Science, Computers & Technology Privacy Government Contracting

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Senator Tom Carper Questions Office Of Management And Budget Regarding Emerging Cybersecurity Technologies

On April 8, 2016, U.S. Senator Tom Carper, the ranking Democratic member of the Senate Homeland Security and Governmental Affairs Committee, sent a letter to Shaun Donovan, Director of the Office of Management and Budget...more

Health Care E-Note - April 2016

Patient care is not confined to a single office or exam room, or a single physician or other provider. Caring for patients these days now includes complex coordination among physicians, nurses, technicians, staff, management,...more

Appeals Court Confirms that HITECH Violations Do Not Violate FCA

In an important recent decision, the Sixth Circuit Court of Appeals confirmed that a qui tam relator's claim that her former husband improperly accessed electronic protected health information (e-PHI) of her and her relatives...more

Data Rights Under Federal Government Contracts: What Are Data rights?

Data rights under federal government contracts create confusion from both the government and the contractor perspectives. There is substantial misunderstanding as to the purpose of the data rights regulations and the limits...more

Sixth Circuit Affirms Dismissal of FCA Claim Based on Health Data Breaches

The U.S. Court of Appeals for the Sixth Circuit recently affirmed the dismissal of a False Claims Act (FCA) case premised on protected health data breaches. In United States ex rel. Sheldon v. Kettering Health Network, the...more

Sixth Circuit Rules That EHR Security Breaches Do Not Violate False Claims Act

On March 7, 2016, the Sixth Circuit Court of Appeals ruled that security breaches of individual electronic health records (“EHRs”) do not violate the HITECH Act and cannot support False Claims Act allegations. ...more

Health Law Insights Newsletter - Issue 7 - March 2016

McCarter & English, LLP’s Health Care Group presents Issue 7 of the Health Law Insights, which discusses the latest legal issues in the health care industry. NATIONAL - Providers’ Obligation to Report Medicare...more

Privacy Tip #26 – Get in compliance with state data security laws—this week: CT

We previously reported that several states, including Connecticut and Rhode Island, have adopted data security requirements, similar to the Commonwealth of Massachusetts’ data security regulations that have been in effect...more

Hot Topics in Employment Law Seminar

On March 4, 2016, the Miles & Stockbridge Labor, Employment, Benefits & Immigration group presented its fourteenth annual Hot Topics in Employment Law seminar to an audience of over three hundred clients and members of the...more

Government Contracts Quarterly Update February 2016

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. In This Issue...more

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

Department of Defense Revises Landmark Cybersecurity Rule, Extends Deadline for Some Compliance Requirements

On December 30, 2015, the Department of Defense (DoD) issued a second interim rule on Network Penetration Reporting and Contracting for Cloud Services, amending an earlier version issued on August 26, 2015. The new, amended...more

Extension given to DOD contractors to comply with cybersecurity requirements

The U.S. Department of Defense (DOD) issued an interim rule on December 30, 2015 that extended the deadline for DOD contractors to comply with security requirements for protecting non-classified, but sensitive government...more

DoD Grants Contractors a Reprieve: Cybersecurity Compliance is Delayed

The U.S. Department of Defense (DoD) released interim rules on Aug. 26, 2015, setting forth (i) information system security requirements; (ii) mandatory cyber breach reporting; and (iii) cloud computing standards and...more

Updates to the Department of Defense’s New Cyber Security Regulation

At the end of 2015, the US Department of Defense (DoD) issued a second interim rule, effective immediately, modifying cyber security control requirements it issued earlier in 2015. In particular, this second interim rule (1)...more

Department of Defense Provides Government Contractors a Grace Period for Compliance with Key Cybersecurity Requirements

In response to industry concerns and comments, on December 30, 2015, the Department of Defense issued a new interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity rules promulgated...more

UPDATE: DoD Cybersecurity Rules Expand Contractors’ and Other DoD Awardees’ Obligations to Safeguard Sensitive Data and Report...

On December 30, 2015, DoD published an interim rule, effective immediately, amending portions of the August Rule. Most importantly, pursuant to the new rule, contractors administering covered information systems that are not...more

Public-private team of security experts disrupt Dorkbot malware

This is how it should be—private companies working with law enforcement to disrupt evil doers on the Internet. Late last week, Microsoft announced that it teamed up with the Department of Homeland Security, Europol, the FBI,...more

DoD Cybersecurity Rules Expand Contractors’ and Other DoD Awardees’ Obligations to Safeguard Sensitive Data and Report Cyber...

The United States Department of Defense (“DoD”) recently published two new rules that impose broader obligations to safeguard information that falls within specified categories of sensitive data and to report cyber incidents...more

It’s (Not) Academic: Cybersecurity Is a Must for Universities and Academic Medical Centers

Cutting-edge research institutions need cutting-edge cybersecurity to protect their IP and critical personal and financial data. Universities hold vast repositories of valuable information, including student healthcare...more

Alert: Department of Defense Finalizes Cybersecurity Rule Impacting IT Contractors

On October 30, 2015, the Department of Defense ("DoD") issued a new rule, Requirements Relating to Supply Chain Risk, requiring its agencies to evaluate cybersecurity risks when considering contractors who provide Information...more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

Are You Overcomplicating Your Cybersecurity Processes?

Yes. I just asked that. For many, the response is likely “Yes! Of course we are! It’s *&^%$% cybersecurity – it’s complicated!” To which I would respond “Touché. It is…but it needn’t be overly complicated.” So, of...more

New DoD Cybersecurity Rule and How Contractors Can Reduce Their Risks

The Department of Defense (DoD) issued an interim cybersecurity rule in August 2015 that, among other things, revises the existing Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity clause and increases...more

More Cybersecurity Rules

This update will cover two things: (1) the new (yes, again) Department of Defense cybersecurity interim/final rule on reporting cyber incidents by contractors / subcontractors and (2) the money to fund these new rules and...more

95 Results
|
View per page
Page: of 4

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×