News & Analysis as of

National Security Encryption

Pillsbury - Internet & Social Media Law Blog

From Encryption to Employment, U.S. Federal Agencies Brace for the Effects of Quantum Computing, AI and More

In this week’s edition of Consumer Protection Dispatch, we look at the latest regulatory developments from the U.S. Department of Commerce, Consumer Financial Protection Bureau, and the Securities and Exchange Commission...more

American Conference Institute (ACI)

[Webinar] Complimentary Webinar on U.S.-China Export & Cyber Controls - June 30th, 1:00 pm - 2:00 pm EDT

With six months into the Biden Administration, American Conference Institute invites you to join one-hour Complimentary Webinar on U.S.-China Export & Cyber Controls, which will take place on June 30th at 1:00pm EDT. The...more

Wilson Sonsini Goodrich & Rosati

U.S. Department of Commerce's Bureau of Industry and Security Relaxes Several Classification and Reporting Requirements for...

As of March 29, 2021, the U.S. Department of Commerce's Bureau of Industry and Security (BIS) has implemented significant modifications to the Export Administration Regulations (EAR) that relax requirements on the...more

Pillsbury Winthrop Shaw Pittman LLP

China Publishes Import License List and Export Control List for Commercial Encryption

The Encryption Export List is the first list of controlled items after the issuance and implementation of China’s new Export Control Law. Under the previous legal regime, China imposed export licensing requirements on the...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 4, August 2020

Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more

Williams Mullen

State Dept. Adopts ITAR Amendment on Use of End-to-End Encryption in International Data...

Williams Mullen on

The State Department has adopted an important new ITAR amendment confirming that if controlled technical data is encrypted using end-to-end encryption, the transfer of such data outside the U.S. is not considered an export...more

Sheppard Mullin Richter & Hampton LLP

From CFIUS, With Love: The FIRRMA Regulations

The most pressing question around the new FIRRMA regulations is “Will my transaction be covered?” To provide a bit of guidance on that point, we present an illustration from our upcoming Second Edition of The CFIUS Book due...more

Akin Gump Strauss Hauer & Feld LLP

DDTC Publishes ITAR Carve-out for Encrypted Technical Data and Software, and Further Harmonizes Definitions Common to the ITAR and...

• On December 26, 2019, DDTC published an interim final rule that would allow, under certain conditions, encrypted technical data and software that is subject to the ITAR to be sent, shipped or stored outside the United...more

Perkins Coie

China’s New Draft Encryption Law

Perkins Coie on

The Standing Committee of the National People’s Congress released the Encryption Law of the People’s Republic of China (Draft) for public comment on July 5, 2019 (the “2019 Draft”). The Encryption Law is being enacted to do...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 14

Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

King & Spalding

DOJ Criminal Chief Continues Push For More Access To Encrypted Data

King & Spalding on

On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more

Patterson Belknap Webb & Tyler LLP

Back-Door Access to Encrypted Communications: Weakening Security to Improve Security?

Last month’s terror attacks in Paris have re-ignited the long-standing debate between national security and privacy advocates over whether technology companies should be required to provide the government special access to...more

Robinson+Cole Data Privacy + Security Insider

Cybersecurity + Law Enforcement: The Cutting Edge Symposium | Friday, October 16, 2015 RWU Law Bristol, RI

Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more

Morgan Lewis

Online Payment Systems Technology in China—Trojan Horse or Forbidden Fruit?

Morgan Lewis on

Powerful new computational technology pioneered in e-commerce presents Chinese regulators with potential concerns and solutions to the perennial problem of information, pricing, and settlement capacity. Online payment...more

King & Spalding

Coders Oppose Government Access To Encrypted Data

King & Spalding on

A group of top coding specialists published a paper on July 6, 2015, arguing that law enforcement’s desire to access encrypted data is not only unfeasible, but would also possibly imperil the security and privacy of global...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide