Guides & Studies

Security & Privacy Questions to Ask Your Contract Technology Vendor

Today’s contract technologies help organizations create, maintain, and analyze the contents of their contracts on a scale that was unthinkable just a few years ago. But the digital transformation of those workflows creates new risks for security and privacy breaches.

This guide describes several types of security and privacy threats to contract data, and the state-of-the art practices, techniques, and technologies used to combat those threats. It also serves as a checklist when speaking with technology vendors about their protection of contract data so that buyers understand:

  • Protections against security threats to a vendor’s systems in the form of unauthorized access and malware.
  • Protections against the vulnerabilities of a vendor’s system to attacks that are directed at the vendor’s employees.
  • Privacy protections focused on protecting data in the underlying documents, ensuring that sensitive data in contracts is not available to third parties, even when models trained on the data are shared with them.

Trusted by the world's largest Law, Commercial, IT and Professional Service firms

Allen & Overy logo
DLA Piper logo
Freshfields logo
Clifford Chance logo
Latham Watkins logo
Goodwin logo

Sign up for your free download

By submitting this request, you agree to Kira Systems using your information to communicate content and partner services. You may review our privacy policy or opt-out by contacting Kira Systems.