News & Analysis as of

Privacy Government Contracting Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

Patient Safety Issues Highlighted in DOJ Settlement and Health Care Industry Cybersecurity Task Force Report

by Pierce Atwood LLP on

As we know, the move away from fee for service reimbursement models is not only intended to reduce costs by no longer paying providers based on the volume of services performed, but is also intended to improve the overall...more

Executive Order on Cybersecurity: Considerations for Business - A fuller picture emerges on how the Trump Administration’s first...

On May 11th, in the wake of a series of wide-ranging cyber breaches and attacks plaguing public and private sectors alike, President Trump signed a long-awaited Executive Order on Strengthening the Cybersecurity of Federal...more

What’s that Cybersecurity FAR Clause Doing In My Contract?

by PilieroMazza PLLC on

Many contractors we talk to believe that cybersecurity requirements are exclusively a concern of contractors working with DoD or with highly-classified, top secret projects. While perhaps true to some degree in the past, that...more

FAR 52.204-21 And The Future Of Federal Cybersecurity Enforcement

by Fox Rothschild LLP on

Earlier this month, we had the pleasure of opening the 2017 Associated General Contractors of America Federal Contractor Conference in Washington, DC with a presentation focused on the emerging issue of Cybersecurity in...more

NISPOM Change 2 Deadlines Coming for Cleared Contractors

by Hogan Lovells on

As industry comes up on the one-year anniversary of the publication of Change 2 to the National Industrial Security Program Operating Manual (NISPOM)1, a number of implementation deadlines are drawing near. This blog post...more

Contractors Beware: New Cybersecurity Executive Order Signals a Change in Direction

by Holland & Knight LLP on

The White House just issued a long-awaited Cybersecurity Executive Order (EO). The EO is divided into five sections, which we will summarize in turn - Section 1 of the EO includes "policy," "findings," and "risk...more

Government Deadline Looms for Training on Insider Threats

by Baker Donelson on

Almost one year ago, on May 18, 2016, the Department of Defense (DoD) published Change Two to DoD 5220.22-M, the Department of Defense's "National Industrial Security Operating Manual (NISPOM)." This change required all...more

Insider Threat Program Awareness Training Deadline - Cybersecurity and Privacy Team Alert

In May 2016, the Under Secretary of Defense for Intelligence issued a requirement for cleared government contractors to establish an “insider threat program” (ITP) to better protect national security networks from...more

Federal Contractors Beware - DHS Proposes Robust Cybersecurity Procurement Regulation to Safeguard Controlled Unclassified...

First and foremost, the proposed Department of Homeland Security (DHS) regulation to safeguard CUI is internally inconsistent or at the very least ambiguous. It appears to conflate the protection of CUI on a federal...more

Top cybersecurity developments in 2017 for ADG companies

by Hogan Lovells on

While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more

DoD to Host Industry Information Day on Implementation of Cybersecurity Rules

by Holland & Knight LLP on

The Dec. 31, 2017 deadline for Department of Defense (DoD) contractors to comply with DoD’s cybersecurity and breach reporting requirements is looming. The requirements, which are set forth in DoD’s Oct. 21, 2016, final rule,...more

DOD U.S.-CERT Cybersecurity Incident Reporting for Defense Contractors Effective April 1, 2017

New U.S. Computer Emergency Readiness Team (U.S.-Cert) guidelines around incident reporting went into effect this week (April 1, 2017). The guidelines require all federal departments and agencies, state, local, tribal and...more

DFARS: Safeguarding Covered Defense Information and Cyber Incident Reporting

by Reed Smith on

Data protection and cybersecurity have been receiving ever-increasing attention within the U.S. federal government. Last October, the DoD issued two final rules that changed the U.S. Department of Defense (“DoD”) Federal...more

OMB Claims Federal Progress on FISMA in 2016 But Much Work Remains

Earlier this week, the White House Office of Management and Budget (“OMB”) issued its 2016 Federal Information Security Modernization Act (“FISMA”) Annual Report. FISMA (last amended 2014) charges OMB with tracking the extent...more

Are Your Federal Contractor Employees Required To Have Privacy Training?

The Federal Acquisition Regulations were recently updated to include a requirement that certain federal contractors provide privacy training to some of their employees. The training obligation does not apply to all employees...more

NIST in the House – Empowering the Nation’s Cybersecurity Standards-Maker To Head Off Increasing Cyber Threats to the Government...

The National Institute of Standards and Technology (NIST) recently received a vote of confidence in the U.S. House of Representatives that may increase its role and authority in defending the nation from cyber threats. On...more

DoD Issues New FAQs on Cybersecurity Compliance

Although DoD remains on the cutting edge of cybersecurity protections in the government contracts world, it continues to hone and refine that edge. Recently, DoD issued an updated frequently asked questions (FAQ) page for...more

OMB Federal Agency Data Breach Guidelines – Considerations for Industry

by Reed Smith on

Earlier in February, the Executive Office of Management and Budget (“OMB”) issued Memorandum M-17-12 to federal agencies to set out guidelines and procedures for preparing for or responding to a breach involving the release...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

The Risks and Implications of Failing to Comply with U.S. Government Cyber and IT Requirements

by Pepper Hamilton LLP on

This article summarizes some of the many risks and implications that are associated with failing to comply with U.S. government-unique cyber and information technology requirements. We are often asked by small and...more

The Department Of Homeland Security Proposes New Rules Affecting Federal Government Contractors

This week, the Department of Homeland Security (“DHS”) issued three proposed rules expanding data security and privacy requirements for contractors and subcontractors. The proposed rules build upon other recent efforts by...more

PII Training Required for Government Contractors, Effective Jan. 19

by McGuireWoods LLP on

Beginning January 19, federal government contracts will contain additional training requirements for contractors who deal with personally identifiable information (PII) or with a system of records....more

Alert: New Privacy Training Requirements for Companies with Federal Government Contracts

by Cooley LLP on

Effective January 19, 2017, companies awarded federal government contracts will be required to ensure that their employees receive annual privacy training if those employees (1) handle personally identifiable information...more

Switches and Sweets: Belsnickel Brings Defense Contractors and Subcontractors New Cybersecurity Controls in Preholiday Revisions...

by McCarter & English, LLP on

If you are aware of German Christmas folklore (and really, who isn’t?), you know that Belsnickel is a legendary companion of St. Nick who carries a switch with which to punish naughty children and a pocketful of sweets to...more

Five Takeaways: How the SAFETY Act Can Help Protect Your Technology or Cybersecurity Business

Gunjan R. Talati, partner in the Government Contracts and Construction & Infrastructure Group recently presented at ING3NIOUS’ 2016 Cybersecurity, Privacy & Data Protection Retreat. Gunjan was on a panel titled “The...more

142 Results
|
View per page
Page: of 6
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.