FCPA Compliance and Ethics Report-Episode 175-Debra Bruce on new methods for law firm funding and its implications
Bjarne Tellmann of Pearson on Major Disruption in the Legal Industry
Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
On July 10, 2015, the Army National Guard announced a breach of its current and former members’ personal information, dating back to 2004. The breach occurred when files containing personal information were accidentally...more
In the wake of the recent public disclosure of the massive breach into the Office of Personnel Management compromising the personal information of approximately 4 million individuals, Senators were hoping to tie a...more
Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more
FireEye’s MVX and DTI Technologies become the first cybersecurity products to earn certification as “Qualified Anti-Terrorism Technologies.”
The Department of Homeland Security (DHS) crossed an important barrier in...more
In a speech at Stanford University on April 23, 2015, Department of Defense (“DoD” or the “Pentagon”) Secretary Ash Carter unveiled the Pentagon’s new cyber strategy (the “Strategy”) and called on the technology sector to...more
SMALL BUSINESS ADMINISTRATION -
SBA Issues Proposed Rule to Amend Women-Owned Small Business Federal Contract Program -
The U.S. Small Business Administration (SBA) issued a proposed rule to amend its...more
On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more
In a recently issued Presidential Memorandum, President Obama included privacy guidelines for the federal government’s use of unmanned aircraft systems (“UAS”) in the United States.
Issued on February 15, 2015, and...more
Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information...more
GOVERNMENT CONTRACTS -
SBA Considering Extending Comment Period for Proposed Rule on the Limitations on Subcontracting -
Although not yet official, we anticipate that SBA will grant an extension until April 6th...more
On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist...more
Programming Error Leads to “Low Tech” Data Breach at Indiana Family and Social Services Administration -
Although it started with a programming error, the breach itself was paper document. Apparently, a programming...more
WIKILEAKS - DECEPTION AND DISINFORMATION?
Perhaps more attention than is deserved is being given by government and the media to the release, by Wikileaks, of alleged "secret" diplomatic communications.
In this "letter...more
President Obama's address on the end of the combat mission in Iraq has left open the question of what will happen to the massive biometric databases on Iraqis, assembled by the United States, during the course of the...more
This case alleges targeting of the leaders of an Islamic charity and their lawyers by the admitted, targeted warrantless wiretapping by the NSA. It is based on a document that was accidentally disclosed to the plaintiffs by...more
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top