The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts
|
|
|
- Joan Johns
- 10 years ago
- Views:
Transcription
1 white paper APRIL 2014 The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts VENABLE LLP ON CYBERSECURITY LAW CALIFORNIA DELAWARE MARYLAND NEW YORK VIRGINIA WASHINGTON, DC VENABLE
2 white paper APRIL 2014 AUTHORS Dismas N. Locaria Brian M. Zimmet Jason R. Wool The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts VENABLE LLP ON CYBERSECURITY LAW Since September 11, 2001, Americans have been keenly aware of the need to better protect both the people and assets of the United States from those who may be intent on doing us harm. We have seen, and largely accepted, increased physical security measures at airports, government facilities, and even sporting event venues. Requirements that once would have seemed a gross invasion of privacy are now commonplace. Some of these requirements were federally mandated; however, because the private sector owns and operates the vast majority of critical infrastructure, the government has been reluctant (or perhaps unable) to impose sweeping security measures across all swaths of life. Nevertheless, despite the cost of some of these measures, we have seen the private sector increase physical security efforts in an effort to better protect the public and manage the risk of liability that could arise from an attack. In some instances, these measures were also implemented to obtain a little-known government carrot, namely liability protection under a federal statute referred to as the SAFETY Act (or Act ). We have been recently bombarded with both fact and fiction about the vulnerabilities of our critical infrastructure to cyber intrusion and attack. Some in Congress have sought to adopt comprehensive cybersecurity regulation, but legislative efforts to adopt such regulation have fallen short. In lieu of mandatory regulation, the federal government has sought to encourage owners and operators of critical infrastructure to adopt baseline cybersecurity measures to protect their assets, primarily through the adoption of a new Cybersecurity Framework by the National Institute of Standards and Technology ( NIST ). In its promotion of the NIST Cybersecurity Framework, the government has sought to identify incentives for owners and operators of critical infrastructure to adopt the framework. The SAFETY Act is one of the few tools in the government s toolbox that can provide concrete, achievable benefits for owners and operators of critical infrastructure. In this context, the SAFETY Act may also serve not only to incentivize the improvement of an organization s
3 cybersecurity, thereby better protecting its assets, but may also benefit the organization at-large, in non-terror contexts. The SAFETY Act In the wake of 9/11, Congress passed the Homeland Security Act of 2002 with a little known section called the "Support Anti- Terrorism by Fostering Effective Technologies Act of 2002, or the SAFETY Act. 1 The purpose of the SAFETY Act was to encourage the development and deployment of anti-terrorism products and services (collectively referred to by the statute and herein as technologies ) by granting various risk management protections. The SAFETY Act, when enacted, held tremendous promise for protecting sellers of new, as well as established, technologies that were needed to combat terrorism and remove impediments to bringing such technologies to and/or maintaining their place in the market. It did so by establishing two levels of protection from third-party liability Designation and Certification that may arise from injury, loss of life, or damage to property or businesses arising out of an act of terrorism where the technology was deployed in defense against, response to or recovery from such an act. Importantly, in the final rule, the Department of Homeland Security ( DHS ) recognized that to encourage industry to make new technologies would likely mean that some would require additional development, testing and evaluation before being available for deployment. 2 As a result the final regulation implements a process whereby technologies in development may be afforded SAFETY Act Designation. 3 This type of Designation is referred to as Developmental Testing and Evaluation ( DT&E ) Designation. This is particularly significant to potential sellers of technologies that may be reluctant to enter the marketplace, or cannot find affordable insurance, for fear of massive liability. This process sees to it that promising technologies are not killed at the drawing board due to the enormity of liability arising from acts they are designed to prevent. The Benefits of the SAFETY Act The SAFETY Act offers substantial protections for sellers of technologies that receive Designation, or the higher-tiered protection, Certification. Designation (including DT&E Designation) most notably caps third-party liability at an approved level of insurance. The Act, however, also includes a myriad of additional risk management benefits along with Designation, such as exclusive jurisdiction in federal court for suits against sellers of a technology arising from acts of terrorism; a bar against punitive damages and prejudgment interest; a limitation on non-economic damages; and liability only in proportion to the responsibility of the seller. The second level of protection Certification confers all of the benefits of Designation as well as the marked addition of potential immunization from liability via the Government Contractor Defense. 4 The assertion of this defense, however, can be rebutted by proving with clear and convincing evidence that fraud or willful misconduct occurred by the seller in submitting
4 information to DHS. Certified technologies are also deemed Approved Products for Homeland Security by DHS. Designation and Certification protections are awarded in five-year increments, which can be renewed in increments of five years thereafter. DT&E Designation limits the term of protection to 36 months (with no continuing survivorship for the life of the technology), and is terminable at will by DHS. Perhaps the greatest benefit of either Designation or Certification, however, is that the Act itself provides that the only proper party defendant to a lawsuit arising out of an act of terrorism is the seller. Thus, customers, clients, subcontractors and vendors that either consume the technology or support the seller in deploying the technology are immune from liability. As one can imagine, providing customers and potential customers with the benefit of immunizing them from the potentially ruinous cost of terrorism liability is a tremendous market differentiator. Importantly, however, one does not have to provide the covered Technology to consumers to be considered a seller. Under the Act, an entity can provide a product or service to itself and still obtain Designation or Certification. In instances such as these, the entity would be a seller to itself. An Act of Terrorism The protections of the SAFETY Act are triggered by an act of terrorism. 5 By statute, an act of terrorism is an act, determined by the Secretary of DHS, that: i. [I]s unlawful; ii. iii. [C]auses harm to a person, property, or entity, in the United States, or in the case of a domestic United States air carrier or a United States-flag vessel (or a vessel based principally in the United States on which United States income tax is paid and whose insurance coverage is subject to regulation in the United States), in or outside the United States; and [U]ses or attempts to use instrumentalities, weapons or other methods designed or intended to cause mass destruction, injury or other loss to citizens or institutions of the United States. 6 Importantly, the final rule to the SAFETY Act expands on the definition of harm to include financial harm, either by nature or degree. This expansion of harm potentially broadens the applicability of the Act considerably by removing any need for physical damage. Obtaining SAFETY Act Protections SAFETY Act protections are sought through an application process. Designation must first be achieved to receive Certification, although applicants may seek both protections simultaneously as part of the same application submission. To receive Designation, applicants must demonstrate that a proposed technology meets various criteria, including:
5 That the technology has utility and is effective; That the seller of the proposed technology has large or unquantifiable potential third-party liability risk exposure; That it is likely that without the SAFETY Act s protections, the liability associated with the technology would prevent or curtail the proposed technology s deployment; That there be a substantial potential risk exposure to the public should the technology not be deployed; and Any other factors DHS deems relevant to the security of the United States. For Certification, applicants must satisfy all of the criteria of Designation, as well as provide information evidencing that the technology can meet three additional criteria, that the technology: 1) performs as intended; 2) conforms to specifications; and 3) is safe for use. Ten Years and Counting The SAFETY Act had a slow start following its inception in late 2002 as DHS established its Office of SAFETY Act Implementation ( OSAI ) and finalized its internal procedures and operating policies. Following the statute s enactment, a proposed rule was issued in July 2003, 7 followed by an interim rule in October Also in October 2003, DHS issued the first iteration of the SAFETY Act Application Kit. However, DHS took almost two years to issue a final regulation and revised Application Kit. 9 The processing of applications for the SAFETY Act s protections was initially slow as well from October 2003, when the initial SAFETY Act Application Kit was first published, until June 18, 2004 a period of eight months just three technologies received Certification status. It took another eight months to double that number to six Designations and Certifications. Today, while over 900 technologies have received SAFETY Act protections, this amounts to less than 100 per year. Thus, while the SAFETY Act holds tremendous benefits for corporations of all kinds, it remains something of a secret. The SAFETY Act Today While the event that led to the creation of the SAFETY Act was an act of physical terror, there is no question that cyber-attacks can also have enormously destructive effects, especially in the context of critical infrastructure. Moreover, current and former officials of the FBI and DHS, as well as numerous members of Congress, agree that cyber-terrorism is a significant security concern. The potential liability from a successful cyber-terrorist attack is substantial. Disruption to a company s operations alone can result in lost business, negative customer reaction, financial harm, government investigations, contract breaches, shareholder lawsuits, and more. In some instances, a cyber-attack could also
