A Less is More Strategy for Data Risk Mitigation
AGG Talks: Cross-Border Business Podcast - Episode 26: U.S. Enforcement Trends Targeting Foreign Pharmaceutical and Medical Device Manufacturers
Key Discovery Points: Even AI Experts Can Get Faked Out
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 223: Cybersecurity and Privacy Risks with Healthcare Vendors with Brandon Robinson of Maynard Nexsen
Government Contracts and New Mandates Executive Orders and Cost Recovery Strategies Explained
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Consumer Finance Monitor Podcast Episode: Regulating Bank Reputation Risk
4 Key Takeaways | AI in Precision Agriculture Legal Risks and Mitigation
The Duty to Cooperate Under a Liability Policy
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Preparing for CMS Staffing Mandates — Assisted Living and the Law Podcast
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 211: Cybersecurity and Privacy Risks for the Healthcare Industry with Brandon Robinson of Maynard Nexsen
Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Why Retailers and Merchants Should Pay Attention to the CFPB - The Consumer Finance Podcast
The Justice Insiders Podcast - The Ever-Expanding Net: Corporate Compliance in an Era of Increasing Trade Sanctions and Restrictions
Fraud Risks at Nonprofit Organizations - Part 1
False Claims Act Insights - If Everything Matters, Nothing Does: Parsing Materiality in FCA Disputes
As demand for electric vehicle (EV) charging stations continues to rise, commercial property owners are increasingly being approached by vendors offering to install these stations at no upfront cost. The appeal is obvious: an...more
On October 16, 2024, the New York State Department of Financial Services (NYDFS) released guidance highlighting the cybersecurity risks associated with artificial intelligence (AI) and how covered entities regulated by NYDFS...more
In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more
All Ohio employers are required to maintain workers’ compensation insurance coverage for their employees, which can be a significant business expense. ...more
With under six months to go until the European Union Digital Operational Resilience Act (DORA) becomes applicable on 17 January 2025, DORA implementation projects are running full steam ahead. DORA lays down uniform...more
We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more
What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more
The Australian Prudential Regulation Authority (APRA) released Prudential Standard CPS 230 in March 2017. At a glance, the regulation aims to strengthen the cybersecurity resilience and operational risk management of the...more
In the evolving world of lead generation and performance-based customer acquisition, the quest for profits can lead to big legal risks, some of them too large for advertisers that buy leads through third parties. Advertisers...more
In today's evolving world of security and data privacy, K-12 schools, universities, local governments, and hospitals are increasingly finding themselves on the same list: vulnerable to the threat of a cyberattack....more
Strategies for Mitigating Unseen Threats and Managing 4th- and Nth-Party Risk in Your Modern Business. Organizations today have transitioned from using on-site server rooms to relying on third-party services and cloud...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
The pace of internet consumer privacy class action litigation is skyrocketing. Remarkably, no specific legislative change in the law triggered the increase in litigation. Instead, the driver of this litigation explosion — in...more
2022 has seen a new wave of class action lawsuits targeting companies that use technology to track consumers’ interfaces on their websites. These lawsuits generally allege that the use of technologies such as session replay...more
Financial services firms are increasingly reliant upon third-party companies to provide important services, ranging from cloud services and data analytics to machine learning and cash distribution. As these third parties...more
Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more
Recently, the Federal Reserve Board (Fed) published its annual Cybersecurity and Financial System Resilience report describing measures it has taken to strengthen cybersecurity in the financial services sector, including the...more
To increase enrollments and lower operating costs, many colleges and universities oftentimes partner with outside companies to provide portions of their academic programs online or on-campus. Serious legal risks may arise...more
Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more
We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more
Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more
Among many other things, 2020 has been the year of vendor security incidents and data breaches. More than ever, we have responded to incidents for clients that were caused not by the client, but by a third-party vendor....more
White & Case Technology Newsflash - Every industry is at a critical juncture in evaluating how to successfully continue business operations in a period of unprecedented disruption. We have received a number of inquiries...more
The Consumer Financial Protection Bureau's Compliance Bulletin and Policy Guidance; 2016-02, Service Providers addresses the CFPB's expectation that companies oversee their business relationships with service providers in a...more
For today's global enterprises, smart management of third-party supply chain providers can help ensure efficient and error-free movement of goods. This article explores key contract strategies and operational risk mitigation...more