12 Days of Regulatory Insights: Day 2 – AI Under Scrutiny — Regulatory Oversight Podcast
Hosted Payload S2.E1: Caroline Van Wie/Working Girl
Hosted Payload Episode 12: Mike Carlson / Spaceman
Hosted Payload Episode 11: Erin Boone/Interstellar
A Deep Dive Into Broadband Equity, Access, and Deployment With Scott D. Woods — TAG Infrastructure Talks Podcast
Hosted Payload Episode 10: Jeanine Poltronieri/For All Mankind (Season 1)
Hosted Payload Episode 7: Wiley All-Stars / Starship Troopers
Hosted Payload Episode 6
[Podcast] Hosted Payload Episode 4
[Podcast] Hosted Payload Episode 3
The Business and Legal Case for EMCs and Broadband - TAG Infrastructure Talks Podcast
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
Corruption, Crime, and Compliance - A Deep Dive into KT Corp's SEC Settlement for FCPA Violations
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Investing in Colombia: Infrastructure Trends and 5G Concessions
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Navigating Section 889 of the 2019 National Defense Authorization Act
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
The wireless industry has revolutionized the way we connect, from facilitating teleworking, distance learning, and telemedicine to allowing the American public to interact virtually in almost all other aspects of their daily...more
Ahead of his inauguration at the end of January, President-elect Donald Trump announced that Damac Properties, controlled by Emirati billionaire Hussain Sajwani, will make at least a $20 billion investment to build data...more
On December 4, 2024, four of the five members of the Five Eyes intelligence-sharing group (the United States, Australia, Canada, and New Zealand) law enforcement and cyber security agencies (Agencies) published a joint guide...more
Carriers have an obligation to protect customer proprietary network information (CPNI) and personally identifiable information (PI). Several recent FCC consent decrees resolving breaches of CPNI and PI show the FCC will hold...more
Close on the heels of its Consent Decrees with TracFone and AT&T, on September 27, 2024, the Enforcement Bureau of the Federal Communications Commission (FCC) announced that it reached a Consent Decree with T-Mobile US, Inc....more
Last week, the Federal Communications Commission (FCC) released a $13 million settlement with AT&T that concluded an investigation into a third-party data breach that exposed AT&T customer data. This is the latest in a series...more
TracFone, the pre-paid phone company, recently settled with the FCC over allegations that the company failed to protect customer information during three different data incidents. According to the FCC, in each of the...more
As the FCC continues to exercise close oversight of the use of Customer Proprietary Network Information (“CPNI”), telecom stakeholders should also be sensitive to potential data security obligations under any relevant...more
On December 21, 2023, the Federal Communications Commission released an order updating its data breach rules. These updated rules require telecommunications providers to report breaches of customer proprietary network...more
The Department for Digital, Culture, Media & Sports (DCMS) confirmed on August 30, 2022, that it will push forward with tough new regulations and a code of practice to bolster the security and resilience of the United...more
Gain critical strategies for managing reviews in the new Team Telecom environment. The American Conference Institute’s 2nd National Team Telecom Conference will take place in Washington D.C. on April 25, 2022, one day...more
The Federal Communications Commission (“FCC”) circulated internally a Notice of Proposed Rulemaking (“NPRM”) last week that would, among other things, enable telecommunications carriers to report breaches to their customers...more
There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more
Mint Mobile notified a “small number” of customers last weekend that their personal information was compromised between June 8 and June 10, when a threat actor ported the phone numbers of those customers to another carrier...more
Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more
"Open the pod door, HAL" • Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity. • A report from NPR and Edison Research states...more
On January 20, 2017, businessman Donald J. Trump was sworn in as the 45th President of the United States following a contentious and unconventional 2016 presidential election. Republicans also successfully maintained control...more
The International Institute for Conflict Prevention and Resolution, a New York-based organisation offering Alternative Dispute Resolution (ADR) services, has recently announced the launch of a new specialised panel of...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
The Federal Communications Commission’s (FCC) Media Relations Office has released a statement announcing Chairman Pai’s intention to stay a data security rule adopted by the Commission late last year in its Broadband Privacy...more
Holland & Knight and the Word of Mouth Marketing Association (WOMMA) hosted a half-day forum that featured government officials discussing hot-button issues in consumer protection regulation and enforcement. Speakers at the...more
In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more
Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more
What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more
On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more