6 result in physical destruction and harm, which could expose the victim to tort liability. For owners and operators of information technology systems, the ramifications of a cyber-attack can extend to large swaths of third parties (think of a major power outage, lack of telecommunications, or broken ATMs). Owners of such systems should explore the possibility of seeking SAFETY Act coverage as a way to complement cybersecurity insurance policies and other risk-mitigation tools. Such consideration would include: Reviewing your cyber-attack risks and potential liabilities to determine whether obtaining SAFETY Act coverage would benefit your business; Examining whether any of your security systems, business continuity, physical and cyber-related defense/mitigation plans, or other products and services qualify for coverage under the SAFETY Act; To the extent possible, procuring SAFETY Act-approved products and services to take advantage of the liability flow downs, or working with your business partners to encourage them to obtain SAFETY Act coverage; and Including SAFETY Act requirements in all of your security product and service procurements. Any entity that sells cybersecurity solutions to owners of information technology systems should consider applying for SAFETY Act protection for such products or services. First, such sellers should review or seek advice on whether your products and services are likely to qualify for coverage under the SAFETY Act. If your products or services do not currently qualify for coverage, keep the SAFETY Act in mind, because it may be a significant way to differentiate your future products and services from those of your competitors. Put simply, the SAFETY Act represents a win/win for both the government and private industry. By taking advantage of the program, private industry can help protect the country from cyber-attack while also lowering insurance costs and mitigating liability risks. Even in the absence of a terrorist attack, SAFETY Act coverage serves as a stamp of approval from the federal government that a Technology which, again, includes security services that a company provides to itself is an effective tool for preventing, detecting, or responding to cyber-attacks. Coverage is therefore not only a market differentiator, but also significant evidence of commercial reasonableness in legal proceedings not associated with an act of terrorism. As a result, any company facing cyber-risk should carefully consider how a SAFETY Act Designation or Certification could protect its interests and elevate its standing in the marketplace.
7 Venable office locations BALTIMORE, MD 750 E. PRATT STREET SUITE 900 BALTIMORE, MD t f ROCKVILLE, MD ONE CHURCH STREET FIFTH FLOOR ROCKVILLE, MD t f TYSONS CORNER, VA 8010 TOWERS CRESCENT DRIVE SUITE 300 VIENNA, VA t f LOS ANGELES, CA 2049 CENTURY PARK EAST SUITE 2100 LOS ANGELES, CA t f NEW YORK, NY ROCKEFELLER CENTER 1270 AVENUE OF THE AMERICAS 25TH FLOOR NEW YORK, NY t f SAN FRANCISCO, CA SPEAR TOWER, 40TH FLOOR ONE MARKET PLAZA 1 MARKET STREET SAN FRANCISCO, CA t f TOWSON, MD 210 W. PENNSYLVANIA AVE. SUITE 500 TOWSON, MD t f WASHINGTON, DC 575 7TH STREET NW WASHINGTON, DC t f WILMINGTON, DE 1201 NORTH MARKET STREET SUITE 1400 WILMINGTON, DE t f VENABLE Homeland Security Act of 2002, Pub. L. No , , 116 Stat (2002) (Title VII, Subtitle G) (codified at 6 U.S.C ). The Department of Homeland Security issued the final rule, implementing the SAFETY Act on June 8, 2006 (71 Fed. Reg. 33,147 et seq. (June 8, 2006, Final Rule), which codified the Act s implementing regulations at 6 C.F.R. Part Fed. Reg. 33,147, 33,156 (June 8, 2006, Final Rule). 3 6 C.F.R. 25.4(f). 4 The Government Contractor Defense arose out of a landmark case, Boyle v. United Technologies Corporation, 487 U.S. 500 (1988), whereby the U.S. Supreme Court determined that a defense contractor manufacturing a military product in accordance with precise government specifications may not be held liable for claims resulting from use of the manufactured product. With respect to the SAFETY Act, DHS limits the defense to that which existed on the day of the SAFETY Act s enactment (November 25, 2002), meaning that future judicial developments in the government contractor defense would not apply. Hence, the considerable body of law growing out of Boyle, and its progeny up to the enactment of the SAFETY Act (November 25, 2002), are essentially frozen in time. 5 6 U.S.C. 444(2). 6 Id Fed. Reg. 41,420 et seq. (July 11, 2003, Proposed Rule) Fed. Reg. 59,684 et seq. (October 16, 2003, Interim Rule) Fed. Reg. 33,147 et seq. (June 8, 2006, Final Rule).
