{"id":660,"date":"2019-05-24T14:07:38","date_gmt":"2019-05-24T18:07:38","guid":{"rendered":"http:\/\/blogs.duanemorris.com\/techlaw\/?p=660"},"modified":"2019-05-24T14:07:38","modified_gmt":"2019-05-24T18:07:38","slug":"executive-order-addresses-foreign-threats-to-u-s-information-and-communications-technology-and-services-systems","status":"publish","type":"post","link":"https:\/\/blogs.duanemorris.com\/techlaw\/2019\/05\/24\/executive-order-addresses-foreign-threats-to-u-s-information-and-communications-technology-and-services-systems\/","title":{"rendered":"Executive Order Addresses Foreign Threats to U.S. Information and Communications Technology and Services Systems"},"content":{"rendered":"<p>On May 15, 2019, President Donald Trump signed Executive Order 13873, \u201cSecuring the Information and Communications Technology and Services Supply Chain\u201d (Federal Register Vol. 84. No. 96, page 22689-92).<\/p>\n<p>Supported by various laws and regulations, the president determined that the United States\u2019 information communication technology systems are increasingly under threat from \u201cforeign adversaries,\u201d defined as \u201cany foreign government or foreign non-government person engaged in a long-term pattern or serious instances of conduct significantly adverse to the national security of the United States or security and safety of United States persons.\u201d These systems and services are targets for \u201cmalicious cyber-enabled actions, including economic and industrial espionage\u201d as they \u201cstore and communicate vast amounts of sensitive information, facilitate the digital economy, and support critical infrastructure and vital emergency services.\u201d<\/p>\n<p>To read the full text of this Duane Morris <em>Alert<\/em>, please visit the <a href=\"https:\/\/www.duanemorris.com\/alerts\/executive_order_addresses_foreign_threats_information_communications_technology_0519.html\" target=\"_blank\" rel=\"noopener noreferrer\">firm website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On May 15, 2019, President Donald Trump signed Executive Order 13873, \u201cSecuring the Information and Communications Technology and Services Supply Chain\u201d (Federal Register Vol. 84. No. 96, page 22689-92). Supported by various laws and regulations, the president determined that the United States\u2019 information communication technology systems are increasingly under threat from \u201cforeign adversaries,\u201d defined as &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.duanemorris.com\/techlaw\/2019\/05\/24\/executive-order-addresses-foreign-threats-to-u-s-information-and-communications-technology-and-services-systems\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Executive Order Addresses Foreign Threats to U.S. Information and Communications Technology and Services Systems&#8221;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[825,828,827,6,826,674],"ppma_author":[878],"class_list":["post-660","post","type-post","status-publish","format-standard","hentry","category-infotechtelecom","tag-executive-order","tag-foreign-adversaries","tag-information-technologies","tag-security","tag-telecommunications","tag-united-states"],"authors":[{"term_id":878,"user_id":6,"is_guest":0,"slug":"duanemorris3","display_name":"Duane Morris","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/843ff6e7a8fe5fc92109b47a45f34b6cf0ea499e6e788db23456c838b0ae6747?s=96&d=blank&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/comments?post=660"}],"version-history":[{"count":0,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/660\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/media?parent=660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/categories?post=660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/tags?post=660"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/ppma_author?post=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}