News & Analysis as of

Communications & Media Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.

Certiorari Grant This Week on Email Providers Served with Warrant for Emails

by Dorsey & Whitney LLP on

The Internet has not only become a backbone for social and business commerce, but, it has become a vehicle to pursue nefarious purposes. Law enforcement and intelligence agencies, believing that material evidence is located...more

Supreme Court to Hear Microsoft Emails Case

In an order issued on October 16, 2017, the U.S. Supreme Court granted certiorari in United States v. Microsoft Corporation, a case with potentially far-reaching implications for the privacy of electronic data maintained by...more

Automated Decision-Making Under the GDPR – A Right for Individuals or A Prohibition for Controllers?

by Hogan Lovells on

The complexity of the EU General Data Protection Regulation (“GDPR”) is often alleviated by the guidance of regulatory authorities who contribute their practical interpretation of the black letter of the law and provide...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Lyft, armed with a fresh billion from Google’s venture investment arm (CapitalG), is looking seriously at a 2018 IPO. The CapG money raises Lyft’s valuation from $6.9 billion to more than $10 billion....more

United States v. Microsoft: Supreme Court to Resolve Lower-Court Dispute Over U.S. Warrants Seeking Foreign-Stored User Data

by Morrison & Foerster LLP on

On October 16, 2017, the Supreme Court announced it had granted the government’s petition for certiorari in United States v. Microsoft and will hear a case this Term that could have lasting implications for how technology...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

Microsoft: Supreme Court Decision on Jurisdiction over Foreign-Located Communications Anticipated

by Cozen O'Connor on

On October 16, 2017, the Supreme Court granted certiorari in In re Warrant to Search a Certain Email Account Controlled & Maintained by Microsoft Corp. (Microsoft). In taking the case for review, the Supreme Court has...more

Social Links: Russia’s threat to block Facebook; Google’s publisher-friendly move; a cease-and-desist letter worth emulating

As part of a new tracking system, the Department of Homeland Security will be keeping records of immigrants’ social media handles and search results. Russia to Facebook: Turn over user-information or risk being blocked....more

EU Digital Single Market Update – Online Platforms and Illegal Content

by Morrison & Foerster LLP on

As part of its Digital Single Market strategy, the European Commission has identified the issue of combatting illegal content online as a key challenge for online platforms. It has now released guidance to online platforms...more

Cybersecurity Awareness: Limiting Your Exposure and Visibility

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Data Privacy + Cybersecurity Insider - October 2017 #2

by Robinson & Cole LLP on

FBI Issues Flash Alert on Apache Struts Vulnerability - The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more

Is it HIPAA or HIPPA? Either way, it still applies.

by Winstead PC on

I have negotiated hundreds of SaaS agreements for dozens of software companies and I always hated when the company on the other side was a healthcare provider. Invariably, they would bring up Protected Health Information...more

Justices to Hear DOJ Appeal on Microsoft Ruling: Is Email Stored Abroad Subject to a U.S. Warrant?

The Supreme Court is poised to finally answer the question that’s been plaguing federal courts across the country: must U.S. tech companies comply with warrants issued under the Stored Communications Act (“SCA”) that demand...more

Twitter Considers Double-Length Tweets

What does Twitter’s doubling of the 140-character limit mean for advertisers? - The expansion of the microblogging site’s longtime limit to 280 characters is designed to encourage more tweeting, the company said. “Our...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

If Netflix is to be believed (and, you know, it is a public company), there’s a LOT more Stranger Things and House of Cards on the way... Turns out Nelson Peltz’s failed quest for a P&G board seat was crazy close. As in,...more

Supreme Court Denies Appeals of Notable Data Scraping, Computer Fraud Decisions from Ninth Circuit

This past week, the Supreme Court denied the petitions for certiorari in two noteworthy Ninth Circuit decisions that had interpreted the scope of liability under the federal Computer Fraud and Abuse Act (CFAA) in the context...more

Patents as a Technology and Marketing Resource

by PretiFlaherty on

Several types of patent searches are known for identifying patents and published patent applications of potential interest. One type of search, often called a novelty search, is employed to identify prior issued patents and...more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Vermont AG Settles with SAManage for $264,000 for Delayed Breach Notification

The Vermont Attorney General (AG) recently announced that it has settled with SAManage USA, a business support services company, for failing to timely notify 660 Vermont residents that their names and Social Security numbers...more

NAD Hangs up on Wireless Carrier’s Crowdsourced Data Claims

Declining to rely on crowdsourced data, the National Advertising Division recommended that T-Mobile USA discontinue advertising claims about the speed of its network....more

Business Associate Resold Fax Machine Containing PHI

Fax machines are still used in the medical community, and these days, faxing may be more secure than emailing as hackers have not yet cracked the task of hacking into old fax machines. All kidding aside, fax machines have...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

by Snell & Wilmer on

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information...more

gTLD Sunrise Periods Now Open

As first reported in our December 2013 newsletter, the first new generic top-level domains (gTLDs, the group of letters after the "dot" in a domain name) have launched their "Sunrise" registration periods. Please contact us...more

6,026 Results
|
View per page
Page: of 242
Cybersecurity

Follow Communications & Media Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.