{"id":6198,"date":"2022-09-30T16:28:38","date_gmt":"2022-09-30T20:28:38","guid":{"rendered":"https:\/\/www.millerthomson.com\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/"},"modified":"2025-12-29T19:03:36","modified_gmt":"2025-12-30T00:03:36","slug":"cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/","title":{"rendered":"Managing cybersecurity in M&#038;A transactions: How to mitigate risk through due diligence"},"content":{"rendered":"\n<p>As companies have become increasingly technology-driven in recent years, a target\u2019s cybersecurity posture has become a key focal point in the diligence process. The COVID-19 pandemic has made this concern particularly acute: notwithstanding that an increasingly large number of people have returned to the office in recent months, there remains a sizeable remote workforce in many sectors. Combined with the rise of motivated cybercriminals and the ever-increasing value and importance of data, there is an undeniable requirement to place additional focus and resources on cybersecurity due diligence during M&amp;A transactions, from both a technical security perspective and a legal perspective.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is cybersecurity due diligence important?<\/h2>\n\n\n\n<p>It is imperative that a purchaser of assets or shares in another organization know what is &#8220;under the hood&#8221; when it comes to IT infrastructure and associated cybersecurity risk. Not only does IT due diligence help identify where the main risks lie, but it is also an essential aspect of valuating a business and identifying how best to proceed with post-acquisition integration.<\/p>\n\n\n\n<p>Ransomware, phishing attacks and other social engineering tactics are becoming increasingly prevalent and have a deep-reaching impact when they strike, posing tangible and oftentimes very material risks \u2013 from both an economic and reputational perspective \u2013 to purchasers, third party creditors and financing entities. The impact of the deficiencies may not become apparent until well after a deal closes.<\/p>\n\n\n\n<p>Cyber and privacy risks are real and can have a massive bottom-line impact. In connection with Verizon\u2019s acquisition of Yahoo! in 2017, Yahoo!\u2019s disclosure of pre-existing security breaches resulted in a whopping <a href=\"https:\/\/money.cnn.com\/2017\/02\/21\/technology\/yahoo-verizon-deal\/index.html\" target=\"_blank\" rel=\"noopener\">$350M reduction of the purchase price<\/a> for that deal. More recently, the UK\u2019s data protection authority, ICO, levied very material fines on Marriott Hotels on account of breaches of the European General Data Protection Regulation (GDPR) relating to the target\u2019s pre-acquisition\u2019s security controls and <a href=\"https:\/\/www.millerthomson.com\/en\/blog\/mt-cybersecurity-blog\/gdpr-shows-its-teeth-uk-pursuing-record-fines-for-data-breaches-emphasizes-accountability\/\" target=\"_blank\" rel=\"noopener\">Marriott\u2019s failure to conduct proper diligence<\/a> and remediate the issues.<\/p>\n\n\n\n<p>While these are notable and well-known cases affecting large multinationals, cyber and privacy risks do not discriminate based on size or sector. We are regularly involved in proactively identifying these risks and managing them during the diligence process, and our crisis management and incident response practice is also regularly involved in breaches where diligence or vulnerability remediation failed in third-party transactions.<\/p>\n\n\n\n<p>While the degree of cybersecurity and privacy due diligence may vary depending on the target\u2019s industry and the nature of its specific operations, IT and privacy due diligence is an integral part of every transaction and there are a number of ways in which a purchaser can assess a target\u2019s overall cybersecurity posture. Below we have set out some key considerations which will enable a purchaser to both identify all applicable risks, as well as take the necessary steps to mitigate against cybersecurity and data privacy risks going forward.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to mitigate cybersecurity and data privacy risks in M&amp;A:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Understand the Data.<\/strong> Understand the value of the target&#8217;s data, as well as the nature of the data and how the organization has classified it (such as personal, financial, health or other confidential information). Understand the data flows and processing activities; i.e., what data is collected, how much data is collected, and for what purposes.<\/li>\n\n\n\n<li><strong>Data Protection.<\/strong> Ask how data is protected, both technically and organizationally, and query how the target is protecting personal information, intellectual property and other confidential information. Where does the data reside and will that be a problem post-transaction (such as storing personal health information in non-Canadian cloud services)? Is there appropriate training in place?<\/li>\n\n\n\n<li><strong>Security Controls and Testing.<\/strong> Does the target have appropriate EDR (Endpoint Protection and Response) tools in place? Is the IT infrastructure vulnerable by design? Are systems no longer supported\/end-of-life? Investigate whether testing and monitoring are in place. Are vulnerability scans and penetration tests conducted regularly?<\/li>\n\n\n\n<li><strong>Target Organization.<\/strong> Are there indications that executive management and Board oversight is lacking? Is there sufficient accountability for both security and privacy considerations? Query whether there are inherent risks arising from the nature of the target&#8217;s workforce, distribution of IT assets, or legacy systems (including in respect of past M&amp;A activity).<\/li>\n\n\n\n<li><strong>Privacy Law Considerations.<\/strong> Identify and assess all relevant privacy legislation that currently applies, or that will apply, to the target post-acquisition. Does the organization have processes and standards in place to run a meaningful privacy program?<\/li>\n\n\n\n<li><strong>Supply Chain Management.<\/strong> Consider the vendor landscape. How robust are third-party vendors relating to security and privacy compliance? What contracts are in place and are they appropriate? Are there any known issues relating to cybersecurity incidents at any of the target&#8217;s vendors? Conducting an OSINT (Open Source Intelligence) assessment can have tremendous value in assessing exposure to third-party risks. Contracts and agreements with third parties should be reviewed to identify mutual obligations related to cyber risks or breaches.<\/li>\n\n\n\n<li><strong>Existence of Past Security Breaches.<\/strong> Ask whether the target has experienced any data security incidents or data breaches. Query whether the Target has systems in place to identify, assess and report data security incidents. Does the organization have a defined, tested and fully implemented Incident Response (IR) program and the resources to execute on it? Does the target have a retainer in place for IR services or breach coaching?<\/li>\n<\/ol>\n\n\n\n<p>Cybersecurity risks are a reality but, much like any other risks, they are manageable with the right approach and attention. Communication and information sharing with commercially focused due diligence and technical IT review is also crucial in understanding the overall risk profile in this area.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As companies have become increasingly technology-driven in recent years, a target\u2019s cybersecurity posture has become a key focal point in the diligence process. The COVID-19 pandemic has made this concern particularly acute: notwithstanding that an increasingly large number of people have returned to the office in recent months, there remains a sizeable remote workforce in [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14345,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531],"insight-format":[418],"class_list":["post-6198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managing cybersecurity in M&amp;A transactions: How to mitigate risk through due diligence | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing cybersecurity in M&amp;A transactions: How to mitigate risk through due diligence | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"As companies have become increasingly technology-driven in recent years, a target\u2019s cybersecurity posture has become a key focal point in the diligence process. The COVID-19 pandemic has made this concern particularly acute: notwithstanding that an increasingly large number of people have returned to the office in recent months, there remains a sizeable remote workforce in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-30T20:28:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-30T00:03:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1776\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katherine Chan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katherine Chan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\"},\"author\":{\"name\":\"Katherine Chan\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\"},\"headline\":\"Managing cybersecurity in M&#038;A transactions: How to mitigate risk through due diligence\",\"datePublished\":\"2022-09-30T20:28:38+00:00\",\"dateModified\":\"2025-12-30T00:03:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\"},\"wordCount\":936,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\",\"name\":\"Managing cybersecurity in M&A transactions: How to mitigate risk through due diligence | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"datePublished\":\"2022-09-30T20:28:38+00:00\",\"dateModified\":\"2025-12-30T00:03:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"width\":1776,\"height\":994,\"caption\":\"person in hoodie looking at a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing cybersecurity in M&#038;A transactions: How to mitigate risk through due diligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\",\"name\":\"Katherine Chan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"caption\":\"Katherine Chan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing cybersecurity in M&A transactions: How to mitigate risk through due diligence | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/","og_locale":"en_US","og_type":"article","og_title":"Managing cybersecurity in M&A transactions: How to mitigate risk through due diligence | Miller Thomson","og_description":"As companies have become increasingly technology-driven in recent years, a target\u2019s cybersecurity posture has become a key focal point in the diligence process. The COVID-19 pandemic has made this concern particularly acute: notwithstanding that an increasingly large number of people have returned to the office in recent months, there remains a sizeable remote workforce in [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2022-09-30T20:28:38+00:00","article_modified_time":"2025-12-30T00:03:36+00:00","og_image":[{"width":1776,"height":994,"url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","type":"image\/jpeg"}],"author":"Katherine Chan","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Katherine Chan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/"},"author":{"name":"Katherine Chan","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6"},"headline":"Managing cybersecurity in M&#038;A transactions: How to mitigate risk through due diligence","datePublished":"2022-09-30T20:28:38+00:00","dateModified":"2025-12-30T00:03:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/"},"wordCount":936,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/","name":"Managing cybersecurity in M&A transactions: How to mitigate risk through due diligence | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","datePublished":"2022-09-30T20:28:38+00:00","dateModified":"2025-12-30T00:03:36+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","width":1776,"height":994,"caption":"person in hoodie looking at a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/cybersecurity-mergers-acquisitions-transactions-mitigate-risk-due-diligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Managing cybersecurity in M&#038;A transactions: How to mitigate risk through due diligence"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6","name":"Katherine Chan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","caption":"Katherine Chan"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=6198"}],"version-history":[{"count":0,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14345"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=6198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=6198"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=6198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}