News & Analysis as of

Networks

Implementing China’s Cybersecurity Law

by Jones Day on

China’s Cybersecurity Law was issued on November 7, 2016, by the Standing Committee of the National People’s Congress, and it came into effect on June 1, 2017. The Cybersecurity Law marks the first comprehensive law in China...more

Boletín Mensual de Telecomunicaciones - Julio 2017

by Holland & Knight LLP on

Las siguientes publicaciones fueron hechas por autoridades del gobierno federal durante Julio de 2017 en relación con el Sector de Telecomunicaciones de México...more

Mexico Telecommunications Update - July 2017

by Holland & Knight LLP on

The following announcements were made by public government authorities in July 2017 regarding Mexico's telecommunications sector...more

Mexico's "Red Troncal" project

by White & Case LLP on

General Guidelines for the Red Troncal Project - On July 17, 2017, Telecomm issued preliminary general guidelines for the Red Troncal Project. This document outlined the general criteria through which Telecomm seeks to...more

Telecomm Publica los Criterios Generales Para un Posible Concurso del Proyecto de la Red Tronca

by Holland & Knight LLP on

El organismo público descentralizado Telecomunicaciones de México (Telecomm) publicó, el 17 de julio de 2017, los criterios generales que podrían aplicarse al posible concurso para el desarrollo y crecimiento de la Red...more

Telecomm Releases General Criteria For Potential Backbone Network Project Bids

by Holland & Knight LLP on

The Mexican government agency, Telecomm, on July 17, 2017, released the general criteria for a potential bid for the development and expansion of the Backbone Network Project (Red Troncal)....more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

Cybersecurity Executive Order escalates cybersecurity to greater priority – top points about critical infrastructure

by DLA Piper on

President Donald Trump recently signed an Executive Order on cybersecurity, "Strengthening the Cybersecurity Federal Networks and Critical Infrastructure." The EO is divided into sections on...more

Trump Executive Order Addresses Executive Branch, Critical Infrastructure Cybersecurity

by Dechert LLP on

President Donald J. Trump issued an Executive Order on May 11, 2017 aimed at “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” (the “Order”). The Order mandates federal governmental review of...more

Keeping Section 5 Alive: The FTC Brings Suit Against D-Link

The U.S. Federal Trade Commission (“FTC”) has filed suit against Taiwan-based D-Link Corporation and D-Link Systems, Inc. (collectively, “D-Link”), manufacturers and sellers of home networking devices including routers,...more

FTC sues IoT Device Manufacturer D-Link for Lax Cyber Security Practices

by Snell & Wilmer on

On January 5, 2017, the Federal Trade Commission (“FTC”) filed a complaint against computer networking hardware manufacturer D-Link Corporation, alleging that the company’s wireless routers, IP cameras, and other “Internet of...more

US Expands Cyber-Related Sanctions Executive Order and Designates Russian Parties

by White & Case LLP on

On December 29, 2016, President Obama issued a new Executive Order (EO) entitled "Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities."...more

The New Cybersecurity Law—New Compliance Focus for Enterprises in China

On November 7, 2016, the Standing Committee of the National People’s Congress (NPC) of the People’s Republic of China (PRC) passed the final Cybersecurity Law (CSL) after three rounds of review by the NPC since June 2015....more

Cloud-Computing Lessons using Software as a Service (SaaS)

by LeClairRyan on

Long before anyone referred to “the cloud” as something related to the Internet, software companies began shifting away from expensive, customized, on-site software implementations to something we used to call Software as a...more

DFS Cyber Regulation: Part II – An Interview with Bay Dynamics’ Steven Grossman

This is the second installment in our interview with Steven Grossman, VP Strategy & Enablement at Bay Dynamics, the cyber risk analytics company. Here, Steven discusses the importance of aligning an institution’s risk...more

China’s Controversial New Cybersecurity Law

Earlier today, the Chinese government in Beijing approved a sweeping new cybersecurity law aimed at centralizing control over computer networks operating within China’s borders. The new law is broadly drafted and...more

[Event] Data Breaches - What To Do When Your Client Falls Victim - September 28th, Mountain View, CA

by Fenwick & West LLP on

The number of data breaches has risen significantly in the past few years. More and more companies, both large and small, are having their computer networks compromised and are looking for guidance on how to respond. This...more

AT&T Teams Up with Biotricity to Power Wearable Medical Devices

by Knobbe Martens on

biotricity, a medical diagnostic and consumer healthcare technology company, recently announced its partnership with AT&T, in which the internet service provider will serve as the preferred network to power biotricity’s...more

Let’s talk about Networks of Things, baby. Let’s talk about you and me.

It is easy to see networks all around us. The printers at the office, your child’s videogame, the food ordering app on your phone, the fitness band or smart watch on your wrist, the electricity grid for your city, the...more

Gigabit Networks: Tomorrow's Infrastructure

by Best Best & Krieger LLP on

A century ago, our nation had two networks of wires that pretty much went everywhere. One was for electricity, and the other was for telephone calls. Both came to be seen as necessities for modern life. Today, gigabit...more

German Parliament (Deutscher Bundestag) releases operators of Wi-Fi networks from liability for copyright infringements committed...

by Reed Smith on

On 2 June, the German Parliament (Deutscher Bundestag) passed a bill (2. Gesetz zur Änderung des Telemediengesetzes – 2nd Amending Law to the Federal Telemedia Act; “New Law”). The New Law limits the scope of potential...more

Manufacturing as a Service

by Benesch on

CONTEXT, a market research firm, projects that the worldwide 3D printer market (including printers, materials, and ancillary services) will grow to $17.8 billion over the next five years. One reason for the rapid expansion...more

Weekly Web Wrap-Up

Welcome to Sheppard Mullin’s Weekly Web Wrap-Up, a quick list of the past week’s top news in the social media, gaming, and virtual goods and currencies industries curated by Social Media & Games Team.  Here are some of the...more

FCC Proposed Rule Will Change Business Data Services (Also Known as Special Access) Marketplace

by Best Best & Krieger LLP on

Public and Private Agencies' Rates Could Be Impacted - The FCC is expected to issue a Further Notice of Proposed Rulemaking on April 28 that will rewrite the rules that protect local governments, public agencies and...more

US Ignite Announces up to $10 Million in Funding for Gigabit Applications

by Kelley Drye & Warren LLP on

On March 18, 2016, the National Science Foundation (NSF) released a solicitation for up to $10 million for US Ignite: Networking Research and Application Prototypes Leading to Smart and Connected Communities, which funds the...more

60 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.