News & Analysis as of

Information Technology Vendors

Mitratech Holdings, Inc

The Vendor Onboarding Process: Keys to Success

What Is Vendor Onboarding? Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk...more

Integreon

DORA Compliance Part 2: Addressing Compliance Across Critical Operational Areas

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Amundsen Davis LLC

Bringing AI Out of the Shadows: How to Manage the Use of AI in Your Workplace

Amundsen Davis LLC on

Artificial intelligence (AI) is everywhere these days, including your workplace. While there is no one-size-fits-all AI policy that will work for every company, here are our general thoughts about how employers can...more

Jackson Lewis P.C.

FAQs for Schools and Persons Affected By the PowerSchool Data Breach

Jackson Lewis P.C. on

A massive data breach hit one of the country’s largest education software providers. According to EducationWeek, PowerSchool provides school software products to more than 16,000 customers, largely K-12 schools, that serve 50...more

Fisher Phillips

The Essential Questions to Ask Your AI Vendor Before Deploying Artificial Intelligence at Your Organization

Fisher Phillips on

Recent studies reflect that more than 75% of companies are either using or exploring the use of AI in their businesses, and more than 80% of employers consider AI a top priority in their future business plans. But finding the...more

Harris Beach Murtha PLLC

New Rule Requires Defense Contractors to Meet Cybersecurity Standards

The Office of Information and Regulatory Affairs (OIRA) recently cleared the final rule for the U. S. Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program, putting the agency one step closer to...more

Purpose Legal

Blog Summary: Embracing Challenges and Strategies in Legal Vendor Collaborations

Purpose Legal on

We recently joined a webinar hosted by the EDRM for an insightful session featuring experts Doug Kaminski and Amy Sellars focused on the intricacies of vendor collaboration, legal partnerships, and effective strategies for...more

Mitratech Holdings, Inc

[Event] Interact 2023 - October 2nd - 5th, New Orleans, LA

Interact is BACK and coming to you live this October from the historic French Quarter of New Orleans! Last year’s event may have been named a finalist for Engage Media's 2022 "Best Brand Experience,” but this year, we’re...more

Polsinelli

Mitigating Your Greatest Data Privacy Risk

Polsinelli on

Third-party vendors pose a significant risk - The greatest data privacy threat to companies is commonly thought to be that company’s employees. While employees can be a threat, the majority of data breaches and ...more

Polsinelli

U.S. State Privacy Law Update

Polsinelli on

In 2023, new comprehensive data privacy laws come into effect in five states — California, Colorado, Connecticut, Utah, and Virginia. The California Privacy Rights Act of 2020 (CPRA) and the Virginia Consumer Data Protection...more

Burr & Forman

Cybersecurity Checklist for Vendor Management – Vendor Security

Burr & Forman on

By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more

King & Spalding

Global Trends in IT Outsourcing

King & Spalding on

The IT sector has been demonstrating its value in the wake of the COVID-19 pandemic. As more businesses adopt hybrid or even permanent remote work, worldwide IT spending is forecast to reach $4.5 trillion in 2022 and expand...more

Sheppard Mullin Richter & Hampton LLP

CFPB Updates Supervision and Examination Manual, Adds IT Examination

The CFPB updated its Supervision and Examination Manual by adding a new section titled Compliance Management Review – Information Technology. The new examination procedures are meant to assist CFPB examiners when assessing...more

Goodwin

FDIC Seeks Comment on Supervisory Approach to Examinations During Pandemic

Goodwin on

In This Issue. The Federal Deposit Insurance Corporation (FDIC) is seeking information and comment regarding the FDIC’s supervisory approach to examinations during the pandemic; the FDIC’s tech lab, FIDTECH, announced a “tech...more

Morrison & Foerster LLP - Government...

April 2021 Bid Protest Roundup (Law360 Spotlight)

This installment of our monthly Law360 bid protest spotlight examines three protest decisions addressing (1) mismatches between proposed labor categories and the scope of a vendor’s underlying General Services Administration...more

Jackson Lewis P.C.

Data Protection And The Role Of Vendor Management

Jackson Lewis P.C. on

The SolarWinds hack highlights the critical need for organizations of all sizes to include cyber supply chain risk management as part of their information security program. It is also a reminder that privacy and security...more

NAVEX

4 Things to Know About Updated NIST 800-53 Standards

NAVEX on

[author: Matt Kelly] In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for...more

Jackson Lewis P.C.

California State Healthcare Worker Accesses COVID-19 Data On More Than 2,000 Patients And Employees

Jackson Lewis P.C. on

As we noted in late January 2020, the spread of infectious disease raises particular concerns for healthcare workers who want to do their jobs and care for their patients, while also protect themselves and their families....more

Jackson Lewis P.C.

Is the Real Estate Industry A Target For Cyberattacks?

Jackson Lewis P.C. on

No industry is immune to privacy and cybersecurity risks, and the real estate industry is no exception. Those in the real estate industry can protect against cyberattack by understanding the risks and vulnerabilities and...more

Mitratech Holdings, Inc

The 12 Ways of Fiscal Festivity, or How to Spend Your Remaining Tech Budget

Mitratech Holdings, Inc on

‘Tis the season to be giving. Giving your legal tech stack an appraising gaze, that is, now that a tough year is on its way out– and, maybe, your fiscal year along with it.  And, may we suggest? It’s a great time to invest...more

Mitratech Holdings, Inc

UK Finance Webinar Recap: Operational Resilience – Lessons Learnt from the Crisis

The Pandemic Crisis has offered the financial services sector a live stress test environment to assess its planning, systems, and processes for Operational Resilience. To explore this and see how institutions have fared so...more

Morgan Lewis

Contract Corner: Basics of Uptime Commitment in Cloud Service Level Agreements

Morgan Lewis on

In cloud services, whether it is infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS), service availability is often a significant customer concern because the customer is relying...more

McDermott Will & Emery

[Event] CCPA Compliance: An Interactive Workshop - Multiple Dates/Locations, February 11th - 24th

McDermott Will & Emery on

Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

McDermott Will & Emery

[Event] CCPA Compliance: An Interactive Workshop - Multiple Dates/Locations, Jan. 22nd - 30th

McDermott Will & Emery on

Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more

Reveal

The eDiscovery Impostor and How to Spot Them

Reveal on

“To err is human,” but in an industry as seemingly driven by precision as eDiscovery, errors are all too common. Yes, mistakes are going to happen. Which is why we can fall back on processes and procedures to ensure that even...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide