Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Understanding third-party service provider relationships and the security risks they present to any organization is an essential element of cybersecurity planning. Bad actors continue to exploit the risks presented by third-party service providers that maintain access to corporate-owned information systems. Over the last several years, companies have found themselves the victim of costly and high profile data breaches occurring as a result of a third-party service provider’s security failures. See, e.g., In re Target Corp. Data Sec. Breach Litig., 66 F. Supp. 3d 1154 (D. Minn. 2014); In re: The Home Depot, Inc., Customer Data Sec. Breach Litig., No. 1:14-MD-2583-TWT, 2016 WL 2897520, at 1 (N.D. Ga. May 18, 2016).
*May exclude premium content
By Ben Schmidt and Nathan Curtis
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let’s take a closer look.
By John Beardwood and Shan Arora
Part Three In a Series
Part Three continues the analysis of new compliance requirements in Canada's new Consumer Privacy Protection Act, including the content of organizational privacy policies and anonymization of personal information policies, and business transaction policies contained in the Act.
By Anthony Davies
Routines based around ‘work from home’ are calcifying, and commuting, parking, sandwich shops and childcare are fading into distant memory. With each passing week, the challenge to win attorneys back into the office increases.
By Steve Whiter
With hybrid and remote working practices having become the norm, lawyers communicate through messaging applications — including on personal devices — and firms are using innovative technologies in novel ways as they adopt digital means of working. In this digital-first landscape, all data is at risk. The good news is that new security solutions offer law firms a range of new tools to counter this threat.