Science, Computers & Technology Energy & Utilities Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Shocking? – Insurers Consider Potential Aggregate Risks from a Power Grid Attack

In the fast-developing cyber insurance marketplace, insurers have closely considered the possible risks and have analyzed the potential aggregation of such risks. While not the only topics of interest to insurers, these two...more

FERC, NERC and Business Blackout: New CIP Standards and Fictional Cyber Attacks

The Federal Energy Regulatory Commission (FERC) issued a Notice of Proposed Rulemaking (NOPR) July 16, 2015, proposing to approve various Critical Infrastructure Protection (CIP) reliability standards proposed by the North...more

Energy Companies and Utilities Are Well Advised to Engage in Drone Privacy Discussions

The Federal Aviation Administration (FAA) reports that, as of July 9, 2015, it has granted 746 Petitions for Exemption under Section 333 of the FAA Modernization and Reform Act of 2012 authorizing commercial operations with...more

German Parliament's IT-Security Act Covers Critical Infrastructure

On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more

Intellectual Property and Technology News

In This Issue: - Biosimilars In The US - Introducing Cybertrak - Free and Open Source Compliance: Action Steps - Falling Prices At The Pump - Put A Premium On Energy IP - Supreme Court Corner - Excerpt...more

Cyber Vulnerability in Wind Turbines

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to a software bug, an attacker can get the user name and password from the browser. This can allow admin...more

Also In the News - Data, Privacy, & Security Practice Report - February 2015 #4

Going With The (Work) Flow After A Data Breach—Corporate Counsel reported on the recent King & Spalding webinar, “Data Breach: What Workflows to Expect and How to Prepare,” offering concerned in-house counsel and the...more

Regulatory Implications of New Products and Services in the Australian Electricity Market

The Energy Market Reform Working Group (Working Group) in Australia released a consultation paper at the end of 2014 regarding the regulatory implications of new products and services in the national electricity market. New...more

Privacy Issues in Smart Electrical Grids: Another Internet of Things Problem

Smart grids – electrical grids that allow two-way communication between utilities and consumers – represent an exciting frontier in the Internet of Things, with ramifications for energy efficiency, weather resiliency and...more

President Presses For Action On Cybersecurity Legislation In State Of The Union

On January 20, 2015, President Obama delivered his sixth State of the Union address, during which he pressed for Congress to take action to combat cybersecurity threats. He called on Congress to “finally pass the legislation...more

President Obama’s 2015 Priorities Include Cybersecurity

During his recent State of the Union address, President Obama called on Congress “to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children’s...more

Energy and information technology: An upcoming wedding where data is at the heart of power

Nowadays, the European energy world is facing a revolution. European utilities have underperformed the broader European equity market by 80 per cent since the start of 2009. They are all trying to transform themselves from...more

House Passes Three Bipartisan Cybersecurity Bills to Protect Critical Infrastructure

On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more

Oil and Gas Industry Forms Information Sharing Group to Combat Cyber Threats

In response to the growing threat from cyber-attacks, the oil and gas industry has announced the formation of an information sharing clearinghouse. The new group, known as the Oil and Natural Gas Information Sharing and...more

Department of Energy Invites Cybersecurity Comments

In a Federal Register notice to be officially published Friday, June 20, 2014, the Department of Energy (DOE) is inviting public participation in its efforts to develop a guidance document entitled “Energy Sector Framework...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Senate Energy and Natural Resources Committee Holds Hearing on Grid Reliability and Security

Today, the U.S. Senate Committee on Energy and Natural Resources held a standing-room only hearing titled “Keeping the lights on — Are we doing enough to ensure the reliability and security of the U.S. electric grid?” While...more

NIST Cybersecurity Framework – What It Is and What It Means for the Energy Industry

The federal government’s long-awaited Cybersecurity Framework offers promising tools for energy companies to manage their cybersecurity risk, but leaves many questions unanswered. The National Institute of Standards and...more

Trade Secrets Trend To Watch In 2014: Government Regulations Requiring Public Disclosure Of Proprietary Information

In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more

Privacy Monday – August 19, 2013

After a brief August hiatus, Privacy Monday is back with privacy goofs, gaffes and tidbits to start your week. Department of Energy Hacked — Again -- Although the grid is supposed to be “critical infrastructure” as...more

No Warrant Needed for Cell Site Geolocational Information

The U.S. government can get historical cell phone records, including geolocational information, from cell phone providers without a warrant, the Fifth District Court of Appeals ruled. The appellate court reversed the trial...more

Congress, The Administration Move Forward To Secure Critical US Infrastructure

Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more

"Cybersecurity Update: Key US and EU Regulatory Developments"

In recent months, federal and state governments have taken an increasingly active role in reviewing cybersecurity issues within the private sector. There has been a flurry of activity as different government bodies discuss...more

Federal Cybersecurity Initiatives Demand Vigilance of Communication and Energy Infrastructure Owners and Operators

Cybersecurity initiatives are moving rapidly within the federal government and require owners and operators of critical infrastructure – including in particular Communication and Energy Systems, and those who supply and...more

REGULATORY: FERC: Notice of Proposed Rulemaking on Bulk Electric System Cyber Security Standards

On April 18, 2013, the Federal Energy Regulatory Commission (“FERC”) issued a notice of proposed rulemaking (the “NOPR”) stating that it intends to approve Version 5 of the Critical Infrastructure Protection (“CIP”)...more

55 Results
|
View per page
Page: of 3

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×