Search Results (2615)
Documents on communications law
Show: results per page
|Lyft Gets Cited by FCC for Robo-Texting|
Paul D. Abbott; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
September 18, 2015, previously published on September 15, 2015Companies that require customers to agree to receive autodialed marketing calls and text messages as a condition for using the companies’ services have been put on notice that they may be in violation of the Telephone Consumer Protection Act (“TCPA”). Last week, the Federal...
|New rules governing communications with certain Mexican government officials|
Nicolas Borda, Hugo López Coll, Hector D. Sanchez Fernandez; Greenberg Traurig, S.C.;
September 8, 2015, previously published on September 8, 2015This GT Alert provides information regarding the publication of the General Guidelines for government officials that participate in government contracts and issuance of licenses, permits, authorizations and concessions.
|Clarifications Published on Russia's Personal Data Localization Law|
Allison S. Khaskelis, Maxim A. Voltchenko; Duane Morris LLP;
September 7, 2015, previously published on September 2, 2015On August 3, 2015, the Russian Ministry of Communications and Mass Media (commonly referred to as "Minsviaz") published detailed-and the only written-guidelines clarifying the new personal data localization requirements implemented by the Amendments to the Personal Data Law, signed...
|Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)|
Melissa K. Ventrone, Aleksandra M. S. Vold; Wilson Elser Moskowitz Edelman & Dicker LLP;
September 2, 2015, previously published on September 1, 2015The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of companies under the “unfair” prong of section 5 of the FTC Act. In...
|5 Deadly Sins Cyber Criminals Know About Law Firm Security|
Brent Cantrell, Fred Cobb, Justin Joy, William Kunkel; Lewis, Thomason, King, Krieg & Waldrop, P.C.;
September 2, 2015, previously published on August 2015Nearly every day we hear news of some new, large-scale cyber hack. For instance, the recent OPM database hack compromised personal information for over 21 million past and current federal employees and contractors. This attack, along with those on Target, Home Depot and several large insurance...
|Third Circuit Affirms the FTC's Authority to Regulate and Enforce Data Security|
Richard J. (Jay) Johnson, Todd S. McClelland, Daniel J. (Dan) McLoon, Michael G. (Mike) Morgan, Jeff Rabkin; Jones Day;
September 1, 2015, previously published on August 2015In FTC v. Wyndham Worldwide Corp., No 14-3514, -- F.3d-- (3d Cir. Aug. 24, 2015), the Third Circuit issued an important decision affirming a United States District Court of New Jersey ruling that the Federal Trade Commission ("FTC") has authority under Section 5 of the Federal Trade...
|NIST Publishes Cybersecurity Standards Objectives|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
August 25, 2015, previously published on August 24, 2015The National Institute of Standards and Technology has published a draft of its objectives for cybersecurity standardization, following in many ways the consultative model that it used successfully in drafting the NIST Framework for critical infrastructure cybersecurity.
|U.S. Court of Appeals Upholds FTC’s Authority to Regulate Cybersecurity|
Sutherland Asbill Brennan LLP;
August 25, 2015, previously published on August 24, 2015Today, the United States Court of Appeals for Third Circuit issued its opinion in FTC v. Wyndham Worldwide Corp. upholding the authority of the Federal Trade Commission to regulate corporate cybersecurity under Section 5(a) of the Federal Trade Commission Act, which prohibits businesses from...
|FTC Safe Harbor Actions|
Ieuan Jolly; Loeb & Loeb LLP;
August 25, 2015, previously published on August 2015While the U.S.-EU “Safe Harbor” Framework for transferring data into the United States is hardly new — it was approved 15 years ago — the Federal Trade Commission has recently focused its enforcement efforts on companies that inaccurately represent their certification under...
|A Recent FCC Order May Require Financial Institutions and Healthcare Providers to Put Robocalls to Wireless Phone Numbers on Hold|
Mitchell F. Brecher, Debra McGuire Mercer; Greenberg Traurig, LLP;
August 14, 2015, previously published on August 13, 2015A recent Federal Communications Commission (FCC) Order issued July 10, 2015, (Robocall Order) clarifies several provisions in the Telephone Consumer Protection Act (TCPA) (47 U.S.C. § 227) and the FCC’s implementing regulations (47 C.F.R. § 64.1200). Those laws provide that an...