Privacy and cybersecurity practices of target companies are being increasingly scrutinized throughout the due diligence process in M&A transactions. Particularly, buyers want to understand the risk and value inherent in sellers’ data assets and sellers want to manage transactional and post-closing risks. In the course of their privacy and cybersecurity due diligence, buyers should consider … Continue reading
Data is an essential asset for many businesses, and one that is increasingly acquired through M&A transactions. Identifying and assessing the particular legal challenges of data assets is crucial for acquirers to mitigate the risks associated with these assets and unlock their full value. While issues will depend on the particulars of each transaction, the … Continue reading
The importance of email in the workplace presents a variety of legal challenges when purchasing a business. Among those are concerns relating to emails and the email addresses of the seller’s employees who are no longer employed by the purchaser after closing. First, there are confidentiality concerns in connection with former employees receiving information they … Continue reading
The heavy reliance on technology in today’s data-driven world means that cybersecurity threats must be taken seriously. More specifically, with respect to M&A transactions, a target’s cybersecurity mechanisms have become an important part of the due diligence consideration. Indeed, it is important to have a firm grasp on the nature and extent of a target’s … Continue reading
Recent rumblings about the “data masking” market have put this concept on the radar of many, which warrants a closer look at the relevant trends and the potential of data masking. The information age has made cybersecurity a necessity and the increase of data breaches and malware attacks have led to calls for greater data … Continue reading
Artificial Intelligence (AI) has immense potential as a solution for cybersecurity vulnerabilities in M&A deals. Generally, M&A deals generate value and as such, understanding vulnerabilities on the acquirer and target sides is important for completion of the transaction. With the common usage of networks and servers to store high volumes of data by corporations, vetting for cybersecurity attacks has become a … Continue reading
On February 21, 2019, Blackberry completed its acquisition of Cylance, a privately-held artificial intelligence (AI) and cybersecurity company. Acquisitions of AI companies like Cylance are becoming increasingly common as businesses seek to realize the opportunities in offering much-improved products or services to their customers. Canada, in particular, has become a hotspot for activity in the … Continue reading
The typical business model has significantly expanded in recent years, and often includes an element of collecting, using, storing or modifying personal information (also known as “processing”). If you are involved in processing personal information, you may likely be considered a “processor”. As a processor, it is crucial to understand the principles for processing data … Continue reading