News & Analysis as of

Today's Popular Updates Data Security Contract Terms

A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous... more +
A repository for the most well-read content on JD Supra at any given time, along with occasional roundups of popular content by specific topic. Also stop by for monthly recaps of hot articles for the previous thirty days. less -
Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

WilmerHale

China’s New Outbound Data Transfer Security Assessment Measures and Standard Contract Provisions

WilmerHale on

Outbound Data Transfer Security Review Measures - On July 7, 2022, the Cybersecurity Administration of China (“CAC”) issued the Outbound Data Transfer Security Assessment Measures (“Security Assessment Measures”) effective...more

McDermott Will & Emery

[Webinar] Privacy and Cybersecurity Contracting: What’s the “Deal”? - June 29th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more

Farella Braun + Martel LLP

[Webinar] Cyber Insurance for the Cannabis Industry - June 1st, 10:00 am - 11:00 am PT

Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more

Epstein Becker & Green

Addressing Data Privacy and Security Provisions in COVID-19 Related Service Provider Agreements and Beyond

Epstein Becker & Green on

Employers’ engagement and use of various types of vendors has expanded recently, to include vendors who assist with office re-entry screening and contact tracing as employees return to work during the COVID-19 pandemic. ...more

Morgan Lewis

Contract Corner: Data Safeguards in Services Agreements (Part 3)

Morgan Lewis on

In Part 1 and Part 2 of this Contract Corner, we discussed the importance of assessing and defining the types of data involved in a services agreement, and highlighted issues to consider with respect to the ownership and...more

McGuireWoods LLP

Draft Kings Class Action Argues Data Leak Revealed “Insider Trading” – But Can Case Survive Arbitration Clause?

McGuireWoods LLP on

Draft Kings and Fan Duel, competing daily fantasy sports (DFS) sites, have been vying for attention by flooding the airwaves with a reported 60,000 commercials this year. However, a recent data leak has resulted in less...more

Arnall Golden Gregory LLP

Six Ways for Data-Driven Medical Device Companies to Implement Effective Privacy and Security Measures

The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide