The Department of Justice (DOJ) and the Department of Commerce recently announced a $140 million resolution of criminal and civil charges against Cadence Design Systems (Cadence) for admitted export control violations...more
8/7/2025
/ Bureau of Industry and Security (BIS) ,
China ,
Department of Justice (DOJ) ,
Enforcement Actions ,
Export Controls ,
National Security ,
Plea Agreements ,
Popular ,
Risk Management ,
Semiconductors ,
Settlement ,
Technology Sector ,
U.S. Commerce Department
The Biden Administration has issued its long-awaited Executive Order on Addressing United States Investments in Certain National Security Technologies and Products in Countries of Concern (“EO”), which will create a new...more
8/11/2023
/ Advanced Notice of Proposed Rulemaking (ANPRM) ,
Biden Administration ,
China ,
Cybersecurity ,
Executive Orders ,
Foreign Investment ,
NAICS ,
National Security ,
Outbound Transactions ,
Popular ,
Proposed Regulation ,
Supply Chain ,
Technology Sector ,
U.S. Treasury
Following a series of public reports, the United States appears close to announcing a new regulatory process to scrutinize US “outbound” investment to countries presenting national security challenges. ...more
2/22/2023
/ Acquisitions ,
CFIUS ,
Compliance ,
Covered Transactions ,
Cross-Border Transactions ,
Foreign Investment ,
Mergers ,
NAICS ,
National Security ,
Office of Foreign Assets Control (OFAC) ,
Outbound Transactions ,
Popular ,
Regulatory Agenda ,
Regulatory Requirements
Legal Framework -
Summarise the main statutes and regulations that promote
cybersecurity. Does your jurisdiction have dedicated
cybersecurity laws?
The United States generally addresses cybersecurity...more
3/7/2016
/ Cloud Computing ,
Computer Fraud and Abuse Act (CFAA) ,
Cyber Incident Reporting ,
Cyber Insurance ,
Cybersecurity ,
Cybersecurity Act of 2015 ,
Data Protection ,
DFARS ,
DMCA ,
ECPA ,
Federal Trade Commission (FTC) ,
FERC ,
GLBA Privacy ,
Health Insurance Portability and Accountability Act (HIPAA) ,
NIST ,
PCI-DSS Standard ,
Popular ,
Risk Management ,
Sarbanes-Oxley ,
State Data Breach Notification Statutes
With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more
3/7/2016
/ China ,
Cloud Computing ,
Credit Cards ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Disclosure Requirements ,
EU ,
European Court of Justice (ECJ) ,
Executive Orders ,
General Data Protection Regulation (GDPR) ,
Intellectual Property Protection ,
Popular ,
Securities and Exchange Commission (SEC) ,
Trade Secrets ,
Trans-Pacific Partnership ,
UK ,
US-EU Safe Harbor Framework
On December 30, 2015, the Department of Defense (DoD) issued a second interim rule on Network Penetration Reporting and Contracting for Cloud Services, amending an earlier version issued on August 26, 2015. The new, amended...more