The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School
The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School MARCH 31, 2014 2013 Venable LLP 1 EO 13636: Improving Critical Infrastructure Cybersecurity Directs to NIST to develop
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act JULY 17, 2014 2013 Venable LLP 1 Agenda 1. Security Risks affecting the Maritime Transportation System (MTS) 2. The
Field/Customer FAQs. What is the SAFETY Act?
Field/Customer FAQs On April 22, 2015, FireEye, Inc. was issued Certification under the SAFETY Act for its Multi-Vector Virtual Execution (MVX) Engine and Cloud Platform by the Department of Homeland Security
Big Data As a Threat? An Alternative Approach to Cybersecurity
Big Data As a Threat? An Alternative Approach to Cybersecurity February 11, 2015 Brian Finch, Pillsbury Winthrop Shaw Pittman Brian Fox, PwC Pillsbury Winthrop Shaw Pittman LLP Data Breaches and Cyber
Cyber-Insurance Metrics and Impact on Cyber-Security
Cyber-Insurance Metrics and Impact on Cyber-Security Sometimes we can... be a little bit more vigorous in using market-based incentives, working with the insurance industry, for example... DHS Secretary
Cyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner
Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
Georgia Board for Physician Workforce
Board for Physician Workforce Spotlight on National Tort Reform & Reform in the Surrounding States August 2010 Tort reform continues to be a highly debated issue at both the state and national level. In
Limited Liability Partnerships
College of William & Mary Law School William & Mary Law School Scholarship Repository William & Mary Annual Tax Conference Conferences, Events, and Lectures 1995 Limited Liability Partnerships James J.
Billing Code: 3510-EA
Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Section 304 - What it Means to the United States Government
Guidance for the Healthcare Community Concerning Section 304 of the Homeland Security Act Manufacturers of smallpox vaccine and those healthcare entities under whose auspices the vaccine would be administered
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak
March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland
False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1
False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1 When Do False Claims Laws Apply? The federal False Claims Act (FCA) applies to any requests for payment from
PASSIVE SELLER IMMUNITY FROM PRODUCT LIABILITY ACTIONS. House Bill 4 significantly impacted most areas of Texas Tort Law. In the
PASSIVE SELLER IMMUNITY FROM PRODUCT LIABILITY ACTIONS House Bill 4 significantly impacted most areas of Texas Tort Law. In the traditional products liability arena, tort reform affected three major changes:
High Risk Jurisdiction Severity Trends, Time to Closure & Obstetric Claims Trends
High Risk Jurisdiction Severity Trends, Time to Closure & Obstetric Claims Trends Analysis and Findings Provided by Beazley Group Excerpt taken from: Aon/ASHRM Hospital and Physician Professional Liability
Liability of Volunteer Directors of Nonprofit Corporations (10/02)
Liability of Volunteer Directors of Nonprofit Corporations (10/02) This memorandum addresses the California and federal law protections that exist to shield volunteer directors of nonprofit corporations
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States
Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States Introduction When it comes to Personally Identifiable Information (PII), privacy laws and regulations
Spill Control. Annual Meeting
Spill Control Association of America Annual Meeting RESPONDER IMMUNITY UPDATE Jonathan K. Waldron March ac 8, 2012 The information contained herein is abridged and summarized from numerous sources, the
New Privacy Laws Impacting the Health Care Work Place
New Privacy Laws Impacting the Health Care Work Place Presented by Thomas E. Jeffry, Jr., Esq. Arent Fox LLP Washington, DC New York, NY Los Angeles, CA November 12 & 19, 2009 Overview 1. Overview of California
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
The Nuances Of California s Revisions To Its False Claims Act
The Nuances Of California s Revisions To Its False Claims Act by Regina A. Verducci, Associate Watt, Tieder, Hoffar & Fitzgerald, L.L.P.* On September 27, 2012, California s Governor Brown signed Assembly
PUBLIC LAW 105 19 JUNE 18, 1997 VOLUNTEER PROTECTION ACT OF 1997
VOLUNTEER PROTECTION ACT OF 1997 111 STAT. 218 PUBLIC LAW 105 19 JUNE 18, 1997 June 18, 1997 [S. 543] Volunteer Protection Act of 1997. 42 USC 14501 note. 42 USC 14501. Public Law 105 19 105th Congress
CLAIMS AGAINST FIRE DEPARTMENTS IN WASHINGTON AND OREGON. By: Jack Slavik. COZEN AND O'CONNOR 1201 Third Avenue Seattle WA 98101
CLAIMS AGAINST FIRE DEPARTMENTS IN WASHINGTON AND OREGON By: Jack Slavik COZEN AND O'CONNOR 1201 Third Avenue Seattle WA 98101 Atlanta, GA Charlotte, NC Cherry Hill, NJ Chicago, IL Columbia, SC Dallas,
Data Privacy and Security: A Primer for Law Firms
Data Privacy and Security: A Primer for Law Firms All We Do Is Work. Workplace Law. In four time zones and 46 major locations coast to coast. www.jacksonlewis.com JACKSON LEWIS SERVING THE DIVERSE NEEDS
By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN
Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the
ORAL ARGUMENT IN CASE NO. 13-1311 SCHEDULED FOR NOVEMBER 21, 2014. Case Nos. 13-1311 and 14-1225
USCA Case #13-1311 Document #1520912 Filed: 11/05/2014 Page 1 of 7 ORAL ARGUMENT IN CASE NO. 13-1311 SCHEDULED FOR NOVEMBER 21, 2014 Case Nos. 13-1311 and 14-1225 UNITED STATES COURT OF APPEALS FOR THE
PROCEDURAL PROVISIONS IN NEVADA MEDICAL MALPRACTICE REFORM. Carl Tobias*
PROCEDURAL PROVISIONS IN NEVADA MEDICAL MALPRACTICE REFORM Carl Tobias* In late July 2002, a special session of the Nevada Legislature passed medical malpractice reform legislation. 1 The expressly-stated
TREASURY ADOPTS RULES REQUIRING BROKER-DEALERS TO VERIFY CUSTOMER IDENTITY
T O O U R F R I E N D S A N D C L I E N T S May 9, 2003 TREASURY ADOPTS RULES REQUIRING BROKER-DEALERS TO VERIFY CUSTOMER IDENTITY INTRODUCTION On April 29, 2003, the Department of Treasury ( Treasury
Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I
Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation Part I March 20, 2014 Speakers John J. Sullivan, Partner, rejoined Mayer Brown after serving as General Counsel at the US Department
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA
1 1 1 1 1 1 1 1 0 1 LAW OFFICES OF RONALD A. MARRON RONALD A. MARRON (SBN 10) [email protected] ALEXIS WOOD (SBN 000) [email protected] KAS GALLUCCI (SBN 0) [email protected]
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA
David W. Lincicum (California Bar No. 223566) Burke W. Kappler (D.C. Bar No. 471936) Federal Trade Commission 600 Pennsylvania Avenue, N.W. Mail Stop NJ-8122 Washington, D.C. 20580 [email protected] [email protected]
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)
HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
How To Implement International Terrorism Agreements
STATEMENT OF BRAD WIEGMANN DEPUTY ASSISTANT ATTORNEY GENERAL DEPARTMENT OF JUSTICE BEFORE THE SUBCOMMITTEE ON CRIME, TERRORISM, AND HOMELAND SECURITY COMMITTEE ON THE JUDICIARY UNITED STATES HOUSE OF REPRESENTATIVES
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
Perspectives on Cyber Security & Digital Issues
Perspectives on Cyber Security & Digital Issues Gary R. Bronstein June 12, 2014 2014 Kilpatrick Townsend Background Cyber security and prevention of data breaches are increasing in importance in the wake
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Analysing the US HIPAA legacy and future changes on the horizon
Volume: 10 Issue: 2 Analysing the US HIPAA legacy and future changes on the horizon The US Department of Health and Human Services issued the long-awaited final omnibus rule under the Health Insurance
ATTORNEYS. Insurance Agents & Brokers Errors & Omissions. LewisBrisbois.com
ATTORNEYS Insurance Agents & Brokers Errors & Omissions Insurance Agents & Brokers Errors & Omissions The attorneys in our Insurance Agents & Brokers Errors & Omissions Practice Group practice in all our
BULLETIN NO. 03-15 H. ROBERT TILLMAN, ACTING COMMISSIONER AND DIRECTOR, DIVISION OF BANKING RE: THE NEW JERSEY HOME OWNERSHIP SECURITY ACT OF 2002
JAMES E. MCGREEVEY Governor State of New Jersey DEPARTMENT OF BANKING AND INSURANCE PO BOX 325 TRENTON, NJ 08625-0325 Tel (609) 292-5360 HOLLY C. BAKKE Commissioner TO: FROM: BULLETIN NO. 03-15 ALL INTERESTED
How To Indemnify An Ehr Technology Developer
EHR Contracts: Key Contract Terms for Users to Understand June 25, 2013 Prepared for: The Office of the National Coordinator for Health Information Technology Washington, DC Prepared by: Westat An Employee-Owned
Defenses in a Product Liability Claim
Defenses in a Product Liability Claim written by: Mark Schultz, Esq. COZEN O CONNOR Suite 400, 200 Four Falls Corporate Center West Conshohocken, PA 19428 (800) 379-0695 (610) 941-5400 [email protected]
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern
IN THE UNITED STATES DISTRICT COURT IN AND FOR THE DISTRICT OF UTAH, CENTRAL DIVISION
Andrew W. Stavros (8615) Austin B. Egan (13203) STAVROS LAW P.C. 11693 South 700 East, Suite 200 Draper, Utah 84020 Tel: (801) 758.7604 Fax: (801) 893.3573 Email: [email protected] [email protected]
Case4:15-cv-04219-DMR Document1 Filed09/16/15 Page1 of 11
Case:-cv-0-DMR Document Filed0// Page of MICHAEL G. RHODES () ([email protected]) California Street, th Floor San Francisco, CA Telephone: Facsimile: BRENDAN J. HUGHES (pro hac vice to be filed) ([email protected])
Fast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
Curriculum Vitae EXPERIENCE WORK HISTORY
Jerry O. Wyatt President Wyatt Security Consultants, LLC P O Box 3446 Houston, Texas 77253-3446 281/361-9826 Office/Fax 713/444-0893 - Cell [email protected] www.wscsecurity.com Curriculum Vitae EXPERIENCE
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
What China's Lemon Law Will Mean For Manufacturers
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] What China's Lemon Law Will Mean For Manufacturers
Deficit Reduction Act Employee Information Requirements
November 9, 2006 Deficit Reduction Act Employee Information Requirements The Deficit Reduction Act ( DRA ) requires states participating in the Medicaid program to amend their State Plans to mandate that
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION COMPLAINT FOR DECLARATORY JUDGMENT I.
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH DIVISION JANICE LEE, ) ) Case No. Plaintiff, ) ) vs. ) ) BETHESDA HOSPITAL, INC. ) ) Defendant. ) ) COMPLAINT FOR DECLARATORY JUDGMENT
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA HOWARD MEDICAL, INC. t/a CIVIL ACTION ADVANCE AMBULANCE SERVICE, NO. 00-5977 Plaintiff, v. TEMPLE UNIVERSITY HOSPITAL, t/a TEMPLE
