China's Export Policy Changes After U.S. Antitrust Case
Jaffe Sees 'A Lot' of IPOs in 2013 'Pipeline'
How to Protect Your Company From Hackers
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
Aquila: M&A Looking Up in 2013; "The Negatives Are Built In"
More Law Firm Mergers in 2013
There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more
This advisory is one of a series prepared by Pillsbury's China Practice on questions frequently asked by our clients doing business in China. In June 2012, we published an advisory on personal data protection in China in...more
On Tuesday, the U.S. Intellectual Property Enforcement Coordinator, Victoria Espinel, published a notice in the Federal Register "requesting any recommendations for legislative changes that would enhance enforcement against,...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more
Editor’s Note -
This is a dignified law firm newsletter, not like the “Brand X” versions. You won’t find pandering, attention-grabbing stories about Justin Bieber, Kim Kardashian, Ashton Kutcher, Prince William, or...more
March 8 (Bloomberg Law) -- With reports of corporate espionage and hacking on the rise, the US government and private companies need to take steps to prevent
the loss of trade secrets and threats to national security says...more
In This Issue:
- U.S. Regulatory; EU Regulatory: Cybersecurity Efforts to Secure Critical Infrastructure including the Energy Sector Advance in the United States and European Union
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more
Immediately following the failure of the Cybersecurity Act of 2012, we had Steptoe & Johnson’s Stewart Baker join us on LXBN TV. Baker, formerly General Counsel for the National Security Agency and the first Assistant...more
On October 8, 2012, the House Permanent Select Committee on Intelligence (“the Committee”) published a report declaring two Chinese telecommunication equipment manufacturers, Huawei Technologies Company and ZTE, to be threats...more
On October 8, 2012, the House Intelligence Committee issued a damning bi-partisan report on what it perceived to be national security risks posed by two Chinese telecommunications companies: Huawei and ZTE. The committee...more
Full text copy of "U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE," the House Committee on Intelligence report that found “the risks associated with [Chinese telecom companies]...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo