Everyone Come to Play: Exploring FOCI Mitigation Instruments
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more
Australia welcomes new business and foreign investment by providing a strong economy, a stable political environment and a skilled and talented workforce. Our comprehensive guide to Doing Business in Australia has been...more
In response to President Biden’s Executive Order authorizing increased data privacy measures, Assistant Attorney General (AAG) Matthew G. Olsen announced that the National Security Division of the Department of Justice (DOJ)...more
On July 26, the Securities and Exchange Commission adopted a new rule regarding cybersecurity risk management, strategy, governance, and incident disclosure. The “Cybersecurity Incident Disclosure Rule” will be applicable to...more
California Privacy Protection Agency Releases Revised Regulations - With the effective date less than three months away, and ahead of a Board Meeting on October 28 and 29, the California Privacy Protection Agency released...more
CYBERSECURITY - Cloaked Ursa Using Trusted Online Storage Services to Evade Detection - According to research by Palo Alto’s Unit 42, the most recent campaign by advanced persistent threat Cloaked Ursa (aka APT 20,...more
Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more
In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more
On May 12, President Biden issued a landmark Executive Order (“the Order”) aimed at improving the country’s cybersecurity threat defense. This Order is an attempt to create a “whole of government” response to increasingly...more
On May 12, 2021, the Biden administration released a far-reaching executive order intended to improve the U.S. government’s cybersecurity posture, both internally and in any private information technology (IT) systems that...more
Key Takeaways: The Trump Administration has remained relatively silent about the 2020 data breach (believed to be connected to Russian state actors). It is unclear at this point whether the Trump Administration will take any...more
Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - Cybersecurity Standards Issued for Government Contractors - On January 31, the Office of the Under Secretary of Defense for Acquisition and...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - FTC Submits Comment on the Preliminary Draft for the NIST Privacy Framework - On October 24, 2019, the Federal Trade Commission ("FTC") announced that...more
In line with recent actions taken across the government to enhance the resilience of the nation’s cybersecurity apparatus, the Cybersecurity Infrastructure Security Agency (CISA) recently released a set of best practices for...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Director Discusses Future Development of Cybersecurity Framework - On March 4, the director of the National Institute of Standards and Technology...more
This past year, in the wake of multiple consumer data breaches and growing concerns regarding national security-related cyber threats, there has been a significant increase in congressional oversight activity directed toward...more
In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more