Search Results (2433)
Documents on communications law
Show: results per page
|If They Could Be All You Wanted: The FCC Gets Serious About Small Cells|
J. Aaron George, Douglas A. "Drew" Svor, Dave Thomas; Sheppard, Mullin, Richter & Hampton LLP;
February 5, 2015, previously published on October 28, 2014Say what you will about inside-the-Beltway leadership vacuums, political gridlock and the indecipherable output from the grey, grinding gears of our government agencies, but once in a while Washington actually gets it right. Or mostly right.
|ITC Institutes Investigation (337-TA-942) Regarding Certain Wireless Devices, Including Mobile Phones And Tablets III|
Eric W. Schweibenz; Oblon, McClelland, Maier & Neustadt, L.L.P.;
February 4, 2015, previously published on December 26, 2014On December 23, 2014, the U.S. International Trade Commission ("Commission") issued a press release announcing their vote to institute an investigation of Certain Wireless Devices, Including Mobile Phones And Tablets III (Inv. No. 337-TA-942).
|Protective Order Can Limit Disclosure of Company’s Non-Public Information in Employment Dispute|
Joseph J. Lazzarotti; Jackson Lewis P.C.;
February 3, 2015, previously published on November 13, 2014When involved in litigation, a company's non-public information, such as trade secrets, can be prevented from becoming public information by a court-granted protective order. While a blanket protection is unlikely to be granted by a court, early consideration of information potentially sought by a...
|Does the Secret Service Need a BYOD Policy? Addressing Personal Device Usage in the Workplace|
V. John Ella; Jackson Lewis P.C.;
February 3, 2015, previously published on November 14, 2014According to a November 13, 2014 article in the New York Times (based on a review by the Department of Homeland Security), an intruder was able to enter the White House back in September due to a succession of performance, organizational, and technical failures. One of the specific findings was...
|CRTC Concludes First Enforcement Under Canada’s New Anti-Spam Legislation|
Arnold Fridhandler, Graeme S. Harrison; Bennett Jones LLP;
January 20, 2015, previously published on October 14, 2014On October 7, 2014, the Canadian Radio-television and Telecommunications Commission (CRTC) announced the conclusion of its first investigation and enforcement action under Canada’s Anti-Spam Legislation (CASL) since coming into force on July 1, 2014.
|FDA to Hold Webinar on Cybersecurity in Medical Devices Guidance|
Mark A. McAndrew; Taft Stettinius & Hollister LLP;
January 16, 2015, previously published on October 28, 2014On Oct. 29, 2014, the United States Food and Drug Administration (FDA) will hold a webinar on its Final Guidance “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.” According to the FDA, the webinar seeks to explain the guidance and provide a forum for...
|The Most Hackable Month of the Year: Steps Companies Can Take to Protect Themselves from Data Breaches|
Kirsten Thompson; McCarthy Tétrault LLP;
January 16, 2015, previously published on November 28, 2014In a few short days it will be Cyber Monday, the kickoff to the financial madness that is the holiday shopping season. For cybercriminals and fraudsters, December represents the mother lode of hackable data.
|Risky Business: BLG Sees Cyber Risks Underlining Challenges to Canadian Businesses|
Eusis Dougan-McKenzie; Borden Ladner Gervais LLP;
January 16, 2015, previously published on December 16, 2014Toronto (December 16, 2014) — Cyber risks will be a dominant issue for Canadian businesses in 2015, according to Borden Ladner Gervais LLP (BLG) in its 2015 Top 10 Business Risks report. Following a Statistics Canada report that 14 per cent of large enterprises experienced an Internet...
|The Business of Cybercrime : Active Defense Against Hackers|
John M. Westercamp; Bose McKinney & Evans LLP;
January 16, 2015, previously published on November 14, 2014Experts estimate the economic costs of cybercrime are between $250 billion and $1 trillion a year. While the most public forms of cybersecurity breaches are data breaches similar to the Home Depot and Target incidents, much of the costs are driven by economic espionage. The most potent threats in...
|On the First Day of Privacy, the EU Gave to Santa......|
Susan L. Foster; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
January 16, 2015, previously published on December 9, 2014If your company doesn’t have an office in the EU, but collects or receives personal data from the EU in the course of running its business, it can be a bit tricky to determine whether or not EU Data Protection laws apply to you. The new Data Protection Regulation, expected sometime in 2015,...