The Presumption of Innocence Podcast: Episode 39 - Unthreading the Silk Road: A Conversation With Author Nick Bilton
Hosted Payload Episode 8: Priya Venkat / A Million Miles Away
JONES DAY PRESENTS®: Section 230: A Springboard to a First Amendment Discussion
Terry Comer and a Vision for Data Centers and Digital Equity - TAG Infrastructure Talks Podcast
All About Web3: The Regulatory Outlook for Cryptocurrency
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
DE Under 3: New WIR Reporter; Nomination for New EEOC General Counsel; ODEP “Disability & the Digital Divide” Report
Podcast: The Briefing by the IP Law Blog - Can Copyrighted Music Keep Vids of Police Encounters Off The Internet?
The Briefing by the IP Law Blog: Can Copyrighted Music Keep Vids of Police Encounters Off The Internet?
E-Sports: What You Should Know About the Industry
The Promise of Connectivity: A Conversation with USTelecom President & CEO Jonathan Spalter
Digital Planning Podcast - Interview With Leeza Garber
Nota Bene Episode 91: China Q3 Check In - Trade Wars, GDP Growth, Pandemic Comparatives, and Hong Kong with Michael Zhang
What Can I Do If My Reputation Has Been Trashed Online?
Investment Management Roundtable Discussion – Internet 3.0: Decentralize Everything
Jones Day Presents: What General Counsel Need to Know about Blockchain
E18: ICANN Loses First GDPR Court Ruling in Germany
Impact of the Internet of Things on the Insurance Industry
The Latest with the FCC's Open Internet Order
Stefan Hankin on Online Harassment
Like many organizations, Peloton is facing a legal challenge under the California Invasion of Privacy Act (CIPA) relating to the company’s alleged use of third-party technology on its website to intercept chat communications...more
Have you recently visited a plaintiff lawyer’s website? If so, then you may be entitled to compensation under the most contrived California Invasion of Privacy Act (CIPA) theory yet. ...more
It has been quite a challenge for all of us in the legal and alternative dispute resolution (ADR) fields to sort through the hype and potential of AI. Many lawyers and law firms dove in headfirst, excited about the potential...more
For the past two years, hundreds of class action lawsuits alleging violations of the California Invasion of Privacy Act (CIPA) have plagued California retailers and consumer-facing service providers. These lawsuits claim,...more
Have you heard about ChatGPT, the A.I. tool that will replace all writers and content creators? ChatGPT is a real tool that may help with content creation, but it is not a replacement for human writers...more
Takeaway: Security labels on internet-connected devices are on the horizon for companies that manufacture and want to sell such devices worldwide. On October 19, 2022, 50 representatives from different industries including...more
New NullMixer Malware Campaign Spreading Through Cracked Software Websites - An emerging campaign was recently discovered by Kaspersky researchers spreading the "NullMixer" malware. NullMixer exfiltrates victims'...more
On February 24, 2022, seven cabinet agencies published reports in response to President Biden’s Executive Order (EO) 14017 with assessments of and recommendations for strengthening certain critical U.S. supply chains....more
Key Wireless Deadlines- NIST Requests Comment on Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight: The National Institute of Standards and Technology (NIST) seeks comment on Draft NISTIR...more
With a year of pandemic-fueled work-from-home experience under our collective belts, you can now find numerous helpful guides and horror stories to help you prepare for remote hearings and trials. There are some basics...more
On March 22, 2021, the Department of Commerce (“Commerce”) interim final rule to implement provisions of Executive Order 13873 on Securing the Information and Communications Technology and Services (ICTS) Supply Chain became...more
On March 10, 2021, the American Bar Association released new guidance for attorneys working remotely. While there has never been a distinction in the Model Rules for Professional Conduct between working in a brick-and-mortar...more
On March 27, 2020, a five-year legal battle between three certified classes of Jeep Cherokee drivers and Fiat Chrysler came to a sudden end, when a federal judge in the Southern District of Illinois held that allegations that...more
In cloud services, whether it is infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS), service availability is often a significant customer concern because the customer is relying...more
Amendments to Russian consumer protection law require installation of local software on digital devices to be sold in Russia after July 2020. The Russian government will publish lists of the digital devices covered by the new...more
On 2 December 2019, the Russian President signed the bill that requires electronic equipment sold in Russia to have pre-installed Russian software. This requirement will come into force on 1 July 2020. ...more
Saudi Aramco’s slow trickle of IPO-related information continued this weekend, including its goal of setting overall company market value at a staggering $1.7 trillion. The figure, though massive, is still well short of the...more
In an effort to phase out what many in the security world believe are threats to the cybersecurity posture of governmental agencies and private entities alike, John Quinn, the Chief Information Officer of the State of...more
The new California Consumer Privacy Act is not the only California privacy law that companies will have to prepare for in 2019. Beginning on January 1, 2020, California will also require a manufacturer of a “connected device”...more
The Situation: California is the first state to specifically regulate the security of connective devices, which are commonly referred to as internet of things ("IoT") devices. The Result: The new law mandates that...more
On Friday, Sept. 28, 2018, California Governor Jerry Brown signed into law first-in-the-nation legislation requiring that manufacturers include “reasonable security features” on any device that is “capable of connecting to...more
Ever since the European Court of Justice (CJEU) in its highly regarded UsedSoft ruling declared the resale of “used” software admissible (dated 3 July 2012, C-128/11)...more
Picking up where we left off last week, below are some additional distinctions for escrow arrangements in the software as a service (SaaS) context and related customer and vendor considerations....more
With software as a service (SaaS) offerings here to stay as the preferred technology solution for many key business requirements, we are seeing more and more requests for escrow arrangements involving SaaS solutions....more
The Internet of Things gives rise to many risks and exposures that companies and their insurers were not thinking about as recently as a couple years ago, and probably aren’t fully cognizant of today....more