News & Analysis as of

Cloud Computing Software Data Security

Orrick, Herrington & Sutcliffe LLP

A Customer Relationship Checklist for Cloud Providers, Including SaaS Companies, Operating in France

For more information about France’s SREN law, see our update that provides five key takeaways for businesses. Two new laws impose an array of obligations and restrictions on cloud providers in France. First, the European...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection - 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

Sheppard Mullin Richter & Hampton LLP

Governmental Practice Cybersecurity and Data Protection: 2023 Recap & 2024 Forecast Alert

To kick off the New Year, Sheppard Mullin’s Governmental Practice Cybersecurity & Data Protection Team has prepared a cybersecurity-focused 2023 Recap (including links to all of the resources the team has put out over the...more

CloudNine

6 Tips for Managing eDiscovery for Access Requests for a State or Local Government Organization

CloudNine on

By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more

Trusaic

Is Data Security A Priority for Your Workplace Equity Provider?

Trusaic on

Cyberattacks continue to rise, increasing the need for robust data security. Global weekly attacks rose by 7% during the first quarter of 2023, versus the same quarter last year. Each organization is estimated to face on...more

Nextpoint, Inc.

Modern eDiscovery Solutions: The Case for the Cloud in 2023

Nextpoint, Inc. on

While the cloud has become commonplace in our everyday lives, many legal teams are still missing out on the benefits of cloud-based ediscovery software. As of 2021, there is a 50/50 split between ediscovery solutions...more

Nextpoint, Inc.

Managing Ediscovery In The Cloud: Essential Questions to Ask Potential Providers

Nextpoint, Inc. on

As we explained in our last post, managing ediscovery in the cloud is the only viable solution for dealing with the massive amount of electronic data involved in litigation today. Nextpoint has been an advocate for...more

Morgan Lewis - Tech & Sourcing

Managed Services and As-a-Service Contracting Activity Stayed Strong in Q2 2022: ISG Index Report

With a solid uptick in requests for assistance with outsourcing, cloud, and as-a-service contracts, 2022 has been busy from the get-go. ISG Index confirmed this trend across the market in its recent Q2 ISG Index Report...more

Polsinelli

Identifying and Remediating the Critical Apache Log4j Cybersecurity Vulnerability

Polsinelli on

On December 9th, 2021, a critical zero-day vulnerability, which has the potential of providing threat actors access to millions of computers worldwide, was discovered. Due to the critical nature of this vulnerability, and the...more

Robinson+Cole Data Privacy + Security Insider

Update on Apache log4j and Kronos Security Incidents

It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more

Lewis Roca

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

Lewis Roca on

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies,...more

Morgan Lewis - Tech & Sourcing

Contract Corner: SaaS and Cloud Services Solutions – Operational vs. Customer Business Data and Who Gets to Use What

If you have been involved with SaaS agreements or agreements that are for, or are enabled by, cloud services, you have seen or even drafted provisions relating to the right to use data processed on or generated through the...more

King & Spalding

Cloud Computing and Issues to Consider During Agreement Negotiations

King & Spalding on

Cloud computing is a subscription-based service where a person or business can obtain networked storage space and computer resources for a fee. There are different types of cloud computing services. The two most...more

Winstead PC

Is it HIPAA or HIPPA? Either way, it still applies.

Winstead PC on

I have negotiated hundreds of SaaS agreements for dozens of software companies and I always hated when the company on the other side was a healthcare provider. Invariably, they would bring up Protected Health Information...more

McGuireWoods LLP

Three Major Security Issues to Consider with SaaS and Cloud Solutions

McGuireWoods LLP on

Small and medium-sized businesses are turning to software as a service (SaaS) solutions for their IT needs more and more frequently. SaaS solutions can provide end-users with quicker, cheaper access to software that they...more

Robinson+Cole Data Privacy + Security Insider

SaaS Adoption Continues to Rise Despite Security Concerns

Software as a Service (SaaS) adoption has continued to climb with each passing year. Major contributors to this have been ease of deployment, improved productivity and lower cost of ownership. Furthermore, organizations have...more

Robins Kaplan LLP

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Robins Kaplan LLP on

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide