News & Analysis as of

Third-Party Risk Third-Party Service Provider

Esquire Deposition Solutions, LLC

Pennsylvania Bar Spells Out Ethical Duties When Vendors Handle Sensitive Information

All lawyers understand that they have an ethical obligation to protect client confidential information from prying eyes, whether in a locked file cabinet, on a cloud storage device, or passing through the networks of...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

NAVEX

[Webinar] Trust Beyond Boundaries: Holistic Approaches to Third-Party Risk - September 14th, 9:00 am BST

NAVEX on

Third-party relationships supporting core operations are now more important than ever for most organizations. Yet too often, procurement, information security, compliance, and other professionals are overburdened with the...more

NAVEX

[Webinar] Trust Beyond Boundaries: Holistic Approaches to Third-Party Risk - September 13th, 9:00 am PT

NAVEX on

Third-party relationships supporting core operations are now more important than ever for most organizations. Yet too often, procurement, information security, compliance, and other professionals are overburdened with the...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Dorsey & Whitney LLP

Tracking Online User Activity: HIPAA and Other Legal Risks

Dorsey & Whitney LLP on

The use of tracking technologies on websites and mobile applications (e.g., cookies) has become largely ubiquitous in our technology-driven world. Health care providers and organizations, for example, may use tracking...more

Orrick, Herrington & Sutcliffe LLP

Bowman discusses bank and third-party cyber risk management expectations

On February 15, Federal Reserve Board Governor Michelle W. Bowman delivered remarks at the Midwest Cyber Workshop, during which she discussed topics related to third-party service provider reliance and regulatory expectations...more

Venable LLP

Evaluating the Cybersecurity Risk of Your Mailing and Publishing Partners

Venable LLP on

Cybersecurity is a growing concern for all nonprofit organizations, especially those that store, process, and transmit sensitive data. While it is common to think of the cyber issue as relevant to digital communications and...more

WilmerHale

UK Regulators Proposed Framework for Critical Third Parties

WilmerHale on

Financial services firms are increasingly reliant upon third-party companies to provide important services, ranging from cloud services and data analytics to machine learning and cash distribution. As these third parties...more

Esquire Deposition Solutions, LLC

Exercising Due Diligence in the Selection of a Tech Vendor

The task of conducting due diligence in the selection of technology vendors is a critical component of the lawyer’s ethical obligation to maintain reasonable security over client confidential information. However, for several...more

Barnea Jaffa Lande & Co.

Do You Own a Database? You’re Also Responsible for Actions Performed by Third Parties

The Black Shadow hacking group’s attack on Cyberserve, reported a few days ago, has resulted (at this point in time) in the leaking of a database with more than 800,000 records pertaining to various individuals and the...more

Mitratech Holdings, Inc

What is a Vendor Risk Assessment?

We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more

Mitratech Holdings, Inc

What is Vendor Risk & Vendor Risk Management (VRM)?

Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more

Mitratech Holdings, Inc

The Case for Decentralized Third-Party Risk Management

As we now enter the third quarter of our discontent with the Coronavirus worldwide pandemic, one thing is very clear: Centralized vendor risk management is imploding....more

Ervin Cohen & Jessup LLP

Can Companies Be Liable If Third-Party Contractors Suffer Data Breaches?

The California Consumer Privacy Act became effective on Jan. 1. Included among its provisions is the grant of a private right of action on behalf of any consumer “whose nonencrypted and nonredacted personal information…is...more

Morgan Lewis

Contract Corner: Required Consents Analysis in Due Diligence

Morgan Lewis on

Are you about to sign a service agreement with a third-party service provider under which it will access and use technology of your company? Have you checked your applicable third-party contracts to see if you need any...more

Thomas Fox - Compliance Evangelist

Billion Dollar Baby: Ericsson FCPA Enforcement Action - Part 4: The Double Whammy in Penalties

Last week the Justice Department (DOJ) announced a resolution of the long standing Foreign Corrupt Practices Act (FCPA) enforcement action involving Telefonaktiebolaget LM Ericsson (Ericsson), a multinational networking and...more

Thomas Fox - Compliance Evangelist

Billion Dollar Baby: Ericsson FCPA Enforcement Action – Part 3: Internal Control Failures

Last week the Justice Department (DOJ) announced a resolution of the long standing Foreign Corrupt Practices Act (FCPA) enforcement action involving Telefonaktiebolaget LM Ericsson (Ericsson), a multinational networking and...more

Reveal

The eDiscovery Impostor and How to Spot Them

Reveal on

“To err is human,” but in an industry as seemingly driven by precision as eDiscovery, errors are all too common. Yes, mistakes are going to happen. Which is why we can fall back on processes and procedures to ensure that even...more

Thomas Fox - Compliance Evangelist

The Dutch Tulip Bubble and Internal Controls for Third Parties

Internal controls are a key tool to operationalize your third-party risk management program. The basic internal controls, that should be a part of any financial controls system. There were four significant controls the...more

Robinson+Cole Data Privacy + Security Insider

Delta Sues Vendor for Causing Data Breach

In an unusual move, Delta Airlines (Delta) sued one of its vendors last week for the data breach it experienced in 2017. It’s an unusual move for several reasons. First, in our experience when a vendor causes a data breach,...more

The Volkov Law Group

Five Lessons for Third-Party Distributor Risk Management from Microsoft FCPA Settlement (Part III of III)

The Volkov Law Group on

The Microsoft FCPA settlement, while not significant in the total penalty of approximately $25 million, provides some important instructions concerning distributor and re-seller risks and mitigation strategies.  ...more

Troutman Pepper

FDIC Reminds Small Banks of Need to Oversee Technology Service Providers

Troutman Pepper on

The need to control risks associated with using third-party technology service providers was reemphasized by the FDIC for institutions with less than $1 billion in assets in a new financial institutions letter...more

Bennett Jones LLP

Cyber Breach at the Ontario Cannabis Store Impacts 4,500 Consumers

Bennett Jones LLP on

The Toronto Sun reported this morning that the privacy of 4,500 consumers of recreational cannabis in Ontario has been compromised. The names and addresses of individuals purchasing cannabis through the Ontario Cannabis Store...more

Esquire Deposition Solutions, LLC

Third-Party Misconduct & Transparency Compliance

Hiring third parties to conduct international business is appealing: Foreign business agents, consultants, distributors, and other groups facilitate business by speaking local languages, providing expertise, and accessing...more

42 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide