Data privacy and cybersecurity services header

Vendor relationships

Expertise
You need to be proactive with your policies, procedures and protocol when it comes to vendor relationships and outside collaboration - nearly one-third of all breaches are the result of an incident at a third-party vendor. To minimize risk and ensure compliance with applicable statutes, we work in collaboration with your internal and external IT vendors to assist and support your data privacy initiatives. Services include:
  • Written Information Security Program
  • Incident Response Plan
  • Training
  • Vendor agreements
  • Computer usage policies
  • Document retention protocols

Attorneys

KEY CONTACTS

James J. Giszczak, Co-Chair
Dominic Paluzzi, Co-Chair

Attorneys

James J. Giszczak profile image

James J. Giszczak

Dominic A. Paluzzi profile image

Dominic A. Paluzzi

Christine N. Czuprynski profile image

Christine N. Czuprynski

Sherri A. Krause profile image

Sherri A. Krause

Emily A. Johnson profile image

Emily A. Johnson

William J. O'Neill profile image

William J. O'Neill

Richard H. Blake profile image

Richard H. Blake

Alan M. Burger profile image

Alan M. Burger

Christopher G. Dean profile image

Christopher G. Dean

Joelle H. Dvir profile image

Joelle H. Dvir

Rick L. Hindmand profile image

Rick L. Hindmand

Christopher B. Hopkins profile image

Christopher B. Hopkins

Timothy J. Lowe profile image

Timothy J. Lowe

Dan L. Makee profile image

Dan L. Makee

David T. Movius profile image

David T. Movius

Matthew R. Rechner profile image

Matthew R. Rechner

Raquel (Rocky) A. Rodriguez profile image

Raquel (Rocky) A. Rodriguez

Miriam L. Rosen profile image

Miriam L. Rosen

Adam C. Smith profile image

Adam C. Smith

+