News & Analysis as of

Third-Party Service Provider Vendors

Integreon

Why Outsourcing Creative Services Makes Sense: A Strategic Approach to Accelerate Global Sales

Integreon on

Strategic sales teams know that speed and consistency aren’t just nice to have – they are essential. But when creative resources are stretched thin or siloed in marketing, sales enablement efforts can stall. The result?...more

Jackson Lewis P.C.

Tips for Vacation Rental, Property Mgmt. Businesses Facing Vendor Cybersecurity Risk

Jackson Lewis P.C. on

No organization can eliminate data breach risks altogether, regardless of industry, size, or even if the organization has taken significant steps to safeguard their systems and train employees to avoid phishing attacks....more

U.S. Legal Support

How to Choose a Record Retrieval Partner

U.S. Legal Support on

Record retrieval is an integral part of any legal case, giving attorneys access to accurate and up-to-date information on which to base their arguments. Preparing records for a case or legal matter requires carefully...more

BakerHostetler

DSIR Deeper Dive: Tracking the Crackdown on Tracking/Pixel Technologies: Web Litigation and Regulatory Landscape - Part 2

BakerHostetler on

In the first part of this blog post, we looked into the OCR and FTC’s focus on third-party tracking technologies. We also reviewed the AHA Lawsuit and its impact for the use of tracking technologies. In this blog post, we...more

Goodwin

NYDFS Publishes Guidance on AI-Related Cybersecurity Risks

Goodwin on

On October 16, 2024, the New York State Department of Financial Services (NYDFS or the “Department”) published an industry letter (the “Guidance”) regarding the increased reliance on artificial intelligence (AI) and the...more

Baker Donelson

Best Practices for Protecting Operations from Vendor's Cyber Incidents

Baker Donelson on

In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more

Constangy, Brooks, Smith & Prophete, LLP

FTC amendments to Health Breach Notification Rule are now in effect

On April 24, the Federal Trade Commission announced that it had finalized changes to its Health Breach Notification Rule - to address emerging technologies. Specifically, the Rule was broadened to (1) apply to entities not...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

Epiq

Practice Groups within eDiscovery Providers? You Should Bet Your Litigation and Investigation Success on It!

Epiq on

For decades, law firms have organized themselves into practice groups or fully specialized firms to marshal resources and expertise, increase efficiency, and develop strong relationships with companies in specific industries...more

Pillsbury - Global Sourcing Practice

Old Tricks for the New Dog: Why Traditional Technology Sourcing Best Practice Is Relevant for Cutting-Edge AI

Since the release of OpenAI’s ChatGPT, the intense hype around large language models (LLMs) and complex AI systems has exploded. Organizations have rushed to both try and buy these new tools. Along with it, a flood of...more

Integreon

Strategic Benefits of an Outsourced Administrative Support Model

Integreon on

In the ever-evolving, intensely competitive corporate landscape, the quest for operational efficiency has given rise to a strategic model that’s reshaping the very fabric of business functions — outsourced administrative...more

MoFo Tech

AI Trends For 2024 - Vendor Procurement Practices And Generative AI

MoFo Tech on

Vendor procurement practices will continue to evolve in 2024 to reflect corporate AI risk management and governance policies. While companies are beginning to appreciate that vendor work product may be developed using AI...more

Ervin Cohen & Jessup LLP

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Sheppard Mullin Richter & Hampton LLP

The Comprehensive Privacy Law Deluge: Updating Vendor Contracts

Of the many worries on privacy compliance teams’ lists as we face the onslaught of state “general” privacy laws are the impacts they have on vendor contracts. Fortunately for those who have already had to deal with contracts...more

WilmerHale

SEC Proposes to Expand Reg SCI

WilmerHale on

The Securities and Exchange Commission (SEC) proposes to amend Regulation Systems Compliance and Integrity (Reg SCI) to update and expand the regulatory oversight of the core technology of the U.S. securities markets.1 The...more

Venable LLP

An Independent Schools' Guide to Vendor Contract Management

Venable LLP on

Independent schools often contract with vendors to support the school's operations and delivery of its curriculum and programming, including transportation providers, food service, cleaning and facilities maintenance,...more

Society of Corporate Compliance and Ethics...

The top risk factor for shell companies

CEP Magazine (October 2022) - A recent case reminded me of how easy it is to use shell companies to perpetrate fraud. A former associate general counsel who handled allegations of employee misconduct for a company created...more

HaystackID

[Webcast Transcript] eDiscovery Playbooks: How to Win by Day and Sleep at Night

HaystackID on

Editor’s Note: On September 21, 2022, Business Intelligence Associates (BIA), a recently acquired HaystackID company, shared an educational webcast on the role of eDiscovery playbooks in litigation preparedness. Regardless of...more

Genova Burns LLC

DoorDash Hacker Incident Illustrates Third-Party Vendor Risks and Potential Vulnerabilities

Genova Burns LLC on

​​​​​​​Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more

Bass, Berry & Sims PLC

CPRA Draft Regulations – Round One

The California Privacy Protection Agency (CPPA or Agency) published 66 pages of proposed draft regulations (Draft Regulations) that govern the California Privacy Rights Act (CPRA) as a special treat on Friday, May 27 for some...more

Esquire Deposition Solutions, LLC

SOC Reports Provide Critical Insights on Vendor Data Security Practices

I’ve written several times during the past year about the importance of information security for legal professionals. Mitigating the threat of unauthorized access to client confidential information is one of the most...more

Esquire Deposition Solutions, LLC

Exercising Due Diligence in the Selection of a Tech Vendor

The task of conducting due diligence in the selection of technology vendors is a critical component of the lawyer’s ethical obligation to maintain reasonable security over client confidential information. However, for several...more

Sheppard Mullin Richter & Hampton LLP

CFPB Updates Supervision and Examination Manual, Adds IT Examination

The CFPB updated its Supervision and Examination Manual by adding a new section titled Compliance Management Review – Information Technology. The new examination procedures are meant to assist CFPB examiners when assessing...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Mitratech Holdings, Inc

What is a Vendor Risk Assessment?

We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more

96 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide