News & Analysis as of

Networks

BakerHostetler

Let’s Get Physical - OCR Issues Reminder that HIPAA Security Isn’t Just Technical

BakerHostetler on

While most entities that are subject to the HIPAA Security Rule spend considerable time and effort ensuring that they have implemented appropriate administrate and technical safeguards to protect the health information that...more

Jones Day

EU Gigabit Infrastructure Act Paves Way for More Access to Physical Infrastructures and Potential Further Deregulation of Telecom...

Jones Day on

The Situation: The European Parliament and Council approved the Gigabit Infrastructure Act ("GIA") on 29 April 2024. The GIA replaces Directive 2014/61/EU. The GIA is a regulation which is directly applicable and binding in...more

Wiley Rein LLP

FCC Releases 2018 Quadrennial Review Report and Order

Wiley Rein LLP on

The Federal Communications Commission (FCC or Commission) released the Report and Order (Order) in the 2018 Quadrennial Review, one day before the December 27 deadline mandated by the United States Court of Appeals for the...more

Cornerstone Research

5 Questions with Mike DeCesaris: AI/ML Efficiency Driven by GPUs

Cornerstone Research on

5 Questions is a periodic feature produced by Cornerstone Research, which asks our professionals, senior advisors, or affiliated experts to answer five questions. We interview Mike DeCesaris, vice president of Cornerstone...more

K2 Integrity

Navigating Work and Travel: Essential Actions for Companies Looking to Keep Their Data Secure

K2 Integrity on

Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Orrick - On the Chain

Cooperatives: An Ownership Model for Digital Networks

Orrick - On the Chain on

Turbulence in crypto and blockchain has shed light on a question that has received increasing attention: how web3 companies share ownership in digital networks, including through tokens. As the industry wrestles with this...more

Blattel Communications

Media Trends and Transitions for 2023 and Beyond

Blattel Communications on

Every year the media landscape evolves, and 2022 was no different. For professional services firms looking to stay in front of key audiences, the shuffle of reporters to different beats, to different (sometimes very...more

Venable LLP

U.S.-China Relationship: Assessing the Risk of Marketing Electronics Made Outside the United States

Venable LLP on

Just weeks after President Biden and Chinese leader Xi Jinping met face-to-face to restore dialogue between the two countries, the Federal Communications Commission adopted new rules that could limit national security threats...more

Wiley Rein LLP

Top Five 5G Spectrum and Use Takeaways from #MWC22 Day 2 – Insights from Keynotes and Panels

Wiley Rein LLP on

Day Two of Mobile World Congress 2022 did not disappoint, delivering additional key takeaways about the 5G present and future. Leading stakeholders from the private sector and government shared insights on making the 5G value...more

Proskauer Rose LLP

When Shareholders Interrupt The Broadcast: A Stream TV Networks Bulletin

Proskauer Rose LLP on

In a previous alert, we covered the Delaware Chancery Court’s decision in Stream TV Networks last year. After Stream TV’s independent directors negotiated a consensual transfer of collateral to its lenders in full and final...more

Good2bSocial

20 Tactics for Marketing a Law Firm

Good2bSocial on

Digital marketing can do incredible things for your law firm. The downside is that everyone knows that by now. The online space is crowded with attorneys marketing their practice. So how can you increase your law firm’s...more

Foley & Lardner LLP

Digital Transformation: The Cloud Is More Than a Location

Foley & Lardner LLP on

What is the cloud? There are many differing (but also similar) answers to that question. Some consider the cloud a gateway to providing online access, while others consider it the relatively narrow provisioning of remote...more

Davies Ward Phillips & Vineberg LLP

China Mobile Case Illustrates Breadth of Canada’s National Security Review Regime

After operating in Canada for five years, China Mobile International (Canada) Inc. (CMI) was ordered by the Canadian government in August 2021 to shut down or divest its Canadian operations because of national security...more

Mintz - Privacy & Cybersecurity Viewpoints

CRITICAL ALERT: Log4Shell

We want to make our readers and your security operations aware of a critical vulnerability that is actively being exploited in the wild. CVE-2021-44228 can easily be exploited to gain complete access to the targeted...more

Bass, Berry & Sims PLC

Privacy Peril: AdiOs, Wi-Fi

Bass, Berry & Sims PLC on

We have warned several times of the dangers of using public Wi-Fi networks (e.g., “I Spy Your Wi-Fi” from September 2018 and March 2020). For iPhone users, a newly-detected vulnerability risked serious damage to your phone’s...more

Mitchell, Williams, Selig, Gates & Woodyard,...

2021 Arkansas Insurance Legislation Summary: Health Insurance

The 93rd Arkansas General Assembly convened on January 11, 2021 and entered into an extended recess on April 27, 2021. The resolution authorizing the extended recess provides for the legislature to reconvene for the following...more

Morrison & Foerster LLP

Biden Administration Carries Forward Trump Era Executive Order Scrutinizing Imports And Sales Of Certain Communications Technology...

On March 22, 2021, the Department of Commerce (“Commerce”) interim final rule to implement provisions of Executive Order 13873 on Securing the Information and Communications Technology and Services (ICTS) Supply Chain became...more

Hogan Lovells

UK telecoms: Landlords take note: new process will accelerate broadband access for resi tenants

Hogan Lovells on

Amendments to the 2017 Electronic Communications Code have been introduced to reduce to six weeks the process by which network operators may get access to multi-let residential properties. ...more

Faegre Drinker Biddle & Reath LLP

Non-Techies – Protect Your Digital Data by Securing Your Home and Business Wi-Fi

I spent over 22 years in the FBI performing criminal cyber and forensics investigations. Many of these investigations led us to people who were innocent of the alleged crimes but who were guilty of unknowingly allowing...more

Wiley Rein LLP

FCC Again Moves on National Security, Further Implementing the Secure and Trusted Communications Networks Act

Wiley Rein LLP on

On December 10, 2020, the Federal Communication Commission (FCC or Commission) unanimously approved a Second Report and Order on supply chain security (Second R&O), which is the latest effort in its evolving role with...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 7, September 2020

U.S. Judge Halts Trump's TikTok Ban, Hours Before It was Set to Start - "John Hall, an attorney for TikTok, said that the app, with some 100 million American users, is a 'modern day version of the town square' and shutting...more

Fox Rothschild LLP

So, Where Did You Get That Lawyer?

Fox Rothschild LLP on

This afternoon brought me an email from a fellow from West Virginia. The caption indicated it might involve a new divorce matter. I opened it to read: “I found your name online and I wanted to send you a quick email before...more

Jackson Lewis P.C.

NSA Releases Helpful Guidance For Limiting Location Data Exposure

Jackson Lewis P.C. on

The National Security Agency (NSA) recently released helpful guidance on how to effectively limit location data exposure for its staffers, which also can be helpful information for the general public. Businesses likely will...more

Faegre Drinker Biddle & Reath LLP

Disruption IV: The New Threat Disruptionware Poses to the American Energy Sector

Over the past few months, I have written about the threat first identified by the Institute for Critical Infrastructure Technology (ICIT) called disruptionware. We have previously described what disruptionware is, how it...more

79 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide