Las Reformas Constitucionales Transcendentales en México: Oportunidades y Retos para el Inversionista Privado
Mexico's Historic Energy Reform: Opportunities and Challenges for Investors
How to Avoid Corruption Risks in China
Polsinelli Podcast - Hot Energy Trends in 2014 by Polsinelli
Bill on Bankruptcy: LightSquared, the Battle among Hedge Funds
California Commercial Building Owners Must Disclose Energy Usage of the Building During Sale, Lease or Financing after July 1, 2013
Transbay Tower Groundbreaking
Consultant: BigLaw Growth is NOT Dead!
How to Conduct Routine Internal Investigations
Weekly Brief: 78% of Law Schools Ignore ABA Rule
Deryck Palmer on What’s Next for the Energy Sector
BigLaw's Banker: I've Got a "Robust" List of Firms That May Fail
Regulatory Challanges When Bringing a Vehicle to Market in the United States
Who pays for road damage in Pennsylvania after ACT 13?
Marcellus gas fuels Natural Gas Vehicles
Natural gas encourages industrial and large commercial end-users to revisit their operational plans
Goldman Sachs' Conflicts at Center of Kinder-El Paso Deal
Is Fracking Safe?
Today, the U.S. Senate Committee on Energy and Natural Resources held a standing-room only hearing titled “Keeping the lights on — Are we doing enough to ensure the reliability and security of the U.S. electric grid?” While...more
We hope that you remembered to “spring forward” over the weekend —
Today’s Privacy Monday is a bit longer than usual – but an important read, particularly if you are a mobile app developer.
Welcome to the latest edition of Minerals Matters and a slightly belated Happy New Year to you all. No doubt as you read this the holiday season seems a long time ago, but hopefully you had the oppor...more
The federal government’s long-awaited Cybersecurity Framework offers promising tools for energy companies to manage their cybersecurity risk, but leaves many questions unanswered. The National Institute of Standards and...more
After a year in which the California Legislature passed a spate of privacy laws, wireless providers and third party mobile application providers do not need to add privacy regulations from the California Public Utilities...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
In this issue:
- Digital Advertising Alliance Releases Mobile Guidance
- House Energy and Commerce Task Force on Privacy
- The Senate Committee on Commerce Considers Cybersecurity
- House Energy...more
After a brief August hiatus, Privacy Monday is back with privacy goofs, gaffes and tidbits to start your week.
Department of Energy Hacked — Again --
Although the grid is supposed to be “critical infrastructure” as...more
The U.S. government can get historical cell phone records, including geolocational information, from cell phone providers without a warrant, the Fifth District Court of Appeals ruled.
The appellate court reversed the trial...more
Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more
In recent months, federal and state governments have taken an increasingly active role in reviewing cybersecurity issues within the private sector. There has been a flurry of activity as different government bodies discuss...more
Cybersecurity initiatives are moving rapidly within the federal government and require owners and operators of critical infrastructure – including in particular Communication and Energy Systems, and those who supply and...more
On April 18, 2013, the Federal Energy Regulatory Commission (“FERC”) issued a notice of proposed rulemaking (the “NOPR”) stating that it intends to approve Version 5 of the Critical Infrastructure Protection (“CIP”)...more
On April 18, 2013, the Federal Energy Regulatory Commission issued a Notice of Proposed Rulemaking recommending approval of the Version 5 Critical Infrastructure Protection Reliability Standards proposed by the North American...more
Major revisions to the existing cybersecurity requirements for electric utilities will focus on greater protections for the most critical assets but will also ensure that all assets receive some level of protection....more
Electric utilities and other generation and transmission companies will be subject to new cybersecurity standards under a proposed rule issued by the Federal Energy Regulatory Commission (FERC). FERC proposed to approve the...more
On April 3, 2013, the National Institute of Standards and Technology (NIST) held a workshop at the Department of Commerce in which it offered a sneak preview of the Cybersecurity Framework required under the recently-issued...more
Following the lead of the Committee on Civil Liberties, Justice and Home Affairs (LIBE), which already released its draft report (see our prior blog), 20 February, the European Parliament Committee on Industry, Research and...more
A sweeping cyber security law is unlikely to pass any time soon.
White House Cyber Security Coordinator Michael Daniel warned last week that President Obama's Executive Order on Cyber Security (EO) could result in new...more
On February 26, following close on the heels of the recent executive order setting forth the administration’s approach to the regulation of critical infrastructure network security, the National Institute of Standards and...more
In recent years, the security of computerized data and the ability of public and private entities to respond to unauthorized penetration of computer networks has been intensely debated by policymakers. The risks associated...more
On 7 February 2013, the European Commission published two cybersecurity documents designed to provide a comprehensive vision of how European Union Member States, national authorities, and private industry will prevent and...more
A tempting response to the Cybersecurity Executive Order (the "Order"), announced by President Obama at his State of the Union address, is to ignore it. It is vague in key particulars, such as which companies are part of the...more
During his State of the Union address on February 12, 2013, President Barack Obama announced his signing of a long-anticipated Executive Order on cybersecurity. After months of discussions with technology companies the...more
Little more than a week after reports of cyber attacks targeted at the Department of Energy, The New York Times and The Wall Street Journal, President Obama declared in his State of the Union address that these forms of...more
Find an Energy & Utilities Author »
Back to Top