News & Analysis as of

Cybersecurity Framework Telecommunications

Robinson+Cole Data Privacy + Security Insider

Public Urged to Encrypt Mobile Phone Messaging and Calls

On December 4, 2024, four of the five members of the Five Eyes intelligence-sharing group (the United States, Australia, Canada, and New Zealand) law enforcement and cyber security agencies (Agencies) published a joint guide...more

Nelson Mullins Riley & Scarborough LLP

And T-Mobile Makes Three: More Information Security Guidance for Telecommunications Carriers from the FCC

Close on the heels of its Consent Decrees with TracFone and AT&T, on September 27, 2024, the Enforcement Bureau of the Federal Communications Commission (FCC) announced that it reached a Consent Decree with T-Mobile US, Inc....more

Paul Hastings LLP

Net Neutrality at the FCC: Title II, Round 2, With a Twist

Paul Hastings LLP on

On October 19, the Federal Communications Commission (“FCC”) is expected to adopt a Notice of Proposed Rulemaking (“NPRM”) proposing to reclassify broadband internet access service as a “telecommunications service” under...more

Wiley Rein LLP

Wireless Roundup (July 2023)

Wiley Rein LLP on

DOT Invites Comments on Advanced Air Mobility: In this Notice and Request for Information, the Department of Transportation (DOT) seeks input on the development of a national strategy on Advanced Air Mobility (AAM) as...more

Wiley Rein LLP

President’s Telecom Advisors Promote Zero Trust Architecture in Key Report

Wiley Rein LLP on

What: On February 23, 2022, the National Security Telecommunications Advisory Committee (NSTAC) approved a final draft of its forthcoming report to the President on Zero Trust and Trusted Identity Management. ...more

McDermott Will & Emery

Working Remotely in France: Protecting the Company’s IT System Through an Information Technology Code Of Conduct

The spread of Coronavirus (COVID-19) has led companies to encourage employees to work remotely. Given that cyber attackers are always ready to exploit any security vulnerability, companies should ensure that they have in...more

Orrick, Herrington & Sutcliffe LLP

China Passes (De) Encryption Cyber Law

On December 27, 2015, the Standing Committee of the National People's Congress, China's national legislative body, passed the Counter-Terrorism Law of China, which entered into force on January 1, 2016. Although the law's...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide