TECHNOLOGY, OUTSOURCING, AND COMMERCIAL TRANSACTIONS
NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
Last week, we discussed three important changes to California’s data breach law that become effective January 1, 2015.
Data breaches continue to make headlines, ringing alarms for companies at risk and for the regulators who look to control the risks involved.
With its latest iOS release, Apple may have charted a new course for the payment industry.
Over the last two weeks, we discussed contract provisions designed to address the implementation of preventive security measures , as well as responding to security incidents . Our third and final blog post in this series focuses on contractual provisions that address the allocation of liability for breaches that result in security incidents.
Cloud computing solutions offer many advantages over traditional enterprise systems, including cost-saving potential, access to enhanced applications, and consumption flexibility.
Last week, we discussed contract provisions that focused on documenting security requirements and monitoring security commitments.
Based on the explosive growth of smartphones over the last three years, Bring Your Own Device (BYOD) policies have been widely adopted for corporate email and other work-related tasks.
As we have previously discussed , cybersecurity threats are mounting and are a major concern for senior management.
EisnerAmper's Fifth Annual Board of Directors Survey highlights cybersecurity breaches and social media use as top risks that concern boards of directors in 2014.