Communications & Media Privacy

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.
News & Analysis as of

Newest FDA Newsletter from AGG

Once a month, AGG’s terrific FDA team publishes a newsletter updating readers on the latest regulatory news affecting food/drug companies–including those from Ireland and Northern Ireland. The August newsletter is here and...more

California Court Dismisses TCPA Claim, Finding Human Intervention in Transmission of Internet Text Messages Removed Them From FCC...

In one of the first court decisions issued since the FCC’s declaratory ruling expansively defined autodialers for purposes of the TCPA, a California district court has dismissed TCPA claims based on promotional text messages,...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

FCC Settles First Data Security Enforcement Action

On July 9, 2015, the Federal Communications Commission settled its first data security case with two related telecommunications carriers – TerraCom, Inc. and YourTel America, Inc. – for $3.5 million. The settlement resolves...more

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Sixth Circuit Rules on New TCPA Limitations

On Friday, the Sixth Circuit declared that a debtor who provides a cellphone number to a creditor has consented to receiving calls, and the creditor does not violate the Telephone Consumer Protection Act (“TCPA”), 47 U.S.C. §...more

FCC Issues $2.96 Million Fine for Robocalling Violations

Last week, the FCC issued its self-described “largest forfeiture order” to date for robocalling violations. The Commission announced the $2.96 million fine against a travel company based in Tampa, Florida, and its owner, for...more

Social Media E-Discovery: Are Your Facebook Posts Discoverable in Civil Litigation?

Judge Richard J. Walsh began his opinion in Largent v. Reed with the following question: “What if the people in your life want to use your Facebook posts against you in a civil lawsuit?” With the explosive growth of social...more

Eleventh Circuit Addresses TCPA Again: Confirms Validity of 1992 FCC Ruling on “Prior Express Consent”

It would be difficult to identify a federal circuit court of appeals that has released a larger number of influential consumer finance decisions in the last year than the Eleventh Circuit. And last week, the court continued...more

Hold that Friend Request: Legal Traps in a Post-Facebook Work Environment

Many well-meaning managers engage with employees on social media websites, and doing so provides a host of benefits: stronger relationships between employees and management; a sense of collegiality; instant updates on...more

Web.com Suffers Data Breach Affecting 93,000 Customers

The list of companies hit by cyber-attacks continues to grow.  This time, Florida-based web hosting company, Web.com, has announced that it suffered a data breach that may have compromised credit card information and other...more

Popular Cybersecurity Reads on JD Supra

Once more the breach? A recap of some of the most well-read Cybsersecurity publications on JD Supra during August, 2015....more

Delaware enacts a series of privacy laws

Delaware recently enacted four privacy laws–the Online and Personal Privacy Protection Act (DOPPA), the Student Data Privacy Protection Act (SDPPA) the Victim Online Privacy Act (VOPA) and the Employee/Applicant Protection...more

Ashley Madison hackers release hacked data and offer advice to users to make amends

On Tuesday, August 18, hackers calling themselves the Impact Team, which claim responsibility for hacking the extramarital affair website Ashley Madison, and stealing information of up to 37 million people, posted 9.7...more

Have You Had Your Annual Checkup? The FTC Cracks Down on Inaccurate U.S.-EU Safe Harbor Claims

While the U.S.-EU “Safe Harbor” Framework for transferring data into the United States is hardly new — it was approved 15 years ago — the Federal Trade Commission has recently focused its enforcement efforts on companies that...more

First Circuit Weighs In On Rule 68 Mootness Issue

In a decision issued on August 21, 2015, the First Circuit added its voice to the recent chorus of federal appellate courts holding that an unaccepted Rule 68 offer of judgment, served before a motion for class certification...more

Internet of Things Framework introduced by the Online Trust Alliance for our connected world

On August 11, 2015, the Online Trust Alliance (OTA) released an Internet of Things (IoT) Trust Framework (“the Framework”), which presents guidelines for IoT manufacturers, developers, and retailers. The Framework was...more

TCPA Connect - August 2015

New Bill Would Create Criminal Penalties for TCPA Violations - Could telemarketers be facing jail time for violations of the Telephone Consumer Protection Act? The answer might be "yes" if a bill introduced by Sen....more

Shareholders sue mobile security firm for failing to disclose hacking incident before IPO

MobileIron, Inc. was sued late last week by shareholders in a proposed class action for allegedly failing to disclose a hacking incident just weeks before its initial public offering (IPO). The suit, filed on behalf of...more

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

Six Ways for Data-Driven Medical Device Companies to Implement Effective Privacy and Security Measures

The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more

Judge Easterbrook Holds Unaccepted Offer of Judgment Does Not Moot an Individual TCPA Claim

As we covered here, the U.S. Supreme Court accepted certiorari in Campbell-Eward Co. v. Gomez, 768 F.3d 871 (9th Cir. 2014), to decide the question of whether a full-relief offer of judgment under Federal Rule of Civil...more

FCC Announces Robocalling and Caller ID Spoofing Workshop

Telemarketers and others who may have been wondering how the Federal Communications Commission’s recent and – to industry participants – concerning Declaratory Ruling and Order on the Telephone Consumer Protection Act (TCPA)...more

Federal Trade Commission Continues Its Enforcement Campaign Against False Safe Harbor Claims

Reiterating its commitment to enforcing the U.S.-EU and U.S.-Swiss Safe Harbor Frameworks, the Federal Trade Commission announced on Monday that it has reached settlements with 13 companies alleged to have misled consumers...more

2,757 Results
|
View per page
Page: of 111

Follow Communications & Media Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×