News & Analysis as of

Encryption Telecommunications

Cooley LLP

Federal Law Enforcement Recommends Encrypted and Ephemeral Messaging

Cooley LLP on

In light of recent reports of cyberattacks on telecommunications companies, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) issued a series of reports and statements recommending secure communications,...more

Benesch

Mixed Messages: The Salt Typhoon Encryption Debacle

Benesch on

While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more

Ropes & Gray LLP

New Year, New Threats: Practical Tips for Secure Communications after Salt Typhoon

Ropes & Gray LLP on

As a recent DataPhiles post explored, the threat to telecommunications infrastructure and private call records posed by foreign threat actors only continues to grow. In fact, at least one U.S. government agency has urged...more

Wiley Rein LLP

New FCC Data Breach Rules Draw Criticism For Problems Beyond the CRA

Wiley Rein LLP on

There has been a lot of coverage about the Federal Communications Commission’s (FCC and Commission) new and expansive data breach notification Order, approved on a 3-2 vote at the Commission’s December 13 Open Meeting. Much...more

Perkins Coie

China’s New Draft Encryption Law

Perkins Coie on

The Standing Committee of the National People’s Congress released the Encryption Law of the People’s Republic of China (Draft) for public comment on July 5, 2019 (the “2019 Draft”). The Encryption Law is being enacted to do...more

Mintz - Real Estate, Construction &...

Optimizing Data Centers to Meet the Needs of Cryptocurrency Miners

Data centers are the twenty-first century nexus between the commercial real estate and telecommunication business sectors. Owners, operators and developers of data centers face the difficult task of continually adapting to...more

Hogan Lovells

Hogan Lovells supports Vodafone Group in its 2017 Law Enforcement Disclosure Statement

Hogan Lovells on

Earlier this year Vodafone Group (“Vodafone“) published an update to its Law Enforcement Disclosure Statement (“Statement“), including an annexe summarizing law enforcement and encryption laws in 28 countries. The Statement...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 14

Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Hogan Lovells

Managing global telecom supply chains – What telecommunications companies need to know about trade control laws

Hogan Lovells on

Maintaining a global supply chain brings its share of commercial, financial, and regulatory risks. Increasingly, telecommunications companies with global operations and suppliers are finding that U.S. trade control laws...more

Proskauer on Privacy

Tales from the (Quantum) Crypt

Proskauer on Privacy on

The dream of hack-proof communication just got a little closer to reality. On August 16, 2016, China launched the world’s first “quantum satellite,” a project the Chinese government hopes will enable it to build a...more

Gray Reed

The Law Behind the Apple vs. FBI iPhone Unlocking Debate

Gray Reed on

By now, you have probably read about how the FBI is asking Apple to create software that would help the FBI unlock the iPhone of one of the deceased San Bernadino attackers. You have probably heard the talking heads scream...more

BakerHostetler

Encryption: The Battle Between Privacy and Counterterrorism

BakerHostetler on

For privacy advocates, it is universally accepted that encryption is a very good thing. After all, encrypted data is deemed a safe harbor under HIPAA and state breach-notification laws, providing an “out” from potential fines...more

Orrick, Herrington & Sutcliffe LLP

China Passes (De) Encryption Cyber Law

On December 27, 2015, the Standing Committee of the National People's Congress, China's national legislative body, passed the Counter-Terrorism Law of China, which entered into force on January 1, 2016. Although the law's...more

Morgan Lewis

Online Payment Systems Technology in China—Trojan Horse or Forbidden Fruit?

Morgan Lewis on

Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more

Latham & Watkins LLP

The USA Freedom Act: What it Changes and (Mostly) Doesn’t for Cloud Services – And is it Really the Issue

Latham & Watkins LLP on

The recent showdown over renewal of certain provisions of the USA Patriot Act (often called simply the Patriot Act) and the subsequent enactment of the USA Freedom Act have raised a number of questions about the ongoing...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide