Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
Cloud computing is a major trend in today's ICT environment. However, unlike participants in some other sectors, Governments in the Asia-Pacific region have been slower to take up the significant financial benefits that this...more
The federal government sector has been abuzz lately with whispers and shouts about pending cybersecurity regulations, frameworks, and requirements. This attention is not particularly surprising, especially given the recent...more
The US General Services Administration is seeking comments from the private sector on draft Alliant II Government Wide Acquisition Contract (GWAC) cybersecurity requirements (available here). The Alliant GWAC provides...more
On February 12, 2014, the Obama Administration released the long-awaited Cybersecurity Framework: “a voluntary how-to guide for organizations in the critical infrastructure community to enhance their cybersecurity” (the...more
The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more
On January 23, 2014, the Department of Defense and General Services Administration issued a final report making recommendations for the development of cybersecurity standards in the acquisition and contracting process. The...more
President Obama’s February 12, 2013 Executive Order, Improving Critical Infrastructure Cybersecurity, required the Department of Defense (DoD) and the General Services Administration (GSA) to make recommendations on the...more
The Department of Defense and the General Services Administration, which together spend more than $500 billion annually on information technology, have released a joint report to the White House recommending steps to upgrade...more
In this issue:
- Are You Ready for the Cybersecurity Boom?
- Size Appeal of Mali, Inc., SBA No. SIZ-5506 (2013)
- Be A Resolved Employer in 2014
- 2014: Year of the WOSB
- Excerpt from Are You...more
On November 20, 2013, the Minnesota Supreme Court issued its long-awaited decision in the case of Helmberger v. Johnson Controls, Inc. The Court ruled in favor of Johnson Controls, Inc. (JCI) and its subcontractor,...more
The Department of Defense (DoD) has published its new final rule governing the security measures imposed on DoD unclassified technical information resident on or passing through the unclassified information systems of its...more
On November 18, 2013, the Department of Defense (DOD) published a Final Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS). The new rule, which is effective immediately, is likely to have broad...more
The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more
On November 18, 2013, the Department of Defense (DOD) issued a final cyber security rule imposing requirements on contractors handling unclassified controlled technical information. While the new rule, which is effective...more
On October 22, 2013, the Department of Defense (DoD) published its Final Rule establishing a program for promoting voluntary sharing of cyber threat information between the DoD and government contractors. The DoD intends this...more
Like Frost’s nameless traveler in “The Road Not Taken,” our Government finds itself confronted with two diverging roads in the cybersecurity realm. The first offers moderation, deliberation, and evolution. The second, speed....more
Procurement and Public Sector Equality Duty Review - On 6 September 2013, the Minister for Women and Equalities published a statement on the outcome of the review.
Mobile banking - supporting an innovative and secure...more
The White House has announced its eight preliminary incentives to encourage private sector owners and operators of critical infrastructure (CI) to adopt the final Cybersecurity Framework, now under development by the...more
President Obama’s February 12, 2013 Executive Order (“EO”) titled, “Improving Critical Infrastructure Cybersecurity,” defined the framework for improving the security of computer networks based on the designation of 16 areas...more
Last week, the General Services Administration (“GSA”) issued a Request for Information (“RFI”) soliciting comments from federal contractors on the feasibility of incorporating cybersecurity standards into federal...more
Acting CMS Administrator, Marilyn Tavenner, recently reaffirmed the agency’s concern that the increased use of electronic health records (“EHRs”) has contributed to increases in fraudulent billing practices by providers. At a...more
If you are a contractor with the federal government, and if you are not already subject to regulations governing the security of your computer systems, you soon will be. On February 12, 2013, President Obama issued an...more
On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more
Find a Science, Computers & Technology Author »
Back to Top