Science, Computers & Technology Privacy Communications & Media

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

FCC Shows Hand on Regulation of Edge Providers

In a prior post, we commented on how the recent expansion of the FCC’s authority to regulate the privacy practices of Internet service providers (ISPs) has ignited calls for further expansion of the FCC’s authority to cover...more

Russia’s new data law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their heads about how to comply. The Basics - The new law applies to businesses with a...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

11th, 6th Circuits Rule on TCPA Consent for Autodialed Calls to Cell Phones

The U.S. Courts of Appeals for the 11th and Sixth Circuits recently issued two rulings regarding when a consumer has given “prior express consent” under the Telephone Consumer Protection Act (TCPA) to receive text messages or...more

[Webinar] Beam It Up Safely: Navigating Data Privacy and Security in Telemedicine's Uncharted Territory - Sept. 17, 12:00pm EDT

Science fiction programs once imagined a future where a doctor on a spaceship could treat a patient on a distant planet using groundbreaking technology. The health care industry may not yet have made this giant leap, but...more

Is Ashley Madison abusing the Digital Millennium Copyright Act in the Wake of Hack?

In July, a group of hackers identifying themselves as the Impact Team took over the computer systems of Avid Life Media (“ALM”), the parent company of the adultery-oriented website Ashley Madison, threatening to release the...more

The Top Social Media Platforms’ Efforts To Control Cyber-Harassment

Social networking platforms have long faced the difficult task of balancing the desire to promote freedom of expression with the need to prevent abuse and harassment on their sites. One of social media’s greatest challenges...more

Telemedicine or just a gadget for fitness addicts? Mobile Health Apps and the law

Mobile health (mHealth) apps are becoming more and more popular. Back in 2013, more than 97,000 health apps were already on the market. According to the European Commission (EC), this figure now amounts to around 100,000...more

Ashley Madison, meet the kids: infidelity and divorce

The recent Ashley Madison breach exposed millions of users who’d signed up to the site, believing they were doing so with full anonymity. Social media and news outlets helped fuel a storm that will not soon be forgotten. In...more

Rocky Road Ahead for Ashley Madison after Widespread Damage Arising from Disclosure of Personal Information

Ashley Madison, the self-described “world's leading married dating service for discreet encounters” is the latest high-profile social media website to sustain a cyberattack. Established to provide an opportunity for married...more

FTC v. Wyndham: The Litigation Goes On, But Other Lessons To Learn

It’s fair to say that the opinion by the Third Circuit Court of Appeals in FTC v. Wyndham was a set-back for Wyndham, but for businesses it may be just the right wake-up call....more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

Privacy in financial markets, not to be ignored

The Article 29 Working Party published a letter it sent to the European Commission urging it to consider the data protection and privacy issues when adopting the secondary regulations (‘Regulations’) necessary to implement...more

Sixth Circuit Weighs in on TCPA “Prior Express Consent”

The U.S. Court of Appeals for the Sixth Circuit recently addressed both the timing and scope of “prior express consent” under the Telephone Consumer Protection Act (“TCPA”). The plaintiff in Stephen M. Hill v. Homeward...more

First “Right to be Forgotten” enforcement action levied against Google

The U.K. Information Commissioner issued an order to Google this week requiring it to remove nine search results of an individual’s minor criminal offense that was committed close to ten years ago. This is reported to be the...more

Advertising Law - August 2015 #4

In Case You Missed It: Possible Jail Time for TCPA Violations, Microsoft Gets Slammed With Solicitation Scam Class Action, and 'Do Not Disturb' Technology Gets Pushed on FCC - The world of the Telephone Consumer...more

Legal Insights on the Ashley Madison Hack: Part II

As more names emerge from the dark web data dump of Ashley Madison customers, lawyers around the globe have found a very willing group of would-be plaintiffs. Interestingly, all of these plaintiffs are named “Doe,” which must...more

The FTC Continues to Flex its Safe Harbor Enforcement Muscles

On August 17, 2015, the Federal Trade Commission (FTC) announced settlements with 13 companies on charges that they misled consumers by claiming that they were certified members of the U.S.-EU or U.S.-Swiss Safe Harbor...more

Newest FDA Newsletter from AGG

Once a month, AGG’s terrific FDA team publishes a newsletter updating readers on the latest regulatory news affecting food/drug companies–including those from Ireland and Northern Ireland. The August newsletter is here and...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

FCC Settles First Data Security Enforcement Action

On July 9, 2015, the Federal Communications Commission settled its first data security case with two related telecommunications carriers – TerraCom, Inc. and YourTel America, Inc. – for $3.5 million. The settlement resolves...more

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Hold that Friend Request: Legal Traps in a Post-Facebook Work Environment

Many well-meaning managers engage with employees on social media websites, and doing so provides a host of benefits: stronger relationships between employees and management; a sense of collegiality; instant updates on...more

Web.com Suffers Data Breach Affecting 93,000 Customers

The list of companies hit by cyber-attacks continues to grow.  This time, Florida-based web hosting company, Web.com, has announced that it suffered a data breach that may have compromised credit card information and other...more

1,530 Results
|
View per page
Page: of 62

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×