Latest Publications

Share:

Update: Hotel Industry Members Withdrawal FCC Wi-Fi Petition

This is an update to an article we posted on January 28, Can Hotels Legally Block Wi-Fi Hot Spots? The FCC Says No, and Fines a Hotel $600,000 For Doing It. On August 25, 2014, the American Hotel & Lodging Association,...more

Cleared for Takeoff? Feds Release Proposed Regulations for Unmanned Aircraft Systems

On February 15, 2015, the federal government unveiled two key documents concerning the future of Unmanned Aircraft Systems (UAS)—sometimes referred to as “drones”—in the United States. The FAA released a highly anticipated...more

Pass it On: New Executive Order Pushes Greater Sharing of Cyber-Threat Information

The federal government continues to steadily ratchet up its focus on cybersecurity. On February 13, 2015, President Obama signed an Executive Order to improve real-time sharing of cyber-threat information between government,...more

It Takes More Than a Village: Protecting Student Privacy in the Age of Big Data

High-profile data breaches and cyber-attacks on well-known brands and businesses have dominated the news cycle for more than a year. Yet during the same time, less visible, but no less important efforts have been made to...more

Can Hotels Legally Block Wi-Fi Hot Spots? The FCC Says No, and Fines a Hotel $600,000 For Doing It.

In a public notice issued this week, the Federal Communications Commission (FCC) warned hotels, convention centers and other businesses that it is illegal to willfully block or interfere with their guests’ Wi-Fi hot spots...more

Can the NSA Legally Collect Telephone Metadata?

Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata....more

Bankruptcy Sales of Personally Identifiable Information: Does it Satisfy the Privacy Policy?

Companies that are looking to sell, transfer or buy personally identifiable information (“PII”) via bankruptcy asset sales would be wise to confirm that such a transfer is consistent with the debtor’s privacy policy. If it...more

Breaching Bad: New Cyber Security Regs for Defense Contractors

Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more

5 Things Every Company's Data Security Program Should Include

What's the one thing every company's data security program must include? That's the question we put recently to experts in the field, knowing that, especially after Heartbleed, the diversity of responses would create an...more

A Brief Survey of Current and Future Developments in Privacy, Data Protection and Cyber Security Law

The challenges confronting corporate counsel regarding privacy, data protection and cyber security have never been more daunting: dealing with the threat of increasingly sophisticated cybercriminals, responding to data breach...more

Malware in the Machines: Cybersecurity for Medical Devices and Hospital Networks

Within the last week the Food and Drug Administration (FDA) issued a pair of Safety Communications directed towards the medical device and healthcare industries regarding cybersecurity. Computer virus and other malware...more

61 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide