News & Analysis as of

National Security Data Protection

Morrison & Foerster LLP

FTC Looks to Leverage PADFAA Enforcement to Help Limit Exposure of Consumer Data

In recent comments, Commissioner Holyoak signaled that the Federal Trade Commission will prioritize enforcement of the Protecting Americans’ Data from Foreign Adversaries Act (PADFAA), a law that empowers the FTC to police...more

Phelps Dunbar

How Can Companies Guard Against Rising Nation-State Cyber Threats?

Phelps Dunbar on

The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more

Dacheng

Decoding the Regulation of “Important Data” in China and the U.S.: Similarities and Differences, Compliance Obligations, and...

Dacheng on

With the rapid development of informatization, how to better safeguard national security in an increasingly complex information environment has become a critical consideration in digital legislation. A key issue within this...more

McDermott Will & Emery

New US Data Security Program limits sensitive data transfers

The United States Data Security Program (DSP) represents a significant regulatory undertaking by the US government to control the flow of bulk sensitive data to specific foreign countries, for national security purposes....more

Quarles & Brady LLP

Trump Reverses Key Biden-Era Cyber Directives: Important Updates to Federal Cybersecurity Priorities

Quarles & Brady LLP on

Earlier this month, President Trump issued an Executive Order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), which amends both Biden...more

Baker Donelson

Digital Marketing Meets DOJ Oversight: What Businesses with Digital Campaigns Should Do to Manage AdTech Risks

Baker Donelson on

With the ease of apps and websites for planning activities, whether it be vacations, business trips, or shopping, we open ourselves to multiple sources of being followed across devices by collecting, analyzing, and sharing...more

Gardner Law

New DOJ Rule Restricts Deidentified Data Transfer

Gardner Law on

No Safe Harbor: New DOJ Data Export Rule Restricts Deidentified Data Transfer - This article outlines new requirements from the Department of Justice regarding “bulk sensitive data”, including de-identified, anonymized,...more

Davis Wright Tremaine LLP

NSA Issues Cybersecurity Guidance and Best Practices for AI Systems

The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 121

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

Potomac Law Group, PLLC

Border Search Inspection of Electronic Devices: What Organizations and Their Employees Need to Know

Employees traveling internationally on behalf of an organization must take steps to protect sensitive, confidential, or proprietary data carried on electronic devices. U.S. Customs and Border Protection (CBP) has broad...more

Goodwin

Trump 2.0 Tech Policy Rundown: 100 Days in, Federal Agencies Shift AI, Privacy, and Governance Priorities

Goodwin on

One hundred days into the new administration, recent developments across multiple US federal agencies reflect a quickly evolving approach to digital governance, with notable shifts in regulatory priorities related to AI, data...more

Bass, Berry & Sims PLC

DOJ Publishes Final Rule Restricting Bulk Cross-Border Data Transfers of Sensitive Data to Foreign Persons

On April 8, the U.S. Department of Justice’s (DOJ) Final Rule, codified at 28 CFR Part 202, (Final Rule), implementing President Biden’s Executive Order 14117 “Preventing Access to U.S. Sensitive Personal Data and...more

White & Case LLP

AI Watch: Global regulatory tracker - Kenya (UPDATED)

White & Case LLP on

Between January 14 and January 19, 2025, the Ministry of Information, Communications, and Technology (the "Ministry") held a consultation on a draft of Kenya's National Artificial Intelligence (AI) Strategy 2025-2030. This...more

Jenner & Block

Client Alert: New Rules for Data Flows Take Effect: What You Need to Know

Jenner & Block on

On April 8, 2025, the United States Department of Justice’s (DOJ) National Security Division’s (NSD) final rule (Final Rule) regulating certain sensitive US data transfers took effect. DOJ has made clear that it will take...more

Goodwin

Life Sciences Companies Must Navigate the DOJ Data Rule

Goodwin on

Life sciences companies have long been outside the scope of US national security regulations and benefited from significant exemptions under US privacy laws. ...more

Hogan Lovells

End-to-end encryption: obstacle or pillar of national security?

Hogan Lovells on

In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more

Jones Day

EU Geopolitical Risk Update - Key Policy & Regulatory Developments No. 120

Jones Day on

This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more

Pillsbury - Internet & Social Media Law Blog

Why Your Organization Should Be Thinking About Quantum Computing and the Future of Encryption

Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more

Baker Botts L.L.P.

AI Legal Watch - DeepSeek Under Scrutiny

Baker Botts L.L.P. on

Everyone is talking about DeepSeek for its increase performance and efficiency. However, with that comes additional risks, as DeepSeek is subject to Chinese national law, and there are still many unanswered questions...more

A&O Shearman

EPRS publishes paper on potential challenges to UK data adequacy decisions

A&O Shearman on

On March 7 2025, the European Parliamentary Research Service (EPRS) published a paper outlining the challenges to UK data adequacy and ongoing national legislative reforms that could affect the renewal of the two existing...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Latham & Watkins LLP

Kingdom of Saudi Arabia Issues New Data Transfer Risk Assessment Guidelines

Latham & Watkins LLP on

The guidelines specify the requirements for data controllers to conduct risk assessments related to the transfer or disclosure of personal data outside the Kingdom. ...more

ArentFox Schiff

Digital Borders: The Power of Immigration Officials’ Authority to Search Your Devices

ArentFox Schiff on

US Customs and Border Protection (CBP) has the authority to search electronic devices — including phones, laptops, tablets, and other electronic devices — of anyone entering the United States, including US citizens and...more

Venable LLP

A Brave New World: Four Considerations When Building a Bulk Data Rule Compliance Program

Venable LLP on

U.S. companies and organizations have entered a new era of sweeping restrictions on cross-border data transfers. The Department of Justice's (DOJ) Final Rule, "Preventing Access to U.S. Sensitive Personal Data and...more

245 Results
 / 
View per page
Page: of 10

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide