Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
What are the Implications of Alice v. CLS?
The CRA will affect a broad range of digital products placed on the EU market (including by those based outside the EU), including connected hardware/devices, software and remote data processing solutions. The EU has adopted...more
Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more
Citing the threats posed by foreign adversaries and criminal organizations, and seeking enhanced accountability for companies that provide software and cloud services to the federal government, the Biden administration has...more
After years of anticipation, the Federal Acquisition Regulation (FAR) Council has announced the arrival of its proposed rule to enhance the safeguarding of Controlled Unclassified Information (CUI) in federal contracts (the...more
On November 15, 2024, the Department of Defense (“DoD”) issued a long-awaited Proposed Rule to implement Section 1655 of the National Defense Authorization Act for Fiscal Year 2019. Section 1655 prohibits DoD from...more
Part of the Biden Administration’s push to enhance U.S. cybersecurity capabilities has focused on imposing new requirements on government contractors. The 2023 National Cybersecurity Strategy suggested, for example, that...more
WHAT: The U.S. Department of Defense (DOD) issued a proposed rule to implement Section 1655(a) and (c) of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2019 (Pub. L. 115-232). The proposed rule would...more
Effective information security is no longer just dependent on an organisation’s own internal cybersecurity controls. The UK Information Commissioner’s Office (ICO) highlights that third-party service providers are processing...more
The Learned Concierge - Welcome to your monthly legal insights on the trends impacting the Retail, Hospitality, and Food & Beverage Industries....more
On June 20, 2024, the U.S. Department of Commerce’s Bureau of Industry and Security (“BIS”) issued a Final Determination prohibiting the sale of certain cybersecurity products, anti-virus software, and related services to...more
In light of the increasing organizational use of and reliance on software and the concerns raised regarding the malicious use of the same, the UK Government has published a response to its call for views on software...more
Whether the game is football, baseball, hockey, or Indy Car racing, no team goes into their major championship matchup without training. Companies need to train as well if they intend to operate on the internet and expect to...more
As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more
On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (“CISA”) and the Office of Management and Budget (“OMB”) released the highly-anticipated Secure Software Development Attestation Form (also known as the...more
In today's interconnected global economy, supply chain optimization plays a critical role in driving business success. However, unpredictable weather events such as hurricanes, tropical storms, and extreme weather conditions...more
The Cybersecurity and Infrastructure Security Agency (“CISA”) recently revised its Secure Software Development Attestation Common Form (after receiving over 110 comments on the initial draft), and is seeking additional...more
On June 16, the U.S. Department of Commerce published a final rule, effective July 17, 2023, on Securing the Information and Communications Technology and Services ("ICTS") Supply Chain, signaling potential new actions on...more
As follow-on guidance to Office of Management and Budget’s (OMB) September 14, 2022 memo and the associated Executive Order on Improving the Nation’s Cybersecurity from May 2021, the Cybersecurity and Infrastructure Security...more
Government contractors providing software across the federal government’s supply chain will be required later this year to comply with a new Secure Software Design Framework (SSDF). The SSDF requires software vendors to...more
Hollywood is full of them. And unless you are trapped on the Planet of the Apes, caught on the 3:10 to Yuma, or running from Godzilla, you’ve probably seen a movie reboot or two over the past two decades. The term generally...more
Automobiles may be the most complex, essential and widely used consumer products in the world and every year they incorporate increasingly advanced technology into nearly every component and function. The advancing...more
Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more
Per Executive Order 14028, Improving the Nation’s Cybersecurity, the Office of Management and Budget (OMB) issued a memorandum on September 14, 2022 requiring federal agencies to only use software from software producers that...more
The OMB has issued memorandum M-22-18 with new security requirements (the "Rules") requiring federal agencies to ensure that all third-party software they use complies with secure software development standards and guidance...more