Science, Computers & Technology Government Contracting General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Opportunities for Increased Drug Sales to the VA

Pharmaceutical manufacturers that produce drugs in non-designated countries under the Trade Agreements Act (TAA) may now have an opportunity to increase their sales to the United States government. The Department of Veterans...more

A lighter touch — Final FAR rule issued on safeguarding contractor information systems

On Monday, May 16, 2016, the FAR Council is expected to issue its long- awaited final FAR rule ("the Final Rule") on safeguarding contractor information systems. This rule, effective immediately, creates a new contract...more

False Claims Act Trends: Technical Data, Software And IP

Government contracting has never been easy. But occasionally it is exciting, at least at the outset: Figuring out how to prepare the most competitive proposal and landing a significant contract are memorable achievements...more

Final Government Contractor Basic Data Security Rule Issued

On May 16, 2016, the Federal Acquisition Regulations (“FAR”) Council published the final FAR rule on Basic Safeguarding of Contractor Information Systems. The rule is intended to prescribe “the most basic level” of...more

Q&A: Robert Metzger – Cybersecurity, DOD and Regulation

In this Q&A, CREATe CEO Pamela Passman asks questions of Robert Metzger about the latest trends and challenges in protecting sensitive Department of Defense information. Metzger recently reviewed and commented on CREATe’s...more

DoD Proposes Cost Allowability Rule for Correcting Counterfeit Electronic Parts

The Department of Defense (“DoD”) recently proposed to make specified costs allowable that are associated with discovering and correcting counterfeit or suspect counterfeit electronic parts. DoD’s proposed rule would amend...more

SBA’s New Itvar Size Rule

OVERVIEW - - History and proposed changes to SBA’s ITVAR size rule - What is SBA’s new ITVAR size rule? - Understanding the nonmanufacturer rule and waivers - What should ITVARs do now Please see...more

New Tech, Old Rules: 6 Tips For Tech Cos. Managing FCA Risk

When it was first enacted in 1863, the original purpose of the False Claims Act was to prosecute war profiteers who were selling sick mules and broken muzzle-loaded rifles to the Union Army. In recent years, its use has...more

Intellectual Property in Government Contracts – Landmines Abound

Intellectual property is often a company’s most valuable asset. For companies with federal government customers, following the government’s rules can mean the difference between maximizing and losing value in newly developed...more

Financial Services and Technology Companies Beware: The U.S. Office of Federal Contract Compliance Has A Target on Your Back

The President released his 2017 budget this week. Budgets are aspirational documents that Congress rarely implements in full. The current acrimony between Congress and the Administration ensures that the President’s 2017...more

The UK Modern Slavery Act and Supply Chain Responsibility

In October 2015, the UK Modern Slavery Act (MSA) became effective, which requires all companies doing business in the UK with worldwide turnover of at least £36 million (or approximately $51 million as of the date of this...more

Department of Defense Revises Landmark Cybersecurity Rule, Extends Deadline for Some Compliance Requirements

On December 30, 2015, the Department of Defense (DoD) issued a second interim rule on Network Penetration Reporting and Contracting for Cloud Services, amending an earlier version issued on August 26, 2015. The new, amended...more

Extension given to DOD contractors to comply with cybersecurity requirements

The U.S. Department of Defense (DOD) issued an interim rule on December 30, 2015 that extended the deadline for DOD contractors to comply with security requirements for protecting non-classified, but sensitive government...more

Updates to the Department of Defense’s New Cyber Security Regulation

At the end of 2015, the US Department of Defense (DoD) issued a second interim rule, effective immediately, modifying cyber security control requirements it issued earlier in 2015. In particular, this second interim rule (1)...more

Department of Defense Provides Government Contractors a Grace Period for Compliance with Key Cybersecurity Requirements

In response to industry concerns and comments, on December 30, 2015, the Department of Defense issued a new interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity rules promulgated...more

Government Contracts Quarterly Update November 2015

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting....more

DOJ’s Increased Scrutiny of Pharmaceutical Manufacturer and Specialty Pharmacy Ties

Over the past two years, the relationship between pharmaceutical manufacturers and specialty pharmacies has been under increased scrutiny by the U.S. Department of Justice (DOJ). Specifically, the DOJ has targeted industry’s...more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

Department of Defense Issues New Cybersecurity Rules for Defense Agencies That Use Contractors and Cloud Services to Hold...

The U.S. Department of Defense (DOD) recently published an interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS).1 The interim rule, effective August 26, 2015, focuses on two issues. First, the...more

Interim rule requires Department of Defense contractors to report cyber breaches

Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more

5 Takeaways From Former SAP Exec's FCPA Case

On Aug. 12, 2015, Vincente Garcia (former head of Latin American sales for SAP International Inc.) pled guilty in federal court in San Francisco to violations of the Foreign Corrupt Practices Act. In addition to pleading...more

“March-in” Rights – The (Paper) Damoclean Sword of Federal Procurement Patent Law

Given the recent PilieroMazza webinar on Data Rights in federal contracting, we have had a number of clients raise concerns or questions about the government’s “march-in” rights under the Bayh-Dole Act, which controls certain...more

DOJ’s Warning to High-Tech Companies: SAP Official Pleads Guilty To FCPA Violation

When DOJ acts, they like to make a splash. While the FCPA Paparazzi have been lamenting the “slow down” in FCPA enforcement actions and the increase in case closings, DOJ still makes its mark when it acts, and I expect more...more

Adding a Short-Order Cook to a Crowded Kitchen: OMB Guidance Creates a Sense of Urgency for Cybersecurity in Federal Acquisitions

The Office of Management and Budget (OMB) on August 11, 2015 released proposed guidance, that takes “major steps” towards – and likely accelerates – the implementation of cybersecurity requirements in federal acquisitions....more

Cyber-Attacks Against Government Contractors and the Availability of Insurance Coverage

Based on recent cyber-attacks against the United States Office of Personnel Management (OPM) and its subcontractors, USIS and KeyPoint Government Solutions, it is evident that government entities and government contractors...more

63 Results
|
View per page
Page: of 3

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×