Cybersecurity Department of Defense (DOD)

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

DFARS and DIB: Compliance Steps for DoD’s Newly Finalized Cybersecurity Rules for Contractors

For businesses that work with the U.S. Department of Defense (“DoD”), two important rules for safeguarding certain categories of sensitive information and reporting cyber incidents were recently finalized, updating the...more

Department of Defense Issues Final Version of Key Cybersecurity Rule

On October 21, 2016, the Department of Defense (DoD) issued its final rule on Network Penetration Reporting and Contracting for Cloud Services, amending an interim version issued on August 26, 2015, and revised on December...more

Department of Defense Issues Final Rule on Network Penetration Reporting and Contracting for Cloud Services

Last week, the Department of Defense adopted as final, with several changes, its interim rule amending the DFARS on “Network Penetration Reporting and Contracting for Cloud Services.” The changes went into effect...more

Department of Defense (DoD) Issues Final Rule on Safeguarding Covered Defense Information and Related Information Security...

On October 21, 2016, the Department of Defense (“DoD”) issued a final rule (the “final rule”) codifying the specific actions DoD contractors and subcontractors must take to adequately safeguard “covered defense information”...more

Effective November 3, 2016: Final DoD Cyber Incident Reporting Rule

On Tuesday, October 4, 2016, the Department of Defense (DoD) issued a long-awaited final rule implementing statutory requirements (10 U.S.C. §§ 391, 393) as part of 32 C.F.R part 236 regarding the reporting, by defense...more

DoD Finalizes Cybersecurity and Cloud Computing Rule

On October 21, 2016, the Department of Defense (DoD) issued a final rule following-up on the interim rules it had issued on August 26 and December 30, 2015, regarding safeguarding contractor networks and purchasing cloud...more

DoD issues final rule on covered defense information clarifying contractor obligations

The US Department of Defense (DoD) issued a rule on Friday, October 21, 2016, finalizing its information security and cyber incident reporting requirements. The rule, Network Penetration Reporting and Contracting for Cloud...more

Department Of Defense Issues Final Cyber Incident Reporting Rule

On October 4, 2016, the Department of Defense (“DoD”) published a final rule implementing mandatory cyber incident reporting requirements for DoD contractors and subcontractors. The rule, which is effective as of November 3,...more

DoD Updates Cyber Incident Reporting Rule

On October 4, 2016, a final rule implementing statutory requirements for Department of Defense (DoD) contractors and subcontractors to report cyber incidents that result in an actual or potentially adverse effect on a covered...more

ITAR For Government Contractors: Revised For Recent Amendments

One of the most important areas of regulation for defense contractors is the International Traffic In Arms Regulations (“ITAR”). ITAR are the State Department controls that regulate the defense industry. Companies regulated...more

FedRAMP Accelerates the Process for Federal Contractors to Obtain Cloud Service Provider Authorizations and DoD Revises its Cloud...

Cloud computing is ubiquitous in the federal market place. Many federal contractors either provide cloud computing services to the government or use cloud computing services when performing a federal contract. For cloud...more

A New Cybersecurity Regime and a New Regulation to Mandate Secure Information Systems for Government Contractors

Congress has enacted a recent wave of legislation to address ongoing cybersecurity threats; the Executive Branch, on May 12, 2016, adopted new cybersecurity regulations; and other Federal initiatives are underway and will...more

FAR Information System Security Standards Rules Finalized

The U.S. federal government announced on May 16, 2016, new Federal Acquisition Regulation (FAR) rules that set high-level standards for the basic safeguarding of contractor information systems that process, store or transmit...more

A lighter touch — Final FAR rule issued on safeguarding contractor information systems

On Monday, May 16, 2016, the FAR Council is expected to issue its long- awaited final FAR rule ("the Final Rule") on safeguarding contractor information systems. This rule, effective immediately, creates a new contract...more

It’s Arrived! FAR Final Rule Addressing “Basic Safeguarding of Contractor Information Systems”

After nearly four years of planning and comments, DoD, GSA, and NASA issued a final rule today amending the Federal Acquisition Regulations (“FAR”) with a new Subpart 4-19 and a new contract clause 52.204-21 addressing the...more

DOD Expands Cyber Security Rules for Defense Contractors

Action Item: Through a new version of its Cyber Security Clause, the Department of Defense (“DOD”) is directing defense contractors to extend their cyber defense and reporting requirements beyond their recognizable supply...more

Privacy & Cybersecurity Update - March 2016

In this edition of our Privacy & Cybersecurity Update, we examine the FCC's proposed privacy rules for broadband providers; new developments relating to the Privacy Shield, which was created to replace the U.S.-EU Safe Harbor...more

DoD Reveals its Cybersecurity Discipline Implementation Plan (or How 1940s War Department VD Training Can Help Your 21st Century...

“If our country is to successfully defend our right to live the American way, it needs every one of you, and requires you in the best possible condition. Any [company] who willfully, or through neglect fails to maintain...more

How Government Contractors Can Manage the Challenges of Rapid Reporting of Cyber Incidents

In the past few years, the Department of Defense’s (DoD) regulations have mandated that DoD contractors and subcontractors rapidly report cyber incidents to the government. That trend continues and may spread to civilian...more

Government Contracts Quarterly Update February 2016

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. In This Issue...more

The gift of time: A second DOD interim rule grants contractors additional time to comply with cyber security requirements

The US Department of Defense (DOD) earlier today issued a second interim rule, effective immediately, that gives affected contractors until December 31, 2017, to implement fully compliant cyber security controls....more

Department of Defense Revises Landmark Cybersecurity Rule, Extends Deadline for Some Compliance Requirements

On December 30, 2015, the Department of Defense (DoD) issued a second interim rule on Network Penetration Reporting and Contracting for Cloud Services, amending an earlier version issued on August 26, 2015. The new, amended...more

Updates to the Department of Defense’s New Cyber Security Regulation

At the end of 2015, the US Department of Defense (DoD) issued a second interim rule, effective immediately, modifying cyber security control requirements it issued earlier in 2015. In particular, this second interim rule (1)...more

Department of Defense Provides Government Contractors a Grace Period for Compliance with Key Cybersecurity Requirements

In response to industry concerns and comments, on December 30, 2015, the Department of Defense issued a new interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity rules promulgated...more

UPDATE: DoD Cybersecurity Rules Expand Contractors’ and Other DoD Awardees’ Obligations to Safeguard Sensitive Data and Report...

On December 30, 2015, DoD published an interim rule, effective immediately, amending portions of the August Rule. Most importantly, pursuant to the new rule, contractors administering covered information systems that are not...more

76 Results
|
View per page
Page: of 4
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×