Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

DHS Issues Final Information Sharing Guidelines

The Department of Homeland Security has issued final guidance on the implementation of the Cybersecurity Information Sharing Act of 2015. The final guidance documents include: Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015, Privacy and Civil Liberties Final...

DHS to Clarify Liability Protections for Companies Sharing Cyber-threat Indicators

The Department of Homeland Security (DHS) intends to issue revised guidance that will clarify liability protections for companies sharing cyber-threat indicators among themselves, and will reissue guidance on information sharing with non-federal entities under the Cybersecurity Act of 2015. DHS intends to revise the initial guidance issued in February to reflect the industry feedback...

House Passes Cybersecurity Consortium Act

The House of Representatives passed the National Cybersecurity Preparedness Consortium Act, which will allow the Department of Homeland Security (DHS) to establish a consortium to address cybersecurity threats and incidents. The consortium would provide training to state and local first responders and officials, conduct training and simulation exercises, and help states develop...

DHS Announces Public Hearings and Requests Comments on Handling of Critical Infrastructure Information

  The Department of Homeland Security (“DHS”) announced that it will hold a series of public hearings and request comments on revising its regulations regarding the handling of protected critical-infrastructure information (“PCII”) in an automated and electronic format.  According to the notice published in the Federal Register, DHS is requesting comments on revising its rules...

FTC Reviews Security Updates Practices of Eight Mobile Device Manufacturers

The Federal Trade Commission is requiring eight mobile device manufacturers to provide the FTC with information about how they determine to issue security updates to address vulnerabilities in smartphones, tablets, and other mobile devices. The FTC plans to use these filings to study policies, procedures, and practices used to notify customers and determine whether to provide security...

« Older Entries