After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Signaling a predicted renewal of enforcement of the federal children’s privacy law following broad expansion last year of who and what is covered by the rules, the FTC has filed and settled two recent law suits against mobile...more
The Federal Trade Commission (FTC) has approved iKeepSafe as a self-regulatory "safe harbor" program under the Children's Online Privacy Protection Act (COPPA). The FTC's COPPA Rule requires, among other things, that online...more
A recent court decision found that the Federal Trade Commission (FTC) has authority to enforce the requirements for security of Protected Health Information, or PHI, as defined under the Health Information Portability and...more
In August 2014, the Federal Trade Commission (“FTC”) approved final orders resolving its actions against Fandango, LLC (“Fandango”) and Credit Karma, Inc. (“Credit Karma”) for allegedly misrepresenting the security of their...more
In August, the Federal Trade Commission (“FTC”) released a staff report concerning mobile shopping applications (“apps”). FTC staff reviewed some of the most popular apps consumers utilize to comparison shop, collect and...more
On August 19, the FTC approved final orders resolving allegations that two companies: (i) misrepresented the level of security of their mobile applications; and (ii) failed to secure the transmission of millions of consumers’...more
According to recent media reports, Google is allegedly designing a Google account for children under 13 which would permit children in this age group to officially create their own Gmail account and to access a kid-friendly...more
Today’s cybersecurity environment demands that every business establish effective corporate data privacy and consumer information security systems and practices. But, unfortunately, no single cybersecurity law exits to...more
Recent comments filed by various stakeholders in response to the U.S. Commerce Department’s National Telecommunications and Information Administration’s (NTIA) Request for Public Comment (RFC) on “Big Data and Consumer...more
Since our last edition, there has been a number of developments in the Life Sciences sector across the Asia Pacific region and we are pleased to be able to update you on these recent trends.
It is evident that the...more
Last week it was reported that a small group of Russian computer hackers illegally obtained an unprecedented quantity of internet credentials, including 1.2 billion username and password combinations, and over 500 million...more
A small private cybersecurity firm recently revealed that a Russian computer hacking organization amassed more than 1.2 billion username and password combinations. The data was collected across a wide swath of websites, from...more
On August 1, 2014, the Federal Trade Commission (FTC) released a report entitled What’s the Deal? An FTC Study on Mobile Shopping Apps (the FTC Report). The FTC Report is based on a study the FTC conducted (the FTC Study) to...more
Last week, the FTC announced approval of a new Safe Harbor Program under the Children’s Online Privacy Protection Act (COPPA), called iKeepSafe. The program was created by the Internet Keep Safe Coalition, a nonprofit...more
Recently, the Federal Trade Commission issued a detailed report that summarized extensive data collection efforts that it uncovered in its study of the data brokerage industry. The FTC recommended that Congress require the...more
The Federal Trade Commission (FTC) has announced that it approved iKeepSafe’s Safe Harbor Program application, allowing the company’s self-regulating framework to serve as a safe harbor under the Children’s Online Privacy...more
Continuing its examination of consumer protection issues in the mobile payments sphere, on August 1, 2014, the FTC released a staff report examining the pre-download disclosures of mobile shopping applications to evaluate the...more
In This Issue:
- Treasury Secretary Calls for Increased Focus on Cybersecurity
- New Requirements for ‘Cleared Intelligence’ Contractors
- FTC Clarifies Verifiable Parental Consent Methods Under COPPA
COPPA Gets Parental Consent Updates -
With changes that should make it easier to develop child-directed apps, the Federal Trade Commission recently updated its guidance for verifying parental consent under the...more
Ofcom has published a call for input, entitled "Promoting investment and innovation in the Internet of Things", regarding issues that might affect the development of the emerging Internet of Things (IoT) sector in the United...more
We have written previously about the FTC’s action arising out of the data breach suffered by the Wyndham hotel group, and the company’s petition for permission to pursue an interlocutory appeal regarding the FTC’s use of its...more
The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more
Ofcom has issued a call for stakeholder input on the emerging Internet of Things. The Internet of Things describes the inter-connection of multiple “things”, be they devices or sensors, that are able to communicate and share...more
On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more
Continuing our Blog’s updates on the Federal Trade Commission’s Frequently Asked Questions (FAQs) to the updated Children’s Online Privacy Protection Act (COPPA) Rule, we highlight that the FTC revised three portions of “Part...more
Find a Science, Computers & Technology Author »
Back to Top