, 2013, in The Zodiac Group, Inc. v. Axis Surplus Insurance Co., the United States Court of Appeals for the Eleventh Circuit affirmed the district court’s dismissal of The Zodiac Group’s (Zodiac’s) claim against...more
The Telephone Consumer Protection Act (TCPA) restricts telephone solicitations and limits the use of automatic dialing systems, prerecorded voice messages, SMS text messages, and faxes. TCPA plaintiffs typically claim that...more
Yesterday, the Belgian Privacy Commission’s announced its intention to make enforcement its number one priority:
- A dedicated inspection task force will be set up pro-actively monitoring companies and organisations...more
Here a breach, there a breach, everywhere a data breach. Verizon’s most recent 2013 Data Breach Investigations Report remarks that “[p]erhaps more so than any other year, the large scale and diverse nature of data breaches...more
The HIPAA Privacy Regulations have long required covered entities to seek a patient authorization in order to use or disclose protected health information ("PHI") for marketing purposes. However, the Office for Civil Rights...more
In response to a recent lawsuit and outcry from a variety of players in the health care market, the Department of Health and Human Services (“HHS”) has committed to issuing guidance by September 23rd (the compliance date for...more
With the recent issuance of the long-awaited final rule by the Department of Health and Human Services ("HHS"), the protection of patient information has been a hot topic among the health care industry the past few months....more
Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more
Insurance is one important line of defense companies can use to protect against the potentially devastating costs of responding to cyber breaches. The following list gives examples of insurance coverage to consider when...more
Many insurers are now offering “cyber liability” or “cyber risk” policies designed to protect policyholders against electronic injuries that policyholders may either suffer themselves or cause to others. Most of these...more
On February 12, 2013, President Obama issued an executive order detailing his plan to improve critical infrastructure cybersecurity. In the Executive Order, President Obama notes that it is the policy of the United States to...more
Originally published in Privacy & Security Law Report, 11 PVLR 1430, 09/24/2012.
Companies, organizations, and individuals throughout the world reap significant benefits of having access to the internet. Since the 1990s,...more
Unknown only a few years ago, online daily deal sites such as Groupon and LivingSocial have become a ubiquitous phenomenon, touted as being of considerable benefit to participating merchants. That may be so, but they also...more
U.S. District Court for the Northern District of Illinois
In Maxum Indem. Co. v. Eclipse Mfg. Co., ___ F.Supp.2d ___, (N.D. Ill. June 13, 2011), the U.S. District Court for the Northern District of Illinois held that...more
In a published decision, the Michigan Court of Appeals has interpreted the meaning of the statutory 180-day period within which a person has to file a complaint for a violation of the Freedom of Information Act (FOIA). The...more
While most businesses and industries have adopted electronic mail as a standard means of communications, this is not the case for many physicians. Although physicians and other health care providers may use e-mail to...more
Superior Court of Pennsylvania
In Telecommunications Network Design and Paradise Distributing, Inc. v. Brethren Mut. Ins. Co., ___ A.2d ___, 2010 WL 3294319 (Pa. Super. Aug. 23, 2010), the Superior Court of Pennsylvania...more
Last year I published an article on this blog entitled "How Facebook Can Undermine Your Workers' Compensation Case." I pointed out then that the default "privacy" settings on Facebook offered very little privacy at all – your...more
For professional "fact-gatherers" such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a...more
IN THIS ISSUE:
*Privacy Groups Call for Mobile Marketing Probe
*Viacom Apologizes for Attack Ads Aimed at Time Warner
*H&R Block Settles Tax Refund Loan Charges
*Insurers Criticize FTC Probe
*Diamond Grading Firm...more