The Department of Justice’s recent rule — Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons (the Rule) — is part of a suite of actions being undertaken or evaluated by U.S. policymakers to secure sensitive data from foreign parties that would seek to exploit it. The Rule is responsive to U.S. policymaker recognition that new technologies, particularly large language models and other AI technologies, that allow for the rapid ingestion, processing and inferencing of large data sets present an emergent and significant threat to U.S. national security.
For companies that control bulk sensitive data or government-related data as it pertains to certain transaction types involving covered persons or Countries of Concern, the Rule has broad implications. The Rule also contains an IT governance overlay, incorporating guidance related to the Rule that was issued by Cybersecurity and Infrastructure Security Agency (CISA).
Alvarez & Marsal (A&M) provides strategic national security and information governance and data privacy guidance to clients navigating the complexities of this sweeping regulation. A&M helps companies determine with fidelity whether they hold data in sufficient volumes to be subject to the Rule. For those that do, A&M helps develop and implement a tailored, risk-based security controls approach to Rule compliance that is practical, sustainable and cost-effective, while being responsive to Rule requirements and U.S. Government equities.
A&M leverages technical tools and know-how to help organizations assess with fidelity: (i) whether they house data in quantities sufficient to implicate the Rule, (ii) whether they do business with suppliers, customers or other stakeholders of a type that implicates restrictions around countries of concern or covered persons and (iii) if both are true, how to build an effective solution tailored to achieving Rule compliance while minimizing business impact. We leverage our expertise in:
A&M professionals have extensive experience working with organizations to build programs responsive to satisfy various IT governance frameworks or benchmarks. This includes deep experience with the types of controls and tools to secure bulk sensitive data expressed within the CISA guidance. We have expertise in: