News & Analysis as of

Third-Party Service Provider Third-Party Risk

Goodwin

DOJ’s Data Export Rule Is In Force April 8: What You Need to Do

Goodwin on

On April 8, 2025, a sweeping rule issued by the US Department of Justice (DOJ) will take effect. The rule imposes restrictions—and in some cases, outright prohibitions—on US companies in connection with certain types of data...more

Benesch

Scientific American Unable to Kick VPPA Class Action

Benesch on

In a notable development for corporate defendants grappling with consumer privacy litigation, the Southern District of New York has recently issued a decision in Lee v. Springer Nature America, Inc., embracing a broadened...more

WilmerHale

FINRA’s 2025 Annual Regulatory Oversight Report: Focus on AI, Other Emerging Risk Areas, and Best Practices

WilmerHale on

On January 28, 2025, FINRA published its Annual Regulatory Oversight Report (the Report). The Report highlights emerging risk areas and recent developments, common compliance deficiencies, and best practices for member firms....more

WilmerHale

2024 Year in Review: Video Privacy Protection Act Litigation Trends

WilmerHale on

The Video Privacy Protection Act (“VPPA”), a federal statute enacted in 1988, is gaining new relevance in recent years as plaintiffs bring lawsuits with the goal of enforcing online privacy rights. 2024 saw a continuation of...more

Benesch

Key Considerations in Developing a Comprehensive AI Governance Policy and Mitigating Risks of AI Use

Benesch on

Crafting an AI Governance policy best suited for your business requires careful consideration of the types of AI, how AI will be used, current and future legislation, and a group of individuals specifically designated to...more

Benesch

Navigating Legal Liability in AI Adoption: What Healthcare Executives Need to Know

Benesch on

The adoption of artificial intelligence (AI) in healthcare has ushered in a new era of innovation that is transforming diagnostics, treatment planning and operational efficiencies. However, with great potential comes...more

Troutman Pepper Locke

6 Tips for Cos. Facing Service Provider Cyber Incidents

Troutman Pepper Locke on

It is no secret that ransomware dominates headlines, and cybersecurity incidents have become part of our everyday language. However, the criminal “business model” behind ransomware keeps evolving. Originally published in...more

BCLP

Managing Technology Supply Chains: What the Advent of the UK’s Critical Third Party Regime Means for Financial Services Firms and...

BCLP on

The FCA, PRA, and Bank of England have published their finalised critical third party (CTP) rules (and accompanying guidance) in PS24/16 Operational resilience: Critical third parties to the UK financial sector....more

Latham & Watkins LLP

UK Regulators Publish Final Rules for Critical Third Parties

Latham & Watkins LLP on

The new regime will take effect on 1 January 2025, but will not diminish the responsibilities of financial services firms relying on the services of critical third parties....more

Baker Donelson

Best Practices for Protecting Operations from Vendor's Cyber Incidents

Baker Donelson on

In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more

Esquire Deposition Solutions, LLC

Pennsylvania Bar Spells Out Ethical Duties When Vendors Handle Sensitive Information

All lawyers understand that they have an ethical obligation to protect client confidential information from prying eyes, whether in a locked file cabinet, on a cloud storage device, or passing through the networks of...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

NAVEX

[Webinar] Trust Beyond Boundaries: Holistic Approaches to Third-Party Risk - September 14th, 9:00 am BST

NAVEX on

Third-party relationships supporting core operations are now more important than ever for most organizations. Yet too often, procurement, information security, compliance, and other professionals are overburdened with the...more

NAVEX

[Webinar] Trust Beyond Boundaries: Holistic Approaches to Third-Party Risk - September 13th, 9:00 am PT

NAVEX on

Third-party relationships supporting core operations are now more important than ever for most organizations. Yet too often, procurement, information security, compliance, and other professionals are overburdened with the...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Dorsey & Whitney LLP

Tracking Online User Activity: HIPAA and Other Legal Risks

Dorsey & Whitney LLP on

The use of tracking technologies on websites and mobile applications (e.g., cookies) has become largely ubiquitous in our technology-driven world. Health care providers and organizations, for example, may use tracking...more

Orrick, Herrington & Sutcliffe LLP

Bowman discusses bank and third-party cyber risk management expectations

On February 15, Federal Reserve Board Governor Michelle W. Bowman delivered remarks at the Midwest Cyber Workshop, during which she discussed topics related to third-party service provider reliance and regulatory expectations...more

Venable LLP

Evaluating the Cybersecurity Risk of Your Mailing and Publishing Partners

Venable LLP on

Cybersecurity is a growing concern for all nonprofit organizations, especially those that store, process, and transmit sensitive data. While it is common to think of the cyber issue as relevant to digital communications and...more

WilmerHale

UK Regulators Proposed Framework for Critical Third Parties

WilmerHale on

Financial services firms are increasingly reliant upon third-party companies to provide important services, ranging from cloud services and data analytics to machine learning and cash distribution. As these third parties...more

Esquire Deposition Solutions, LLC

Exercising Due Diligence in the Selection of a Tech Vendor

The task of conducting due diligence in the selection of technology vendors is a critical component of the lawyer’s ethical obligation to maintain reasonable security over client confidential information. However, for several...more

Barnea Jaffa Lande & Co.

Do You Own a Database? You’re Also Responsible for Actions Performed by Third Parties

The Black Shadow hacking group’s attack on Cyberserve, reported a few days ago, has resulted (at this point in time) in the leaking of a database with more than 800,000 records pertaining to various individuals and the...more

Mitratech Holdings, Inc

What is a Vendor Risk Assessment?

We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more

Mitratech Holdings, Inc

What is Vendor Risk & Vendor Risk Management (VRM)?

Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more

Mitratech Holdings, Inc

The Case for Decentralized Third-Party Risk Management

As we now enter the third quarter of our discontent with the Coronavirus worldwide pandemic, one thing is very clear: Centralized vendor risk management is imploding....more

Ervin Cohen & Jessup LLP

Can Companies Be Liable If Third-Party Contractors Suffer Data Breaches?

The California Consumer Privacy Act became effective on Jan. 1. Included among its provisions is the grant of a private right of action on behalf of any consumer “whose nonencrypted and nonredacted personal information…is...more

51 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide