FCC Welcomes Comment Regarding BIAS Providers’ Use of Data Caps for Fixed and Mobile Broadband Internet Service: In this Notice of Inquiry (NOI), the Federal Communications Commission (FCC or Commission) seeks comment...more
The wireless industry has revolutionized the way we connect, from facilitating teleworking, distance learning, and telemedicine to allowing the American public to interact virtually in almost all other aspects of their daily...more
Patents related to mobile devices and wireless networks have received significant industry attention as they enable mobile device manufacturers, network system vendors, and cellular providers to protect the intellectual...more
The Federal Communications Commission (FCC) has established a new program, the Enhanced Competition Incentive Program (ECIP), designed to further help close the digital divide by fostering increased access to wireless...more
The U.S. Department of the Treasury (Treasury) released its Guidance for the Coronavirus Capital Projects Fund (Capital Projects Fund) for States, territories, and tribal governments, as created by Section 9901 of the...more
The National Security Agency (NSA) recently released helpful guidance on how to effectively limit location data exposure for its staffers, which also can be helpful information for the general public. Businesses likely will...more
Our previous Privacy Peril provided information on securing your private Wi-Fi network from public access. Here, we offer guidance on avoiding the opposite – inadvertently disclosing confidential private information through...more
Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more
Public Wi-Fi networks are a wonderful thing, particularly if you subscribe to a limited carrier data plan and have spent the month streaming Bachelor in Paradise or your favorite NCAA and NFL teams’ games. However, by...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more
We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more
China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more
FCC Fines Non-Telecom Companies for Lapse in Compliance with Wireless Rules August 19, 2016 The enforcement action highlights the importance of complying with FCC rules with respect to their wireless facilities and devices....more
Employees use their smartphones as a key tool for accessing information during a work day – especially when outside the office and traveling on business. While smartphones, tablets, laptops and other devices may increase...more