Communications & Media Science, Computers & Technology Privacy

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.
News & Analysis as of

Advertising Law - August 2015 #4

In Case You Missed It: Possible Jail Time for TCPA Violations, Microsoft Gets Slammed With Solicitation Scam Class Action, and 'Do Not Disturb' Technology Gets Pushed on FCC - The world of the Telephone Consumer...more

Legal Insights on the Ashley Madison Hack: Part II

As more names emerge from the dark web data dump of Ashley Madison customers, lawyers around the globe have found a very willing group of would-be plaintiffs. Interestingly, all of these plaintiffs are named “Doe,” which must...more

The FTC Continues to Flex its Safe Harbor Enforcement Muscles

On August 17, 2015, the Federal Trade Commission (FTC) announced settlements with 13 companies on charges that they misled consumers by claiming that they were certified members of the U.S.-EU or U.S.-Swiss Safe Harbor...more

Newest FDA Newsletter from AGG

Once a month, AGG’s terrific FDA team publishes a newsletter updating readers on the latest regulatory news affecting food/drug companies–including those from Ireland and Northern Ireland. The August newsletter is here and...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

FCC Settles First Data Security Enforcement Action

On July 9, 2015, the Federal Communications Commission settled its first data security case with two related telecommunications carriers – TerraCom, Inc. and YourTel America, Inc. – for $3.5 million. The settlement resolves...more

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Hold that Friend Request: Legal Traps in a Post-Facebook Work Environment

Many well-meaning managers engage with employees on social media websites, and doing so provides a host of benefits: stronger relationships between employees and management; a sense of collegiality; instant updates on...more

Web.com Suffers Data Breach Affecting 93,000 Customers

The list of companies hit by cyber-attacks continues to grow.  This time, Florida-based web hosting company, Web.com, has announced that it suffered a data breach that may have compromised credit card information and other...more

Popular Cybersecurity Reads on JD Supra

Once more the breach? A recap of some of the most well-read Cybsersecurity publications on JD Supra during August, 2015....more

Delaware enacts a series of privacy laws

Delaware recently enacted four privacy laws–the Online and Personal Privacy Protection Act (DOPPA), the Student Data Privacy Protection Act (SDPPA) the Victim Online Privacy Act (VOPA) and the Employee/Applicant Protection...more

Ashley Madison hackers release hacked data and offer advice to users to make amends

On Tuesday, August 18, hackers calling themselves the Impact Team, which claim responsibility for hacking the extramarital affair website Ashley Madison, and stealing information of up to 37 million people, posted 9.7...more

Have You Had Your Annual Checkup? The FTC Cracks Down on Inaccurate U.S.-EU Safe Harbor Claims

While the U.S.-EU “Safe Harbor” Framework for transferring data into the United States is hardly new — it was approved 15 years ago — the Federal Trade Commission has recently focused its enforcement efforts on companies that...more

Internet of Things Framework introduced by the Online Trust Alliance for our connected world

On August 11, 2015, the Online Trust Alliance (OTA) released an Internet of Things (IoT) Trust Framework (“the Framework”), which presents guidelines for IoT manufacturers, developers, and retailers. The Framework was...more

Shareholders sue mobile security firm for failing to disclose hacking incident before IPO

MobileIron, Inc. was sued late last week by shareholders in a proposed class action for allegedly failing to disclose a hacking incident just weeks before its initial public offering (IPO). The suit, filed on behalf of...more

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

Six Ways for Data-Driven Medical Device Companies to Implement Effective Privacy and Security Measures

The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more

Judge Easterbrook Holds Unaccepted Offer of Judgment Does Not Moot an Individual TCPA Claim

As we covered here, the U.S. Supreme Court accepted certiorari in Campbell-Eward Co. v. Gomez, 768 F.3d 871 (9th Cir. 2014), to decide the question of whether a full-relief offer of judgment under Federal Rule of Civil...more

FCC Announces Robocalling and Caller ID Spoofing Workshop

Telemarketers and others who may have been wondering how the Federal Communications Commission’s recent and – to industry participants – concerning Declaratory Ruling and Order on the Telephone Consumer Protection Act (TCPA)...more

Federal Trade Commission Continues Its Enforcement Campaign Against False Safe Harbor Claims

Reiterating its commitment to enforcing the U.S.-EU and U.S.-Swiss Safe Harbor Frameworks, the Federal Trade Commission announced on Monday that it has reached settlements with 13 companies alleged to have misled consumers...more

China’s Draft Cybersecurity Law – A New Regime for Network Security

China’s current leadership has attached significant attention to network security, which is deemed to be a core aspect of national security. In early 2014, China’s President, Xi Jinping, who is also the head of the Office for...more

Germany rolls out IT Security Act

Germany's controversial IT Security Act (ITSG) came into effect on July 25, 2015.[1] The new act seeks to increase protections for German citizens, companies and government institutions that may be vulnerable to a range of IT...more

Maine Enacts Social Media Protections for Applicants and Employees

Effective as of October 15, 2015, employers in Maine will be restricted in their ability to access the personal social media accounts of applicants and employees. Specifically, under the new law, an employer may not...more

Encryption: What is it, Why do it!

Encryption is a basic term used to describe the act of encoding data, files, and digital communications such that only those with the cipher could read or understand the information.  Think back to the decoder ring you got in...more

1,516 Results
|
View per page
Page: of 61

Follow Communications & Media Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×