News & Analysis as of

Science, Computers & Technology Government Contracting

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Health Care E-Note - April 2017

by Burr & Forman on

An often overlooked and under publicized provision of the False Claims Act (“FCA”) is the retaliatory discharge prohibition. This is probably because retaliatory discharge claims do not grab headlines by winning multimillion...more

Nuevas oportunidades de P3 para tecnología de gobiernos

Si bien las colaboraciones público-privadas (public-private partnerships, P3) se asocian con frecuencia a una infraestructura física, las P3 son esencialmente flexibles y pueden utilizarse para una prestación rentable y...more

Top unmanned aircraft systems developments in 2017 for ADG companies

by Hogan Lovells on

Aerospace, defense, and government services (ADG) companies are not new to game-changing technology innovations. It is therefore no surprise that a number of ADG companies are early investors in unmanned aircraft systems...more

Top trade secret developments in 2017 for ADG companies

by Hogan Lovells on

Trade secrets form one of the most valuable assets of technology companies. The protection of trade secrets is widely seen as essential to foster innovation and economic growth. This past year, both the United States (U.S.)...more

Top M&A developments in 2017 for ADG companies

by Hogan Lovells on

We expect 2017 M&A activity in the aerospace, defense, and government services (ADG) industry sector to equal or surpass 2016 M&A activity. Although 2016 M&A activity was down both by volume and value over 2015 it was...more

Top international trade and export control developments in 2017 for ADG companies

by Hogan Lovells on

Aerospace, defense, and government services (ADG) companies increasingly rely on international customers and global supply chains to stay competitive in today’s global market. In the United States, ADG companies rely heavily...more

Federal Contractors Beware - DHS Proposes Robust Cybersecurity Procurement Regulation to Safeguard Controlled Unclassified...

First and foremost, the proposed Department of Homeland Security (DHS) regulation to safeguard CUI is internally inconsistent or at the very least ambiguous. It appears to conflate the protection of CUI on a federal...more

New P3 Opportunities for Government Technology

Although public-private partnerships (P3s) are frequently associated with physical infrastructure, P3s are inherently flexible and can be utilized for the time and cost-effective delivery of virtually any public good or...more

Top cybersecurity developments in 2017 for ADG companies

by Hogan Lovells on

While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more

Top commercial space developments in 2017 for ADG companies

by Hogan Lovells on

Thinking big and small(sat) satellites - The Huffington Post recently identified “Top 10 Tech Trends Transforming Humanity.”1 The first of these transformative tech trends was labeled “we are hyper-connecting the world”...more

Healthcare Fraud and Abuse Review 2016

by Bass, Berry & Sims PLC on

Bass, Berry & Sims is pleased to announce the release of its fifth annual Healthcare Fraud and Abuse Review 2016. The Review, compiled by the firm’s Healthcare Fraud Task Force, is an industry-leading guide to healthcare...more

DoD to Host Industry Information Day on Implementation of Cybersecurity Rules

by Holland & Knight LLP on

The Dec. 31, 2017 deadline for Department of Defense (DoD) contractors to comply with DoD’s cybersecurity and breach reporting requirements is looming. The requirements, which are set forth in DoD’s Oct. 21, 2016, final rule,...more

DOD U.S.-CERT Cybersecurity Incident Reporting for Defense Contractors Effective April 1, 2017

New U.S. Computer Emergency Readiness Team (U.S.-Cert) guidelines around incident reporting went into effect this week (April 1, 2017). The guidelines require all federal departments and agencies, state, local, tribal and...more

DFARS: Safeguarding Covered Defense Information and Cyber Incident Reporting

by Reed Smith on

Data protection and cybersecurity have been receiving ever-increasing attention within the U.S. federal government. Last October, the DoD issued two final rules that changed the U.S. Department of Defense (“DoD”) Federal...more

OMB Claims Federal Progress on FISMA in 2016 But Much Work Remains

Earlier this week, the White House Office of Management and Budget (“OMB”) issued its 2016 Federal Information Security Modernization Act (“FISMA”) Annual Report. FISMA (last amended 2014) charges OMB with tracking the extent...more

Pharmaceutical Manufacturers and Healthcare Leaders cite Fraud and Abuse Laws as Obstacle to Value-Based Arrangements

As the healthcare industry moves towards value-based purchasing, pay-for-performance, and other payment reform models, industry leaders have identified federal fraud and abuse laws as a barrier to full implementation of such...more

Are Your Federal Contractor Employees Required To Have Privacy Training?

The Federal Acquisition Regulations were recently updated to include a requirement that certain federal contractors provide privacy training to some of their employees. The training obligation does not apply to all employees...more

NIST in the House – Empowering the Nation’s Cybersecurity Standards-Maker To Head Off Increasing Cyber Threats to the Government...

The National Institute of Standards and Technology (NIST) recently received a vote of confidence in the U.S. House of Representatives that may increase its role and authority in defending the nation from cyber threats. On...more

DoD Issues New FAQs on Cybersecurity Compliance

Although DoD remains on the cutting edge of cybersecurity protections in the government contracts world, it continues to hone and refine that edge. Recently, DoD issued an updated frequently asked questions (FAQ) page for...more

OMB Federal Agency Data Breach Guidelines – Considerations for Industry

by Reed Smith on

Earlier in February, the Executive Office of Management and Budget (“OMB”) issued Memorandum M-17-12 to federal agencies to set out guidelines and procedures for preparing for or responding to a breach involving the release...more

Transactional Data Reporting: Brave New World

by PilieroMazza PLLC on

As part of its Category Management initiative, the U.S. General Services Administration (“GSA”) has piloted the Transactional Data Reporting rule (“TDR”), which is meant to provide a greater degree of transparency into the...more

Health Care Fraud and Abuse in the Middle District of Florida in 2016 - a Year in Review

by Carlton Fields on

The United States Attorney’s Office (USAO) for the Middle District of Florida (USAO-MDFL) prosecuted several civil health care fraud matters in 2016 and issued related press releases. A review of the USAO-MDFL’s criminal and...more

Former NSA Contractor Indicted for Theft of Government Property

The United States Department of Justice (DOJ) has announced that a former contractor of a defense contractor has been indicted for stealing over 75 percent of hacking tools belonging to the Nations Security Agency’s offensive...more

Dentons' pick of global regulatory trends to watch in 2017 - National security and foreign investment review

by Dentons on

Focus on the US - Defense and national security - The 115th Congress will mark the first opportunity in a decade for a Republican-controlled House and Senate to work with a Republican president. In 2017, leading...more

Your Cyber Minute: Ransomware attacks and what you need to know [Video]

by Hogan Lovells on

The conversation continues. Hogan Lovells Partner Harriet Pearson and Managing Principal of Hogan Lovells Cyber Risk Services Jeff Lolley address the threat around ransomware and the potential implications for companies that...more

479 Results
|
View per page
Page: of 20
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!