12 Days of Regulatory Insights: Day 2 – AI Under Scrutiny — Regulatory Oversight Podcast
Hosted Payload S2.E1: Caroline Van Wie/Working Girl
Hosted Payload Episode 12: Mike Carlson / Spaceman
Hosted Payload Episode 11: Erin Boone/Interstellar
A Deep Dive Into Broadband Equity, Access, and Deployment With Scott D. Woods — TAG Infrastructure Talks Podcast
Hosted Payload Episode 10: Jeanine Poltronieri/For All Mankind (Season 1)
Hosted Payload Episode 7: Wiley All-Stars / Starship Troopers
Hosted Payload Episode 6
[Podcast] Hosted Payload Episode 4
[Podcast] Hosted Payload Episode 3
The Business and Legal Case for EMCs and Broadband - TAG Infrastructure Talks Podcast
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
Corruption, Crime, and Compliance - A Deep Dive into KT Corp's SEC Settlement for FCPA Violations
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Investing in Colombia: Infrastructure Trends and 5G Concessions
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Navigating Section 889 of the 2019 National Defense Authorization Act
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
The volume of “documents” relevant to litigation and government investigations has exploded due to electronic data, leading to a significant shift in the discovery process. What once required a trip to a client’s filing...more
We live in an era of ‘big data.’ According to the International Telecommunications Union, more than three-quarters of the world’s population own a mobile phone. The same statistics apply for computer and internet use....more
Are emojis legally binding? Can they be used as evidence in court? The answer is complicated....more
EDRM Ripped From the Headlines Webinar Series: In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the Practice at the University of Maryland and James and Jack Dever, cyber attorneys...more
Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more
Governments are increasingly seeking to leverage consumer geolocation and other mobile device data to assist with fighting the spread of COVID-19, as cases continue to mount globally. Location data can be of significant...more
More than 26 million custom emoji have been created in Slack and the use of emoji in Teams is universal, revolutionizing the way we communicate. Some employees can have entire discussion with emoji, and it takes just one...more
What starts online won't stop there - There aren't many college basketball games that change the share price of a Fortune 100 company. But in February 2019, Duke University freshman star Zion Williamson blew out one of his...more
How are you preserving emojis for ediscovery? Hold on just a minute. Do people really use emojis in a business setting? You bet, though not everyone is on board. But now that offices are more dispersed than ever—and...more
Times are a-changing! Back in the day (pre-2013), email dominated business communications. It was simply the standard. Fast forward to today, the shift to collaboration applications like Slack, Microsoft Teams, and others has...more
Eric Goldman, an Internet law professor, gives us an overview of emoji law, including the pros—more precise and nuanced communication—and the cons—more ambiguity and room for misinterpretation. Eric Goldman is a Professor at...more
Seyfarth Synopsis: A case out of the District of Oregon recently dismissed a Plaintiff’s sexual harassment and retaliation claims where the allegations relied on manufactured text messages that Plaintiff failed to produce. ...more
A recent post to this blog titled You’ve Got (E-)Mail! Can Your Survivors Access It After Your Death?, discussed New York’s recently-enacted digital assets legislation, and Surrogate Mella’s decision in Matter of Serrano,...more
On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more
Data security seems to make headlines nearly every week, but last Friday, a new player entered the ring. The Federal Communications Commission (“FCC”) took its first foray into the regulation of data security, an area that...more