Text Size   Decrease Font SizeIncrease Font Size

The PT Law Blog

The FAA Reauthorization Act 2016: The Future of Drone Regulations

PDF Print
Privacy, Data Protection and Security
Tuesday, 03 May 2016 17:55

By: Cara Di Silvio

UnknownOn April 19, the Federal Aviation Administration Reauthorization Act of 2016 passed in the Senate, by a vote of 95-3. Originally the bill was introduced as S.2658 and later merged with H.R.636, an unrelated House bill. The legislation reauthorizes the FAA through 2017 and, ultimately, reinforces the FAA’s authority over drone regulation.

So far this year, over 40 state legislatures have debated bills related to Unmanned Aircraft Systems (UAS); however, the FAA Reauthorization Act, makes clear that no state can enact laws related to UAS “design, manufacture, testing, licensing, registration, certification, operation, or maintenance of an unmanned aircraft system, including airspace, altitude, flight paths, equipment or technology requirements, purpose of operations, and pilot, operator, and observer qualifications, training, and certification.” The recreational drone safety provisions passed in April remain similar to those in the Consumer Drone Safety Act introduced in 2015. 

Read more... [The FAA Reauthorization Act 2016: The Future of Drone Regulations]

The Drone Debate

PDF Print
Privacy, Data Protection and Security
Tuesday, 12 April 2016 13:48

By: Cara Di Silvio


Recently, there has been a steady increase in news coverage of anything and everything drone. Headlines claiming an overlap in regulations and questions of necessity of legislation have sparked an interest among consumers, civilians and government-related communities alike.

The debate over airspace control has been brought up on the Senate floor as lawmakers look into the scope of consumer drone regulation. However Congress has decided to postpone any decision on FAA Reauthorization proposals until later this summer. Unmanned aircraft technology and consumer use has evolved immensely over a short span of time. These infinitely fast changes have reached a point in regulatory law, in which guidelines are now necessary as we are faced with safety and privacy concerns.

With estimates of nearly 400,000 Unmanned Aircraft Systems (“UAS”) registered with the FAA since December of last year, it seems that lawmakers are now going to have to address the situation head on.1

Read more... [The Drone Debate]

The Elephant in the Room: Accountability and Consequences in Obtaining Encrypted Data

PDF Print
Privacy, Data Protection and Security
Monday, 04 April 2016 14:56

By: Arthur M. Freyre

The House Judiciary Committee, prior to the Easter recess, announced that they are forming a working group to further investigate encryption issues and the challenges they may pose on law enforcement’s ability to protect the American people. The formation of this group is an encouraging start in finding an adequate balance between innovation and security but how they will go about addressing the encryption debate is one that needs to be seen. This latest move by the House Committee follows not only the FBI-Apple debate but also the introduction of various bills to State legislations that would require all smartphones manufactured and sold to be decryptable.   

Read more... [The Elephant in the Room: Accountability and Consequences in Obtaining Encrypted Data]

Apple vs. FBI

PDF Print
Privacy, Data Protection and Security
Tuesday, 23 February 2016 18:22

By. Arthur M. Freyre

Apple v FBI

The debate over encryption took an interesting turn this past week. The federal government obtained a warrant directing Apple to assist in obtaining information from the iPhone of one of the San Bernardino terrorists. In response, on Monday, Apple has urged the government to withdraw its court order.

The problem at hand is that the iPhone has an auto erase program. The auto erase program will be activated after ten unsuccessful attempts to access the iPhone. No one knows if the program has been activated or not. However, in an abundance of caution the government filed a petition ordering Apple to assist the government. The court agreed with the government’s position and issued the order.

Read more... [Apple vs. FBI]

Regulatory Humility

PDF Print
Privacy, Data Protection and Security
Monday, 01 February 2016 16:00

By: Arthur M. Freyre 


The widespread use of encryption technology was one of the major topics trending in technological discussions for 2015. Encryption technology allows a user to protect confidential conversations or information on designated computers by disguising the information into code. This technology safeguards protected data from external parties by making it very difficult for a person to access information, if they do not have an encryption key.

Without an encryption key, those that attempt to access these files without authorization, or hackers, see illegible characters and gibberish on their computer screen. An encryption key utilizes a program that allows the user not only to conceal their information, but also allows authorized access to view protected files. Companies are beginning to use encryption technology as a standard defense against hackers because of this advantage.

Read more... [Regulatory Humility]

A Valuable Lesson From the OPM Breach

PDF Print
Privacy, Data Protection and Security
Thursday, 03 December 2015 20:56

By: Arthur M. Freyre

National Journal recently posted an article titled, “OPM Just Now Figured Out How Much Data It Owns”. The article states that the months after its system was breached, the Office of Personnel Management was able to conduct an inventory of the information that the agency had in its network. Although, it is easy to say that this is an example of a bad management, the fact is that many companies do not know what information they have stored in their computers, or even the content of the stored information.

Read more... [A Valuable Lesson From the OPM Breach]

Data Security and Presidential Campaigns

PDF Print
Privacy, Data Protection and Security
Thursday, 12 November 2015 16:55

By Arthur M. Freyre

The 2016 presidential campaign will be kicking into high gear in the upcoming months. As the primaries begin in earnest in Iowa and New Hampshire, you can expect emails and phone call solicitations asking not only for your time, but also your money. But have you ever wondered how safe is the information you are providing a campaign online?

Read more... [Data Security and Presidential Campaigns]

Can Cuba Afford to Pay?

PDF Print
International Claims
Tuesday, 27 October 2015 19:02

By Mauricio Tamargo

There are Certain Cuba policy advocates and lobbyists in Washington, DC that are in a hurry to normalize trade relations with Cuba. One of the things that we keep hearing repeatedly from these people is that American certified claimants need to settle for pennies on the dollar because Cuba does not have the money to pay. 

Well, that is just not true and those who keep repeating that misinformation are undercutting our State Department’s negotiating team who are trying to get the best deal they can for the American claimants. Here are a few facts which give us a good indication of Cuba’s ability to pay the $8 billion debt represented by the 5,913 certified claims.

Read more... [Can Cuba Afford to Pay?]

Cyber Security Month

PDF Print
Privacy, Data Protection and Security
Monday, 05 October 2015 13:09

By: Arthur M. Freyre

The White House issued a proclamation setting aside October as Cyber Security month. How businesses and governments protect personal information affects all of us. As we depend on technology such as smart phones and laptops, the data that you transmit will become vulnerable to hackers, if you are not proactive.

Read more... [Cyber Security Month]

Congressman Jeff Duncan Urges US Delegation to UN to Uphold US Sovereign Law

PDF Print E-mail
International Claims
Wednesday, 23 September 2015 18:30

By: Cara E. Di Silvio

Western Hemisphere Subcommittee Chairman Congressman Jeff Duncan (R-SC) urged Ambassaador Samantha Power, the U.S. Ambassador to the United Nations, to defend U.S. sovereignty and interests at the United Nations with respect to an upcoming vote on Cuba:

"the U.S. delegation to the United Nations may abdicate its sovereign responsibility to uphold and defend U.S. interests as enshrined in U.S. law by abstaining, instead of voting against, on a resolution demanding the end of U.S.-Cuba embargo as outlined in the Cuban Liberty and Democratic Solidarity Act of 1996 (Libertad/Helms-Burton)."

Read more... [Congressman Jeff Duncan Urges US Delegation to UN to Uphold US Sovereign Law]
<< Start < 1 3 5 6 7 8 9 10 > End >>

Page 3 of 13

Social Media

Twitter2Facebook2LinkedIn2 YouTube Icon 

Newsletter Sign-Up

Fill out my online form.


Recent News

Mr. Tomeu Vadell, American Hostage in Venezuela for Two Years

Mr. Tomeu Vadell, American Hostage in Venezuela for Two Years Joint Statement by Mr. Vadells’ Counsel Two years ago a few days ... [More]

UPDATE 25- On Fourth Anniversary of Nizar Zakka's Abduction

Open Letter from Nizar Zakka, Former Iran Hostage, On the Fourth Anniversary of his Abduction On this day four years ago, k... [More]

©2018 PobleteTamargo LLP
Attorney Website by The Modern Firm