Latest Posts › Department of Justice (DOJ)

Share:

DOJ Issues Guidance for New Data Security Program

On April 8, the Department of Justice’s (“DOJ’s”) final rule on Preventing Access to US Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons (the “Rule”) formally took effect. ...more

DOJ Finalizes Rule Regarding Sensitive Data Transfers

On January 8, the Department of Justice (DOJ) published its final Rule implementing Executive Order 14117 (EO), “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by...more

DOJ Issues NPRM Regarding Sensitive Data Transfers

With the publication of a recent Notice of Proposed Rulemaking (NPRM), the Department of Justice National Security Division will soon become an important new regulator of transactions involving the transfer of sensitive U.S....more

Final DoD Cybersecurity Maturity Model Certification Rule Will Bring Compliance Challenges, Increased False Claims Act Risk

On October 11, 2024, the U.S. Department of Defense (DoD) at long last published a final rule establishing the Cybersecurity Maturity Model Certification (CMMC) Program (the Final Rule)...more

U.S. Agencies Caution Foreign-Based Persons on Extraterritorial Reach of U.S. Sanctions and Export Control Regulations

On March 6, 2024, the U.S. Departments of the Treasury, Commerce, and Justice jointly issued a Tri-Seal Compliance Note titled “Obligations of Foreign-Based Persons to Comply with U.S. Sanctions and Export Control Laws”...more

DOJ Launches “Civil Cyber Fraud Initiative” to Use the False Claims Act to Address Cybersecurity-Related Conduct

The US Department of Justice (DOJ) recently announced plans to use the False Claims Act (FCA) to pursue cybersecurity-related fraud by government contractors, subcontractors and grant recipients, including for providing...more

Department of Justice Issues Best Practices Guidance on Cyber Incidents

On Wednesday, April 29, the US Department of Justice released guidance titled “Best Practices for Victim Response and Reporting of Cyber Incidents.” The guidance outlines steps companies should take before, during, and after...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide