The Privacy Insider Podcast Episode 11: Signal and Noise: The New Administration, Privacy, and Our Digital Rights with Cindy Cohn of Electronic Frontier Foundation
The Presumption of Innocence Podcast: Episode 39 - Unthreading the Silk Road: A Conversation With Author Nick Bilton
Hosted Payload Episode 8: Priya Venkat / A Million Miles Away
JONES DAY PRESENTS®: Section 230: A Springboard to a First Amendment Discussion
Terry Comer and a Vision for Data Centers and Digital Equity - TAG Infrastructure Talks Podcast
All About Web3: The Regulatory Outlook for Cryptocurrency
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
DE Under 3: New WIR Reporter; Nomination for New EEOC General Counsel; ODEP “Disability & the Digital Divide” Report
Podcast: The Briefing by the IP Law Blog - Can Copyrighted Music Keep Vids of Police Encounters Off The Internet?
The Briefing by the IP Law Blog: Can Copyrighted Music Keep Vids of Police Encounters Off The Internet?
E-Sports: What You Should Know About the Industry
The Promise of Connectivity: A Conversation with USTelecom President & CEO Jonathan Spalter
Digital Planning Podcast - Interview With Leeza Garber
Nota Bene Episode 91: China Q3 Check In - Trade Wars, GDP Growth, Pandemic Comparatives, and Hong Kong with Michael Zhang
What Can I Do If My Reputation Has Been Trashed Online?
Investment Management Roundtable Discussion – Internet 3.0: Decentralize Everything
Jones Day Presents: What General Counsel Need to Know about Blockchain
E18: ICANN Loses First GDPR Court Ruling in Germany
Impact of the Internet of Things on the Insurance Industry
The Latest with the FCC's Open Internet Order
AI is technology that enables computers to simulate human intelligence and problem-solving skills, whereas deepfake is synthetic media that has been digitally manipulated to replace and mimic one person’s likeness. AI has...more
In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID chips to track items as they moved throughout a supply chain. “Though there is no...more
Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more
China’s internet watchdog, the Cyberspace Administration of China (CAC), has continued to tighten its regulation of internet industries and driven the formulation of many new laws and regulations in cybersecurity and data...more
In this election cycle, technology and internet policy is a persistent factor across multiple issue areas. With implications for national security, economic equality, infrastructure and market regulation, the next...more
The Bavarian Data Protection Authority (“BDPA”) took the “safer internet day” in February 2019 as an opportunity to conduct privacy checks on website operators....more
On June 12, 2018, the Vietnamese National Assembly passed the Law on Cybersecurity (the “Cybersecurity Law“), which will take effect on January 1, 2019....more
Facebook announced late last week that it had suffered the largest breach in its history—50 million accounts were compromised, and another 40 million accounts affected—yes, that equals 90 million accounts. ...more
On September 20, 2018, the White House released its new National Cyber Strategy, which details a four-pillar national cybersecurity plan. In a letter to the American people preceding the 26-page plan, President Donald Trump...more
More than 15 years after the adoption of the Data Protection Directive, the European Commission noticed that the current legislative framework on data protection did not adequately deal with the risks associated with online...more
If you have ever made an online purchase, chances are that you have received at least one email in the last month notifying you that a company’s privacy policy has changed. ...more
Kara Scarboro, an attorney in Saul Ewing Arnstein & Lehr LLP’s Insurance Practice, explains the concept of “the internet of things” and how it enables real-time data to be provided from an insured to an insurance company,...more
The average internet user may be largely unaware that there are actually different “levels” of the internet. First, there is the surface level of the internet where companies post their webpages, and where employees may...more
The Federal Trade Commission on October 23, 2017, provided guidance on how it will enforce the Children’s Online Privacy Protection Act (COPPA) with respect to audio recordings of children. This comes as part of a wave of...more
Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS - The FBI and Department of Homeland Security issued a joint statement on October 20, 2017 warning of an increased danger of a...more
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
The Digital Economy Bill passed into UK law last Thursday 27 April 2017 amidst the flurry of activity known as the “wash up” period before the dissolution of Parliament and ahead of the early general election in the UK to be...more
In a key decision, the European Court of Justice has ruled that dynamic IP addresses may qualify as personal data in certain circumstances—ending years of uncertainty about whether such fundamental building blocks of the...more
California’s Attorney General, Kamala Harris, has required Houzz, a home décor information and e-commerce website and mobile app publisher, to hire a chief privacy officer (CPO), conduct a company-wide privacy assessment, and...more
What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more
Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more
In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more
In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more
The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more
If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more