Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
In case you spent last week (this morning) dealing with winter weather instead of reading the latest and greatest in the realm on federal contracting, here is a rundown of last week’s top developments related to government...more
Reporting Deadline for HIPAA Breaches – March 1, 2015 – Did you have a HIPAA breach this year involving less than 500 individuals? If so, the deadline to report such a breach to the U.S. Department of Health and Human...more
GOVERNMENT CONTRACTS -
SBA Considering Extending Comment Period for Proposed Rule on the Limitations on Subcontracting -
Although not yet official, we anticipate that SBA will grant an extension until April 6th...more
Speaking at the White House’s Summit on Cybersecurity and Consumer Protection at Stanford University this month, President Obama announced that an Executive Order was signed on February 13, urging private sector companies to...more
There are a growing number of cybersecurity requirements applicable to government contractors that work with the Department of Defense (DoD) and intelligence community. ...more
Altegrity, Inc., who bills itself on its website as “The world’s leading brands in risk solutions, security, ediscovery, data recovery and employment screening,” filed for chapter 11 protection in Delaware on February 8,...more
This post is co-authored by Tamara Jack of LMI Government Consulting. Federal government contractors, especially those in the manufacturing sector, continue to experience the economic impact of budget cuts, decreased federal...more
On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist...more
The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting.
Each year brings significant changes and challenges in the laws governing the health care industry, and 2014 proved to be no exception. What the year may have lacked in the high drama that accompanies comprehensive health...more
Congress passed the Carl Levin and Howard P. "Buck" McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA or Act) on Dec. 12, 2014. The NDAA for 2015 creates a new cyber breach reporting requirement affecting...more
At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more
Most companies are worried about external threats – things that are coming at their people, their group, their company, their government, all from an outside actor. Like government’s with an eye on counter-intelligence,...more
Cybersecurity remains one of the most important and least understood issues of the day. Last week, the National Institute of Standards and Technology (NIST) hosted a workshop in Tampa, Florida, to receive private sector...more
Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
Cloud computing is a major trend in today's ICT environment. However, unlike participants in some other sectors, Governments in the Asia-Pacific region have been slower to take up the significant financial benefits that this...more
The federal government sector has been abuzz lately with whispers and shouts about pending cybersecurity regulations, frameworks, and requirements. This attention is not particularly surprising, especially given the recent...more
The US General Services Administration is seeking comments from the private sector on draft Alliant II Government Wide Acquisition Contract (GWAC) cybersecurity requirements (available here). The Alliant GWAC provides...more
On February 12, 2014, the Obama Administration released the long-awaited Cybersecurity Framework: “a voluntary how-to guide for organizations in the critical infrastructure community to enhance their cybersecurity” (the...more
The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more
On January 23, 2014, the Department of Defense and General Services Administration issued a final report making recommendations for the development of cybersecurity standards in the acquisition and contracting process. The...more
President Obama’s February 12, 2013 Executive Order, Improving Critical Infrastructure Cybersecurity, required the Department of Defense (DoD) and the General Services Administration (GSA) to make recommendations on the...more
The Department of Defense and the General Services Administration, which together spend more than $500 billion annually on information technology, have released a joint report to the White House recommending steps to upgrade...more
In this issue:
- Are You Ready for the Cybersecurity Boom?
- Size Appeal of Mali, Inc., SBA No. SIZ-5506 (2013)
- Be A Resolved Employer in 2014
- 2014: Year of the WOSB
- Excerpt from Are You...more
Find a Science, Computers & Technology Author »
Back to Top