It pays to be at the top
People at senior levels are paid more. That's no surprise. But IACCM's most recent salary survey s...
Addressing the impact of mobile devices on in-house counsel
Mobile device use lessens the extent of corporate control over confidential business information...
Outsourcing IT services: goals and negotiations
The supplier selection phase of the sourcing lifecycle is dominated by negotiations and characteri...
'Heartbleed' bug poses major data security risk for all Internet users
The bug, which has been on the Internet undetected for roughly two years, does not attack individu...
IACCM 2013-14 North America Salary Survey
The attached report represents the results of the salary survey for North America. The survey was ...
IT Outsourcing Contracts: Practical Issues for Management
A good contract is often the key to a successful IT outsourcing relationship. The contract defines...
Will regulation eliminate the need for contract negotiation?
Take a look at this article describing the terms that are now impacted by regulation in the financ...
The New Age of Cyber Security: From Prevention to Intelligence and Proactive Detection
Over the past decade the focus on cyber security has grown rapidly, with cyber attacks escalating ...
Generic outsourcing agreement
The following agreement is a fairly generic outsourcing agreement that allows the vendor to subcon...
A New World Order and Supply Chain Finance: Unlocking the Potential
It is often said that the world changed forever after the 2008-09 global financial crisis. One thi...