The Latest Word in Information Management
IG, Regulations & Compliance
Privacy & Security
Storage & Destruction
Training & Awareness
How to Set up a Reseller-Supported Software Escrow Agreement
When Escrow Agreements Go Bad …
Who is Responsible for Protecting the Data in your SaaS Relationship?
3 Initial Steps to Define your Software Escrow Plan
Making Plans for Something You Hope Never Happens: What’s your Continuity Plan?
What should we know as Bots control our Data?
If it’s a Trade Secret, Define “Reasonable Effort”
Whose Fault is it if Source Code Escrow Doesn’t Add Value?
The IoT Global Innovation Forum presents: Risk in the Supply Chain
The Essential Source Code Escrow Checklist: Part III – What if something is missing?
Broker-Dealers and Transfer Agents: Have you checked your SEC Rule 17a-4 and 17Ad-7 Compliance?
The Essential Source Code Escrow Checklist – Part II: Accountability for the Escrow Agreement