Choose Site
Companies spend millions of dollars on third-party software products to automate and integrate their operations—from operating systems (OS) for mainframe and distributed systems, to enterprise resource planning (ERP) software, to end user applications.
Information Services Group (ISG) predicts an increase in outsourcing transaction activity for quarter four of 2014.
Over the last two weeks, we discussed contract provisions designed to address the implementation of preventive security measures , as well as responding to security incidents . Our third and final blog post in this series focuses on contractual provisions that address the allocation of liability for breaches that result in security incidents.
Cloud computing solutions offer many advantages over traditional enterprise systems, including cost-saving potential, access to enhanced applications, and consumption flexibility.
Last week, we discussed contract provisions that focused on documenting security requirements and monitoring security commitments.
Based on the explosive growth of smartphones over the last three years, Bring Your Own Device (BYOD) policies have been widely adopted for corporate email and other work-related tasks.
As we have previously discussed , cybersecurity threats are mounting and are a major concern for senior management.
Governance is an essential component of outsourcing planning and execution.
EisnerAmper's Fifth Annual Board of Directors Survey highlights cybersecurity breaches and social media use as top risks that concern boards of directors in 2014.
The U.S. Copyright Office recently released a third-edition public draft of the Compendium of its practices for comment.