The Presumption of Innocence Podcast: Episode 39 - Unthreading the Silk Road: A Conversation With Author Nick Bilton
Hosted Payload Episode 8: Priya Venkat / A Million Miles Away
JONES DAY PRESENTS®: Section 230: A Springboard to a First Amendment Discussion
Terry Comer and a Vision for Data Centers and Digital Equity - TAG Infrastructure Talks Podcast
All About Web3: The Regulatory Outlook for Cryptocurrency
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
DE Under 3: New WIR Reporter; Nomination for New EEOC General Counsel; ODEP “Disability & the Digital Divide” Report
Podcast: The Briefing by the IP Law Blog - Can Copyrighted Music Keep Vids of Police Encounters Off The Internet?
The Briefing by the IP Law Blog: Can Copyrighted Music Keep Vids of Police Encounters Off The Internet?
E-Sports: What You Should Know About the Industry
The Promise of Connectivity: A Conversation with USTelecom President & CEO Jonathan Spalter
Digital Planning Podcast - Interview With Leeza Garber
Nota Bene Episode 91: China Q3 Check In - Trade Wars, GDP Growth, Pandemic Comparatives, and Hong Kong with Michael Zhang
What Can I Do If My Reputation Has Been Trashed Online?
Investment Management Roundtable Discussion – Internet 3.0: Decentralize Everything
Jones Day Presents: What General Counsel Need to Know about Blockchain
E18: ICANN Loses First GDPR Court Ruling in Germany
Impact of the Internet of Things on the Insurance Industry
The Latest with the FCC's Open Internet Order
Stefan Hankin on Online Harassment
If you are a customer of CrowdStrike, you are working on recovering from the outage that occurred on July 19, 2024. As if that isn’t enough disruption, CrowdStrike is warning customers that threat actors are taking advantage...more
The UK Information Commissioner’s Office (ICO) issued guidance on content moderation technologies and processes for the first time (the Guidance). In its press release on 16 February 2024, the ICO flagged the need for content...more
As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more
Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more
The International Association of Privacy Professionals held its annual Global Privacy Summit on April 4-5 in Washington, D.C. Here are some things we learned. 1. Generative Artificial Intelligence (“AI”) is Ubiquitous in the...more
This week, in addition to the news-catching, ongoing dispute between Twitter and Elon Musk, Twitter’s former head of cybersecurity, Peiter Zatko, claimed in a whistleblower filing with several federal agencies that Twitter...more
China’s internet watchdog, the Cyberspace Administration of China (CAC), has continued to tighten its regulation of internet industries and driven the formulation of many new laws and regulations in cybersecurity and data...more
With the recent explosion of blockchain technology and major companies pivoting their business models to realize the promise of a metaverse, tech innovators, entertainment and sports icons, and venture capitalists alike are...more
Technology is evolving at a rapid pace, and many of these advances enhance our lives and keep us connected to family and friends. But with thousands of new apps available seemingly daily, much of what can be accessed online...more
In an attempt to enhance legal certainty, especially with the rapidly developing digital platforms as the pandemic appeared to linger longer than it was previously speculated, the Ministry of Communication and Informatics of...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more
The COVID-19 Pandemic is forcing organizations to adjust their operating practices to continue operations, meetings, classes, and services remotely insofar as possible. Organizations using these types of technologies, as...more
Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more
Maine’s legislature unanimously passed a new law—“An Act to Protect the Privacy of Online Customer Information” (the “Act”)—that will impose strict data protection restrictions on broadband internet service providers (ISPs)...more
The past year has been a volatile one, from trade wars to the government shutdown to a stock market dive. One constant that U.S. businesses have become accustomed to, however, is deregulation across a wide variety of...more
It is common for individuals to see the “padlock icon” on their browser bar when visiting a website, and assume they are safe. Sadly, this assumption is no longer valid. As we approach Data Privacy Day (January 28, 2019) many...more
In This Issue - Gender Diversity in Patenting: Current Landscape and Recommendations - The gender gap in patenting is a current challenge that companies face. While this issue seems pervasive, companies and lawyers can...more
I often hear people say that they have no control of their data, that their data is being monetized by big companies, that they don’t know what those companies are doing with their data, that they are frustrated when they...more
On Friday, Sept. 28, 2018, California Governor Jerry Brown signed into law first-in-the-nation legislation requiring that manufacturers include “reasonable security features” on any device that is “capable of connecting to...more
Facebook announced late last week that it had suffered the largest breach in its history—50 million accounts were compromised, and another 40 million accounts affected—yes, that equals 90 million accounts. ...more
On September 20, 2018, the White House released its new National Cyber Strategy, which details a four-pillar national cybersecurity plan. In a letter to the American people preceding the 26-page plan, President Donald Trump...more
The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more
Nearly 30 years ago the Fair Isaac Corporation (“FICO”) first introduced its metric for measuring creditworthiness. Since then, the FICO Score has become a default metric used by countless market participants to facilitate...more
On January 20, 2017, businessman Donald J. Trump was sworn in as the 45th President of the United States following a contentious and unconventional 2016 presidential election. Republicans also successfully maintained control...more
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more