News & Analysis as of

Encryption National Security Cybersecurity

Hogan Lovells

End-to-end encryption: obstacle or pillar of national security?

Hogan Lovells on

In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

King & Spalding

Biden Administration’s Eleventh-Hour Executive Order Imposes New Software Requirements on Companies

King & Spalding on

On January 16, 2025, President Biden issued Executive Order 14144 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the “EO”). Building on prior initiatives such as Executive Order 14028 and the...more

Pillsbury - Internet & Social Media Law Blog

From Encryption to Employment, U.S. Federal Agencies Brace for the Effects of Quantum Computing, AI and More

In this week’s edition of Consumer Protection Dispatch, we look at the latest regulatory developments from the U.S. Department of Commerce, Consumer Financial Protection Bureau, and the Securities and Exchange Commission...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

Perkins Coie

China’s New Draft Encryption Law

Perkins Coie on

The Standing Committee of the National People’s Congress released the Encryption Law of the People’s Republic of China (Draft) for public comment on July 5, 2019 (the “2019 Draft”). The Encryption Law is being enacted to do...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 14

Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Robinson+Cole Data Privacy + Security Insider

Cybersecurity + Law Enforcement: The Cutting Edge Symposium | Friday, October 16, 2015 RWU Law Bristol, RI

Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more

Morgan Lewis

Online Payment Systems Technology in China—Trojan Horse or Forbidden Fruit?

Morgan Lewis on

Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide