4 Key Takeaways | Solar Industry & Chinese Tariff Update
Wiley's 10 Key Trade Developments: The CHIPS Act and Inflation Reduction Act (IRA)
Contratación para el Desarrollo de Infraestructura del Agua
El Plan Nacional de Desarrollo
Introducing TAG Infrastructure with Board Chair Sarah Ellis - TAG Infrastructure Talks Podcast
Introducing TAG Infrastructure Talks - TAG Infrastructure Talks Podcast
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
Protection of Critical Infrastructure via LIPA and ICTS
Energy + Cybersecurity: What's In the Pipeline? [More with McGlinchey Ep. 23]
On-Demand Webinar | Living on the Edge: Managing Sea Level Rise in California
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
DHS and Cyber: What Should Companies Expect?
#WorkforceWednesday: Guidance for Critical Infrastructure Workers; OSHA Reporting Guidance; EEOC Update - Employment Law This Week®
AF COVID-19 PODCAST: Can Construction Projects Move Forward?
Podcast: CFIUS Update: Key Takeaways from the FIRRMA Implementing Regulations
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
Jones Day Talks: Italy Embraces Foreign investment but Maintains Oversight
Jones Day Talks: Doing Deals Down Under: Australia's Foreign Direct Investment Regime
Jones Day Talks: Navigating Foreign Direct Investment in Germany
China’s new cybersecurity law
Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more
Hong Kong has seen cryptocurrencies grow in popularity, highlighting the need for appropriate licensing regimes (implemented in the form of virtual asset service providers (VASPs)), bolstered by active enforcement actions. ...more
On October 3, 2023, the European Commission ("Commission") unveiled a list of 10 technology areas qualified as "critical" to the European Union's ("EU") economic security, out of which four (Semiconductors, AI, Quantum...more
In December 2022, the UK Product Security and Telecommunications Infrastructure Act (“PSTI Act”) became law. Along with setting out requirements for the deployment and expansion of mobile, full fibre and gigabit capable...more
Now in its seventh year of annual publication, White & Case's Foreign Direct Investment Reviews provides a comprehensive look into rapidly evolving foreign direct investment (FDI) laws and regulations in approximately 40...more
President Biden issued an executive order (EO) increasing protections and safeguards for personal data subject to signals intelligence activities. It also establishes a redress mechanism for residents of qualifying states who...more
Unless you’ve been completely disconnected from the internet for the past year, you’ve undoubtedly read about the passage of a number of state and international laws addressing privacy and cybersecurity. Does this mean that...more
There have been a number of significant legal and policy developments recently related to data and cybersecurity. Some of the most important are...more
The German federal government recently passed the 17th amendment to the Foreign Trade and Payments Ordinance (Außenwirtschaftsverordnung—AWV), which considerably expands the scope of foreign direct investment (FDI) screening...more
Foreign investment control has become a key factor in M&A deals and 2020 was a particularly eventful year. A large number of countries have recently introduced foreign investment control regimes (or tightened their existing...more
On 16 December 2020, the EU released its proposed revisions to the existing Directive 2016/1148 on the security of network and information systems (NIS2)....more
This White Paper presents a high-level overview of the current cybersecurity legislation in force or proposed at the European Union (EU) level as well as in a selection of EU member states. - This White Paper is not an...more
With the imminent rollout of new 5G mobile networks, the European Union (EU) and its member states are looking to adequately frame and safeguard the secure implementation of this new key technology. On top of that, foreign...more
Top Court Seeks Trump Administration Input on PennEast Pipeline - "The U.S. Supreme Court asked the Trump administration for input on a PennEast Pipeline Co. appeal that aims to jump-start a planned natural-gas line by...more
Energy-Related CO2 Emissions ‘Flatlined’ Last Year, IEA Says, Raising Hopes About Climate - "Global emissions remained at approximately 33 gigatonnes in 2019 despite the world economy growing by 2.9%, the IEA said." ...more
Energy Blockchain’s Most Obvious Use Case is Not What You Think - "Instead, a select group of blockchain companies is finding success with a focus on certificates of origin, helping demonstrate the provenance of renewable...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the European Data Protection Board's published opinions on data protection impact assessments, an Ohio court's ruling that bitcoin is covered insured...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
In this month's edition of our Privacy & Cybersecurity Update, we examine Brazil's new data protection regulation, the French data protection authority's warning to two companies of potential GDPR violations and the U.S....more
On December 28, 2016, the New York Department of Financial Services ("DFS") released a revised version of a proposed regulation that would require banks, insurance companies, and other financial services institutions...more
On July 6, 2016, the European Parliament passed the Network and Information Security (“NIS”) Directive, over three years after the initial draft was proposed. The Directive will enter into force in August 2016. EU Member...more
In recent months, federal and state governments have taken an increasingly active role in reviewing cybersecurity issues within the private sector. There has been a flurry of activity as different government bodies discuss...more
The media is replete with reports of a botnet onslaught paralyzing Spamhaus, flaming worms usurping strategic information in the Middle East and a stuxnet super weapon wreaking physical damage to Iran’s nuclear reactors....more
In recent years, the security of computerized data and the ability of public and private entities to respond to unauthorized penetration of computer networks has been intensely debated by policymakers. The risks associated...more
Everyone is talking about cybersecurity. Articles appear almost daily regarding significant cybersecurity events. And over the past two years, the drumbeat for action on the issue of cybersecurity and the protection of the...more