News & Analysis as of

Vendors Today's Popular Updates

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

Fisher Phillips

AI Call-Monitoring Lawsuits Are Heating Up: 5 Steps Your Business Can Take to Minimize Risk

Fisher Phillips on

A new lawsuit just filed against an AI software provider offers a clear warning for any business using artificial intelligence to monitor or record customer service calls. On June 13, a California plaintiff filed a federal...more

Integreon

DORA Compliance Part 1: Proactively Meeting DORA Supply Chain Resilience Obligations

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Jackson Lewis P.C.

Tips for Vacation Rental, Property Mgmt. Businesses Facing Vendor Cybersecurity Risk

Jackson Lewis P.C. on

No organization can eliminate data breach risks altogether, regardless of industry, size, or even if the organization has taken significant steps to safeguard their systems and train employees to avoid phishing attacks....more

Baker Donelson

Best Practices for Protecting Operations from Vendor's Cyber Incidents

Baker Donelson on

In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more

Nelson Mullins Riley & Scarborough LLP

AT&T Consent Decree Underscores Telecommunications Carriers’, Vendors’ Obligations to Protect Customer Data

On Sept. 17, the Federal Communications Commission (FCC) announced that it has reached a Consent Decree with AT&T Services Inc. to resolve an investigation into a data breach that occurred in January 2023. AT&T's vendor...more

Foley & Lardner LLP

Thorny Laws That ICHRA Vendors Should Consider

Foley & Lardner LLP on

Individual Coverage Health Reimbursement Arrangements (ICHRAs) have continued to grow in popularity since their inception in 2019 (see our article here summarizing the 2019 rule establishing ICHRAs). While initially it seemed...more

King & Spalding

FTC Announces Final Rule Sweeping Consumer Digital Health Tech Under the Health Breach Notification Rule

King & Spalding on

On April 26, the Federal Trade Commission (FTC) approved its Final Rule revising the Health Breach Notification Rule (HBNR) (“Final Rule”) by a 3-2 vote. The HBNR requires vendors of personal health records (PHR) and related...more

Guidepost Solutions LLC

Defending Your Law Firm Against Cyber Threats

In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more

King & Spalding

Emerging Themes Relating to the Use of Artificial Intelligence in the Workplace

King & Spalding on

Companies are increasingly exploring the use of artificial intelligence (AI) and automated decision-making technologies to manage human capital, including for recruitment, hiring and performance purposes. Vendors offer...more

Burr & Forman

Checklist for Addressing Data Privacy and Cybersecurity with Your Vendors

Burr & Forman on

In our last newsletter, we discussed due diligence as it relates to selection of vendors. The second part of that exercise is to negotiate your agreement with the vendor to properly manage any risks you identified. In this...more

Thomas Fox - Compliance Evangelist

Innovation in Compliance - Improving Third - Party Risk Management with Paul Valente

In today’s interconnected world, businesses rely on third-party vendors for various products and services. While these partnerships bring great benefits, they also expose companies to a range of risks, such as cyber threats,...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Polsinelli

Blockchain Technology: High-Profile Use Cases in the News and Other Alternative Use Cases

Polsinelli on

Cryptocurrencies and non-fungible token (NFT) news headlines currently focus on the market crash (sometimes framed as a crypto-winter or cryptoextinction), fraud and the collapse of various crypto exchange platforms — or the...more

Polsinelli

U.S. State Privacy Law Update

Polsinelli on

In 2023, new comprehensive data privacy laws come into effect in five states — California, Colorado, Connecticut, Utah, and Virginia. The California Privacy Rights Act of 2020 (CPRA) and the Virginia Consumer Data Protection...more

Burr & Forman

Cybersecurity Checklist for Vendor Management – Vendor Security

Burr & Forman on

By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more

King & Spalding

Global Trends in IT Outsourcing

King & Spalding on

The IT sector has been demonstrating its value in the wake of the COVID-19 pandemic. As more businesses adopt hybrid or even permanent remote work, worldwide IT spending is forecast to reach $4.5 trillion in 2022 and expand...more

Akerman LLP

Cybersecurity and Privacy Risks for the Construction and Real Estate Industries

Akerman LLP on

The construction industry has experienced an amazing evolution in recent years thanks to the rapid adoption of new technologies. While all of this new technology has the potential to make companies more productive and more...more

BakerHostetler

Navigating Contractual Relationships in the NFT Market

BakerHostetler on

Overview of Common NFT Contractual Relationships - Participants in the fast-moving - but legally uncertain - non-fungible token (NFT) marketplace can maximize their business opportunities and mitigate risk by delineating...more

HaystackID

[Webcast Transcript] You’ve Got to Move It: Data Protection and Privacy with Cross-Border Transfers

HaystackID on

...This session, led by industry-acknowledged experts in areas ranging from data protection and privacy to data transfer and legal discovery, provided a professional forum for the explanation of the best approaches,...more

McDermott Will & Schulte

[Webinar] Privacy and Cybersecurity Contracting: What’s the “Deal”? - June 29th, 12:00 pm - 1:00 pm EDT

Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more

Esquire Deposition Solutions, LLC

SOC Reports Provide Critical Insights on Vendor Data Security Practices

I’ve written several times during the past year about the importance of information security for legal professionals. Mitigating the threat of unauthorized access to client confidential information is one of the most...more

Association of Certified E-Discovery...

[Webinar] Cybersecurity Basics for Legal Practitioners - April 19th, 1:00 pm - 2:00 pm EDT

Join us for a webinar on basic cyber information regarding data protection, data privacy, cybersecurity requirements PII and Sensitive PII, cybersecurity requirements for Third Party vendors, Cyber insurance in the age of...more

Jackson Lewis P.C.

Responding to the Kronos Cyber Attack – What Should Employers Be Thinking About?

Jackson Lewis P.C. on

According to reports, Kronos, the cloud-based, HR management service provider, suffered a data incident involving ransomware affecting its information systems. Kronos communicated that it discovered the incident late on...more

Ervin Cohen & Jessup LLP

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

89 Results
 / 
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide