News & Analysis as of

Risk Management Contract Terms Cybersecurity

Morgan Lewis

Data Center Operations: Aligning Supply Chain, Compliance, and Customer Expectations

Morgan Lewis on

The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more

Levenfeld Pearlstein, LLC

7 Things Businesses Should Consider When Using AI

Artificial intelligence (AI), machine learning algorithms, and other emerging technologies impact nearly every business and industry. The rapid deployment of Generative AI (GenAI) is reshaping how organizations do business...more

Warner Norcross + Judd

Emphasizing Robust Contracts with Cloud Providers Amid Recent Alleged Breach at Oracle

Warner Norcross + Judd on

Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more

White & Case LLP

Navigating NATO Procurement: Legal and Regulatory Considerations for Companies in Finland & Sweden

White & Case LLP on

As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more

Miles Mediation & Arbitration

Electronic Contracts and Electronic Signatures Under E-Sign and UETA

The digital revolution has fundamentally changed the way businesses and individuals conduct transactions. Electronic contracts and electronic signatures have become vital to modern commerce, enabling efficiency and...more

GeoDataVision

Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory...

GeoDataVision on

In this podcast, the hosts discuss the importance of managing third-party risk for financial institutions. They highlight how institutions rely on external providers for technological innovation and operational support, but...more

Morgan Lewis - Tech & Sourcing

The Devil Is in the Details: Key Thoughts on Compliance Provisions

In the current, highly competitive, business landscape, businesses face the challenge of optimizing efficiency, enhancing productivity, and reducing costs, all while maintaining the quality of their services. One of the...more

Neal, Gerber & Eisenberg LLP

Top Twelve Trends to Monitor in the Hospitality Industry in 2025

The hospitality industry will need to focus on several key areas to ensure compliance and minimize risk in the year ahead, including data privacy and cybersecurity protections, employment and labor law compliance, and even...more

Arnall Golden Gregory LLP

Complete Win, Secured Early, for Payment Processor and Sponsor Bank in Business Email Compromise Fight

As we have previously explored, litigation involving account takeovers (“ATOs”) and business email compromise (“BEC”) fraud have produced a muddled legal landscape. As between payors and intended payees, courts have tended to...more

Fish & Richardson

Protecting and Enforcing Your Trade Secrets in a Global Economy

Fish & Richardson on

In the interconnected, global business environment, trade secret information regularly crosses international boundaries, and trade secret misappropriation can occur anywhere in the world. Trade secret holders should thus...more

King & Spalding

EU DORA: Are you in scope, and if so, how can you prepare?

King & Spalding on

The Digital Operational Resilience Act (DORA) establishes a harmonised and comprehensive framework for information and communication technology (ICT) risk management in the financial sector. It is a directly applicable EU...more

Benesch

Protecting Your Business in a Digital World: Top 10 Questions for Internal Teams and Stakeholders

Benesch on

The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

McDermott Will & Emery

[Webinar] Privacy and Cybersecurity Contracting: What’s the “Deal”? - June 29th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more

Bowditch & Dewey

[Webinar] New Contracts: Pandemic Impact on Contract and Transaction Due Diligence - October 27th, 3:00 pm - 4:00 pm ET

Bowditch & Dewey on

During times of economic turbulence and commercial uncertainty, your business team and corporate counsel are well advised to undertake a more deliberate and thorough due diligence process when entering into contract and...more

Williams Mullen

The Impact of Remote Workforce on Contractual Obligations

Williams Mullen on

As a significant number of employees are working remotely due to COVID-19, maintaining adequate cybersecurity measures has been a priority for many businesses. Such concerns are certainly justified, and every effort should be...more

Orrick, Herrington & Sutcliffe LLP

Practical Tips for In-House Counsel From Recent Cybersecurity Decisions

The possibility of a cybersecurity incident—and ensuing litigation—is a fact of life for almost every business. Even companies that do not process or handle consumer information collect personal information about their...more

Robinson+Cole Data Privacy + Security Insider

Fully Executed Contracts are Preferred

We have been involved in several situations lately with security incidents where we ask our clients for the final executed contract with the vendor that we believe caused the incident, but the contract that we receive has not...more

Latham & Watkins LLP

Cyber Risk a Modern Concern for M&A Dealmakers

Latham & Watkins LLP on

Amid a growing number of high-profile corporate data breaches, cybersecurity is now a key issue for strategic acquirers. Thehack of Yahoo, which came to light midway through its 2016 takeover by Verizon, resulted in a US$350...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide