News & Analysis as of

Cybersecurity Contract Terms

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Ice Miller

As the Department of Justice Affirms and Advances Its Cyber-Fraud Initiative, Government Contractors Should Take Steps to Ensure...

Ice Miller on

While some areas of white-collar enforcement have been deprioritized by the Trump Administration, the Department of Justice (DOJ) remains committed to its Civil Cyber-Fraud Initiative as demonstrated by two recent False...more

Morgan Lewis

Data Center Operations: Aligning Supply Chain, Compliance, and Customer Expectations

Morgan Lewis on

The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more

A&O Shearman

European Commission adopts RTS on the elements to assess when subcontracting certain ICT services under DORA

A&O Shearman on

The European Commission has adopted a Delegated Regulation supplementing Regulation 2022/2554 on digital operational resilience for the financial sector (DORA) with regard to regulatory technical standards specifying the...more

Levenfeld Pearlstein, LLC

7 Things Businesses Should Consider When Using AI

Artificial intelligence (AI), machine learning algorithms, and other emerging technologies impact nearly every business and industry. The rapid deployment of Generative AI (GenAI) is reshaping how organizations do business...more

Warner Norcross + Judd

Emphasizing Robust Contracts with Cloud Providers Amid Recent Alleged Breach at Oracle

Warner Norcross + Judd on

Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Miles Mediation & Arbitration

Electronic Contracts and Electronic Signatures Under E-Sign and UETA

The digital revolution has fundamentally changed the way businesses and individuals conduct transactions. Electronic contracts and electronic signatures have become vital to modern commerce, enabling efficiency and...more

GeoDataVision

Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory...

GeoDataVision on

In this podcast, the hosts discuss the importance of managing third-party risk for financial institutions. They highlight how institutions rely on external providers for technological innovation and operational support, but...more

Carlton Fields

Square Peg, Round Hole: 6th Circuit Affirms Finding That Cyber Claims Are Not Covered by CGL Policies

Carlton Fields on

In Home Depot Inc. v. Steadfast Insurance Co., Home Depot learned the hard way a rule every DIY enthusiast knows: measure twice, cut once. It appears Home Depot’s measurements were off when it sized up its insurance needs,...more

Morgan Lewis - Tech & Sourcing

The Devil Is in the Details: Key Thoughts on Compliance Provisions

In the current, highly competitive, business landscape, businesses face the challenge of optimizing efficiency, enhancing productivity, and reducing costs, all while maintaining the quality of their services. One of the...more

Neal, Gerber & Eisenberg LLP

Top Twelve Trends to Monitor in the Hospitality Industry in 2025

The hospitality industry will need to focus on several key areas to ensure compliance and minimize risk in the year ahead, including data privacy and cybersecurity protections, employment and labor law compliance, and even...more

Arnall Golden Gregory LLP

Complete Win, Secured Early, for Payment Processor and Sponsor Bank in Business Email Compromise Fight

As we have previously explored, litigation involving account takeovers (“ATOs”) and business email compromise (“BEC”) fraud have produced a muddled legal landscape. As between payors and intended payees, courts have tended to...more

Fish & Richardson

Protecting and Enforcing Your Trade Secrets in a Global Economy

Fish & Richardson on

In the interconnected, global business environment, trade secret information regularly crosses international boundaries, and trade secret misappropriation can occur anywhere in the world. Trade secret holders should thus...more

King & Spalding

EU DORA: Are you in scope, and if so, how can you prepare?

King & Spalding on

The Digital Operational Resilience Act (DORA) establishes a harmonised and comprehensive framework for information and communication technology (ICT) risk management in the financial sector. It is a directly applicable EU...more

Epiq

Cyber Incidents on the Rise: Tips for Effective Data Breach Notification

Epiq on

Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five...more

McAfee & Taft

DOL confirms cybersecurity guidance applies to health and welfare plans

McAfee & Taft on

On Friday, September 6, 2024, the U.S. Department of Labor confirmed that its cybersecurity guidance applies to all employee benefit plans, including health and welfare plans. In 2021, the DOL issued guidance providing best...more

Venable LLP

The Subcontractor Performed. The Prime Contractor Paid. But a Hacker Ended Up with the Money. Who Is Responsible?

Venable LLP on

When hackers gain access to a subcontractor’s information systems and divert the prime contractor’s payment to themselves instead of to the subcontractor, does the prime contractor still have to pay the subcontractor?...more

ArentFox Schiff

2023 Trade Secrets End of Year Report

ArentFox Schiff on

2023 was a banner year for trade secrets, non-competes, and other restrictive covenants. Employee non-competes continued to garner attention at the federal agency level, drawing commentary and action from the Federal Trade...more

Mintz - Privacy & Cybersecurity Viewpoints

Major Win for California Privacy Protection Agency: Enforcement of Regulations Can Begin Immediately

If you have been relying on last year’s court order staying the ability of the California Privacy Protection Agency (CPPA) to enforce regulations promulgated under the California Privacy Rights Act (CPRA) to also stay your...more

King & Spalding

Proposed FAR Revisions Aim to Standardize Cybersecurity Requirements Across Agencies and Add Incident Reporting Obligations for...

King & Spalding on

On October 3, the Department of Defense, General Services Administration, and the National Aeronautics and Space Administration published two sets of proposed revisions to the Federal Acquisition Regulation (“FAR”) pertaining...more

Ervin Cohen & Jessup LLP

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Benesch

Protecting Your Business in a Digital World: Top 10 Questions for Internal Teams and Stakeholders

Benesch on

The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

Kaufman & Canoles

Credit Union Client Alert - Year-End Housekeeping for Credit Unions - Is Your “House” in Order?

Kaufman & Canoles on

Credit unions should take the time to ensure your house is in order and fully compliant in every area before the year’s end. This will help prepare for new developments, rulings, guidance, settlement actions, and anything...more

55 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide