News & Analysis as of

Vendors

Global In-House Centers in India, v2.0

GICs in India are evolving from cost-saving platforms into Innovation Centers for emerging digital technologies that can provide a competitive advantage. Recent years have seen a resurgence of interest in GICs in India...more

Allocation of Data Breach Risks and Costs in Vendor Contracts: Negotiate, Negotiate, Negotiate (And Negotiate Again!) Limitations...

by McGuireWoods LLP on

“A significant data breach is likely to cost the company materially, and costs could drag on for a number of years,” analyst Shlomo Rosenbaum, commenting on the Equifax breach. Organizations increasingly rely on...more

Building a Health App? Part 5: Contracting for Health App Construction

As you take your health app from innovative idea to reality, you will be engaging in a development project that will likely entail the procurement of technology, services and perhaps even content from third parties. For...more

7 things you might not know about cybersecurity insurance

by Thompson Coburn LLP on

The number of cyber attacks and data breaches are increasing, and the costs to respond to such incidents are also increasing. This underscores the importance of cyber insurance, a valuable tool that companies can access that...more

Client Alert: Vendor Section 503(b)(9) Administrative Priority Claims: When Goods are Received is Critical

Debtors in Chapter 11 proceedings rarely pay unsecured creditors a meaningful dividend on prepetition accounts receivable balances, much less pay them in full. In an era of aggressive lending to place capital in the market,...more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

Common Cybersecurity Mistakes

by Nexsen Pruet, PLLC on

Data breaches result in massive economic and legal consequences for organizations. Ginni Rometty, IBM Corp.’s Chairman, President, and CEO stated last year...more

Vendor Breaches and Their Implications for Employers

by Littler on

The announcement by Equifax, Inc. that it had been victimized in a hacking incident involving the personal information of 143 million Americans generated headlines this past week. The sheer size of the hack means that most...more

How to guarantee bad performance from your vendors

by Thompson Coburn LLP on

A well-crafted master services agreement for outsourced services can create a powerful alliance between you as the customer and the service provider or vendor. On the other hand, there are some pitfalls will likely or...more

Data Collection at Retail Properties - Risks and Recommendations

by King & Spalding on

Brick-and-mortar retailers and other property-level businesses have increasingly taken advantage of technology in learning about consumer behavior. Businesses can enhance consumer experiences through targeted marketing,...more

Vendor Contracting for Privacy and Security

by Morris James LLP on

In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the...more

[Webinar] You Don’t Know What You’re Missing: Motivating Performance Through Service Level Agreements - September 19th, 12:00pm CT

by Thompson Coburn LLP on

All businesses buy services, and each of them wants to get its money’s worth. Because these transactions often involve large expenditures, long term relationships, and critical functions, it is vital to understand how to...more

The Jevic Files Continue: Pioneer-ing the Post-Jevic Era, and Wondering if Jevic Altered Critical Vendor Theory After All?

by Bryan Cave on

The Supreme Court’s Jevic ruling last spring remains a treasure trove of bankruptcy theory, suitable for the novice bankruptcy student and highly instructional for those of us who have practiced in chapter 11 for years. We at...more

GDPR is Coming -- Are You Prepared?

by Exterro, Inc. on

What is the GDPR? The General Data Protection Regulation (GDPR) is a comprehensive data protection law created by the European Union and comes into effect on May 25, 2018. It replaces the Data Protection Directive. Its...more

The Good and the Bad from OCIE’s Cyber Examinations and What Firms Should Do Next

by Dechert LLP on

The Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) released a National Examination Program Risk Alert (Risk Alert) on August 7, 2017 regarding observations from...more

Florida Alcoholic Beverages Trade Practices Guide

by Holland & Knight LLP on

The Florida Alcoholic Beverages Trade Practices Guide is a reference tool that addresses Florida Statute §561.42, referred to as the Tied House Evil law. The statute provides prohibitions and limitations related to the...more

Procurement Pressure: The Convergence Of Supply And Compliance

by Thomas Fox on

With a growing number of complex regulations and directives, the only thing that is constant right now in the regulatory environment is change. Supply chain leaders and compliance professionals alike continue to grapple with...more

Maximizing Compliance Opportunities: Your Vendor Onboarding Process and Vendor Master File

by Michael Volkov on

Compliance practitioners are opportunists. They have to look for openings in the corporate resource world to build partnerships with related functions. To put it another way, they are purveyors of compliance thinking – they...more

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

by Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

Sears Canada Files for CCAA Protection: A Distressed Investor's Overview of US Bankruptcy and Canadian Insolvency Law

On June 22, Sears Canada Inc. ("Sears Canada") and certain affiliates1 (collectively, the "Sears Canada Group") sought and obtained insolvency protection under the Companies' Creditors Arrangement Act (CCAA) from the Ontario...more

Health Update - July 2017

Contracting With Technology Vendors: Obligations and Compliance Strategies - Editor’s Note: In a recent webinar, Manatt Health examined how to protect privacy when communicating in the digital age. The session revealed how...more

State Releases Medicaid Managed Care Invitation to Negotiate

Last Friday, July 14, 2017, the Florida Agency for Health Care Administration (AHCA) released its long awaited Invitation to Negotiate (ITN) for State Wide Medicaid Managed Care services. The ITN, one for each of the 11...more

Protecting Data: Vendors May Be Your Weakest Link

by Murtha Cullina on

A Verizon Communications vendor misconfigured a cloud server that caused the information of 6 million Verizon customers to be exposed on-line. When a cyber incident or data breach occurs on your vendor’s watch, regardless of...more

Shipped Goods Deemed “Received” Upon Physical Possession for Allowed Claims for Administrative Expenses in Bankruptcy

by Burr & Forman on

Signed, sealed, delivered, but am I yours? Apparently not, according to the United States Court of Appeals for the Third Circuit, at least in the context of allowed administrative expense claims under Section 503(b)(9) of the...more

McNees Advocate Alert - July 2017

In February 2016, a computer hacker sent an e-mail infected with a “ransomware virus” to an employee of the town of Medfield, Massachusetts. When the e-mail was opened, the virus spread throughout the town’s computer network,...more

254 Results
|
View per page
Page: of 11
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.