Hosted Payload Episode 12: Mike Carlson / Spaceman
Hosted Payload Episode 11: Erin Boone/Interstellar
A Deep Dive Into Broadband Equity, Access, and Deployment With Scott D. Woods — TAG Infrastructure Talks Podcast
Hosted Payload Episode 10: Jeanine Poltronieri/For All Mankind (Season 1)
Hosted Payload Episode 7: Wiley All-Stars / Starship Troopers
Hosted Payload Episode 6
[Podcast] Hosted Payload Episode 4
[Podcast] Hosted Payload Episode 3
The Business and Legal Case for EMCs and Broadband - TAG Infrastructure Talks Podcast
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
Corruption, Crime, and Compliance - A Deep Dive into KT Corp's SEC Settlement for FCPA Violations
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Investing in Colombia: Infrastructure Trends and 5G Concessions
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Navigating Section 889 of the 2019 National Defense Authorization Act
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
The Promise of Connectivity: A Conversation with USTelecom President & CEO Jonathan Spalter
Robocall Update: New Call Authentication Order and Obligations, Explained
Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more
The Companies (Jersey) Law 1991 (the "Law") permits the creation of cell companies and sets out the legal requirements relating to cell companies in Jersey. In essence, cell companies are companies whose assets and...more
A cancellation clause in a signed mobile phone supply contract was considered unduly onerous and not fairly and reasonably drawn to the purchaser’s attention to be incorporated by reference. ...more
We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more
The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy....more
On 13 January 2020 the Turin Court of Appeals dismissed the appeal filed by the National Insurance Provider ("INAIL") and upheld the first instance decision issued by the Court of Ivrea in 2017, which had established...more
Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more
I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more
There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more
If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of...more
In this hoganlovells.com interview, Hogan Lovells partner Trey Hanbury talks about the need for wireless carriers to broaden their offerings to meet the demands of an increasing number of niche markets. At the same time,...more
You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more
University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more
Mexico's Telecom and Antitrust Federal Courts have issued three resolutions declaring that the model used by the Comisión Federal de Telecomunicaciones (COFETEL) for calculating interconnection costs for fixed and mobile...more
The Ninth Circuit issued two similar opinions arising out of Samsung’s appeals of orders denying arbitration in two putative class actions filed against it. The claims against Samsung allege that the smartphone maker...more
The Indianapolis Colts mobile app is alleged by a putative class to record fans’ private conversations. In the putative class action, the named plaintiff alleges that the mobile app secretly activates the smart phone’s...more
Many firms have strict international travel policies in relation to the use of technology. These policies tend to be more skewed towards countries with greater state control over communications networks and specifically the...more
Although the California Legislature sent Governor Jerry Brown bills on bed bugs, powdered alcohol, and making denim the official state fabric, the laws enacted in 2016 affecting the state’s private-sector employers were...more
Last week, the FCC finally released the full, 224-page text of its controversial and anxiously awaited Lifeline Modernization Order, which was approved by a bitterly divided, party-line 3-2 vote on March 31. As we advised in...more
I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more
The U.S. Court of Appeals for the Third Circuit recently became the first federal appellate court to apply the Federal Communications Commission’s declaratory ruling that expanded the notion of what constitutes an...more
It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more
We previously reported that government access to cellphone geographic information or CSLI without a warrant has become a vigorous debate between the government, defense attorneys, and the federal bench. In a lengthy opinion,...more
Most of us are aware of the increased risk of identity theft caused by the exponential growth of digital communications. But have we stopped to consider how the ease of communication we have today has significantly decreased...more
Florida Statute § 934.03 regarding interception and disclosure of wire, oral, or electronic communications closely mirrors the United Code 18 U.S.C. § 2511(1)(a), which clearly sets forth the rights to privacy regarding...more