Virtual Currency Regulations: Key Insights for the Payments Industry — Payments Pros – The Payments Law Podcast
Protection of Critical Infrastructure via LIPA and ICTS
Compliance Perspectives: Sanctions, Data and Vetting Third Parties
ITAR for Facility Security Officers
Podcast - Credit Funds: How Managers Can Avoid and Mitigate ERISA Conflicts
Earlier this spring, the U.S. Department of Justice’s National Security Division (NSD) launched the data security program (DSP). The program is designed to address national security risks posed by foreign adversaries' access...more
On Friday, December 27, 2024, the Justice Department issued a final rule to address “urgent national security risks posed by access to U.S. sensitive personal and government-related data from countries of concern and covered...more
On 7 March 2023, U.S. Senators Mark Warner and John Thune introduced the Restricting the Emergence of Security Threats that Risk Information and Communications Technology (RESTRICT) Act, sweeping legislation aimed at...more
Key Points - On January 19, 2021, the U.S. Commerce Department published an interim final rule (IFR) to implement Executive Order 13873 of May 15, 2019, on “Securing the Information and Communications Technology and...more
Under this new evaluation process, Commerce can prohibit companies from engaging in a wide variety of transactions and order them to cease using the information technology or telecommunication system in question even if it is...more
On May 15, 2019, President Trump issued an Executive Order (“EO”) targeting activities of certain foreign telecommunications companies based in hostile countries. Entitled “Securing the Information and Communications...more
On May 15, 2019, President Trump issued an Executive Order (EO), “Securing the Information and Communications Technology and Services Supply Chain.” The EO directs the U.S. Department of Commerce to lead an interagency effort...more