Data privacy and cybersecurity services header

Vendor relationships

Expertise
You need to be proactive with your policies, procedures and protocol when it comes to vendor relationships and outside collaboration - nearly one-third of all breaches are the result of an incident at a third-party vendor. To minimize risk and ensure compliance with applicable statutes, we work in collaboration with your internal and external IT vendors to assist and support your data privacy initiatives. Services include:
  • Written Information Security Program
  • Incident Response Plan
  • Training
  • Vendor agreements
  • Computer usage policies
  • Document retention protocols

Attorneys

Attorneys

William J. O'Neill profile image

William J. O'Neill

Richard H. Blake profile image

Richard H. Blake

James J. Giszczak profile image

James J. Giszczak

Timothy J. Lowe profile image

Timothy J. Lowe

Rick L. Hindmand profile image

Rick L. Hindmand

Raquel (Rocky) A. Rodriguez profile image

Raquel (Rocky) A. Rodriguez

Emily A. Johnson profile image

Emily A. Johnson

Christine N. Czuprynski profile image

Christine N. Czuprynski

Samuel D. Goldstick profile image

Samuel D. Goldstick

Dan L. Makee profile image

Dan L. Makee

Dominic A. Paluzzi profile image

Dominic A. Paluzzi

Miriam L. Rosen profile image

Miriam L. Rosen

Rachel H. Yaffe profile image

Rachel H. Yaffe

Christopher B. Hopkins profile image

Christopher B. Hopkins

Alan M. Burger profile image

Alan M. Burger

Adam C. Smith profile image

Adam C. Smith

David T. Movius profile image

David T. Movius

Matthew R. Rechner profile image

Matthew R. Rechner

Sherri A. Krause profile image

Sherri A. Krause

+