Science, Computers & Technology Privacy Government Contracting

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

2015 National Defense Authorization Act Requires New Cyber Breach Reporting - "Operationally Critical Contractors" Are Required to...

Congress passed the Carl Levin and Howard P. "Buck" McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA or Act) on Dec. 12, 2014. The NDAA for 2015 creates a new cyber breach reporting requirement affecting...more

Cybersecurity Monday: Who Is Shopping for Your Data?

At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more

Cyber-Breach & NISPOM Conforming Change 2 – It’s What’s on the Inside That Counts

Most companies are worried about external threats – things that are coming at their people, their group, their company, their government, all from an outside actor. Like government’s with an eye on counter-intelligence,...more

Intro to Cybersecurity Framework: New Mandatory NIST Standards for Government Contractors?

Cybersecurity remains one of the most important and least understood issues of the day. Last week, the National Institute of Standards and Technology (NIST) hosted a workshop in Tampa, Florida, to receive private sector...more

Breaching Bad: New Cyber Security Regs for Defense Contractors

Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more

2014 Intelligence Authorization Act Imposes Cyber Breach Reporting Requirement on Intelligence Community Contractors - Many...

The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication. Intelligence community contractors will be...more

Selling Cloud Computing To Government: Beyond The Privacy And Security Debate

Cloud computing is a major trend in today's ICT environment. However, unlike participants in some other sectors, Governments in the Asia-Pacific region have been slower to take up the significant financial benefits that this...more

The Cybersecurity Race: Executive Branch Takes The Lead While Congress Watches From The Bleachers

The federal government sector has been abuzz lately with whispers and shouts about pending cybersecurity regulations, frameworks, and requirements. This attention is not particularly surprising, especially given the recent...more

Contractors affected by the US cybersecurity requirements: take part in the GWAC comment process

The US General Services Administration is seeking comments from the private sector on draft Alliant II Government Wide Acquisition Contract (GWAC) cybersecurity requirements (available here). The Alliant GWAC provides...more

Cybersecurity Update – How Are You Impacted?

On February 12, 2014, the Obama Administration released the long-awaited Cybersecurity Framework: “a voluntary how-to guide for organizations in the critical infrastructure community to enhance their cybersecurity” (the...more

Government Contracts Quarterly Update - February 2014

The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more

Department of Defense and General Services Administration Make Cybersecurity Recommendations for Contractors

On January 23, 2014, the Department of Defense and General Services Administration issued a final report making recommendations for the development of cybersecurity standards in the acquisition and contracting process. The...more

Acquisition Working Group Report Identifies Cybersecurity Considerations for Government Contractors

President Obama’s February 12, 2013 Executive Order, Improving Critical Infrastructure Cybersecurity, required the Department of Defense (DoD) and the General Services Administration (GSA) to make recommendations on the...more

Federal IT Acquisition Policy Recommendations Focus on Cybersecurity

The Department of Defense and the General Services Administration, which together spend more than $500 billion annually on information technology, have released a joint report to the White House recommending steps to upgrade...more

Legal Advisor Newsletter - First Quarter 2014

In this issue: - Are You Ready for the Cybersecurity Boom? - Size Appeal of Mali, Inc., SBA No. SIZ-5506 (2013) - Be A Resolved Employer in 2014 - 2014: Year of the WOSB - Excerpt from Are You...more

Construction Law Insight: Minnesota Supreme Court Rules In Favor Of Contractors In Government Data Practices Act Case

On November 20, 2013, the Minnesota Supreme Court issued its long-awaited decision in the case of Helmberger v. Johnson Controls, Inc. The Court ruled in favor of Johnson Controls, Inc. (JCI) and its subcontractor,...more

Data Security Advisory for Federal Contractors: Safeguarding Unclassified Controlled Technical Information

The Department of Defense (DoD) has published its new final rule governing the security measures imposed on DoD unclassified technical information resident on or passing through the unclassified information systems of its...more

Defense Department Issues Final Rule Requiring Safeguards For Unclassified Technical Information And Cyber Incident Reporting

On November 18, 2013, the Department of Defense (DOD) published a Final Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS). The new rule, which is effective immediately, is likely to have broad...more

CYBERSECURITY UPDATE: New Rules Require Defense Contractors To Protect Technical Information

The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more

DOD Final Rule on Contractors' Responsibilities for Safeguarding Unclassified Technical Data

On November 18, 2013, the Department of Defense (DOD) issued a final cyber security rule imposing requirements on contractors handling unclassified controlled technical information. While the new rule, which is effective...more

New DoD Rule Promotes Voluntary Sharing of Cyber-Security Threat Information Between DoD and Defense Contractors

On October 22, 2013, the Department of Defense (DoD) published its Final Rule establishing a program for promoting voluntary sharing of cyber threat information between the DoD and government contractors. The DoD intends this...more

Robert Frost and Cybersecurity - Two Roads Diverging

Like Frost’s nameless traveler in “The Road Not Taken,” our Government finds itself confronted with two diverging roads in the cybersecurity realm. The first offers moderation, deliberation, and evolution. The second, speed....more

Technology & Sourcing News - September 2013 (Global)

Procurement and Public Sector Equality Duty Review - On 6 September 2013, the Minister for Women and Equalities published a statement on the outcome of the review. Mobile banking - supporting an innovative and secure...more

The Cybersecurity Framework: Administration, Congress move to incentivize private-sector cooperation, strengthen federal...

The White House has announced its eight preliminary incentives to encourage private sector owners and operators of critical infrastructure (CI) to adopt the final Cybersecurity Framework, now under development by the...more

Client Alert: GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Federal Procurement

President Obama’s February 12, 2013 Executive Order (“EO”) titled, “Improving Critical Infrastructure Cybersecurity,” defined the framework for improving the security of computer networks based on the designation of 16 areas...more

41 Results
|
View per page
Page: of 2

Follow Science, Computers & Technology Updates on: