CHPS Podcast Episode 3: Unlocking America's Mineral Potential
Analyzing the Overlap Between CFIUS and FOCI
4 Key Takeaways | Solar Industry & Chinese Tariff Update
Wiley's 10 Key Trade Developments: The CHIPS Act and Inflation Reduction Act (IRA)
Contratación para el Desarrollo de Infraestructura del Agua
El Plan Nacional de Desarrollo
Introducing TAG Infrastructure with Board Chair Sarah Ellis - TAG Infrastructure Talks Podcast
Introducing TAG Infrastructure Talks - TAG Infrastructure Talks Podcast
No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel
Protection of Critical Infrastructure via LIPA and ICTS
Energy + Cybersecurity: What's In the Pipeline? [More with McGlinchey Ep. 23]
On-Demand Webinar | Living on the Edge: Managing Sea Level Rise in California
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
DHS and Cyber: What Should Companies Expect?
#WorkforceWednesday: Guidance for Critical Infrastructure Workers; OSHA Reporting Guidance; EEOC Update - Employment Law This Week®
AF COVID-19 PODCAST: Can Construction Projects Move Forward?
Podcast: CFIUS Update: Key Takeaways from the FIRRMA Implementing Regulations
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
Jones Day Talks: Italy Embraces Foreign investment but Maintains Oversight
Jones Day Talks: Doing Deals Down Under: Australia's Foreign Direct Investment Regime
It is hard to believe that we are starting the 25th year of the 21st century. The rapid evolution that technology, privacy and data security have undergone these last 25 years is mindbending. Yet, as we enter 2025, it still...more
In late June 2024, the Security Bureau of the Hong Kong SAR Government (the “Government”) proposed the first specific cybersecurity legislation in Hong Kong, tentatively entitled the Protection of Critical Infrastructure...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
CYBERSECURITY - HC3 Warns Healthcare Organizations about Akira Ransomware Group - The Health Sector Cybersecurity Coordination Center (HC3) recently warned the health care sector about the Akira ransomware group that...more
New York has released proposed cybersecurity regulations for hospitals. The regulations, which were published in The State Register on Dec. 6 and will undergo a 60-day public comment period ending on Feb. 5, are designed to...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Unless you’ve been completely disconnected from the internet for the past year, you’ve undoubtedly read about the passage of a number of state and international laws addressing privacy and cybersecurity. Does this mean that...more
Virginia recently adopted a GDPR-inspired comprehensive data protection law for Virginia residents. What Are the Main Points Covered by Virginia’s Consumer Data Protection Act (CDPA)? ...more
Virginia became the second state in the United States, after California, to pass a comprehensive data privacy law when the Virginia Consumer Data Protection Act (CDPA) passed both houses of the state legislature in February...more
Investors and deal makers are taking note: The Committee on Foreign Investment in the United States (CFIUS, or the Committee) will focus on foreign investment in U.S. businesses that could lead to cybersecurity...more
Data protection authorities from around the world are stepping in to provide their input and guidance on the matter of data processing activities and the fight against the coronavirus. Hogan Lovells’ global Privacy and...more
Data centre operators in Europe could benefit from Brexit and have already been preparing for years for precisely this scenario, including by expanding such data centre capacities in Continental Europe....more
The United Kingdom (UK) finally left the EU on 31 January 2020. The withdrawal agreement provides for the UK to continue to be treated largely as an EU member state until the end of the transition period on 31 December 2020,...more
Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more
Data protection laws in Europe evolved substantially in 2018, with the implementation of the General Data Protection Regulation (GDPR) and the Directive on Security of Network and Information Systems (NIS Directive) becoming...more
Increasing numbers of initiatives, devices, and solutions related to the Internet of Things (IoT) are substantially impacting the development of cybersecurity and data privacy regulations throughout Asia. ...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
China’s new data protection framework clearly creates a requirement for local storage and conducting a security assessment before personal information or important data is shared with other jurisdictions, but it is currently...more
On 19 May 2017, the Cyberspace Administration of China (the “CAC“) released a revised draft of its Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of China Measures...more
On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more