Michael R. Overly is a partner and intellectual property lawyer with Foley & Lardner LLP where he focuses on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e-commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and on-line law.
Mr. Overly is a member of the Technology Transactions & Outsourcing and Privacy, Security & Information Management Practices. Mr. Overly is one of the few practicing lawyers who has satisfied the rigorous requirements necessary to obtain the Certified Information System Auditor (CISA), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (ISSMP), Certified Risk and Information System Controls (CRISC) and Certified Outsourcing Professional (COP) certifications.
The opinions expressed in this blog are those of Michael R. Overly and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
Businesses should think very carefully before moving forward with any honeypot project.
Given the growth over the last few years in BEC and EAC fraud, businesses should educate employees about the risks involved and red flags of this activity.
It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.
A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.
The latest threat to your data may not be a hacker, but your own cloud provider, who can suspend performance and hold your data hostage.
While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in the details...
Beware of vendors who attempt to abdicate their responsibility to unnamed third-party contractors.
Addressing the security risks that come with non-negotiable shrink-wrap (or click-wrap) agreements.
Sponsored Links