Search Results (1436)
Documents on Communications Law, Communications & Media
Show: results per page
|Simplifying Classroom Consent: the FTC’s Guidance on COPPA in Schools|
Matthew D. Lawless; Taft Stettinius & Hollister LLP;
March 27, 2015, previously published on January 29, 2015The Children’s Online Privacy Protection Act (“COPPA”) governs an online operator’s collection of personal information from children, i.e., those under 13 years of age. Generally, the act requires verifiable parental consent before an online operator may collect a...
|Telecom Business Alert - 911 Violation, 911 Outage Investigation Settled, Signal Booster Waiver, FirstNet Activities, FCC Continues to Go Green, and KH Attorney Authors Net Neutrality Article - Vol. XII, Issue 12|
C. Douglas Jarrett, Gregory E. Kunkle, Thomas B. Magee, Tracy P. Marshall, Jack Richards; Keller and Heckman LLP;
March 27, 2015, previously published on March 23, 2015Last week, the Commission ordered Hinton Telephone Company (Hinton) to pay a $100,000 penalty for failing to direct 911 calls to local first responders. In May 2013, the Commission received a complaint pertaining to Hinton’s 911 services. Upon further investigation, the Enforcement Bureau...
|OCIE Risk Alert on Cybersecurity: SEC’s Office of Compliance Inspections and Examinations Announces Findings from its Cybersecurity Examination Initiative|
Jay Clayton, John Evangelakos, Scott D. Miller, Nader A. Mousavi, Frederick Wertheim; Sullivan & Cromwell LLP;
March 27, 2015, previously published on February 5, 2015On February 3, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) published a Risk Alert summarizing findings from its Cybersecurity Examination Initiative relating to broker-dealers and investment advisers, which was announced in April 2014. A copy of the Risk...
|Data Breach Security: The Five Best Questions Every Organization Should Answer|
Diane D. Reynolds, William C. Wagner; Taft Stettinius & Hollister LLP;
March 27, 2015, previously published on January 6, 2015The news headline “Jimmy John’s Notifies Customers of Payment Card Security Incident” caught our attention because the credit and debit card information was stolen at 216 Jimmy John’s locations, some of which are in states where Taft has offices (Arizona, Illinois, Indiana,...
|Defamation in the Blogosphere: Baglow v Smith|
Roland Hung, Kevin Stenner; McCarthy Tétrault LLP;
March 26, 2015, previously published on March 9, 2015In introduction to Baglow v. Smith, 2015 ONSC 1175 [“Baglow”], an action for defamation involving political bloggers, Madam Justice Polowin described political debate in the Internet blogosphere as, “rude, aggressive, sarcastic, hyperbolic, insulting, caustic and/or vulgar.”...
|Privacy and Cyber Security: Summary of the Report from the Privacy Commissioner of Canada|
Roland Hung, Kevin Stenner; McCarthy Tétrault LLP;
March 26, 2015, previously published on March 4, 2015In December 2014, the Office of the Privacy Commissioner of Canada (the “Commissioner”) released a report entitled Privacy and Cyber Security: Emphasizing privacy protection in cyber security activities (the “Report”), examining the common interests and tensions between...
|International Hacking Ring Executes $1 Billion Banking Breach|
James J. Giszczak, Sara Hutchins Jodka, Dominic A. Paluzzi; McDonald Hopkins LLC;
March 25, 2015, previously published on February 16, 2015Kaspersky Lab, an Internet security firm, confirmed that an international hacking ring made up of hackers from Russia, Ukraine, China, and Europe stole as much as $1 billion from more than 100 banks in 30 countries, including the United States, in what could be one of the biggest banking breaches...
|White House Proposes National Data Breach Notification Standard|
Cynthia J. Larose, Ari Z. Moskowitz; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
March 25, 2015, previously published on January 14, 2015This has been a big week for cybersecurity announcements from Washington. In what the White House has called a series of “SOTU Spoilers,” President Obama announced his intention to follow through on some of the recommendations in his administration’s Big Data report - the...
|Healthcare Home Monitoring Company Avoids FCRA Liability Over Stolen Laptop|
Michael J. Zbiegien; Taft Stettinius & Hollister LLP;
March 25, 2015, previously published on December 1, 2014Theft or accidental loss of a laptop, thumb drive or other device is “[t]he single most common way that protected health information is compromised.” And while violating the Health Insurance Portability and Accountability Act’s Privacy and Security Rules can result in...
|Protect Your Business from Competitive Intelligence|
Zachary W. Behler, Samuel J. Frederick, Mindi M. Johnson, Iris K. Linder, John W. Mashni; Foster, Swift, Collins & Smith, P.C.;
March 25, 2015, previously published on January 7, 2015The term "competitive intelligence" is the process of legally gathering information about one's competitors to gain a strategic advantage in the marketplace. Large corporations will have strategic intelligence experts as a part of their marketing department. These experts specialize in...