Privacy Military

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

VA OIG reports patient data at risk with vendor

The Department of Veterans Affairs’ Office of Inspector General recently issued a report, following a complaint that the VA Palo Alto Health Care System put veterans’ health information at risk when it allowed personnel of a...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

DOD Adopts Interim Cyber Rules As Claims of Chinese Cyber Attacks Continue

U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more

SCRA Compliance, Cybersecurity, and Responsible Innovation Remain Top Priorities at OCC

On August 31, Grovetta Gardineer, the OCC’s Deputy Comptroller for Compliance Operations and Policy, delivered remarks at the Association of Military Bankers of America annual workshop in Leesburg, VA. Throughout her...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

Defense Department Issues Interim Rule Requiring Contractor and Subcontractor Reporting of Cyber Incidents

On August 26, 2015, the Department of Defense (DoD) published a long-awaited Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to require “rapid” reporting of “cyber incidents” that result in...more

Royal Navy Warship launches 3D Drone

University of Southampton engineers recently launched a 3D-printed unmanned aerial vehicle from a Royal Navy warship to show the potential use of lightweight drones during sea missions....more

The shifting sands of cybersecurity: DOD's interim rule further burdens contractors

The Department of Defense (DOD) earlier today issued an interim rule, effective immediately, that significantly increases existing cybersecurity requirements for DOD contractors. The requirements in the interim rule, have...more

U.S. Navy first to launch and recover underwater drone in military operation

We have been watching the growth of drones in the sky and the FAA and states’ attempts to regulate them. Now we will start watching the growth of underwater drones. The USS North Dakota submarine sailed into Groton,...more

Army National Guard announces data breach affecting both current and former members

On July 10, 2015, the Army National Guard announced a breach of its current and former members’ personal information, dating back to 2004. The breach occurred when files containing personal information were accidentally...more

Republican Senators Sought To Tie Cybersecurity Measure To Defense Bill

In the wake of the recent public disclosure of the massive breach into the Office of Personnel Management compromising the personal information of approximately 4 million individuals, Senators were hoping to tie a...more

DOL Issues Updated FMLA Notices and Forms Addressing GINA "Safe Harbor" Language Requirements

The U.S. Department of Labor (DOL) recently issued new versions of the agency's template Family and Medical Leave Act (FMLA) notices and certification forms, which have been approved for use for the next three years.  The new...more

DOL Releases Updated FMLA Health Care Provider Certification Forms - Employers: Begin Using the New Forms Immediately; Note the...

The U.S. Department of Labor (DOL) recently published updated health care provider certification forms for employers to provide employees who request leave under the Family and Medical Leave Act (FMLA) due to any one of the...more

USA Freedom Act To End NSA Bulk Data Collection

On June 2, the President signed into law the USA Freedom Act of 2015 (“the Act”) after the Senate passed the bill by a vote of 67-to-32. As King & Spalding previously reported, the Act amends the Patriot Act and prohibits...more

Does the False Claims Act Preempt An Attorney Relator’s Ethical Obligations?

In United States ex rel. Holmes v. Northrop Grumman Corp., No. 1:13-cv-85, 2015 WL 3504525 (S.D. Miss. June 3, 2015), the court answered this question with a resounding “no” and provided a laundry list of ethical violations...more

The New Space Race: Protecting Trade Secrets on the Final Frontier

Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more

DHS Breaks New Ground With Issuance of SAFETY Act Certifications for Advanced Cybersecurity Defense Systems

FireEye’s MVX and DTI Technologies become the first cybersecurity products to earn certification as “Qualified Anti-Terrorism Technologies.” The Department of Homeland Security (DHS) crossed an important barrier in...more

New Cyber Strategy Issued By Pentagon

In a speech at Stanford University on April 23, 2015, Department of Defense (“DoD” or the “Pentagon”) Secretary Ash Carter unveiled the Pentagon’s new cyber strategy (the “Strategy”) and called on the technology sector to...more

Weekly Update Newsletter - May 2015

SMALL BUSINESS ADMINISTRATION - SBA Issues Proposed Rule to Amend Women-Owned Small Business Federal Contract Program - The U.S. Small Business Administration (SBA) issued a proposed rule to amend its...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

Presidential Memorandum Outlines Privacy Guidelines For Domestic Federal Use Of Drones

In a recently issued Presidential Memorandum, President Obama included privacy guidelines for the federal government’s use of unmanned aircraft systems (“UAS”) in the United States. Issued on February 15, 2015, and...more

A New Cyber World Framework to Strengthen Agency Information Security

Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information...more

Read the Directions Carefully Before Playing: State Department Releases Military Drone Export Guidance

The United States has a responsibility, or so the State Department tells us, to ensure the sales and exports of Unmanned Aerial Systems (UAS) are consistent with U.S. national security interests, U.S. policy, and even U.S....more

Weekly Update Newsletter - January 2015 #4

GOVERNMENT CONTRACTS - SBA Considering Extending Comment Period for Proposed Rule on the Limitations on Subcontracting - Although not yet official, we anticipate that SBA will grant an extension until April 6th...more

64 Results
View per page
Page: of 3

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.