News & Analysis as of

Cybersecurity Data Protection Contract Terms

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Warner Norcross + Judd

Emphasizing Robust Contracts with Cloud Providers Amid Recent Alleged Breach at Oracle

Warner Norcross + Judd on

Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Benesch

Protecting Your Business in a Digital World: Top 10 Questions for Internal Teams and Stakeholders

Benesch on

The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

WilmerHale

China’s New Outbound Data Transfer Security Assessment Measures and Standard Contract Provisions

WilmerHale on

Outbound Data Transfer Security Review Measures - On July 7, 2022, the Cybersecurity Administration of China (“CAC”) issued the Outbound Data Transfer Security Assessment Measures (“Security Assessment Measures”) effective...more

Morgan Lewis - Tech & Sourcing

From Pandemic Challenges to a Potential Recession – Are Your Outsourcing Contracts Up to Date?

The COVID-19 pandemic introduced unprecedented challenges, requiring companies to adapt quickly to the way their personnel work, changes in their business offerings, and how they interact with their customers and suppliers....more

McDermott Will & Emery

[Webinar] Privacy and Cybersecurity Contracting: What’s the “Deal”? - June 29th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more

Womble Bond Dickinson

The Logical Conclusion to an Illogical Conclusion: Schrems May Forbid Data Commerce from the EU to the US

Womble Bond Dickinson on

The world just received the newest pronouncement from the EU Court of Justice, in a decision known as Schrems II, and the legal opinion extends the data war declared on the United States in the first Schrems decision....more

Epstein Becker & Green

Addressing Data Privacy and Security Provisions in COVID-19 Related Service Provider Agreements and Beyond

Epstein Becker & Green on

Employers’ engagement and use of various types of vendors has expanded recently, to include vendors who assist with office re-entry screening and contact tracing as employees return to work during the COVID-19 pandemic. ...more

Hogan Lovells

COVID-19 and IT service provider contracts: A checklist for force majeure events

Hogan Lovells on

The COVID-19, and the various restrictions that have been implemented in response to it, are causing extraordinary business disruptions. Many organizations have had to modify their operational controls and accommodate a shift...more

Orrick, Herrington & Sutcliffe LLP

Practical Tips for In-House Counsel From Recent Cybersecurity Decisions

The possibility of a cybersecurity incident—and ensuing litigation—is a fact of life for almost every business. Even companies that do not process or handle consumer information collect personal information about their...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide