News & Analysis as of

Cybersecurity Hackers DFARS

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Venable LLP

The Subcontractor Performed. The Prime Contractor Paid. But a Hacker Ended Up with the Money. Who Is Responsible?

Venable LLP on

When hackers gain access to a subcontractor’s information systems and divert the prime contractor’s payment to themselves instead of to the subcontractor, does the prime contractor still have to pay the subcontractor?...more

Robinson+Cole Data Privacy + Security Insider

Interim rule requires Department of Defense contractors to report cyber breaches

Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide