Everyone Come to Play: Exploring FOCI Mitigation Instruments
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
On May 7, 2024, the Federal Communications Commission (FCC) issued its latest network neutrality order, Safeguarding and Securing the Open Internet (the "Order"), which was published in the Federal Register on May 22, 2024,...more
With the recent circulation of the Federal Communications Commission’s (FCC) draft version of its highly anticipated net neutrality order, Promoting a Fast, Open, and Fair Internet (the 2024 Order), Chairwoman Jessica...more
Recent actions by the Federal Communications Commission indicate its support for the country’s space-based economy and national security interests. The FCC has adopted rules that allow satellite operators and terrestrial...more
On March 2, the Biden administration announced the release of its National Cybersecurity Strategy (Strategy) in a continued effort to provide a safe and secure digital ecosystem for Americans. ...more
Editor’s Note: In regulatory news, the Colorado AG published a second version of its proposed regulations. In U.S. litigation, Meta and TikTok both faced further litigation, and an Illinois court ruled that J&M Plating must...more
Takeaway: Security labels on internet-connected devices are on the horizon for companies that manufacture and want to sell such devices worldwide. On October 19, 2022, 50 representatives from different industries including...more
China continued to strengthen its national security regulatory regime by introducing the new Data Security Law in 2021 - China has further strengthened its legislation on data security in view of the popularity of...more
This webinar focuses on the role of the U.S. government and Biden Administration in protecting American cybersecurity with respect to: - The prevalence and spread of malicious third party code; - Internet infiltration,...more
Key Wireless Deadlines - FCC Requests Comment on Proposals to Address 911 Fee Diversion: Reply comments are due by April 2 on the Federal Communications Commission’s (FCC or Commission) Notice of Proposed Rulemaking to...more
Washington saw a flurry of bipartisan activity over the last few weeks. Most notably, Republican and Democratic negotiators reached a long-awaited deal on sequestration budget caps. The compromise, announced on February 7 as...more
Employers may need to start “following” the information their foreign national workers share on Twitter or Facebook, as the Department of Homeland Security is turning social media into the federal government’s latest...more
On October 6 a bipartisan group of lawmakers from the House Judiciary Committee unveiled the USA Liberty Act (H.R. 3989), which seeks to reform and reauthorize Section 702 of the Foreign Intelligence Surveillance Act. Section...more
China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more
China’s current leadership has attached significant attention to network security, which is deemed to be a core aspect of national security. In early 2014, China’s President, Xi Jinping, who is also the head of the Office for...more
A group of top coding specialists published a paper on July 6, 2015, arguing that law enforcement’s desire to access encrypted data is not only unfeasible, but would also possibly imperil the security and privacy of global...more