News & Analysis as of

Cybersecurity Telecommunications Data Protection

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Lerman Senter PLLC

All Providers Must Submit Expanded Filing in Robocall Mitigation Database by February 26, 2024

Lerman Senter PLLC on

The Federal Communications Commission has set a February 26, 2024 filing deadline for all providers in the call chain, regardless of STIR/SHAKEN status or whether they have the facilities to implement STIR/SHAKEN, to file...more

Orrick, Herrington & Sutcliffe LLP

FCC adopts updated data breach notification rules

On December 21, 2023, the FCC announced it adopted an updated data breach notifications rule. The rule was formerly designed to protect consumers against pretexting, “a practice in which a scammer pretends to be a particular...more

Foley Hoag LLP - Security, Privacy and the...

The Federal Communications Commission Updates Its Data Breach Rules

On December 21, 2023, the Federal Communications Commission released an order updating its data breach rules. These updated rules require telecommunications providers to report breaches of customer proprietary network...more

Ankura

Ankura CTIX FLASH Update - December 8, 2023, Ankura CTIX

Ankura on

New Linux Remote Access Trojan "Krasue" Targets Thai Telecom Sector - A newly discovered Remote Access Trojan (RAT) for Linux has been seen targeting telecommunications firms in Thailand as reported by Group-IB. Named RAT...more

Mintz - Privacy & Cybersecurity Viewpoints

FCC Partners With States to Increase on Privacy and Data Protection Investigations, Signaling Increased Focus on Future...

The Federal Communications Commission (“FCC”) announced Thursday that in furtherance of the work of the agency’s Privacy and Data Protection Task Force, the FCC’s Enforcement Bureau signed Memoranda of Understanding (“MOU”)...more

Wiley Rein LLP

Mobile World Congress 2023: Packed Agenda Promises Key Insights on Spectrum, IoT, Cybersecurity, and Wireless Industry Innovation

Wiley Rein LLP on

Next week in Las Vegas, the Mobile World Congress (MWC) will bring together policymakers, industry experts, and stakeholders across the wireless ecosystem to discuss critical issues impacting the industry. Hosted by trade...more

Akin Gump Strauss Hauer & Feld LLP

FCC Chairwoman Jessica Rosenworcel Announces New Privacy and Data Protection Task Force; Elaborates on Data Privacy Priorities

Key Points - The FCC has launched a new “Privacy and Data Protection” Task Force to coordinate rulemaking and enforcement across the agency. Chairwoman Rosenworcel called on her fellow Commissioners to finalize...more

Troutman Pepper

Cyber Capsule - February 2023

Troutman Pepper on

Before we jump into February developments — trigger warning if you are a Russian hacker — for those keeping track of breach notification requirements, the National Credit Union Administration (NCUA) Board approved a final...more

Hogan Lovells

Securing Cyberspace: White House releases National Cybersecurity Strategy

Hogan Lovells on

The Biden Administration released its National Cybersecurity Strategy (Strategy) in an effort to reshape U.S. policy and priorities around cybersecurity for the public and private sectors, marking a significant shift in tone...more

Morgan Lewis - Tech & Sourcing

UK Government to Introduce New Rules to Protect Telecoms Networks Against Cyberthreats

The Department for Digital, Culture, Media & Sports (DCMS) confirmed on August 30, 2022, that it will push forward with tough new regulations and a code of practice to bolster the security and resilience of the United...more

Morgan Lewis - Tech & Sourcing

From Pandemic Challenges to a Potential Recession – Are Your Outsourcing Contracts Up to Date?

The COVID-19 pandemic introduced unprecedented challenges, requiring companies to adapt quickly to the way their personnel work, changes in their business offerings, and how they interact with their customers and suppliers....more

American Conference Institute (ACI)

[Event] 2nd National Forum on Team Telecom - April 25th, Washington, DC

Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more

Bilzin Sumberg

FCC Calls for Changes to Telecommunications Carriers’ Reporting of Data Breaches

Bilzin Sumberg on

The Federal Communications Commission (“FCC”) circulated internally a Notice of Proposed Rulemaking (“NPRM”) last week that would, among other things, enable telecommunications carriers to report breaches to their customers...more

Robinson+Cole Data Privacy + Security Insider

T-Mobile Clarifies Facts of Security Incident in Press Release

There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #292 – Some Mint Mobile Users’ Information Compromised

Mint Mobile notified a “small number” of customers last weekend that their personal information was compromised between June 8 and June 10, when a threat actor ported the phone numbers of those customers to another carrier...more

WilmerHale

Decoupling From China: Part 2 - Security Requirements

WilmerHale on

The COVID-19 pandemic and the serious supply chain vulnerabilities it exposed have led to a seismic shift in U.S. policy and regulation, from stepped-up measures to protect U.S. technology, intellectual property and data from...more

Womble Bond Dickinson

You Have Been Weighed in the Balance and Found Wanting (Or at Least, Inadequate)

Womble Bond Dickinson on

Article 45 of the GDPR allows the transfer of personal data from the EU to a third country when the third country ensures an “adequate level of protection” (adequacy decision). In determining “adequacy,” the GDPR provides...more

Shumaker, Loop & Kendrick, LLP

Client Alert: Protecting Intellectual Property in Remote-Based Work Settings

During the COVID-19 pandemic, teleworking has become both a requirement and a preference to facilitate a safe and healthy workplace. However, remote-based work settings may pose intentional and unintentional threats to...more

Locke Lord LLP

Privacy And Cybersecurity Work From Home Considerations In The Context of Coronavirus

Locke Lord LLP on

We want to enable our personnel to work from home during this health crisis. What do we need to worry about from a privacy and cybersecurity perspective? 1.Equipment. Personnel working remotely will need equipment, and you...more

Lowndes

Five Cybersecurity Practices to Minimize Risk During Coronavirus

Lowndes on

As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more

Perkins Coie

China’s New Draft Encryption Law

Perkins Coie on

The Standing Committee of the National People’s Congress released the Encryption Law of the People’s Republic of China (Draft) for public comment on July 5, 2019 (the “2019 Draft”). The Encryption Law is being enacted to do...more

Hogan Lovells

Investing in China’s TMT sector: What you need to know

Hogan Lovells on

China is a market that represents a paradox for many telecoms, media and technology (“TMT“) companies. On the one hand it offers the promise of almost unlimited growth potential if you get the product right, but on the other...more

Epstein Becker & Green

The Future of Work: Five Developing Trends for Technology, Media, and Telecommunications Employers

Epstein Becker & Green on

Technology, media, and telecommunications organizations are at the forefront of tackling new challenges in handling employee information and managing employee populations. As legislatures (from the federal level down to...more

Foley Hoag LLP - Security, Privacy and the...

MaHIMA Webinar: "Alexa, What Medication Am I Taking?" (Presentation)

"Open the pod door, HAL" • Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity. • A report from NPR and Edison Research states...more

WilmerHale

The European Commission Launches a Public Consultation on Connected and Automated Vehicles

WilmerHale on

On October 24, 2018, the European Commission (“EC”) opened a Public Consultation on a Recommendation that will identify the main challenges linked to the deployment of connected and automated vehicles. Stakeholders, including...more

44 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide