Overview
You need to be proactive with your policies, procedures and protocol when it comes to vendor relationships and outside collaboration - nearly one-third of all breaches are the result of an incident at a third-party vendor. To minimize risk and ensure compliance with applicable statutes, we work in collaboration with your internal and external IT vendors to assist and support your data privacy initiatives. Services include:
- Written Information Security Program
- Incident Response Plan
- Training
- Vendor agreements
- Computer usage policies
- Document retention protocols
Newsroom
News
Key Practice Contact
- Member|
Members
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
- Member|
Counsel
- Counsel|
- Counsel|
- Counsel|
Associates
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|
- Associate|