News & Analysis as of

Risk Management Telecommunications

Hogan Lovells

NIST and NTIA publish key resources on AI risk management and safety

Hogan Lovells on

President Biden’s October 2023 AI executive order (AI EO), which aimed to promote the development of guidance and regulations to support a safe, secure, trustworthy AI ecosystem, is spurring agencies across the federal...more

Jackson Lewis P.C.

The Broadening Data Security Mandate: SEC Incident Response Plan and Data Breach Notification Requirements

Jackson Lewis P.C. on

Virtually all organizations have an obligation to safeguard their personal data against unauthorized access or use, and, in some instances, to notify affected individuals in the event such access or use occurs. Those...more

Akin Gump Strauss Hauer & Feld LLP

Geneva Insights - July & August 2024

International Geneva – A global governance ecosystem of over 40 international organizations, 178 country representations and 700+ non-governmental organizations....more

Davis Wright Tremaine LLP

FCC Proposes Reporting and Other Obligations To Secure Routing of Internet Traffic

On June 7, 2024, the Federal Communications Commission ("FCC") issued a Notice of Proposed Rulemaking ("NPRM") that would require providers of retail broadband internet access service to create detailed plans to address and...more

Guidepost Solutions LLC

Artificial Intelligence Governance – First, Build On What You Have

As artificial intelligence (AI) continues to advance rapidly, organizations of all types are seeking to deploy this powerful tool to increase the effectiveness and efficiency of their operations, improve service to their...more

Guidepost Solutions LLC

FCC Bans AI Voices in Robocalls, Yet Deep Fake Scams Persist

On February 8, 2024, the Federal Communications Commission outlawed AI-generated voices in robocalls and with the upcoming Presidential election in the United States, it is easy to see why. Imagine the implications if “leaked...more

Nelson Mullins Riley & Scarborough LLP

Beware of Scams that Hijack Cellphone Accounts: The Importance of Authentication for Businesses and Consumers: Privacy Day...

Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more

Perkins Coie

Biden Administration Seeks Comment on How To Improve AI Accountability

Perkins Coie on

The recent dramatic growth of artificial intelligence (AI) technologies continues to be a focus of the Biden administration. The National Telecommunications and Information Administration (NTIA), a federal agency within the...more

K2 Integrity

The North Korean Crypto Threat

K2 Integrity on

Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more

Wiley Rein LLP

Wireless Roundup (September 2022)

Wiley Rein LLP on

Key Wireless Deadlines- FCC Proposes to Update Intercarrier Compensation Regime: In this Further Notice of Proposed Rulemaking (FNPRM), the Federal Communications Commission (FCC or Commission) “seeks comment on proposed...more

Wiley Rein LLP

Wireless Roundup (May 2022)

Wiley Rein LLP on

Key Wireless Deadlines- SEC Requests Comment on Cybersecurity Reporting Requirements: The Securities and Exchange Commission (SEC) is proposing rules to enhance and standardize disclosures regarding cybersecurity risk...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #327 – Scammers Spoof Cell Phone Numbers

Scammers use familiarity to get victims to fall for their scams. One way to do that is to spoof a cell phone number from the same area code to make the targeted person think that the person calling or texting them is someone...more

American Conference Institute (ACI)

[Event] 2nd National Forum on Team Telecom - April 25th, Washington, DC

Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more

Wiley Rein LLP

President’s Telecom Advisors Promote Zero Trust Architecture in Key Report

Wiley Rein LLP on

What: On February 23, 2022, the National Security Telecommunications Advisory Committee (NSTAC) approved a final draft of its forthcoming report to the President on Zero Trust and Trusted Identity Management. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #300 – Apple iPhone Users: Update Your iPhone iOS ASAP

We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more

PilieroMazza PLLC

Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know

PilieroMazza PLLC on

2020 saw the implementation of several game-changing regulations for government contractors. None the least of these were related to DOD’s Cybersecurity Maturity Model Certification (CMMC) and Section 889 of the National...more

Stinson - Government Contracting Matters

Continuing Developments on the Supply Chain Front

Recent weeks have brought news on multiple fronts regarding supply chain risks and actions in response thereto: Commerce ICTS Regulations to Go Into Effect; Chinese ICTS Companies, Products and Services in the...more

King & Spalding

President Biden Orders Comprehensive Supply Chain Review

King & Spalding on

Articulates Administration Policy And Reaffirms Need For “Strong, Resilient Supply Chains” For “Critical And Essential Goods And Materials” - On February 24, 2021, President Joseph R. Biden Jr. signed an Executive Order on...more

Akin Gump Strauss Hauer & Feld LLP

FERC Seeks Comments on Risks to Bulk Electric System from Equipment and Services from Entities Identified as Risks to National...

On September 17, 2020, the Federal Energy Regulatory Commission (FERC or the “Commission”) issued a Notice of Inquiry (NOI) seeking comments on “potential risks to the bulk electric system posed by using equipment and...more

Rumberger | Kirk

Is Your Loyalty Program Putting Your Restaurant at Risk for TCPA Liability?

Rumberger | Kirk on

TCPA litigation can cost companies, both big and small, millions of dollars. Loyalty programs are a great way for restaurants to keep in contact with their existing customers and incentivize future purchases. In the modern...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #233 – Be Wary of Coronavirus Telemarketing Calls

The scammers know that most of us are working from home and are trying to use this to their advantage. The robocalls have increased, and telemarketers are calling more frequently, but with a new twist—preying on fears of...more

Locke Lord LLP

Privacy And Cybersecurity Work From Home Considerations In The Context of Coronavirus

Locke Lord LLP on

We want to enable our personnel to work from home during this health crisis. What do we need to worry about from a privacy and cybersecurity perspective? 1.Equipment. Personnel working remotely will need equipment, and you...more

Lowndes

Five Cybersecurity Practices to Minimize Risk During Coronavirus

Lowndes on

As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more

Robins Kaplan LLP

Financial Daily Dose 2.20.2020 | Top Story: Fed Minutes Show Central Bank Happy With Economy, Worried About Coronavirus

Robins Kaplan LLP on

Newly released minutes from the Fed’s January meeting show central bankers preoccupied with global risks, including the still-growing economic impact of the coronavirus, while still taking a wait-and-see approach to any...more

Association of Certified E-Discovery...

[Webinar] The Impact of Emoji in Workplace Communications - March 5th, 1:00 pm ET

More than 26 million custom emoji have been created in Slack and the use of emoji in Teams is universal, revolutionizing the way we communicate. Some employees can have entire discussion with emoji, and it takes just one...more

44 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide