Integrating Information Security Protections in Supplier Agreements: Guidance for Business and Technology Counsel
Evaluating Data Security Risks, Negotiating Contractual Protections, Monitoring Supplier Performance
Recording of a 90-minute CLE video webinar with Q&A
This CLE course will guide business and technology counsel for incorporating information security protocols into supplier contracts. The program will discuss due diligence strategies, specific clauses to include in agreements, and effective tactics for monitoring supplier performance and compliance with contractual terms and relevant privacy and security laws.
- Internal and vendor due diligence
- Contractual protections
- Information handling and security procedures and requirements
The panel will review these and other key issues:
- What types of business information require security protection and why are contractual protections important?
- What mistakes do businesses make when designing a comprehensive security protocol?
- What issues should business counsel address during initial internal due diligence? What should counsel address in supplier due diligence?
- What are the contractual protections to include in supplier agreements?
- What issues should business counsel anticipate when negotiating with suppliers?
Michael R. Overly
Foley & Lardner
Mr. Overly focuses his practice on drafting and negotiating technology related agreements, software licenses, hardware... | Read More
Mr. Overly focuses his practice on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e-commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and on-line law. He is the co-author of A Guide to IT Contracting: Checklists, Tools and Techniques (CRC Press, 2012).Close