Search Results (1999)
Documents on defense
Show: results per page
|High Court Rules for Vets|
Stanley A. Millan, Adam Stone; Jones Walker LLP;
July 12, 2016, previously published on June 27, 2016In Kingdomware Technologies, Inc. v. United States, --- v. ---, No. 14-916 (June 16, 2016), the Court unanimously ruled that under a 2006 statute (38 U.S.C. §8127(b)), the Department of Veterans Affairs ("VA") was obligated to restrict competition to only veteran-owned small business...
Michael S. Berg;
July 7, 2016Over 15 million Americans are victims of Identity Theft each year. Another 100 million more are at risk. These alarming statistics prove that identity theft may be the most frequent and pervasive crime in the United States. Each year hackers become more sophisticated in their techniques and...
|What is an Internet Crime?|
Michael S. Berg;
July 7, 2016What is an Internet Crime?
|New One-Stop Online Employment Resource for Veterans and Employers|
Dara L. DeHaven; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
May 30, 2016, previously published on May 17, 2016On May 2, 2016, the U.S. Department of Labor’s (DOL) Veterans’ Employment and Training Service launched a one-stop online resource for employment services for veterans. The new website, Veterans.gov, brings together job banks, state employment offices, American Job Centers,...
|U.S. Tightens Sanctions on North Korea|
Sean Thomas Boyce, Laura L. Fraedrich, Michael P. Gurdak, Fahad A. Habib, D. Grayson Yeargin; Jones Day;
March 22, 2016, previously published on February 2016In the wake of a recent nuclear test and rocket launch by North Korea, on February 18, 2016, President Obama signed into law the North Korea Sanctions and Policy Enhancement Act of 2016 (the "Act"), which enhances existing U.S. sanctions against North Korea and imposes secondary sanctions...
|CFIUS Annual Report: Investigations and Mitigation Agreements Return to Historic Rates Despite Growing Caseload|
Chad O. Dorr, Laura L. Fraedrich, Chase David Kaniecki, Bevin M.B. Newman, D. Grayson Yeargin; Jones Day;
March 22, 2016, previously published on February 2016The Committee on Foreign Investment in the United States ("CFIUS") periodically publishes the unclassified portion of its Annual Report to Congress, which, among other things, highlights key statistics regarding the types and number of transactions submitted to CFIUS for review. In the...
|Revised DFARS Interim Rule Regarding Cybersecurity Responds to Industry Concerns|
Peter F. Garvin, J. Andrew Jackson, Fernand A. Lavallee, Todd S. McClelland, Mauricio F. Paez; Jones Day;
February 2, 2016, previously published on January 2016After collecting feedback from industry representatives, the Department of Defense ("DOD") recently revised the Defense Federal Acquisition Regulations Supplement ("DFARS") interim rule on required cybersecurity measures for defense contractors (the "December 30 Interim...
|President Obama Signs Cybersecurity Act of 2015 to Encourage Cybersecurity Information Sharing|
Peter Carey, Keith M. Gerver, Kenneth L. Wainstein; Cadwalader, Wickersham & Taft LLP;
January 18, 2016, previously published on December 24, 2015On December 18, 2015, President Obama signed into law a $1.1 trillion omnibus spending bill that contained the Cybersecurity Act of 2015 (the “Act”), a compromise bill based on competing cybersecurity information sharing bills that passed the House and Senate earlier this year. The Act...
|House Passes Bill Enhancing Security of Visa Waiver Program in Wake of Paris Terror Attacks|
Diane M. Rish, Stephen H. Smalley; Ogletree, Deakins, Nash, Smoak & Stewart, P.C.;
December 16, 2015, previously published on December 9, 2015In the wake of the Paris terrorist attacks, the U.S. House of Representatives passed a bill on Tuesday, December 8, 2015, to tighten security measures and impose new restrictions on the Visa Waiver Program (VWP). The VWP permits citizens of 38 designated countries, mostly in Europe, to travel to...
|Five Things You Should Know About DOD Cybersecurity Regulations|
Blake Christopher, Neil S. Lowenstein; Vandeventer Black LLP;
December 8, 2015, previously published on November 2015In 2007, a preeminent American defense contractor first reported cyber attacks emanating from China. Four years later, upon a visit by then Secretary of Defense Robert Gates, the Chinese Air Force revealed a fighter jet unnervingly similar to the one manufactured by the hacked American contractor....