[Podcast] Hosted Payload Episode 2
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Is the TCPA Unconstitutional? [More With McGlinchey, Ep. 18]
Podcast: Conductive Discussions: Recent FRAND & Trade Secret Enforcement Trends Affecting the Semiconductor Industry
E17: Carpenter Decision Builds Up Privacy from #SCOTUS
Won’t You Be My Neighbor?
A Valuable Discussion About Property Values
The TCPA: Basics, Targeted Industries, and Trends
New Jersey to consider allowing police to search cell phones to combat distracted driving
Instapundit: America's IP Laws Need to be "Pruned Back"
TracFone, the pre-paid phone company, recently settled with the FCC over allegations that the company failed to protect customer information during three different data incidents. According to the FCC, in each of the...more
This week, the Federal Communications Commission (FCC) announced a settlement with TracFone Wireless to resolve investigations into whether TracFone failed to reasonably protect its customers’ information from unauthorized...more
Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more
Hat tip to Debbie Reynolds for the heads up on this story! More than 130 petitions seeking access to push notification metadata have been filed in US courts, according to a Washington Post investigation also reported on...more
That this past year was the most challenging year in your professional life is an almost certainty. You were forced to learn entirely new statutory schemes, absorb new local health directives on a near-daily basis, create a...more
Apple has launched, in connection with other privacy changes in iOS 14, a requirement for privacy “nutrition labels.” The labels are required for new and existing apps, and are in addition to the existing requirement of...more
The Editors' Note - Welcome to the third issue of Decoded, Spilman's e-newsletter focusing on technology law, including data security, privacy standards, financing technologies, and digital-based means of conducting...more
Governments are increasingly seeking to leverage consumer geolocation and other mobile device data to assist with fighting the spread of COVID-19, as cases continue to mount globally. Location data can be of significant...more
The legislation and litigation regarding unwanted calls remain alive and well and show no signs of ending anytime soon. With recent statutes enacted by the federal and New York State legislatures, telemarketing and debt...more
A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more
Cellphones are an essential part of our daily lives, and our frequent usage has produced large amounts of personal data. It is unavoidable that some of this data — be it email, text message or even GPS location data — may be...more
Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more
A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more
The American Institute of CPAs (AICPA), has released a risk management reporting framework intended to "establish a common, underlying language for Cybersecurity risk management reporting — almost akin to US GAAP or IFRS...more
I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more
With the release of Android 6.0, code name Marshmallow, Google has mandated that OEMs (Original Equipment Manufacturers) enable full disk encryption. Google is requiring that the feature be enabled as part of the ‘out of box...more
Last Thursday, Governor Jerry Brown signed the California Electronic Communications Privacy Act (CalECPA) into law, which requires law enforcement to obtain a warrant before accessing or searching individuals’ digital...more
A number of courts have considered whether the Fourth Amendment requires the government to obtain a warrant to access historical and/or real time cell phone geographic location information, known as CSLI. CSLI is cell site...more