IP Goes Pop! S6 Ep #3 The (Copy)Right Tool for the Job- The Copyright Tool Kit
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
PilieroMazza recently highlighted a Department of Defense (DOD) memo requiring DOD Components to adopt the Software Acquisition Pathway (SWP) as the preferred acquisition method for business and weapon system programs. The...more
After years of anticipation, the Federal Acquisition Regulation (FAR) Council has announced the arrival of its proposed rule to enhance the safeguarding of Controlled Unclassified Information (CUI) in federal contracts (the...more
On December 23, 2024, President Biden signed the Source Code Harmonization and Reuse in Information Technology Act (“SHARE IT Act” or “the Act”), which provides a formal mechanism for federal agencies to store and share...more
To kick off the New Year (and as is now tradition, since we put out a similar Recap & Forecast last year), Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2024...more
On December 4, 2024, the House passed the Strengthening Agency Management and Oversight of Software Assets (SAMOSA) Act, a bipartisan bill that is now before the Senate. Under the SAMOSA Act, federal agencies are directed to...more
Part of the Biden Administration’s push to enhance U.S. cybersecurity capabilities has focused on imposing new requirements on government contractors. The 2023 National Cybersecurity Strategy suggested, for example, that...more
WHAT: As we previously reported here, on October 3, 2023, the Federal Acquisition Regulatory Council (FAR Council) proposed a pair of major cybersecurity rules intended to implement key parts of President Biden’s May 2021...more
When trade secrets and other intellectual property disputes arise involving federal government contractors, defendants often assert that the alleged trade secret or intellectual property belongs to the government as part of...more
President Biden recently signed an executive order, “Improving the Nation’s Cybersecurity,” signaling a significant increase in regulatory oversight of government contractors’ cybersecurity programs. This action came on the...more
Last week, the White House issued a new Executive Order (the “EO” or “Order”) on cybersecurity. The EO responds to ever-increasing malicious cyber campaigns threatening the public and private sectors and the American people’s...more
The President’s new Executive Order on Improving the Nation’s Cybersecurity includes wide-ranging measures intended to strengthen security standards for the federal government and federal government contractors in response to...more
On May 12, 2021, the Biden Administration issued its much anticipated “Executive Order on Improving the Nation’s Cybersecurity.” Below are provisions we believe will be of most interest to contractors, as well as any company...more
On May 12, 2021, President Biden signed a sweeping Executive Order (EO) to protect federal government networks and software supply chains against increasing threats of attacks from malicious cyber actors, setting the stage...more
On May 12, 2021, President Biden issued an Executive Order on Improving the Nation’s Cybersecurity following a series of highly publicized cybersecurity incidents during the first four months of his presidency, including the...more
Concluding our blog series on open-source software in the government market, it is time to turn to the darker side of things. We already discussed the “good” of open-source software for government buyers, and we walked...more
In the first post of this series, we discussed “the good” of open-source software and why federal buyers should find it attractive. However, when it comes to the federal government accepting open-source code with open arms,...more
In a decision published last week, Appeals of CiyaSoft Corp., ASBCA Nos. 59519, 59913, the Armed Services Board of Contract Appeals (ASBCA) held for the first time that the Government may be bound by the terms of a commercial...more
In the IT sector, it is common for contractors with relationships to various federal agencies to have top-tier talent in-house to provide high quality IT services. Some vendors even have programmers and software engineers...more
On August 8, 2016, the U.S. Office of Management and Budget (“OMB”) promulgated an Open Source Software (“OSS”) policy via the Memorandum for the Heads of Departments and Agencies, M-16-21 (“Memorandum” or “M-16-21”). The...more
This article is the third installment in a series on Data Rights in Federal Contracts. We first wrote about what data rights were; then about technical data and how to protect it; and now we will discuss ownership, license...more
In this presentation: - FAR AND DFAR - TYPES OF DATA - TECHNICAL DATA - COMPUTER SOFTWARE - COMMERCIAL COMPUTER SOFTWARE - TYPES OF RIGHTS - LICENSE RIGHTS - BAYH-DOLE...more