This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
This week in Washington IP news, in the Senate, the Commerce Committee will hold an executive session to debate the Next Generation Telecommunications Act and a hearing focused on actions Congress can take to secure critical supply chains in semiconductors. Japan cooperation in key areas of emerging technology.
The European Union is considering a new regulatory regime for the licensing and litigation of standard essential patents (SEPs) that will destabilize the global telecommunications market.
In 2001, six years before the iPhone appeared, a futurist named Ray Kurzweil wrote that humankind would cram 20,000 years of technological progress into the century that had just begun.
This week in Washington IP news, the Senate Science Committee convenes an executive session on Wednesday to deliberate over a pair of bills that would direct the Federal Communications Commission’s activities on establishing universal telecommunications services.
focusing, in particular, on the CAFCs findings regarding interpretation and performance of the contractual obligation associated with the licensing declaration utilized by the European Telecommunications Standards Institute (ETSI) as set forth in the ETSI IPR Policy. Lenovo (United States), Inc.
The venue, rebranded as The O2 in 2005 after the telecommunications company acquired naming rights, opened in 2007 and quickly ascended to global prominence. Workshops and keynotes will focus on tangible strategies to integrate emerging technologies, from document automation to AI-driven litigation analytics.
Vidal affirming the Patent Trial and Appeal Board’s (PTAB) invalidation of several patent claims to technologies for managing access to telecommunications networks. Court of Appeals for the Federal Circuit on Monday, December 2, issued a ruling in Koninklijke KPN N.V.
Within the next few years, the city of Newark, NJ, will be the home of a museum properly paying homage to the historic contributions that these inventors have made to medical science, telecommunications, transportation and more.
Editor’s Note: AT&T’s $13 million settlement with the Federal Communications Commission (FCC) following a significant data breach in January 2023 highlights the ongoing cybersecurity challenges faced by telecommunications giants. This breach, which exposed the personal data of 8.9
Industry News – Cybersecurity Beat AT&T Faces Major Cybersecurity Breach Affecting Over 100 Million Customers ComplexDiscovery Staff In a significant cybersecurity incident, AT&T, the Dallas-based telecommunications giant, has disclosed a data breach impacting the call and text records of more than 100 million of its customers.
Although the technology has changed since Larry’s early days in IT, his real-world experience in IT project delivery gives him a unique perspective and insight into his clients’ businesses, and enables him to offer a blend of legal experience and business strategy to complement corporate management.”.
The England and Wales Court of Appeal this morning said that Optis Cellular Technology is entitled to an injunction before a lower court has set fair, reasonable and non-discriminatory (FRAND) terms for a license to Optis’ standard essential patents (SEPs) if Apple refuses to take a court-determined FRAND license.
Unique Considerations for Patenting Inventions Practiced in Outer Space Illustration by Sierra McWilliams BY KATE MEAD Since the 1980s, outer space has developed into a significant destination for commercial technologies. patent holders, the combination of these laws enables enforcement over many space technologies. patent system.
The Kremlin’s aggressive efforts to control the domestic narrative, including new telecommunications restrictions and the suppression of independent media, reflect a deepening authoritarian grip aimed at shaping public perception and stifling dissent.
This policy is likened to the telecommunications industry’s mobile number portability, breaking down barriers and enabling consumers to switch providers while retaining their financial history. Large-scale financial technology companies must comply by 2026, while smaller entities have until 2030. financial system.
Editor’s Note: The severing of critical undersea telecommunications cables in the Baltic Sea represents a stark reminder of the vulnerabilities inherent in modern infrastructure amidst growing geopolitical tensions.
Editor’s Note: The recent data breach at Free, one of France’s major telecommunications providers, highlights an unsettling vulnerability in the digital security landscape, even within heavily regulated industries. Affecting up to 19.2
Industry News – Cybersecurity Beat How CISA’s FOCAL Plan Addresses Federal Cybersecurity Gaps ComplexDiscovery Staff The rapid advancement of AI-driven technology has transformed industries worldwide, creating new challenges for cybersecurity frameworks and regulatory measures.
The corporate world, especially those involved in digital technology and telecommunications, must be adept in navigating these complicated terrains, ensuring that they comply with local laws while safeguarding the rights of their users. As digital governance becomes increasingly complex, understanding these dynamics is critical.
In this Part II, we consider the language of a specific licensing commitment made to European Telecommunications Standards Institute (ETSI), and various legal pronouncements that have been made in relation thereto.
Editor’s Note: Telecommunications giants face ever-evolving cybersecurity challenges as cybercriminals target their vast and critical infrastructure. Telefnicas status as a leading telecommunications provider with operations in countries such as Spain, Germany, the United Kingdom, and Brazil magnifies the breach’s impact.
A recent decision out of the Eastern District of Texas sheds further light on Judge Rodney Gilstrap’s interpretation of a patent owner’s commitment to the European Telecommunications Standards Institute (ETSI) pursuant to ETSI’s Intellectual Property Rights Information Statement and Licensing Declaration (“the ETSI Licensing Declaration”).
of the European Telecommunications Standards Institute’s (ETSI) Intellectual Property Rights (IPR) Policy, and (ii) the impact this has on the enforceability of a patent subject to the Policy. Both decisions were in the ongoing patent and fair, reasonable, and non-discriminatory (FRAND) related litigations between Optis and Apple.
Senate Judiciary subcommittee overseeing technology issues will hold a hearing Tuesday on Chinese hacking incidents, including a recent incident involving American telecom companies. The hearing to be chaired by Senator Richard Blumenthal will review the threats “Chinese hacking …
In Part II of this series, we considered the language of a specific licensing commitment made to European Telecommunications Standards Institute (ETSI) and the prevailing law relating thereto.
Cryptography: A Pillar of Cybersecurity Cryptographic technologies provide fundamental security properties, including confidentiality, integrity, authentication, and non-repudiation. Regulators and policymakers : Bodies responsible for establishing and enforcing regulations, guidelines, and standards related to cryptographic technologies.
willfully infringed upon a pair of cellular telecommunications patents. On October 16, a jury verdict entered in the District of Delaware awarded $9 million to 3G Licensing, a subsidiary of European patent pool operator Sisvel, after finding that Taiwanese consumer electronics company HTC Corp.
For cybersecurity, information governance, and eDiscovery professionals, this issue highlights the intersection of geopolitics, advanced technologies, and policy frameworks. This funding will be used to bolster electronic surveillance, improve telecommunications networks, and deploy advanced detection technologies.
Editor’s Note: The disruption of the Estlink 2 electricity cable between Finland and Estonia has illuminated a critical vulnerability in the Baltic Sea’s undersea infrastructure, which is essential not only for regional energy transmission but also for global telecommunications and data flows.
This article unpacks how Nokia leveraged its IP portfolio to challenge Amazons use of video streaming and cloud technologies, leading to a wave of litigation. At stake were technologies foundational to modern data centers: network virtualization tools from Nokias Nuage Networks and security protocols embedded in its CloudBand software.
A network of power cables and telecommunications lines weave through its depths, including notable conduits like the Estlink 2, a power cable uniting Estonia and Finland, and high-capacity fiber-optic links such as the one between Latvia and Sweden. NATO’s response has been both swift and substantial.
Industry News – Cybersecurity Beat AT&T Repackaged Data Leak 2025: New Risks from Old Breaches ComplexDiscovery Staff In June 2025, the cybersecurity and legal technology sectors were jolted by the re-emergence of a massive trove of AT&T customer data on dark web forums.
This month’s edition delves into the rapidly evolving domains of AI, digital security, and data governance—areas where technological advancements bring both opportunities and significant challenges. Deepfake technology continues to emerge as one of the most significant threats to cybersecurity and governance professionals.
Nevertheless, as global connectivity surges, driven by technological advancements and burgeoning digital economies, the installation of new cables remains a priority for leading tech enterprises.
” Fraudulent activities extend beyond traditional scams, as cybercriminals increasingly leverage advanced technologies to deceive consumers. Continuous monitoring, innovative technological solutions, and informed legal strategies are instrumental in fortifying defenses and protecting both corporate and consumer interests.
The foundational technologies are already here. Instead, they will be networks of AI agents, governed by smart contracts and aligned with strategic frameworks. The only real question is how we will design this new future, before it designs us.
This is particularly useful in healthcare, finance, or technology. AI Prompt for Case Law Research [Identify and summarize all precedent cases concerning breach of contract in the telecommunications sector within the last 10 years.] AI Prompt for Regulation Updates [Summarize recent changes in U.S.
This comprehensive review offers critical insight into the global regulatory and security response to advanced AI technology. These actions, taken in a relatively short timeframe, reflect the urgency among authorities to address the implications of deploying advanced AI technologies without fully verified security measures.
Covering incidents across Australia, New Zealand, North America, and Europe, the report delivers insights rooted in active response to breaches spanning industries such as healthcare, education, telecommunications, and finance. News Sources CyberCX. Digital Forensics and Incident Response 2025 Threat Report.
For professionals in cybersecurity, information governance, and eDiscovery, this report offers critical insights into the evolving threat landscape, policy responses, and emerging technologies that are reshaping the industry. This report is essential reading for those navigating the intersection of technology, regulation, and security.
According to section 454B of the Telecommunications Act 1997 (Cth), “Determination of a person as the numbering scheme manager does not confer any property rights in numbers used in connection with the supply of carriage services in Australia.”. Were the Disputed Numbers property? Other WIPO cases. 1300 Directory Pty Ltd.
Or, as defined by the statute , “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system” held by third-party technology providers. Examples: Email providers (e.g.,
This breach targeted telecommunications networks, compromising sensitive communications and data associated with high-profile political figures and governmental activities. Telecommunication Systems Compromised by Chinese Hackers ComplexDiscovery Staff In a revelation carrying significant implications for national security, U.S.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content