News & Analysis as of

Data Security Iran Executive Orders

Womble Bond Dickinson

DOJ’s Data Security Program Final Rules Effective - Implications for Telecom Providers

Womble Bond Dickinson on

On January 8, 2025, the U.S. Department of Justice (DOJ) issued its final rule to implement Executive Order 14117 aimed at preventing access to Americans' bulk sensitive personal data and government-related data by countries...more

Orrick, Herrington & Sutcliffe LLP

DOJ implements its Data Security Program to protect users’ data

On April 11, the DOJ announced steps towards the implementation of a national security program aimed at protecting Americans’ sensitive data from China, Russia, Iran and other foreign adversaries. The Data Security Program,...more

Womble Bond Dickinson

Navigating the New DOJ Data Security Program Compliance

Womble Bond Dickinson on

On January 8, 2025, the U.S. Department of Justice (“DOJ”) issued its final rule to implement Executive Order 14117 aimed at preventing access to Americans' bulk sensitive personal data and government-related data by...more

Hinch Newman LLP

DOJ Issues Rule Addressing Threat Posed by Foreign Adversaries’ Access to Americans’ Sensitive Personal Data

Hinch Newman LLP on

On Friday, December 27, 2024, the Justice Department issued a final rule to address “urgent national security risks posed by access to U.S. sensitive personal and government-related data from countries of concern and covered...more

Goodwin

US Government Moves to Regulate Cross-Border Transactions Involving Sensitive Data

Goodwin on

In a sweeping, coordinated effort across federal agencies, the US government has taken a giant leap forward to prevent access to data that could be exploited to the detriment of national security. On February 28, 2024,...more

Carlton Fields

The War Against Cyber Threats: President Obama Ups the Ante

Carlton Fields on

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide