Communications & Media Science, Computers & Technology Business Organization

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.
News & Analysis as of

Groundhog Day: Don’t Get Stuck When Collecting New Data Types

February 2nd is Groundhog Day, and while we all know of the tradition of Punxsutawney Phil’s famous shadow forecasting the arrival of spring, many of us can’t help but think of the 1993 film starring Bill Murray. In it, he...more

FTC’s PrivacyCon Highlights Consumer Privacy Perceptions and Targeting

The Federal Trade Commission is currently the most aggressive enforcement agency on privacy and data security. The agency kicked off 2016 with PrivacyCon on January 14, which put the spotlight on academic research on consumer...more

3 Defining Issues for the Internet of Things in 2016

In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more

The Privilege of PR: Application of the Attorney-Client Privilege to Crisis Communications and Public Relations in Breach Response...

Cyber-attacks have become a matter of everyday reality for all businesses: regardless of industry or size, it is no longer if a data breach will happen, but when. And waiting for a breach to occur before designing and...more

Perspective: What Will Be the Defining Cybersecurity Issues In 2016?

As data breaches and their related obligations and liability risks continue to pile up with every passing year, we asked attorneys writing on JD Supra to answer the question: What will be among the defining issues for...more

Federal Trade Commission PrivacyCon 2016 Recap: Insights into the FTC’s Perspective on Privacy and Data Security

The Federal Trade Commission’s PrivacyCon event brings together the FTC, researchers and academics to discuss the latest research and trends related to consumer privacy and data security. Much of the discussion today...more

China Released the Latest Classification Catalogue of Telecommunications Services (2015 Revision)

On December 28, 2015, the Ministry of Industry and Information Technology of China (the MIIT) released the newly revised Classification Catalogue of Telecommunications Services (2015 Catalogue) and the new Catalogue is due to...more

Finding Investors in a Crowd—New SEC Rules Clear the Way for Startups to Use Crowdfunding to Exchange Equity for Capital

Soon startups will be able to use crowdfunding platforms to sell an equity stake in their business to investors in exchange for working capital. However, as explained below, this new capital pathway may be of limited utility...more

New Crowdfunding Rules for Issuers: Opportunities or Landmines? - Part II

This is the second of our blog posts exploring Regulation Crowdfunding and its provisions before the final rules become effective on May 16, 2016. Issuer Requirements - Certain Issuers Ineligible for...more

Manatt Digital Media - November 2015

This month's newsletter features highlights from the Siemer Summit in Beverly Hills, the SLUSH conference in Helsinki and conversations with the founders of emerging tech start-ups in sensor data technology and virtual...more

Managing the Court of Public Opinion During a Media Crisis

If your company is hit with negative press, should you just ignore it? Absolutely not. There are steps you can take to stop or mitigate any possible damage. In those communication networks that you control (rather than...more

It’s Called Sputnik!: Don’t Fall Behind in the E-Discovery Space Race

This week marks the 58th anniversary since the launch of Sputnik II, the first spacecraft in history to carry a living animal—a dog named Laika—into Earth orbit. But the Sputnik program, which began the space age in 1957,...more

2015 DMCA Exemptions In Detail: When Is It OK to Technologically Circumvent Copyright Protections?

On October 28, 2015, the LOC reported a new set of regulations regarding exemptions to the DMCA provision that prohibits circumvention of technological measures that control access to copyrighted works. Here's a summary of...more

5 Popular Cybersecurity Writers to Follow Right Now

For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more

Interview: Amy Much - Director, Global Compliance, Under Armour

Protect This House - Amy Much discusses building a compliance program from the ground up at a fast moving, international organization....more

Data Breaches, Media Relations, and the Bottom Line

Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more

Technology Industry Newsletter - October 2015

We hope you enjoy this edition of our Tech Newsletter. As technology continues to drive business innovation and growth, new and existing companies positioned to take advantage of the tech trends for 2016 will be better...more

The New Russian Data Protection Law: Five Important Things To Know

Early in July 2014, the Russian Federal Act on Data Protection was amended to require that personal data of Russian citizens be first processed and stored on servers located within the territory of Russia. Initially, the...more

Crowdfunding: A Potential Cash Source for Business That Could Make a Well-Intentioned Company's Financial State Worse

“Crowdfunding”: In broad terms, it’s a decade-old means to an end for those with bright ideas and dim financials who hope to bring an inspired cause to market. As established as the practice is, with the more recent explosion...more

Media Query Call on Line 1: Do’s and Don’ts from an Information Security Officer

Putting your organization’s name in the paper can be a boon to both your business and your career. The ego stroke isn’t bad either; it can be quite a jolt to see your name in a trade or general news publication for the first...more

9 Things Employees Should Do to Prevent Data Breaches

Avoiding employee mistakes that lead to inadvertent failures will free up valuable resources to fight the bad guys—and may save your job. ...more

Government Websites With Cybersecurity Tips & Information

As part of the government’s recent clarion call to improve our individual and collective cybersecurity posture, several federal and state agencies have released a variety of guidelines, frameworks, best practices and tips. ...more

Popular Cybersecurity Reads on JD Supra

Once more the breach? A recap of some of the most well-read Cybsersecurity publications on JD Supra during August, 2015....more

Popular Cybersecurity Reads on JD Supra

From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular cybersecurity reads on JD Supra during the second half of July 2015....more

Marketing to Millennials [Video]

Does your legal counsel understand your customer? Your business? Your industry? At Ifrah Law, we understand all three and we strive to provide you with the expertise that will help you grow your business!...more

110 Results
|
View per page
Page: of 5

Follow Communications & Media Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×