Search Results (2283)
Documents on communications law
Show: results per page
|Canada’s Anti-Spam Legislation: Are You Prepared?|
Chad Matheson; Cassels Brock & Blackwell LLP;
May 12, 2014, previously published on May 2, 2014On July 1, 2014, certain provisions of Canada’s Anti-Spam legislation (“CASL”) will come into force and govern how businesses can communicate with Canadian recipients. Given its scope, CASL is considered to be one of the most stringent commercial electronic messaging laws in the...
|Can A GPS Result In TMI?|
Sally F. Barron; Fisher & Phillips LLP;
May 8, 2014, previously published on May 5, 2014The answer is “yes” ¿ tracking employees by using Global Positioning Systems (GPS) can give an employer too much information (TMI). Surreptitious Surveillance
|White House Issues Two Big Data Reports; Florida Legislature Passes Revamped Breach Notification Law|
Chanley T. Howell, James R. Kalyvas, Steven M. Millendorf, Michael R. Overly; Foley & Lardner LLP;
May 6, 2014, previously published on May 2, 2014Yesterday, May 1, was a big day for privacy in the news. The White House issued 2 reports on the privacy implications of Big Data, and the Florida legislature overhauled the state’s security breach notification law, strengthening and adding several new requirements relating to data security...
|FCC Evaluating Proposals for IP Transition Trials|
Lawrence R. Freedman, Arthur H. Harding, Ari Z. Moskowitz; Edwards Wildman Palmer LLP;
May 2, 2014, previously published on April 29, 2014Since inviting proposals for IP transition trials at its January meeting, the FCC has thus far received two proposals - one from AT&T involving two locations and one from Iowa Network Services involving transitioning Centralized Equal Access ("CEA") service from TDM to IP.
|On Net Neutrality Planning Based on the Definition of "Telecommunications Services"|
Sean Liu; Lee Tsai Partners Attorneys-at-Law;
April 30, 2014On Net Neutrality Planning Based on the Definition of "Telecommunications Services"
|FCC Eliminates Foreign Competition Test for Certain International Telecommunications Authorization Applications|
Ernest C. Cooper, Benjamin J. Griffin; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
April 28, 2014, previously published on April 24, 2014In an order released on April 22, 2014, the Federal Communications Commission eliminated its longstanding requirement that certain applications for authorization to provide international telecommunications services or for international cable landing licenses must pass an effective competitive...
|FCC to Propose New Net Neutrality Rules at May Meeting|
Seth A. Davidson, Lawrence R. Freedman, Craig A. Gilley, Arthur H. Harding, Ari Z. Moskowitz; Edwards Wildman Palmer LLP;
April 28, 2014, previously published on April 2014In response to widespread press reports that the FCC was preparing to adopt new network neutrality rules that would, among other things, allow “edge providers” (including companies such as Disney, Google or Netflix) to pay Internet service providers for special, faster lanes to send...
|Wisconsin Limits Employers’ Access to Personal Social Media Accounts of Employees, Job Applicants|
Jackson Lewis P.C.;
April 24, 2014, previously published on April 17, 2014Adopting restrictions on employers’ ability to access the social media accounts of employees and job applicants, Wisconsin has joined 12 other states with similar restrictions.
|The Heartbleed Bug: Data Breach and Liability Risks|
Richard J. Johnson, Mauricio F. Paez, Gregory P. Silberman; Jones Day;
April 24, 2014, previously published on April 2014It seems that every other day we learn about a new data security threat or compromise. The so-called "heartbleed bug," or CVE-2014-0160 for those technically inclined, is the latest reported data security vulnerability, and it requires an immediate and swift response. The bug was recently...
|Healthcare Organizations Can Take Steps to Mitigate Heartbleed Impact|
Peter J. Enko, Deborah H. Juhnke, Wakaba Y. Tessier; Husch Blackwell LLP;
April 24, 2014, previously published on April 15, 2014Because the healthcare community relies upon encryption to safeguard e-Protected Health Information (ePHI), vulnerability to the underlying security of any encryption code is potentially devastating.