What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
During his recent State of the Union address, President Obama called on Congress “to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children’s...more
Nowadays, the European energy world is facing a revolution. European utilities have underperformed the broader European equity market by 80 per cent since the start of 2009. They are all trying to transform themselves from...more
On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more
In response to the growing threat from cyber-attacks, the oil and gas industry has announced the formation of an information sharing clearinghouse. The new group, known as the Oil and Natural Gas Information Sharing and...more
In a Federal Register notice to be officially published Friday, June 20, 2014, the Department of Energy (DOE) is inviting public participation in its efforts to develop a guidance document entitled “Energy Sector Framework...more
The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more
Today, the U.S. Senate Committee on Energy and Natural Resources held a standing-room only hearing titled “Keeping the lights on — Are we doing enough to ensure the reliability and security of the U.S. electric grid?” While...more
The federal government’s long-awaited Cybersecurity Framework offers promising tools for energy companies to manage their cybersecurity risk, but leaves many questions unanswered. The National Institute of Standards and...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
After a brief August hiatus, Privacy Monday is back with privacy goofs, gaffes and tidbits to start your week.
Department of Energy Hacked — Again --
Although the grid is supposed to be “critical infrastructure” as...more
The U.S. government can get historical cell phone records, including geolocational information, from cell phone providers without a warrant, the Fifth District Court of Appeals ruled.
The appellate court reversed the trial...more
Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more
In recent months, federal and state governments have taken an increasingly active role in reviewing cybersecurity issues within the private sector. There has been a flurry of activity as different government bodies discuss...more
Cybersecurity initiatives are moving rapidly within the federal government and require owners and operators of critical infrastructure – including in particular Communication and Energy Systems, and those who supply and...more
On April 18, 2013, the Federal Energy Regulatory Commission (“FERC”) issued a notice of proposed rulemaking (the “NOPR”) stating that it intends to approve Version 5 of the Critical Infrastructure Protection (“CIP”)...more
On April 18, 2013, the Federal Energy Regulatory Commission issued a Notice of Proposed Rulemaking recommending approval of the Version 5 Critical Infrastructure Protection Reliability Standards proposed by the North American...more
Major revisions to the existing cybersecurity requirements for electric utilities will focus on greater protections for the most critical assets but will also ensure that all assets receive some level of protection....more
Electric utilities and other generation and transmission companies will be subject to new cybersecurity standards under a proposed rule issued by the Federal Energy Regulatory Commission (FERC). FERC proposed to approve the...more
Following the lead of the Committee on Civil Liberties, Justice and Home Affairs (LIBE), which already released its draft report (see our prior blog), 20 February, the European Parliament Committee on Industry, Research and...more
A sweeping cyber security law is unlikely to pass any time soon.
White House Cyber Security Coordinator Michael Daniel warned last week that President Obama's Executive Order on Cyber Security (EO) could result in new...more
On February 26, following close on the heels of the recent executive order setting forth the administration’s approach to the regulation of critical infrastructure network security, the National Institute of Standards and...more
In recent years, the security of computerized data and the ability of public and private entities to respond to unauthorized penetration of computer networks has been intensely debated by policymakers. The risks associated...more
On 7 February 2013, the European Commission published two cybersecurity documents designed to provide a comprehensive vision of how European Union Member States, national authorities, and private industry will prevent and...more
A tempting response to the Cybersecurity Executive Order (the "Order"), announced by President Obama at his State of the Union address, is to ignore it. It is vague in key particulars, such as which companies are part of the...more
During his State of the Union address on February 12, 2013, President Barack Obama announced his signing of a long-anticipated Executive Order on cybersecurity. After months of discussions with technology companies the...more
Find a Science, Computers & Technology Author »
Back to Top