Innovation in Compliance - Improving Third - Party Risk Management with Paul Valente
The “Catch-22” of Preference Law
Gerry Blass on Healthcare Vendor Risk Management
Cyberside Chats: Would you bury your driver's license? (with Whitney McCollum)
Matt Silverman on Export Compliance
Thobekile Cynthia Khumalo on Third Party Due Diligence
Sitting with the C-Suite: Blending eDiscovery Vendors and Law Firms
Ledgers and Law: Real-World Planning for Cyber Attacks
Education Data Privacy and Security Laws: Best Practices for School Districts
In House Counsel: How To Measure the Effectiveness of Your Staffing Strategy
Sitting with the C-Suite: Identifying Opportunities to Leverage Human Capital
Lessons for Health, Beauty & Wellness Companies [Part 2]: What Options Exist for a Vendor During Bankruptcy
Lessons for Health, Beauty & Wellness Companies: What to do When Your Buyer is in Financial Distress
Sitting with the C-Suite: How Should In-House Counsel Evaluate eDiscovery Service?
Strategies for Restaurant Owners to Survive in the New Normal
Compliance Perspectives: Supply Chain Compliance Challenges
The CCPA for the Land Title Industry: Service Providers and Sale of Data Under the CCPA
Compliance Perspectives: Supply Chains, Human Trafficking and Modern Slavery
Episode 120: Interview of NAVEX Global Third-Party Risk Officials: Chris Bailey and Stephen Gooding
PODCAST: Williams Mullen GovCon Perspectives - Recent Updates to the SWaM Certification Process in Virginia
Negotiating a data processing agreement (DPA) is typically a necessary step when engaging vendors that handle personal data. However, these negotiations have become time consuming and complex, given the evolving privacy...more
“Software-as-a-Service,” commonly known as “SaaS,” is a subscription-based software distribution model in which the vendor allows users to connect to and use cloud-based applications over the Internet for the subscribed term....more
Artificial Intelligence (AI) has been an integrated feature in videogames and other interactive entertainment for some time. For example, a range of AI, from rudimentary algorithms to sophisticated machine learning...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
Licensees face financial risk and operational disruption in audits by their software and data vendors. Changes in technology are driving a current surge in those audits. Join Mayer Brown partners Richard Assmus, Brad Peterson...more
The Consumer Financial Protection Bureau's Compliance Bulletin and Policy Guidance; 2016-02, Service Providers addresses the CFPB's expectation that companies oversee their business relationships with service providers in a...more
This presentation will cover what you need to know to avoid unnecessary legal risk and imbalanced risk allocation. A concise look at the latest trends, key provisions, and common tricks in commercial contracts, as well as a...more
Farrell Fritz Attorney Patrick Collins was quoted in this Long Island Business News Article. The parade of retailers filing for bankruptcy marches on as consumer shopping habits continue to evolve and e-commerce keeps...more
This is part 2 of a Seven Part Guide to reviewing vendor contracts. Recitals. Some contracts will contain several “WHEREAS” clauses at the inception of the document followed by a recitation of various facts about...more
Managing third party vendor relationships has always been an important function in banks. More recently it has become a hot topic for state and federal financial bank regulators. The increasing complexity of what vendors are...more