Protection of Critical Infrastructure via LIPA and ICTS

Jackson Walker
Contact
When it comes to critical infrastructure such as electricity, water treatment, internet connectivity, and hazardous waste management, many fear that foreign governments may find ways to infiltrate those systems. To proactively prevent this sort of hacking, the U.S. federal government and states like Texas have instituted regulations and laws that prohibit businesses or individuals from engaging in commercial transactions with certain foreign nations. This episode features Robert Soza discussing the Lone Star Infrastructure Protection See more +
When it comes to critical infrastructure such as electricity, water treatment, internet connectivity, and hazardous waste management, many fear that foreign governments may find ways to infiltrate those systems. To proactively prevent this sort of hacking, the U.S. federal government and states like Texas have instituted regulations and laws that prohibit businesses or individuals from engaging in commercial transactions with certain foreign nations. This episode features Robert Soza discussing the Lone Star Infrastructure Protection Act (LIPA) and regulations from the U.S. Department of Commerce on the Information and Communications Technologies (ICT) supply chain. See less -
Embed
Copy

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Jackson Walker | Attorney Advertising

Written by:

Jackson Walker
Contact
more
less

Jackson Walker on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.