Choose Site
TECHNOLOGY, OUTSOURCING, AND COMMERCIAL TRANSACTIONS
NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
Data breaches continue to make headlines, ringing alarms for companies at risk and for the regulators who look to control the risks involved.
Big Data: It is in the news every day, and industry researchers can't say enough about the potential value of data and predictions for the data analytics market.
With its latest iOS release, Apple may have charted a new course for the payment industry.
Companies spend millions of dollars on third-party software products to automate and integrate their operations—from operating systems (OS) for mainframe and distributed systems, to enterprise resource planning (ERP) software, to end user applications.
Information Services Group (ISG) predicts an increase in outsourcing transaction activity for quarter four of 2014.
Over the last two weeks, we discussed contract provisions designed to address the implementation of preventive security measures , as well as responding to security incidents . Our third and final blog post in this series focuses on contractual provisions that address the allocation of liability for breaches that result in security incidents.
Cloud computing solutions offer many advantages over traditional enterprise systems, including cost-saving potential, access to enhanced applications, and consumption flexibility.
Last week, we discussed contract provisions that focused on documenting security requirements and monitoring security commitments.