News & Analysis as of

Risk Mitigation Third-Party Service Provider

Bricker Graydon LLP

Boost Workplace Safety and Lower Ohio Workers’ Comp Premiums with a Drug-Free Safety Program

Bricker Graydon LLP on

All Ohio employers are required to maintain workers’ compensation insurance coverage for their employees, which can be a significant business expense. ...more

K&L Gates LLP

Digital Operational Resilience in the Financial Services Sector: EU and UK Update

K&L Gates LLP on

With under six months to go until the European Union Digital Operational Resilience Act (DORA) becomes applicable on 17 January 2025, DORA implementation projects are running full steam ahead. DORA lays down uniform...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Mayer Brown

EU Cyber Legislation Puts Emphasis on Board Responsibility

Mayer Brown on

What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more

Mitratech Holdings, Inc

Compliance Down Under: Understanding Australian Regulation CPS 230

The Australian Prudential Regulation Authority (APRA) released Prudential Standard CPS 230 in March 2017. At a glance, the regulation aims to strengthen the cybersecurity resilience and operational risk management of the...more

Venable LLP

Lead Generation: An Excerpt from the Advertising Law Tool Kit

Venable LLP on

In the evolving world of lead generation and performance-based customer acquisition, the quest for profits can lead to big legal risks, some of them too large for advertisers that buy leads through third parties. Advertisers...more

Parker Poe Adams & Bernstein LLP

The Increasing Importance of Cybersecurity Readiness in the Municipal Bond Market: How Public Institutions Can Respond

In today's evolving world of security and data privacy, K-12 schools, universities, local governments, and hospitals are increasingly finding themselves on the same list: vulnerable to the threat of a cyberattack....more

Mitratech Holdings, Inc

Understanding 4th- and Nth-Party Risk: What Do You Need to Know?

Strategies for Mitigating Unseen Threats and Managing 4th- and Nth-Party Risk in Your Modern Business. Organizations today have transitioned from using on-site server rooms to relying on third-party services and cloud...more

Ervin Cohen & Jessup LLP

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Goodwin

California Invasion of Privacy Act (CIPA) Decisions Continue to Create Uncertainty for Websites Using Third-Party Technology

Goodwin on

The pace of internet consumer privacy class action litigation is skyrocketing. Remarkably, no specific legislative change in the law triggered the increase in litigation. Instead, the driver of this litigation explosion — in...more

Polsinelli

Will a New Wave of Lawsuits Roll Into a Nationwide Tsunami? Wiretapping Litigation for Website Analytics

Polsinelli on

2022 has seen a new wave of class action lawsuits targeting companies that use technology to track consumers’ interfaces on their websites. These lawsuits generally allege that the use of technologies such as session replay...more

WilmerHale

UK Regulators Proposed Framework for Critical Third Parties

WilmerHale on

Financial services firms are increasingly reliant upon third-party companies to provide important services, ranging from cloud services and data analytics to machine learning and cash distribution. As these third parties...more

Genova Burns LLC

DoorDash Hacker Incident Illustrates Third-Party Vendor Risks and Potential Vulnerabilities

Genova Burns LLC on

​​​​​​​Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more

Sheppard Mullin Richter & Hampton LLP

Fed Reports on Cybersecurity and Financial System Resilience

Recently, the Federal Reserve Board (Fed) published its annual Cybersecurity and Financial System Resilience report describing measures it has taken to strengthen cybersecurity in the financial services sector, including the...more

Holland & Knight LLP

U.S. Department of Education Cautions Colleges and Universities on Program Arrangements

Holland & Knight LLP on

To increase enrollments and lower operating costs, many colleges and universities oftentimes partner with outside companies to provide portions of their academic programs online or on-campus. Serious legal risks may arise...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Mitratech Holdings, Inc

What is a Vendor Risk Assessment?

We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more

Mitratech Holdings, Inc

What is Vendor Risk & Vendor Risk Management (VRM)?

Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more

Robinson+Cole Data Privacy + Security Insider

2021 Project: Update Vendor Contracts

Among many other things, 2020 has been the year of vendor security incidents and data breaches. More than ever, we have responded to incidents for clients that were caused not by the client, but by a third-party vendor....more

White & Case LLP

Vendor performance during social isolation

White & Case LLP on

White & Case Technology Newsflash - Every industry is at a critical juncture in evaluating how to successfully continue business operations in a period of unprecedented disruption. We have received a number of inquiries...more

Hudson Cook, LLP

Vendor Service Contracts - Not Just Arm's Length Transactions Anymore

Hudson Cook, LLP on

The Consumer Financial Protection Bureau's Compliance Bulletin and Policy Guidance; 2016-02, Service Providers addresses the CFPB's expectation that companies oversee their business relationships with service providers in a...more

Benesch

Supply Chain Services Contracts: Mitigating Global Operational Risk

Benesch on

For today's global enterprises, smart management of third-party supply chain providers can help ensure efficient and error-free movement of goods. This article explores key contract strategies and operational risk mitigation...more

Hudson Cook, LLP

CCPA Advent: Waiting on the World to Change

Hudson Cook, LLP on

January 1, 2020, opens both a new decade and a new landscape in privacy regulation in the United States. On that day, the California Consumer Privacy Act, or CCPA, is set to become effective. The law will be the first of its...more

Reveal

The eDiscovery Impostor and How to Spot Them

Reveal on

“To err is human,” but in an industry as seemingly driven by precision as eDiscovery, errors are all too common. Yes, mistakes are going to happen. Which is why we can fall back on processes and procedures to ensure that even...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

37 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide