Government’s Health Care Fraud “Cash Cow” Keeps Mooing
Investment Management Update- 2014 Election Impact
Trial by Jury: Why It Matters in a Democratic Society
Busy Days For Voting Rights Advocates, Thanks to SCOTUS
Polsinelli Podcast - Republicans Gain Control of the U.S. Senate - How That May Impact Health Reform
Karl Rove's Efforts to "Buy" Courts Harmed America, Says Legendary Attorney
Crisis at the Border Shows Problems in US Immigration Law
Are Criminal Laws the Right Response to Revenge Porn?
Why Does BigLaw Have So Few Black Partners?
Aquila on M&A: Dealmaking is Back
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
ATL Law School Rankings: All About The Jobs
What Comes Next in Derivatives Regulation?
A More Perfect Union: Why Punish Russia for Crimea?
Only in DC: Ethics Rule Permits Non-lawyers to Own Law Firms
How a Reluctance to Deport Pop Stars Strengthens US Immigration Policy
Law Prof: The Clean Air Act Needs a Reboot
Is Punishment Dead in America?
Hailey French’s Story – When millions barely cover the bills.
Bill on Bankruptcy: Detroit Shows Need for Amending Bankruptcy Law
In conjunction with the recent White House Summit on Cybersecurity and Consumer Protection Summit, President Barack Obama has issued a much-anticipated cybersecurity information sharing Executive Order, "Promoting Private...more
On January 13, 2015, the Obama Administration presented to Congress an updated legislative proposal to improve American cybersecurity and data privacy protection....more
The Obama Administration could not be more clear that cybersecurity issues will continue to receive priority attention at the highest levels of government. ...more
The National Institute of Standards and Technology (NIST) and the White House continue efforts to improve private sector security and increase sharing of information about potential cybersecurity threats. ...more
President Barack Obama recognized in a speech he gave at the Federal Trade Commission on January 12th that identity theft poses a direct threat to the financial security of Americans. ...more
On February 12, seven industry trade associations co-authored a letter to Congress regarding anticipated data breach legislation. The letter urges Congress to protect its constituents from the impact of identity theft and...more
In the midst of ongoing, escalating and increasingly troublesome reports of large-scale corporate cyber breaches, the federal government is trying to fight back more forcefully with a dual strategy to shore up agency...more
On February 15, 2015, the Federal Aviation Administration published its highly anticipated Notice of Proposed Rulemaking (NPRM) on the Operation and Certification of Small Unmanned Aircraft Systems (applicable to UAS weighing...more
On February 10, the White House announced it will establish the Cyber Threat Intelligence Integration Center (CTIIC). In prepared remarks, Lisa Monaco, Assistant to the President for Homeland Security and Counterrorism,...more
Agency Assessment Comes as President Signs Executive Order Increasing Cyber Sharing with the Private Sector Late last year, this post speculated whether 2015 would become “the Year of Cybersecurity.” Though 2015 is still...more
The federal government continues to steadily ratchet up its focus on cybersecurity. On February 13, 2015, President Obama signed an Executive Order to improve real-time sharing of cyber-threat information between government,...more
President Obama’s February 13 Executive Order, “Promoting Private Sector Cybersecurity Information Sharing” (the “EO”), turns out to be light on new measures to improve cybersecurity, but focused heavily on adjustments to...more
On Friday, February 13, 2015, President Obama delivered the keynote speech and signed an executive order on cybersecurity information sharing at the White House cybersecurity and privacy summit held at Stanford University. ...more
The White House, on February 10, 2015, announced the creation of a new federal agency, the Cyber Threat and Intelligence Integration Center (“CTIIC” or the “Center”), to combat cyber-threats by coordinating digital...more
As a follow up to our summary of the key takeaways from the White House’s first Summit on Cybersecurity and Consumer Protection, the centerpiece of which was President Obama’s signing of a new Executive Order, “Promoting...more
On Friday, February 13, 2015, President Obama signed an executive order, Promoting Private Sector Cybersecurity Information Sharing (the “EO”), designed to encourage private companies to share information regarding threats to...more
On February 15, 2015, the FAA issued its long-awaited notice of proposed rulemaking on small unmanned aerial vehicles (UAVs). Currently, federal law prohibits commercial use of UAVs without advance approval, typically through...more
The Federal Aviation Administration (FAA) released its long-awaited Notice of Proposed Rulemaking (NPRM) on Sunday, Feb. 15, 2015 for the commercial use of small unmanned aircraft systems (UAS), commonly referred to as...more
Expectations were raised last month that the federal government would soon enact legislation to address the legal and regulatory obstacles that prevent private companies and government agencies from working together to...more
There are a growing number of cybersecurity requirements applicable to government contractors that work with the Department of Defense (DoD) and intelligence community. ...more
On Friday February 13, 2015, President Obama spoke at the White House Summit on Cybersecurity and Consumer Protection at Stanford University. After his address, President Obama signed an executive order, Promoting Private...more
Many of the nation's leading cyber, data and privacy experts convened Friday at a White House Summit at Stanford University to discuss ways to improve our nation's cybersecurity. During the summit, President Obama signed an...more
HIPAA in the Workplace -
In late 2013, the Office of Inspector General issued a report critical of the Office of Civil Rights’ enforcement of the Health Insurance Portability and Accountability Act. OCR enforcement of...more
We have all heard about the burgeoning opportunities tied to the development of precision medicine (also called “personalized medicine”), which includes the use of an individual’s genetic information to design targeted...more
High-profile data breaches and cyber-attacks on well-known brands and businesses have dominated the news cycle for more than a year. Yet during the same time, less visible, but no less important efforts have been made to...more
Find an Elections & Politics Author »
Back to Top