Since 2016, the federal government has implemented numerous procurement regulations and associated contract clauses to address cybersecurity by requiring contractors to adopt various controls and standards to protect...more
10/9/2024
/ Cyber Crimes ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Breach ,
Data Protection ,
Department of Defense (DOD) ,
DFARS ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Information Technology ,
Personally Identifiable Information ,
Risk Management
Introduction -
On April 29, Aerojet Rocketdyne Holdings Inc. (Aerojet) settled claims by whistleblower Brain Markus for a reported $9 million after the second day of a jury trial. This is the second recent settlement under...more
On February 28, the U.S. Department of Justice (DOJ) agreed to a $930,000 settlement with Comprehensive Health Services (CHS) to resolve False Claims Act allegations. The resolution represents the department’s first...more
On May 12, President Biden signed an executive order intended to improve the federal government’s cybersecurity. This comes in the wake of sweeping cyber incidents, such as the SolarWinds incident that affected both public...more
On May 12, President Biden signed an executive order (EO) that seeks to improve the federal government’s cybersecurity. This comes in the wake of sweeping cyber incidents, such as the SolarWinds incident. The EO calls on both...more
Listen to the next installment of the Cyber Café series covering the top issues in government contracts and cybersecurity. During this webinar, Hilary Cairnie, chair of Pepper Hamilton's Government Contracts Practice Group,...more
Listen to this special COVID-19 webinar briefing as part of our Cyber Café series, covering the top issues in government contracts and cybersecurity. This special installment will discuss corporate cybersecurity challenges...more
The Government Contracts Cyber Café provides coaching, training and analysis to help you work through the technical, legal, accounting and other requirements confronting your organization, with the goal of helping you achieve...more
Listen to the fifth installment of our 2019 webinar series covering the top issues in government contracts and cybersecurity — all in just 45 minutes. The Government Contracts Cyber Café provides coaching, training and...more
Join us for the seventh monthly installment of our webinar series that covers the top issues in government contracts and cybersecurity — all in just 45 minutes. The Government Contracts Cyber Café provides coaching, training...more
This article summarizes some of the many risks and implications that are associated with failing to comply with U.S. government-unique cyber and information technology requirements. We are often asked by small and...more
2/2/2017
/ Breach of Contract ,
Confidential Information ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
False Claims Act (FCA) ,
False-Certification of Conformance ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Information Technology ,
Liquidated Damages ,
Mandatory Disclosure Rules ,
Popular ,
Qui Tam ,
Subcontractors ,
Whistleblowers