News & Analysis as of

The United States Federal Communications Commission Risk Mitigation

The United States Federal Communications Commission is an independent federal agency established by the Communications Act of 1934. The Commission is charged with regulating interstate and international... more +
The United States Federal Communications Commission is an independent federal agency established by the Communications Act of 1934. The Commission is charged with regulating interstate and international communications by radio, wire, satellite, and cable. less -
Benesch

AI Reporter - August 2024

Benesch on

Google and Microsoft are spearheading the Coalition for Secure AI, focusing on supply chain security and mitigation strategies. Whether this attempt at self-regulation will ultimately succeed is unknown, as it overlaps with...more

Mintz - Technology, Communications & Media...

Telephone and Texting Compliance News: Regulatory Update — FCC Acts Against Provider Facilitating Tax Robocalls and Initiates...

Federal Communications Commission Takes Further Action Against Provider Facilitating Illegal Tax Robocalls - Following up on its previous enforcement actions, the Federal Communications Commission’s (Commission)...more

Mintz - Technology, Communications & Media...

Telephone and Texting Compliance News: Regulatory Update — FCC Confirms TCPA Bars AI-Generated Voices, Adopts New Consent...

Commission Declares TCPA Prohibits AI-Generated Voices - Following up on January’s update, the Federal Communications Commission (FCC) issued a Declaratory Ruling that confirms that the prohibitions in the Telephone...more

Mintz - Technology, Communications & Media...

Telephone and Texting Compliance News: Regulatory Update — FCC Floats Proposals on Consumer Consent and AI-Generated Voices,...

On January 25, 2024, the Federal Communications Commission (“Commission”) released a draft Report and Order and Further Notice of Proposed Rulemaking (“Further Notice”) for consideration at its February 15, 2024, Open...more

Hogan Lovells

Federal agencies issue advisory on unmanned aircraft system detection and mitigation

Hogan Lovells on

Unmanned Aircraft Systems (UAS or drones) are increasingly popular in the United States and around the world. While most UAS operators operate safely and comply with relevant laws, growing security and privacy concerns over...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - August 2020

In this month's edition of our Privacy & Cybersecurity Update, we examine the National Institute of Standards and Technology's four principles of the "explainability" of artificial intelligence and the U.K. Information...more

Manatt, Phelps & Phillips, LLP

The TCPA and Healthcare: Consent, Exemptions and Risk Mitigation

Editor’s Note: The average cost of a Telephone Consumer Protection Act (TCPA) settlement is estimated at $6.6 million—and healthcare is among the top three industries being targeted for TCPA litigation. Though its sponsors in...more

King & Spalding

FCC Releases Cybersecurity Risk Reduction White Paper

King & Spalding on

On January 18, 2017, during the final days of the Obama Administration, the Federal Communications Commission (“FCC”) released a white paper (the “FCC Paper”) on cybersecurity risk mitigation in communications networks. The...more

Skadden, Arps, Slate, Meagher & Flom LLP

"Privacy & Cybersecurity Update - October 2016"

In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more

Manatt, Phelps & Phillips, LLP

Health Update - September 2016

The Election’s Impact on Healthcare: Preparing for Potential Scenarios - Editor’s Note: Election 2016 will have a major impact on federal and state healthcare policy. To be prepared for all the possibilities, it’s...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide