30 September 2015
Wyndham Decision: FTC Can Sue Businesses For Getting Hacked
re: federal trade commission, cybersecurity, liability
source: Burning Down The House – The Wyndham Decision Allows The FTC To Sue Businesses For Getting Hacked | Fowler White Burnett, P.A. - JDSupra
29 September 2015
28 September 2015
India and US Joint Strategic and Commercial Dialogue, Internet Governance
Joint Press Conference with Commerce Secretary Penny Pritzker, Indian External Affairs Minister Sushma Swaraj, and Indian Minister of State for Commerce and Industry Nirmala Sitharaman: Remarks John Kerry Secretary of State Dean Acheson Room Washington, DC September 22, 2015: "... We spoke of India’s aspiration for greater participation in internet governance organizations such as ICANN and related bodies. We agreed to convene a track 1.5 program to further cooperation on internet and cyber issues in this regard. ..."
Remarks at the Joint Strategic and Commercial Dialogue Opening Plenary: US Secretary of State John Kerry remarks, in attendance: Minister Swaraj, Secretary Pritzker, Minister Sitharaman, Secretary Moniz, Minister Goyal, the members of both the Indian and the American delegations: "... And we’re also building an important and far-reaching partnership in the crucial area of Internet governance..."
more news links below (on mobile go to web version link below)
Follow @expvccom
Remarks at the Joint Strategic and Commercial Dialogue Opening Plenary: US Secretary of State John Kerry remarks, in attendance: Minister Swaraj, Secretary Pritzker, Minister Sitharaman, Secretary Moniz, Minister Goyal, the members of both the Indian and the American delegations: "... And we’re also building an important and far-reaching partnership in the crucial area of Internet governance..."
more news links below (on mobile go to web version link below)
Follow @expvccom
25 September 2015
24 September 2015
Ninth Circuit Court, Copyright, DMCA Takedown Notices, Fair Use
The Dancing Baby Grooves to Mixed Victory in the Ninth Circuit: Court Holds That DMCA Takedown Notices Require Consideration of Fair Use--
source: The Dancing Baby Grooves to Mixed Victory in the Ninth Circuit: Court Holds That DMCA Takedown Notices Require Consideration of Fair Use | Davis Wright Tremaine LLP - JDSupra
source: The Dancing Baby Grooves to Mixed Victory in the Ninth Circuit: Court Holds That DMCA Takedown Notices Require Consideration of Fair Use | Davis Wright Tremaine LLP - JDSupra
23 September 2015
22 September 2015
21 September 2015
Silicon Valley Venture Survey, Second Quarter 2015
source: Silicon Valley Venture Survey - Second Quarter 2015 | Fenwick & West LLP - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
18 September 2015
What Does It Take to Trademark Your Name?
source: What Does It Take to Trademark Your Name? - Tartell, M.D. v. South Florida Sinus and Allergy Center, Inc., et al. | McDermott Will & Emery - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
17 September 2015
The Internet and Google’s New Logo
source: Internet Loses it Over Google’s New Logo | Winthrop & Weinstine, P.A. - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
16 September 2015
Notice Your Trademarks and Copyrights
source: Do You Notice Your Trademarks and Copyrights? | Cullen and Dykman LLP - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
15 September 2015
Sixth Circuit, Design Separability, Uniform Graphics, Copyright
source: Sixth Circuit Tackles “Metaphysical Quandary” Of Design Separability: Rules That Cheerleader Uniform Graphics Are Protected By Copyright | Brooks Kushman P.C. - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
14 September 2015
Numbers, Phone Numbers, Numbering Resources, Internet of Things, IoT
Numbers, Phone Numbers, Numbering Resources, Internet of Things, IoT
source: Telephone Numbers – An infinitely available scarce resource | DLA Piper - JDSupra
11 September 2015
FTC as Data Security Cop Affirmed
source: FTC as Data Security Cop Affirmed | Kelley Drye & Warren LLP - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
10 September 2015
09 September 2015
08 September 2015
Life Sciences Brand Names, 5 Key Tips
source: Generating Life Sciences Brand Names: 5 Key Tips | DLA Piper - JDSupra
more news links below (on mobile go to web version link below)
Follow @expvccom
04 September 2015
Uber, Airbnb, Public Policy, Conflicting Interests
"... In general, social scientists recognize that different people and groups in society often have conflicting interests in how economic institutions are shaped. These interests are reconciled — if they are reconciled — through political institutions. Many social scientists thus look not so much at efficiencies but at political institutions to understand why economic institutions are shaped the way they are. For example, a democratic local government in principle represents the interests of its citizens, through political institutions such as council elections and public consultations. Local governments consequently try to strike a balance between the conflicting interests of hoteliers and their neighbours, by limiting hotel business to certain zones. In contrast, Airbnb as a for-profit business must cater to the interests of its customers, the would-be hoteliers and their guests. It has no mechanism, and more importantly, no mandate, to address on an equal footing the interests of third parties like customers’ neighbours. Perhaps because of this, 74% of Airbnb’s properties are not in the main hotel districts, but in ordinary residential blocks. That said, governments have their own challenges in producing fair and efficient economic institutions. Not least among these is the fact that government regulators are at a risk of capture by incumbent market participants, or at the very least they face the innovator’s dilemma: it is easier to craft rules that benefit the incumbents than rules that provide great but uncertain benefits to future market participants. For example, cities around the world operate taxi licensing systems, where only strictly limited numbers of license owners are allowed to operate taxicabs. Whatever benefits this system offers to customers in terms of quality assurance, among its biggest beneficiaries are the license owners, and among its losers the would-be drivers who are excluded from the market. Institutional insiders and outsiders have conflicting interests, and government political institutions are often such that it is easier for it to side with the insiders..."
Read more at: Uber and Airbnb make the rules now — but to whose benefit? | The Policy and Internet Blog
Read more at: Uber and Airbnb make the rules now — but to whose benefit? | The Policy and Internet Blog
03 September 2015
Dot-Com Era Over? OR Welcome to Dot-Anything?
source: The Dot-com Era Is Over, Welcome to .Anything | Lane Powell PC - Intellectual Property Law Blog - JDSupra
new gTLDs, domain names, top-level domains, ICANN
02 September 2015
US Ambassador at 7th Annual Summit on Cyber and Network Security
U.S. Ambassador Richard R. Verma’s Remarks at ASSOCHAM’s 7th Annual Summit on Cyber and Network Security - Ashok Hotel, New Delhi | August 26, 2015 (As Prepared for Delivery):
Good morning and thanks for the generous introduction. I’m delighted to be here and thank ASSOCHAM for the chance to speak to you on this important topic. Of course, the Internet today is part of just about everything we do. This digital age has opened countless windows of opportunity, to the great benefit of the U.S. and India. Both our societies and our economies have been enriched by the many advantages of greater connectivity; and I know this first hand, since I continue to marvel and how instantly connected I have felt to Indians of all ages since I have started my Twitter account. In fact just two weeks ago I visited Twitter’s India headquarters and took part in an online chat with a number of tech savvy Indians.
When we talk about digital technology, it is natural to think about potential risks, but it is the possibilities that should motivate us. From the campuses of Silicon Valley to the tech parks of Bangalore, our countries have emerged as leaders in the field of IT development. The Indian diaspora has played a particularly large role. Just two weeks ago Sundar Pichai, a native of Chennai, was named CEO of Google, one of America’s tech giants. He is one of countless similar examples. Indeed, when Prime Minister Modi visits California next month, he will be welcomed by a vibrant Indian-American community which, over the last two decades, has helped to transform the high-technology sector.
Similarly, here in India, technology has been integral in powering economic growth, whether it be through e-commerce, IT services, or product development. The Prime Minister’s “Digital India” initiative highlights India’s commitment to enhancing digital capacity, across a variety of sectors, bridging the divide between urban and rural communities. Secretary John Kerry also recently launched a new initiative to increase internet connectivity, in partnership with government, development banks, engineers, and industry leaders. I applaud these efforts, as broadening the reach of the Internet is a powerful way to promote global development. Every time a country increases its internet penetration by ten percent, its total economic growth can expand by up to two percent.
The Internet is part of the critical infrastructure that we have come to depend on. We use it in so many ways – as a communication tool, a marketplace, a forum for expressing new ideas. Digital technology promotes transparency and helps to hold governments accountable. It is a means to fight against repression, and protect human dignity. Yet we must ensure that cybersecurity tools are not inappropriately used to undermine these important benefits.
But, as transformative as the Internet is, there are risks. And the more reliant we become on the Internet, the greater those risks become. This means we need sound policies to protect this essential resource, as it is vital to advancing human progress in the 21st century. Therefore, promoting an open, secure, and reliable Internet is a key component of our economic policy.
Protecting the Internet cannot be the task of just one country, however, and requires cooperation between government, industry, academia, and every user. It is a shared resource, and thus its stewardship is a shared responsibility. The Internet has flourished because of the bottom-up, consensus-based process that allows multiple stakeholders to participate in its governance. Likewise, all stakeholders have a critical role in cybersecurity and cybercrime as well. The multistakeholder approach reaches beyond government and includes the private sector, civil society, academic institutions, and all internet users. Multistakeholder Internet governance has served us well thus far, and it is critical to broaden this approach to other areas of cyber policy because all institutions and users share a responsibility to keep the internet operating in a safe, secure, and reliable manner.
To that end, India’s recent decision to support the multistakeholder approach to internet governance is not only a win for India’s people, but an example of India’s ever-expanding role as a democratic world leader. We look forward to working closely with India and other partners to preserve the multistakeholder model, wherever it is challenged.
Of course, there are other, serious threats to the internet. As recent headlines have shown, cyber-attacks are a real and persistent concern. Internet misconduct has resulted in billions of dollars in economic damage. Criminal networks misuse the Internet to steal information and profit at the expense of private citizens, businesses, and governments. Extremist groups see it as a means to disseminate violent extremist propaganda and mislead youth into joining their causes. It is in our shared interest to seek collaborative solutions to these challenges.
We believe that the best defense is to promote what we call “international cyber stability.” This means we are seeking broad consensus on what constitutes responsible behavior in cyberspace. Our goal is to create a climate in which people everywhere are able to enjoy the benefits of the digital world. There is general consensus that the basic rules of international law apply in cyberspace, but there are a number of additional principles that should underpin countries’ behavior in cyberspace.
First, we posit that no country should support or conduct online activity that intentionally damages or impedes another country’s use.
Second, no country should seek to prevent emergency teams from responding to a security breach, or allow its own teams to cause harm.
Third, no country should engage in cyber-enabled theft of intellectual property, trade secrets, or other confidential information for commercial gain.
Fourth, every country should confront malicious cyber activity emanating from its soil. This includes the activities of extremist groups who seek to engage in criminal and terrorist behavior.
And finally, every country should do what it can to help states that are the victims of a cyber-attack.
Agreeing to and abiding by these principles would move us a long way towards ensuring a more secure cyberspace. In order to get there, however, we must work to improve our own and our partners’ capacity to protect against cyber threats. This includes a preventative component – through strong legal frameworks and improved training. It also means enhancing our capability to respond to threats, by improving the resiliency of our networks, and strengthening the relationships between our law enforcement communities.
Perhaps the greatest protection against such threats is the regular and substantive sharing of information on cyber threats, and stronger coordination in response to cyber-attacks and cybercrime. This is an area in which the United States and India continue to partner. We recently provided information on a high-profile hacking group operating from India, enabling our two countries to take concerted action against its threat. We are also engaged in efforts to improve the process through which other countries can obtain bank records and other forms of electronic evidence from the United States, for use in legal proceedings against illicit actors.
We should continue to build information-sharing mechanisms through law enforcement and intelligence channels, as well as within our private sector, as the bulk of our networks lie outside of public and government control. We must also continue to work through differences in our legal systems that can sometimes slow the sharing of information used during criminal investigations. Given the risks involved, these are worthwhile efforts.
Just two weeks ago, our governments participated in the U.S.-India Cyber dialogue. The United States and India held open and constructive conversations about substantive measures to increase cyber cooperation, ranging from coordinating on internet governance issues, deepening our existing cyber security collaboration, streamlining the exchange of information related to cybercrime, and U.S. support for India’s ambitious but essential cybersecurity skills development initiative. These, and other common objectives, highlight the criticality of the U.S.-India relationship, leverage the inseparable ties of our IT communities, and emphasize yet another example of our joint efforts to safeguard critical infrastructure and national security.
Our populations are among the most interconnected on the planet, which is in part a reflection of our shared values. The Internet is an unparalleled platform where voices from every corner of the globe can contribute to political, economic, and social discourse. Discussions on how to manage cyberspace can be difficult, because they touch on the core of our democratic values, including ethics, the role of government in society, and economic liberty. But if we commit ourselves to protecting internet freedom, the digital revolution will continue to power the opportunities our societies cherish most – by helping to strengthen governments, make us safer, boost economic growth, and promote free expression. And those are goals worth fighting for.
Thank you.
source: Speeches & Remarks | New Delhi, India - Embassy of the United States
Good morning and thanks for the generous introduction. I’m delighted to be here and thank ASSOCHAM for the chance to speak to you on this important topic. Of course, the Internet today is part of just about everything we do. This digital age has opened countless windows of opportunity, to the great benefit of the U.S. and India. Both our societies and our economies have been enriched by the many advantages of greater connectivity; and I know this first hand, since I continue to marvel and how instantly connected I have felt to Indians of all ages since I have started my Twitter account. In fact just two weeks ago I visited Twitter’s India headquarters and took part in an online chat with a number of tech savvy Indians.
When we talk about digital technology, it is natural to think about potential risks, but it is the possibilities that should motivate us. From the campuses of Silicon Valley to the tech parks of Bangalore, our countries have emerged as leaders in the field of IT development. The Indian diaspora has played a particularly large role. Just two weeks ago Sundar Pichai, a native of Chennai, was named CEO of Google, one of America’s tech giants. He is one of countless similar examples. Indeed, when Prime Minister Modi visits California next month, he will be welcomed by a vibrant Indian-American community which, over the last two decades, has helped to transform the high-technology sector.
Similarly, here in India, technology has been integral in powering economic growth, whether it be through e-commerce, IT services, or product development. The Prime Minister’s “Digital India” initiative highlights India’s commitment to enhancing digital capacity, across a variety of sectors, bridging the divide between urban and rural communities. Secretary John Kerry also recently launched a new initiative to increase internet connectivity, in partnership with government, development banks, engineers, and industry leaders. I applaud these efforts, as broadening the reach of the Internet is a powerful way to promote global development. Every time a country increases its internet penetration by ten percent, its total economic growth can expand by up to two percent.
The Internet is part of the critical infrastructure that we have come to depend on. We use it in so many ways – as a communication tool, a marketplace, a forum for expressing new ideas. Digital technology promotes transparency and helps to hold governments accountable. It is a means to fight against repression, and protect human dignity. Yet we must ensure that cybersecurity tools are not inappropriately used to undermine these important benefits.
But, as transformative as the Internet is, there are risks. And the more reliant we become on the Internet, the greater those risks become. This means we need sound policies to protect this essential resource, as it is vital to advancing human progress in the 21st century. Therefore, promoting an open, secure, and reliable Internet is a key component of our economic policy.
Protecting the Internet cannot be the task of just one country, however, and requires cooperation between government, industry, academia, and every user. It is a shared resource, and thus its stewardship is a shared responsibility. The Internet has flourished because of the bottom-up, consensus-based process that allows multiple stakeholders to participate in its governance. Likewise, all stakeholders have a critical role in cybersecurity and cybercrime as well. The multistakeholder approach reaches beyond government and includes the private sector, civil society, academic institutions, and all internet users. Multistakeholder Internet governance has served us well thus far, and it is critical to broaden this approach to other areas of cyber policy because all institutions and users share a responsibility to keep the internet operating in a safe, secure, and reliable manner.
To that end, India’s recent decision to support the multistakeholder approach to internet governance is not only a win for India’s people, but an example of India’s ever-expanding role as a democratic world leader. We look forward to working closely with India and other partners to preserve the multistakeholder model, wherever it is challenged.
Of course, there are other, serious threats to the internet. As recent headlines have shown, cyber-attacks are a real and persistent concern. Internet misconduct has resulted in billions of dollars in economic damage. Criminal networks misuse the Internet to steal information and profit at the expense of private citizens, businesses, and governments. Extremist groups see it as a means to disseminate violent extremist propaganda and mislead youth into joining their causes. It is in our shared interest to seek collaborative solutions to these challenges.
We believe that the best defense is to promote what we call “international cyber stability.” This means we are seeking broad consensus on what constitutes responsible behavior in cyberspace. Our goal is to create a climate in which people everywhere are able to enjoy the benefits of the digital world. There is general consensus that the basic rules of international law apply in cyberspace, but there are a number of additional principles that should underpin countries’ behavior in cyberspace.
First, we posit that no country should support or conduct online activity that intentionally damages or impedes another country’s use.
Second, no country should seek to prevent emergency teams from responding to a security breach, or allow its own teams to cause harm.
Third, no country should engage in cyber-enabled theft of intellectual property, trade secrets, or other confidential information for commercial gain.
Fourth, every country should confront malicious cyber activity emanating from its soil. This includes the activities of extremist groups who seek to engage in criminal and terrorist behavior.
And finally, every country should do what it can to help states that are the victims of a cyber-attack.
Agreeing to and abiding by these principles would move us a long way towards ensuring a more secure cyberspace. In order to get there, however, we must work to improve our own and our partners’ capacity to protect against cyber threats. This includes a preventative component – through strong legal frameworks and improved training. It also means enhancing our capability to respond to threats, by improving the resiliency of our networks, and strengthening the relationships between our law enforcement communities.
Perhaps the greatest protection against such threats is the regular and substantive sharing of information on cyber threats, and stronger coordination in response to cyber-attacks and cybercrime. This is an area in which the United States and India continue to partner. We recently provided information on a high-profile hacking group operating from India, enabling our two countries to take concerted action against its threat. We are also engaged in efforts to improve the process through which other countries can obtain bank records and other forms of electronic evidence from the United States, for use in legal proceedings against illicit actors.
We should continue to build information-sharing mechanisms through law enforcement and intelligence channels, as well as within our private sector, as the bulk of our networks lie outside of public and government control. We must also continue to work through differences in our legal systems that can sometimes slow the sharing of information used during criminal investigations. Given the risks involved, these are worthwhile efforts.
Just two weeks ago, our governments participated in the U.S.-India Cyber dialogue. The United States and India held open and constructive conversations about substantive measures to increase cyber cooperation, ranging from coordinating on internet governance issues, deepening our existing cyber security collaboration, streamlining the exchange of information related to cybercrime, and U.S. support for India’s ambitious but essential cybersecurity skills development initiative. These, and other common objectives, highlight the criticality of the U.S.-India relationship, leverage the inseparable ties of our IT communities, and emphasize yet another example of our joint efforts to safeguard critical infrastructure and national security.
Our populations are among the most interconnected on the planet, which is in part a reflection of our shared values. The Internet is an unparalleled platform where voices from every corner of the globe can contribute to political, economic, and social discourse. Discussions on how to manage cyberspace can be difficult, because they touch on the core of our democratic values, including ethics, the role of government in society, and economic liberty. But if we commit ourselves to protecting internet freedom, the digital revolution will continue to power the opportunities our societies cherish most – by helping to strengthen governments, make us safer, boost economic growth, and promote free expression. And those are goals worth fighting for.
Thank you.
source: Speeches & Remarks | New Delhi, India - Embassy of the United States
01 September 2015
Joint Statement: 2015 United States-India Cyber Dialogue
Joint Statement: 2015 United States-India Cyber Dialogue:
To increase global cybersecurity and promote the digital economy, the United States and India have committed to robust cooperation on cyber issues. To that end, the United States and India met at the U.S. Department of State in Washington, DC on August 11 and 12 for the 2015 U.S.-India Cyber Dialogue.
The whole-of-government Cyber Dialogue, fourth in the series, was led by the U.S. Cybersecurity Coordinator and Special Assistant to the President Michael Daniel and by India’s Deputy National Security Advisor Arvind Gupta. The Department of State Coordinator for Cyber Issues Christopher Painter and the Ministry of External Affairs Joint Secretary for Policy Planning, Counterterrorism, and Global Cyber Issues Santosh Jha co-hosted the Dialogue. U.S. whole-of-government participation included the Departments of State, Justice, Homeland Security, Treasury, and Commerce. The Indian government was represented by the National Cyber Security Coordinator at the National Security Council Secretariat, the Ministry of External Affairs, the Ministry of Home Affairs, and the Ministry of Communication and Information Technology.
The delegations discussed a range of cyber issues including cyber threats, enhanced cybersecurity information sharing, cyber incident management, cybersecurity cooperation in the context of “Make in India,” efforts to combat cybercrime, Internet governance issues, and norms of state behavior in cyberspace.
The two delegations identified a variety of opportunities for increased collaboration on cybersecurity capacity-building, cybersecurity research and development, combating cybercrime, international security, and Internet governance, and intend to pursue an array of follow-on activities to bolster their cybersecurity partnership and achieve concrete outcomes.
In addition to the formal Dialogue, the delegations met with representatives from the private sector to discuss issues related to cybersecurity and the digital economy. The Indian delegation also met with Deputy Secretary of State Antony Blinken and Assistant to the President for Homeland Security and Counterterrorism Lisa Monaco.
The two countries decided to hold the next round of the Cyber Dialogue in Delhi in 2016.
source: whitehouse.gov
To increase global cybersecurity and promote the digital economy, the United States and India have committed to robust cooperation on cyber issues. To that end, the United States and India met at the U.S. Department of State in Washington, DC on August 11 and 12 for the 2015 U.S.-India Cyber Dialogue.
The whole-of-government Cyber Dialogue, fourth in the series, was led by the U.S. Cybersecurity Coordinator and Special Assistant to the President Michael Daniel and by India’s Deputy National Security Advisor Arvind Gupta. The Department of State Coordinator for Cyber Issues Christopher Painter and the Ministry of External Affairs Joint Secretary for Policy Planning, Counterterrorism, and Global Cyber Issues Santosh Jha co-hosted the Dialogue. U.S. whole-of-government participation included the Departments of State, Justice, Homeland Security, Treasury, and Commerce. The Indian government was represented by the National Cyber Security Coordinator at the National Security Council Secretariat, the Ministry of External Affairs, the Ministry of Home Affairs, and the Ministry of Communication and Information Technology.
The delegations discussed a range of cyber issues including cyber threats, enhanced cybersecurity information sharing, cyber incident management, cybersecurity cooperation in the context of “Make in India,” efforts to combat cybercrime, Internet governance issues, and norms of state behavior in cyberspace.
The two delegations identified a variety of opportunities for increased collaboration on cybersecurity capacity-building, cybersecurity research and development, combating cybercrime, international security, and Internet governance, and intend to pursue an array of follow-on activities to bolster their cybersecurity partnership and achieve concrete outcomes.
In addition to the formal Dialogue, the delegations met with representatives from the private sector to discuss issues related to cybersecurity and the digital economy. The Indian delegation also met with Deputy Secretary of State Antony Blinken and Assistant to the President for Homeland Security and Counterterrorism Lisa Monaco.
The two countries decided to hold the next round of the Cyber Dialogue in Delhi in 2016.
source: whitehouse.gov
Subscribe to:
Posts (Atom)
expVC.com Domain Name News Archive
-
▼
2015
(279)
-
▼
September
(21)
- Wyndham Decision: FTC Can Sue Businesses For Getti...
- Avoiding and Responding to a Cybersecurity Breach
- India and US Joint Strategic and Commercial Dialog...
- Farmville Creator Zynga Awarded Attorney Fees, San...
- Ninth Circuit Court, Copyright, DMCA Takedown Noti...
- Uncommon Nevada Definitions Of Common Gaming Terms
- Fair Use,Takedown Notices, and the DMCA
- Silicon Valley Venture Survey, Second Quarter 2015
- What Does It Take to Trademark Your Name?
- The Internet and Google’s New Logo
- Notice Your Trademarks and Copyrights
- Sixth Circuit, Design Separability, Uniform Graphi...
- Numbers, Phone Numbers, Numbering Resources, Inter...
- FTC as Data Security Cop Affirmed
- Before Your First Investment, 8 Legal To-Dos
- “Look and Feel” of a Website, Protectable Trade Dress
- Life Sciences Brand Names, 5 Key Tips
- Uber, Airbnb, Public Policy, Conflicting Interests
- Dot-Com Era Over? OR Welcome to Dot-Anything?
- US Ambassador at 7th Annual Summit on Cyber and Ne...
- Joint Statement: 2015 United States-India Cyber Di...
-
▼
September
(21)