Communications & Media Science, Computers & Technology Business Organization

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.
News & Analysis as of

Manatt Digital Media - November 2015

This month's newsletter features highlights from the Siemer Summit in Beverly Hills, the SLUSH conference in Helsinki and conversations with the founders of emerging tech start-ups in sensor data technology and virtual...more

Managing the Court of Public Opinion During a Media Crisis

If your company is hit with negative press, should you just ignore it? Absolutely not. There are steps you can take to stop or mitigate any possible damage. In those communication networks that you control (rather than...more

It’s Called Sputnik!: Don’t Fall Behind in the E-Discovery Space Race

This week marks the 58th anniversary since the launch of Sputnik II, the first spacecraft in history to carry a living animal—a dog named Laika—into Earth orbit. But the Sputnik program, which began the space age in 1957,...more

2015 DMCA Exemptions In Detail: When Is It OK to Technologically Circumvent Copyright Protections?

On October 28, 2015, the LOC reported a new set of regulations regarding exemptions to the DMCA provision that prohibits circumvention of technological measures that control access to copyrighted works. Here's a summary of...more

5 Popular Cybersecurity Writers to Follow Right Now

For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more

Interview: Amy Much - Director, Global Compliance, Under Armour

Protect This House - Amy Much discusses building a compliance program from the ground up at a fast moving, international organization....more

Data Breaches, Media Relations, and the Bottom Line

Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more

Technology Industry Newsletter - October 2015

We hope you enjoy this edition of our Tech Newsletter. As technology continues to drive business innovation and growth, new and existing companies positioned to take advantage of the tech trends for 2016 will be better...more

The New Russian Data Protection Law: Five Important Things To Know

Early in July 2014, the Russian Federal Act on Data Protection was amended to require that personal data of Russian citizens be first processed and stored on servers located within the territory of Russia. Initially, the...more

Crowdfunding: A Potential Cash Source for Business That Could Make a Well-Intentioned Company's Financial State Worse

“Crowdfunding”: In broad terms, it’s a decade-old means to an end for those with bright ideas and dim financials who hope to bring an inspired cause to market. As established as the practice is, with the more recent explosion...more

Media Query Call on Line 1: Do’s and Don’ts from an Information Security Officer

Putting your organization’s name in the paper can be a boon to both your business and your career. The ego stroke isn’t bad either; it can be quite a jolt to see your name in a trade or general news publication for the first...more

9 Things Employees Should Do to Prevent Data Breaches

Avoiding employee mistakes that lead to inadvertent failures will free up valuable resources to fight the bad guys—and may save your job. ...more

Government Websites With Cybersecurity Tips & Information

As part of the government’s recent clarion call to improve our individual and collective cybersecurity posture, several federal and state agencies have released a variety of guidelines, frameworks, best practices and tips. ...more

Popular Cybersecurity Reads on JD Supra

Once more the breach? A recap of some of the most well-read Cybsersecurity publications on JD Supra during August, 2015....more

Popular Cybersecurity Reads on JD Supra

From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular cybersecurity reads on JD Supra during the second half of July 2015....more

Marketing to Millennials [Video]

Does your legal counsel understand your customer? Your business? Your industry? At Ifrah Law, we understand all three and we strive to provide you with the expertise that will help you grow your business!...more

Advertising and Marketing News from Ifrah Law’s, Volume 6

Internet Advertising and Marketing Summer Newsletter from Ifrah Law with updates you won't want to miss!...more

iGaming News from Ifrah Law’s, Volume 6

Ifrah Law's Summer Edition Newsletter with the latest iGaming News and Updates you'll want to know!...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

Mobile Apps & the Law - Popular Reads on JD Supra

ICYMI a recap of recent well-read posts on JD Supra at the intersection of mobile apps and the law....more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

European Commission Publishes Strategy on the Digital Single Market

On 6 May the European Commission released the EU’s Digital Single Market strategy (the ‘DSM Strategy’), with the declared objective to tear down the obstacles to doing business online. The DSM Strategy has been released...more

How to Avoid Choosing the Wrong Cybersecurity Firm

Although the inherent nature of cybersecurity radiates urgency, businesses should not let this characteristic dictate the vendor selection process....more

Other Peoples’ (Adult) Content (Episode 15)

There are so many legal issues in Episode 15 that it’s hard to know where to begin, so I’m going to start at the end: porn. Pied Piper is competing against nemesis Endframe for a $15 million contract from the online porn...more

What's Popular Right Now at the Intersection of Social Media and the Law?

Live streaming, hashtag trademarks, social media ownership after bankruptcy, the role of socmed in discovery ... myriad issues make for interesting reading....more

101 Results
View per page
Page: of 5

Follow Communications & Media Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.