Michael R. Overly

Opinions expressed by ICN authors are their own.

Michael R. Overly is a partner and intellectual property lawyer with Foley & Lardner LLP where he focuses on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e-commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and on-line law.

Mr. Overly is a member of the Technology Transactions & Outsourcing and Privacy, Security & Information Management Practices. Mr. Overly is one of the few practicing lawyers who has satisfied the rigorous requirements necessary to obtain the Certified Information System Auditor (CISA), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (ISSMP), Certified Risk and Information System Controls (CRISC) and Certified Outsourcing Professional (COP) certifications.

The opinions expressed in this blog are those of Michael R. Overly and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

A checklist for avoiding cyberattacks with vendors’ tech products

Employee training remains the best first line of defense against cybersecurity breaches

Employee training remains the best first line of defense against cybersecurity breaches

Ongoing training about current and future security issues is just not on the radar screen of most companies. That has to change.

6 tips for drafting better statements of work

6 tips for drafting better statements of work

You can draft the most protective contract in the world, but if the statement of work (SOW) fails to adequately describe the deliverables, projects can fail.

What can my cloud provider do with my data?

What can my cloud provider do with my data?

Lack of specificity regarding cloud vendors' rights to use customer data presents a significant risk in the majority of cloud services agreements. This article discusses two of the most critical issues presented by this risk and...

Know the 'real' price of vendor contracts

Know the 'real' price of vendor contracts

Although many vendor engagements result in close working relationships, the age of predatory vendors is upon us. What can you do to avoid them?

Despite the warnings, corporate cyber defenses remain inadequate

Despite the warnings, corporate cyber defenses remain inadequate

If anything, 2017 will be remembered as the year of the cyber-attack. No business is safe. No industry is exempt. In this article, Mike Overly takes a detailed look at the WannaCry ransomware attack and recent cyber-attack statistics,...

Cloud solutions: The danger of 'floating' contracts

Cloud solutions: The danger of 'floating' contracts

In most cloud engagements these days, it is not only the customer’s data that is in the cloud, but also many key parts of the vendor contract as well. That is, the average cloud vendor today generally places several key areas of the...

Hiring an information security vendor? Use these best practices.

Hiring an information security vendor? Use these best practices.

Companies should take great care when hiring a party that will be granted access to its most sensitive systems and data. (Insider; registration required)

Common cybersecurity myths debunked

Common cybersecurity myths debunked

One of the greatest challenges for organizations attempting to address cybersecurity risks is the number of fundamental security myths that cause organizations to incorrectly assess threats.

Legal compliance challenges of Big Data: Seeing the forest for the trees

Legal compliance challenges of Big Data: Seeing the forest for the trees

With the advent of big data, businesses today are managing databases of unprecedented size and complexity. With that size and complexity comes myriad legal and compliance challenges.

Legal quicksand: Shrink-wrap and click-wrap agreements

You see shrink-wrap and click-wrap agreements when you click through terms and conditions in accessing an online service. But Michael Overly cautions you to consider their legal and business liabilities before you blindly agree

Load More