Visit our blog to stay up to date with legal topics related to business and technology.

Outsourcing to third parties has become more common as businesses experience efficiencies in moving process offsite to software as a service (SaaS) applications. Working with external service providers can involve highly confidential data of clients, business partners, employees, or even …

Without established security policies, it can be more difficult to determine the company’s risk level. In entering an agreement with vendors, however, establishing security standards is not sufficient to ensure the protection of customer or proprietary information. Security audits can …

Many cybersecurity laws and privacy laws apply to companies that use customers’ personal information, and all companies have proprietary business information that theyis haves a duty to protect. Consequently, companies can be vulnerable to liability claims from customers, shareholders, directors, …