News & Analysis as of

Communications & Media Science, Computers & Technology Privacy

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.

Unusual IoT Hacking Shows Creativity of Hackers

Everything connected to the Internet is hackable and at risk. But there are some things connected to the Internet that you just don’t think of as risks to an organization. That is, until now. Darktrace has issued its report...more

Another Rematch Between Tech Companies and the Government over the Territorial Reach of the Stored Communications Act

Lawyers for the tech community are gearing up for argument next month in the U.S. District Court in San Francisco, seeking to overturn another magistrate’s order that requires digital information stored outside of the U.S. to...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

FTC Reaffirms that IoT Devices Must Comply with COPPA

The Internet of Things (“IoT”) can be thought of as a group of different devices that can communicate with each other, perhaps over a network such as the internet. We have written extensively about many of the privacy...more

Third Circuit Rules that a Single Voicemail on a Cell Phone is Sufficient to Confer Standing for a TCPA Claim

by Hinshaw & Culbertson LLP on

In another court's journey into the murky waters of constitutional standing post-Spokeo, the Third Circuit Court of Appeals concluded that one single voicemail on a consumer's cell phone is sufficient to confer standing under...more

Ashley Madison Settles Data Breach Case for $11.2M

Ashley Madison, which suffered a data breach in 2015 involving the loss of 37 million users’ personal and financial information, has settled the suit for $11.2 million....more

EU-U.S. Privacy Shield – What’s Its Future?

by Pierce Atwood LLP on

It’s been almost one year since the EU-U.S. Privacy Shield (Privacy Shield) came into existence. Its upcoming annual review in September by the European Commission (Commission) and the U.S. Department of Commerce (DOC) – its...more

Cyber Threats Equal Serious Threats

by Burr & Forman on

Every where you look these days, there seems to be another report of a cyber attack--attacks which do not discriminate based on industry type, size of business, or impact. In other words, everyone is vulnerable. In fact, the...more

VTech Escapes Class Action Case Over Breach of 11 Million Toy Users’ Information

In November 2015, VTech Electonics North America LLC (VTech) announced that an unauthorized party infiltrated its network and gained access to the personal information of 5 million adults and 6.5 million children through its...more

Twilio Narrowly Avoids TCPA Lawsuit Liability

by Klein Moynihan Turco LLP on

On July 12, 2017, the United States District Court for the Western District of Washington dismissed a putative class action complaint filed against Twilio, Inc. (“Twilio”), alleging that the platform had violated the...more

Hacker Steals Millions from Virtual Currency Exchange Bithumb

A cyber-attack against–Bithumb–one of South Korea’s largest cryptocurrency exchanges and one of the five largest in the world—has reaped access to the data of 30,000 users and drained their accounts in the process. Bithumb is...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

Privacy Tip #96 – Consider “Who Has Your Back” as Your Next Summer Read

As you head to the beach or hammock for a bit of R+R this summer, here is one that you might want on the reading list. The Electronic Frontier Foundation (EFF) has been publishing a report entitled “Who Has Your Back”...more

Solicitor General Urges Supreme Court Review of Second Circuit Microsoft Decision

On June 23, 2017, the Office of the Solicitor General (OSG) filed a petition for a writ of certiorari with the United States Supreme Court requesting reversal of a 2016 decision in which the U.S. Court of Appeals for the...more

AGs Weave Themselves Into Patchwork of Digital-Health Regs

by Pepper Hamilton LLP on

There are more than 165,000 mobile health applications available for download in Apple’s App Store or Google Play. This number will likely keep rising, and a body of federal and state regulators, including state attorneys...more

(Connected) Toy Story: The FTC Updates the COPPA Compliance Plan

by Davis Wright Tremaine LLP on

The Federal Trade Commission (“FTC”) recently issued an updated “Six-Step Compliance Plan for Businesses” (“Compliance Plan”) for entities subject to the Federal Children’s Online Privacy Protection Act (“COPPA”), 15 U.S.C....more

Your Apps May Be Selling You Out

by Carlton Fields on

While most people are vaguely aware, even if they are in denial, that their browsers give advertisers access to their search histories, they are probably unaware that information is being sold or given to third parties via...more

How Connected Cars and Autonomous Vehicles Will Change and Shape the Future of How We Move

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Lance Bultena talks about the impact connected cars and autonomous vehicles (AVs) will have on America’s infrastructure and environment; the services associated with...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Office of the National Coordinator Issues Guidance After NotPetya Attack

Following the most recent ransomware attack, known as NotPetya, (among other nicknames), many health care entities were victims of the ransomware, which prompted the Office of the National Coordinator (ONC) to issue guidance...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Privacy Tip #95 – Echo Show Drop In Feature

I don’t own an Echo, and Alexa is not listening to all of the conversations in my home. If that were the case, I would have no credibility in writing weekly Privacy Tips....more

Amendment To Japan’s Omnibus Data Protection Law Mean New Compliance Requirements For U.S. Multinational Employers With Operations...

by Littler on

Effective May 30, 2017, Japan amended its omnibus data protection law, the Personal Information Protection Act (“PIPA”), to add new compliance requirements that will have an immediate impact on many U.S. multinational...more

Southern Oregon University Victim of Phishing Scheme

Last month, Southern Oregon University (SOU) announced that it was the victim of a $1.9 million phishing scheme. SOU received an email purportedly from their contractor, Anderson Construction, requesting the April payment for...more

When Health Data Goes Missing: Largest Reported Ransomware Attack

In the aftermath of two powerful global ransomware attacks, a Michigan-based medical equipment provider has disclosed that hackers “encrypted our data files” and accessed more than 500,000 patient records in what is believed...more

2,553 Results
|
View per page
Page: of 103
Cybersecurity

Follow Communications & Media Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.