News & Analysis as of

Contract Negotiations Data Breach

Keating Muething & Klekamp PLL

Benefits Monthly Minute - December 2023

Happy Holidays! The December Monthly Minute includes a fiduciary checkup reminder and a look at HHS’ recent settlement stemming from a phishing attack that impacted ePHI of nearly 35,000 individuals....more

Manatt, Phelps & Phillips, LLP

[Webinar] FTC’s Heightened Scrutiny of Health Apps: Increased Enforcement Activity; Proposed HBNR Changes - September 26th, 10:00...

With recent events underscoring the Federal Trade Commission’s (FTC) heightened scrutiny of and enforcement efforts against health app companies collecting or using consumer health information, it's imperative for these same...more

McDermott Will & Emery

[Webinar] Privacy and Cybersecurity Contracting: What’s the “Deal”? - June 29th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more

Bodman

What do M&M’s Candy and Complex Contract Reviews Have in Common?

Bodman on

If you know music, you know Van Halen. The Hall of Fame rock band turned out several hit singles and was known for their virtuoso guitar riffs, great hair, lavish lifestyles, and a penchant for M&M candies. That’s right,...more

BCLP

Recovery and Transformation - a checklist for business

BCLP on

Business as (un)-usual after Covid? As we emerge from the pandemic, it is becoming increasingly clear that planning and working for a return to business as usual will not be enough. To survive in the marketplace, careful...more

Foley & Lardner LLP

A Hacker or Your Cloud Provider. Who Presents the Greatest Risk to Your Data?

Foley & Lardner LLP on

It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been taken...more

Farella Braun + Martel LLP

Keeping Up With the Risks and Protections of Cyber Insurance

An obscure niche product less than a decade ago, cyber insurance is now a staple of many companies’ risk transfer programs. Its rise in prominence is no wonder. High-profile data breaches have caused businesses millions of...more

BakerHostetler

How and Why to Pick a Forensic Firm Before the Inevitable Occurs

BakerHostetler on

A forensic investigation by a security firm often does (and should) drive decision-making in response to an incident. Because the work of a security firm usually drives the critical path of a response, companies can become...more

Benesch

Landmarks - Summer 2015

Benesch on

Technologically savvy shoppers visiting brick-and-mortar retail locations are increasingly engaging in “showrooming,” a practice where consumers use the brick-and-mortar retail location to evaluate a product in person, yet...more

Pillsbury - Global Sourcing Practice

Addressing Cyber Attacks and Data Breaches in Supplier Contracts - Part 2: How are Limits of Liability Evolving, with Respect to...

Ten years ago, most "buyers/customers" expected their suppliers to absorb unlimited contractual liability if the supplier was responsible for a breach affecting the customer's data. Today, while customers may continue to...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide