Innovation in Compliance - Improving Third - Party Risk Management with Paul Valente
The “Catch-22” of Preference Law
Gerry Blass on Healthcare Vendor Risk Management
Cyberside Chats: Would you bury your driver's license? (with Whitney McCollum)
Matt Silverman on Export Compliance
Thobekile Cynthia Khumalo on Third Party Due Diligence
Sitting with the C-Suite: Blending eDiscovery Vendors and Law Firms
Ledgers and Law: Real-World Planning for Cyber Attacks
Education Data Privacy and Security Laws: Best Practices for School Districts
In House Counsel: How To Measure the Effectiveness of Your Staffing Strategy
Sitting with the C-Suite: Identifying Opportunities to Leverage Human Capital
Lessons for Health, Beauty & Wellness Companies [Part 2]: What Options Exist for a Vendor During Bankruptcy
Lessons for Health, Beauty & Wellness Companies: What to do When Your Buyer is in Financial Distress
Sitting with the C-Suite: How Should In-House Counsel Evaluate eDiscovery Service?
Strategies for Restaurant Owners to Survive in the New Normal
Compliance Perspectives: Supply Chain Compliance Challenges
The CCPA for the Land Title Industry: Service Providers and Sale of Data Under the CCPA
Compliance Perspectives: Supply Chains, Human Trafficking and Modern Slavery
Episode 120: Interview of NAVEX Global Third-Party Risk Officials: Chris Bailey and Stephen Gooding
PODCAST: Williams Mullen GovCon Perspectives - Recent Updates to the SWaM Certification Process in Virginia
There has been a spate of legislation and lawsuits targeting the use of software that gives visibility to competitors’ prices. This allows firms to adjust their prices, either undercutting the competition or setting a de...more
Choosing the right background screening vendor is a crucial step for any organization. The stakes are high, and getting it wrong can lead to costly mistakes or legal troubles. If you’re considering making a switch, you’re not...more
Last Friday, July 12, 2024, it was widely reported that AT&T experienced another catastrophic cyber-attack. This material cyber incident affected over 100 million of its wireless customers according to AT&T’s 8-K Filing with...more
Growth of the eDiscovery industry has occurred through new companies, new products, and consolidation. So does a company’s size matter when you’re choosing an eDiscovery provider? Some of that choice comes down to preference,...more
As supply chains have become more digitized and interconnected, they have also become more vulnerable to a range of cyber threats. These threats not only pose risks to the direct operations of companies but also to the...more
We recently joined a webinar hosted by the EDRM for an insightful session featuring experts Doug Kaminski and Amy Sellars focused on the intricacies of vendor collaboration, legal partnerships, and effective strategies for...more
How to define and categorize EUC risks based on organizational impact - Any application supporting a critical process that is developed or managed by end users rather than an IT department or professional software...more
Cyberattacks continue to rise, increasing the need for robust data security. Global weekly attacks rose by 7% during the first quarter of 2023, versus the same quarter last year. Each organization is estimated to face on...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more
As society moves away from the use of on-premises software into a modern world in which software vendors offer software and services through online, hosted environments, new challenges and trends related to data use and...more
On March 9, the FTC unanimously voted to block the proposed merger between the nation’s largest provider of home mortgage loan origination systems (LOS) and other key lender software tools, and its top competitor that offers...more
For the past three years Bloomberg Law has conducted surveys to understand the key trends in legal operations and legal technology. One of the prominent findings in the 2022 survey is the shifting priorities by which firms...more
A number of companies suffered collateral damage last winter as a result of a cyber attack on a major provider of time and attendance software. With your timekeeping systems compromised, how do you determine what to pay your...more
Licensees face financial risk and operational disruption in audits by their software and data vendors. Changes in technology are driving a current surge in those audits. Join Mayer Brown partners Richard Assmus, Brad Peterson...more
Software vendors and purchasers won an important victory in a decision handed down by the Massachusetts Supreme Judicial Court (SJC) this May. The SJC affirmed vendors can use the normal abatement process to apportion sales...more
Organizations are becoming increasingly reliant on external parties to manage parts of their business. The centralized knowledge, expertise, and economies of scale that third parties provide enables organizations to focus...more
The Massachusetts Supreme Judicial Court denied the Commissioner of Revenue’s attempted money grab and held that there is a statutory right to apportion sales tax on receipts from the sale or license of software that was...more
This installment of our monthly Law360 bid protest spotlight examines three protest decisions addressing (1) mismatches between proposed labor categories and the scope of a vendor’s underlying General Services Administration...more
Vendor management is a complex task, yet a necessary undertaking for any organization dealing with third parties. ...more
It happens to everyone. You send out an inquiry to a vendor. A few days pass and no one replies. You email, you text, you leave a voicemail. A few more days pass, and finally you get a response. ...more
ANALYSIS - Maximizing Teleconferencing Privacy - With much of the nation under orders that limit employees’ ability to go into the office, organizations around the world are increasingly moving entire businesses online...more
In cloud services, whether it is infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS), service availability is often a significant customer concern because the customer is relying...more
January 14, 2020, the Board of Regents formally adopted Part 121 to the Commissioner’s Regulations to implement Education Law § 2-d. The regulation will become effective January 29, 2020. This regulation primarily addresses...more
In a recent decision, the Alabama Supreme Court held that the sale of computer software, whether "canned" or customized, is subject to Alabama sales and use tax, while confirming that separately invoiced services for custom...more