Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
POST BUDGET -
What it means for digital innovation and emerging technology:
The theme of the 2015 Budget encourages Australian Government entities to proactively reform the way they do business. Specifically,...more
In case you spent last week (this morning) dealing with winter weather instead of reading the latest and greatest in the realm on federal contracting, here is a rundown of last week’s top developments related to government...more
There are a growing number of cybersecurity requirements applicable to government contractors that work with the Department of Defense (DoD) and intelligence community. ...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
June 14 (Bloomberg Law) -- Trevor Timm, writer and activist at the Electronic Frontier Foundation, talks with Bloomberg Law's Lee Pacchia about recent intelligence leaks surrounding the NSA's surveillance of American...more
As the Alabama Legislature marked the halfway point of the 2013 Regular Session, progress continued to move at a slow pace where repercussions of the Alabama Accountability Act continue to linger in the halls of the...more
On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more
On February 12, 2013, President Barack Obama issued the long awaited cybersecurity Executive Order, which will establish national cybersecurity standards for critical infrastructure. This cybersecurity Executive Order was...more
Given the failure to enact comprehensive cybersecurity legislation last year, Congress included several targeted statutory provisions setting federal defense policy on a range of cybersecurity issues in the National Defense...more
On January 2, 2013, President Obama signed the 2013 National Defense Authorization Act for 2013 (NDAA) into law. Each year Congress passes the NDAA to authorize funding levels for Department of Defense (DoD) programs and...more
On October 10, 2012, two pro-life groups petitioned the U.S. Supreme Court to review and reverse the U.S. Court of Appeals for the District of Columbia Circuit Court’s decision allowing the continued federal funding of...more
In comments released on March 12, 2010, the Administration announced that it will be shifting the current encryption review request process under 15 C.F.R. section 740.17 to an on-line system, with the objective of reducing...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top