Name
D2. Information Security in Contracting
Date & Time
Wednesday, May 10, 2017, 3:15 PM - 4:15 PM
Stephen Reynolds Nick Merker
Description
Session Description:
 
Your vendors might not be protecting your data as well as you are. This session will discuss what you can do to bring your vendors in compliance with your security program and offer solutions from a contractual an insurance standpoint. In this session, attorney Stephen Reynolds will discuss how to obligate vendors to comply with your information security program and challenges in drafting agreement. We will go over sample contract provisions and examples of how to solve some common security concerns in contractual negotiation. The discussion will include information on insurance due diligence and contractual insurance requirements when contracting with third parties.
 
 
Location Name
Room 708/710
Full Address
Colorado Convention Center
700 14th Street
Denver, CO 80202
United States
Category
Audit, Risk & Compliance
Learner Objectives
After completing this session, the learner will:
  • Understand the key terms pertaining to information security when negotiating a contract including indemnification, confidentiality, downstream obligations, and representations and warranties
  • Understand the types of insurance coverages that pertain to technology and data security and how these insurances related to contracts with third parties
  • Feel more confident and knowledgeable when negotiating contracts with vendors and procuring cyber-liability or related insurance
 
Speaker Bio(s)
Stephen Reynolds, CISSP, CIPP/US, is a partner in Ice Miller's Litigation and Intellectual Property Group and co-chair of the Data Security and Privacy Practice. As a former computer programmer and IT analyst, Stephen is uniquely able to and routinely uses his computer background in matters involving data privacy and security.
 
Nick Merker is a partner and co-chair of Ice Miller’s Data Security and Privacy Practice. With almost a decade of hands-on, pre-legal computer systems, network, and security experience in the public and private sector, Nick bridges the gap between information technology and the law. Privacy law and technology are both constantly changing - Nick assists clients by analyzing laws against emerging technology and preparing clients to address regulatory and contractual audits, customer expectations, and assessment of risk.
Sorting Order
6