Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
6/10/2022
/ Continuing Legal Education ,
Contract Drafting ,
Contract Negotiations ,
Contract Terms ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
International Data Transfers ,
Popular ,
Privacy Laws ,
Risk Management ,
Standard Contractual Clauses ,
Vendors ,
Webinars
McDermott Will & Emery is hosting a webinar with ON2IT to discuss cybersecurity risk and what has become the prevailing cybersecurity strategy known as “Zero Trust.” The webinar will be a fireside chat between Todd...more
10/11/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Popular ,
Risk Management ,
Webinars
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more
9/24/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
NIST ,
Popular ,
Ransomware ,
Risk Management
In April, the Chinese government issued a second version of the draft Personal Information Protection Law (Draft PIPL), which will impact global companies. Join us for a joint webinar as we discuss the key provisions of the...more
6/14/2021
/ China ,
Cybersecurity ,
Data Privacy ,
Data Processors ,
Data Protection ,
Data Security ,
International Data Transfers ,
Legislative Agendas ,
Multinationals ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Webinars