Protecting Data – Considerations For Drafting Security Schedules

Protecting Data – Considerations for Drafting Security Schedules

With the exponential growth of cyber threats, cloud computing and remote working, contract provisions regarding data security requirements have also expanded in size and frequency. It has become common practice to prepare schedules to detail (and limit) security requirements. Customers and vendors both have a vested interest in clearly identifying expectations and obligations for such…
Back To Top